Friday, May 2, 2008

Aliguyon

ANG AWIT SA TAG-ANI NI ALIGUYON

Si Aliguyon, anak ni Amtalao
Na nakatira sa Hannanga,
Isang araw ay nagwika,
"Nasaan kayo, mga kaibigan ni Aliguyon?
Gawin ang ginagawa sa Hannanga."
Maiingay ang mga kaibigan ni Aliguyon,
Na naglaro ng trumpo.
Trumpo ni Aliguyon tumilapon sa bakuran,
Umikot pataas sa bahay,
At tinamaan ang bangibang ni Iken.
Waring umaawit na tumunog ang bangibang;
Nadinig ni Aliguyon, anak ni Amtalao,
Pumasok, tumingala sa pinto ng bahay
Nakitang ang bangibang at ibinaba,
Ibinato ni Aliguyon ang bangibang kay Iken.
Agad niyang kinuha sa kulungan ang tandang
At agad itong pinanaog sa silong.
Lumundag siya sa batong dingding ng kamalig,
Sumigaw, "Mga kaibigan, gawin ang dapat gawin
Dasalin ang panalangin sa tandang
pagkat tayo'y pasasa digma."
Maingay na nagtipon sila.
Nagtipong samasama sa
Taimtim na nagdasal si Aliguyon sa silong,
Nagwika, "Bigyan kami ng tanda aming
tandang.

Tuesday, April 1, 2008

My Argumentative Research Paper: How Unsafe Can You Get?

In late August 2003, a malicious code called “Sobig.F” unleashed its terror upon the World Wide Web. The worm has the capability to evolve from the instructions it gets from 20 computers. Because of this “adaptation,” it is impossible for antivirus programs to detect, block and repair the damage. Unlike other malicious code, the sender does not have to send the message to his contacts for the infection to take place. The virus takes the initiative to send itself to all persons in the mailing list.

The infection was so severe that 1 in 17 mails sent worldwide are infected and reporters at the New York Times had to turn off all their terminals. Also, Sobig.F does not do any damage to hard drives. This means that all files in the computer’s hard drive are intact. So what do we need to worry about? Sobig.F might not deal destruction to hard drives but networks get napalmed. All internet applications, and including email, crashed and became as good as nothing. Thankfully, before the infection spread even further, investigators were able to track and shut down 19 of the 20 computers used to give instructions to the virus and the last computer redirects the infected computers to a “run-of-the-mill sex site” (Taylor, 2003).

The first paragraph might be an apt synopsis for a sci-fi thriller. However, that amount of destruction does not end in the movies. This is true. Virus infections are everywhere. If it could happen to the best of us (i.e. denial of service attacks on large computer corporations like Microsoft), it could happen to any of us. This paper deals with how one of the new media of communications, called email, has made life easier but more unsafe for us.

Most Common Threats

The number one threat to an email’s integrity (authenticity of data and other factors associated with it) are viruses. The biological virus is harmless outside a cell. When it comes in contact with a cell, it multiplies inside the cell until the cell ruptures. Likewise, computer viruses are virtually harmless outside of a “host” computer. The good part ends at that since viruses do not stay outside of a host computer forever.

Because of the relatively high frequency of virus infections, antivirus software are the most used security tool by large companies. In the United Kingdom alone, all large businesses and 49 out of 50 businesses use this kind of software overall (Pricewaterhouse, 2006). Email has a significant amount of contribution for this infection. Virus-infected messages usually have attachments that have subjects that are sexual in nature to make sure that the owner of the email address would at least stop and be curious enough to open the attachment (the file bundled to the message). Anti-spyware software ranks a close second. There is reason for this kind of security paranoia. In 2006, almost half of all businesses in Great Britain were infected with at least one kind of virus. But another problem comes to mind: viruses are revised by the same or different programmers and, therefore, antivirus software cannot recognize such threats. To counter this, most software offer updates to their virus database or list of viruses. This means that new viruses or modifications of old ones can be recognized. There are two kinds of updates: signature files and critical updates. Both are crucial to antivirus software’s function. Signature files contain the signatures (what makes the virus different from harmless code and what makes it different from the other virus) for specific viruses. Critical updates contain updates about the overall program itself, usually with the database and the workings of the programs. But to recognize the infection, some damage must be done by the new virus to be officially called a virus. In other words, antivirus software would not detect a new virus unless the virus shows its effects (“Viruses and malicious software,” 2006). Much like what a vaccine does to the human body but, this time, email is the syringe. This amount of complexity in the part of the antivirus program mirrors the destructive capability of viruses. In this arms race, email users are always on the defensive.

Spyware are the more stealthy cousins of viruses. From the name itself, its function can be deduced. This type of malicious code aims to get personal information (such as name, birthday, email and social security number, etc.) from the user. This type of infection is usually less destructive than a virus. Aside from websites, they are usually in the form of email attachments. The subject of the email would probably be something about winning in a lottery or a jackpot. The senders would usually ask for personal information (name, birthday, social security number, etc.) to be emailed to them. Even if the user recognizes that the message is a fake one, a well-constructed message might already have embedded spyware at the email user’s mailbox or at the user’s hard drive. A possible way of data gathering by the spyware is by recording the letters or numbers typed by the program user. The spyware then sends the recorded set of characters to the spyware’s creator. The first set of characters typed by someone is the person’s password in the Windows interface. This is far less dangerous than the spyware in the mailbox since the hacker must be physically present to open the account using the password. In Yahoo! Mail, for example, whenever the user tries to access the URL http://mail.yahoo.com or http://www.yahoomail.com, the spyware is prompted to begin recording information. Whatever is typewritten in the username and password field is stored by the spyware for future use. Though these are but some possible scenarios, with the vast amount of spyware available, it is impossible that no programmer has at least took into consideration the said plan of attack.

Adware is one of the most visible types of security breaches. Compared to a virus and spyware, any ordinary personal computer user can create an adware. Adware (from the root words “advertisement” and “software”) is in the form of a promotion of a commercially available product. Whether this product is for sale or not or whether the product even exists is most usually unknown by the recipient of adware. Adware would range from fully-colored and graphically complex ones to a text-only email. The more visually appealing adware sometimes have an animated button that says “Click Me!” or a variation of that device. The advertisement contains text saying, “You won $1,000,000” or “Congratulations! You are the 999,999th visitor,” both of which are too good to be true. If the user, by any means, accessed the link given in the adware, a site, heavily-infected with viruses, spyware, adware, etc. would appear. This would make the adware an indirect way but, nonetheless, another way of infecting computers. With the text-only kind of adware, a message containing the name of the product, a tagline and a link to a website is used as a method of cheap (has costs so negligible that it is almost free) product endorsement. Most users would think that not clicking the link or deleting the message solves the problem. However, adware has a defining characteristic: “persistence.” The same message could be sent 10 times, registering as 10 emails in a recipient’s mailbox. This would be a complete waste of time for email users. Of course, if the messages use the same words for its subjects, the email user could open the message, read the message and delete the other emails since they would most probably contain the same texts for the message itself. However, it is more recommended that this kind of email should not be opened at all and should be deleted immediately. People might think that avoiding adware is easy and that personal information cannot be taken from them if the users do not give it. As a matter of fact, the mere presence of an adware in an email message is an indicator that the sender knows the user’s email address or the email address of the user’s group at the least.

Problems with the Predecessors of Email

Before email, prototypes or what is popularly called beta versions, were used which cater only to specific audiences. These services are similar to email in the aspect of delivering a message in a way that can be read by the computer.

A proposal for a more efficient form of communications was made in 1977. Compared to the traditional snail mail which took days to reach its destination, this proposal claimed that this new communications system, called electronic mail, will “reduce transmission time to minutes” (Potter 1161). By 1986, an electronic mail system (EMS) capable of “computer text processing and communication tools to provide a high speed information exchange service” (Sproull and Kiesler 1493) was already in use. The user of this system needs only to make an account, as all email clients/providers require up to the present, and he can then use email to send messages to email accounts of computer users connected to a network the sender is connected to. The rudimentary text processing has greatly improved. Today, Microsoft Word is the dominant text-processing software due mainly to it being bundled to most Windows operating systems (OS), which is the most iconic OS since the late ‘80s. Also, Microsoft Word Documents (abbreviated as Word documents and carrying the .doc format) can now be “linked up” with email through attachments, the information exchange capability of email. The information exchange capability is what malicious software writers employ to bundle viruses, spyware, adware, etc. with an innocent-looking email. One of the best features of email is its non-simultaneous capability. Whether the receiver is connected or not connected to the internet, he will be able to receive an email. Compare this to telephones which require that the caller and receiver by on the phone at the same time (Sproull and Kiesler 1495). There should be conscious coordination between caller and receiver due to time zones, schedules and other such constraints. There is the factor of time and place. Communication via snail mail already solved both these problems but it is too slow (Sproull and Kiesler 1945). The 1986 EMS was able to solve the problem of synchronicity but it will take years before email can be used anywhere (the advent of the laptop and wireless technology are credited for this). Because of being non-simultaneous, virus writers can now “fire-and-forget.” All they have to do is compose a message, attach a virus and send the message. Afterwards, they could hide safely in the anonymity of their fake accounts knowing that, their message will be received almost always. As of today, email can transmit messages in seconds. The extremely quick transmission time is an obvious benefit of this system. However, this is a double-edged sword. This also means that infection-laden emails can propagate in a very short amount of time. The author of the article even predicted the use of high-speed media in conjunction with the internet and the reduction of prices in communications.

One could envision future generations of communicating equipment using magnetic media, such as disks, or high-speed tapes with higher throughput capability and highspeed modems. This would further reduce the cost of transmission and provide a tremendous communication savings for the user, providing his volume can justify the investment in the terminals and systems (Potter 1161).

Today, the most popular email web clients like Yahoo! Mail and Gmail even offer email free of charge. As a consequence of this, fake email accounts, which are accounts with forged personal information, have multiplied in number. These fake accounts are an essential tool for virus writers due to the privacy that it offers. In essence, email has been used against itself.

The first users of electronic mail are companies. Because of this factor, knowledge of even the simple workings of the system is limited to few. Now, electronic mail is a very prevalent form of communication that almost all people in first world countries own one. Because of its negligible cost, email, which was once a luxury available for top companies only, was now a necessity available to all people. This has made the knowledge of the weakness of email known to a large number of individuals.

In 1978, an early but fully-functional form of email is the Electronic Mail System (EMS). This system was first used by the United States military under the Advanced Research Project Agency (ARPA) of the Department of Defense. The “…concept was to install dedicated minicomputer systems in selected facilities or clusters, tied together in a logical mail network…” (Crawford 2). This is very similar to what the servers do to support the growth and data stored in the World Wide Web. Multiple servers are currently used to relay information from one computer to the next. This relay can be in the form of web pages or emails. Also, the number of servers used is directly proportional to the distance between the two computers. Like email, EMS can store data in a network in organized arrays, resulting in files. This military system used civilian establishments, most notably companies, as guinea pigs to find out the user’s response to the new system of communication. In offices, the most commonly utilized forms of communication are memos (physically attached to a location where it is visible to the personnel concerned), telephones and fax machines. The response was an increase in the rate of productivity. “Secretaries estimated that EMS saved them an estimated eight to ten hours per week, and managers estimated their saving [sic] to be about seven hours per week…” (Crawford 4). This was the beginning of a psychological dependence, on part of humans, on email. Because EMS reduced workload, people tried to use the system to its limit to achieve maximum efficiency. What they did not take into consideration at that time are certain factors which they just considered as theoretical. These include increasing connection time resulting in inadequate service and, further, more users being added on to the network. Similar to adware, office memos became more informal but EMS cannot differentiate between adware and a useful email message Because of this, “…the mass storage capabilities of the system can become swamped rather quickly.” More problems were later discovered including “… high frustration for all users because of poor resistance, undue internode message delays and, even worse, low probability of access to the system during prime time [sic]. The popularity of the new tool almost became its downfall! (sic)” (Crawford 8). Email groups were formed in businesses as different groups specialized in various tasks to keep the business running. In EMS, only one note is needed to send a memo to a group. The group then sends the message to each and every member of the team. Each contains a field where the recipient ID is seen. If this is seen by a third party (another person or group of persons not included in the network), like the EMS, the members of the group are compromised.

Electronic Data Interchange (EDI) is another form of email used by companies. EDI is capable of transmitting information via a specified format. “Transactions may be initiated directly by customers and vendors. The authorization of transactions is controlled by limiting those trading partners that can gain access to the computer system” (Hansen and Hill 403). This could only mean that certain features comparable to today’s emails, like username and password for authentication, was shared by at least two groups. One of the most common tips in cyberspace was to make a password known only to the account’s owner. The sharing of an account needs a very strong sense of trust (a very hard thing to come by between business partners) especially in an extremely competitive area like business. “A paper-driven system naturally creates a trail of documents that allow tracking of the transaction activities. These documents are not necessary to process transactions in an EDI system [sic]” (Hansen and Hill 410). The paper trail, though cumbersome and takes up huge amount of resources, is good form tracking business transactions. EDI is considerably harder to trace than a paper trail, making it ideal for hiding anomalous transactions as well as for hackers to sneak into.

Prevention and Protection

A message can be protected by encryption. Encryption changes the original message (called “plaintext”) into a garbled, incomprehensible and unreadable form (called “ciphertext”). Two types of key encryption are utilized by email: symmetric key encryption and asymmetric key encryption.

Symmetric key encryption involves the possession of a key. A long set of letters (both uppercase and lowercase) and numbers comprises the key. This key contains instructions to be given to the computer to change plaintext into ciphertext. However, the sender and the receiver must have a copy of this key as this key can be used to reverse the instructions given to the previous computer and apply this to the ciphertext sent to the receiver computer. The receiver computer changes the ciphertext back to its readable form, the plaintext. This change is called decryption. Ideally, only one sender and one receiver should have the same key. This means that for a person with 10 contacts, he should possess 10 distinct symmetric keys. Applying this further, if all 10 of the person’s contacts have also 10 contacts and uses symmetric key encryption, there should be a total of 55 distinct symmetric keys for that specific network. Due to being reversible, a symmetric key is hard for ordinary people to crack but, compared to the next techniques in encryption, fairly easy for a determined hacker to get and very easy for government agencies, specifically, the Central Intelligence Agency (CIA) and the National Security Agency (NSA) of the United States. If in the case that the hacker was able to get the key, by any means possible, the connection between the sender and receiver is compromised (Schneier, 1995).

Symmetric key encryption users have two keys: a public key and a private key. Both keys also comprises of a long set of random characters and numbers. The public key is usually posted at a forum managed by the receiver or any public accessible website owned by the receiver. Visitors of the forum or website can email the owner of the website with confidence that information sent via the internet is secure because of the system’s relatively strong indecipherability. The public key is a one way key: this means that the public key can only be used for encryption. The public key is useless for decryption. If it was used in decryption, another garbled message, which has a security that was further strengthened by double encryption, is the result of this error. The private key is similar in form to the public key: it also uses a random combination of letters and numbers. However, this key is available only to the receiver. This means that only the receiver has the capability to decrypt the message. The sender cannot decrypt the message (however, the sender composed the original message so it is useless to have the private key). The private key cannot be used as to encrypt the message. This would result in an unreadable form of the message which will render the message impossible to decrypt. In this case, the private key was used to encrypt (a task for the public key) the message. Because public and private key occur in pairs, making the private key do the task of the public key made the private key the public key. This means that another private key is needed to decrypt the message encrypted by the private key but the private key that should be used to decrypt the message does not exist. Compared to the cumbersome symmetric keys, asymmetric keys are much easier to use. For a certain individual with 10 contacts, all he needs is one public key and its corresponding private key. If all the individual’s contacts also have 10 contacts and they all use asymmetric key encryption, this means that only 10 pairs of public and private keys are needed. For this system to be compromised, a hacker must get both the public key and the private key. If the hacker succeeds in getting the private key (getting the public key is a piece of cake), the owner of both keys is compromised. In this case, only the owner is compromised but all of his encrypted incoming mails are now rendered useless (Schneier, 1995).

Digital Signatures are a set of codes embedded in an email. This is more effective if combined with asymmetric key encryption. In this system, a code is generated and inserted into the message. If the message was received and/or decrypted, the digital signature would look like a long string (i.e. combination) of characters and numbers which have no meaning and no pattern. The digital signature is unique for every email. Every email, even by the same sender, has a different digital signature. The digital signature is an indicator of the authenticity of the message. If the message was modified by a third party, a hacker for example, the digital signature would also be modified. If the receiver gets the email, he would know that it was tampered with due to the tampered digital signature.

Conclusion

The nightmare that was Sobig.F was over. However, infections due to virus, spyware, adware and the like are still roaming the Internet. It might neither be now nor tomorrow, but one thing is for sure: a bigger and badder virus might make its way into mailboxes. Who knows what adaptation this virus would have? It could send probably send itself a hundred times among all a person’s contacts. It might not only bring down the internet but even the hard drive. This time New York Times would not be the only ones beating the clock to shut down their computer terminals. At least 10 percent of email would be infected. By that time, hard drives have crashed and the whole world could be in a state of pandemonium. Industries, stock markets and whole nations would go down overnight. Too bad not all people learn from other’s mistakes. Sobig.F was stopped in its tracks. The world’s gamble paid off. However, even gamblers run out of luck. The question is: when?

Sources:

  1. Crawford, A. B. Jr. “Corporate Electronic Mail—A Communication Intensive Application Information Technology.” MIS Quarterly 6.3 (Sep. 1982): 1-13. Journal Storage. Rizal Library, Ateneo de Manila University, Quezon City. 28 Nov. 2007. .
  1. Hansen, James V., and Ned C. Hill. “Control and Audit of Electronic Data Interchange.” MIS Quarterly 13.4 (Dec. 1989): 403-413. Journal Storage. Rizal Library, Ateneo de Manila University, Quezon City. 28 Nov. 2007. .
  1. Taylor, Chris. “Attack of the World-Wide Worms.” TIME Magazine (1 Sep. 2003): 16 pars. 24 Dec. 2007. .
  1. “Information Security Breaches 2006: Viruses and malicious software.” Pricewaterhouse Coopers. Apr. 2006. Department of Trade and Industry, United Kingdom. 8 Dec. 2007. .
  1. Potter, Robert J. “Electronic Mail.” Science 195.4283 (18 Mar. 1977): 1160-4. Journal Storage. Rizal Library, Ateneo de Manila University, Quezon City. 28 Nov. 2007. .
  1. Schneier, Bruce. Email Security: How To Keep Your Electronic Mail Private. New York: Wiley, 1995.
  1. Sproull, Lee, and Sara Kiesler. “Reducing Social Context Clues: Electronic Mail in Organizational Communication.” Management Science 32.11 (Nov. 1986): 1-21. Journal Storage. Rizal Library, Ateneo de Manila University, Quezon City. 28 Nov. 2007. .


Monday, March 31, 2008

SJ Philippine Province Guidelines on the National Situation

March 25, 2008
TO THE WHOLE PROVINCE


Re: Endorsement of GUIDELINES FOR COMMUNAL DISCERNMENT AND ACTION TO ADDRESS THE NATIONAL CRISIS
to Jesuits and Jesuit Institutions of the Philippine Province


With this letter, I wish to endorse to all Jesuits, Jesuit communities and Jesuit apostolic institutions of the Philippine Province, the attached Guidelines for Communal Discernment and Action to Address the National Crisis, produced by our Province Commission on the Social Apostolate.

The following Guidelines are not a “statement” or a “manifesto” of a “Province position or stand.” Rather, this document fills an important need in our emotionally charged and often confusing context: it provides a substantive analysis, based on Catholic moral and social doctrine, of our present national situation and the various options and courses of actions taken or advocated in response to that situation. It is hoped that the carefully reasoned assessments presented here will aid communal discernment and action.

There are four major sections to these Guidelines. After a brief introductory review of the present context, the Guidelines provide:

1. A presentation of the range of responses made by various groups to the present crisis;
2. A summary of “non-negotiable” guiding principles, drawn from the Catholic moral and social tradition;
3. An assessment of different options and positions, based on the non-negotiable principles earlier identified; and
4. An identification of possible action points for the future, in the light of the analysis in the previous two sections.

As I sincerely thank the members of the Province Commission on the Social Apostolate who labored generously on this document, I ask that individual Jesuits, Jesuit communities and institutions read, reflect, pray over, and discuss these Guidelines, toward the discernment of principled, responsible and effective action. These Guidelines may also be shared with others who are seeking direction and guidance.

Although I endorse this document as a very helpful and illuminating guide, no one, of course, is compelled to agree with or adhere to all the points made in the text. At the same time, I hope that the careful analysis offered in this paper is given a fair and thoughtful reception. Moreover, as I said in a similar letter I wrote three years ago, “if some, in conscience, differ with the positions taken here, let that dissent be presented with civility and intelligence, as input for the continuing task of communal discernment towards that which will serve the true good of our country.”

Finally, during this Easter season, we pray for our country in hope, and we pray too that the Lord may allow us to be his instruments of hope and new life for our people.

Fraternally in our Lord,



DANIEL PATRICK L. HUANG, S.J.
Provincial


Guidelines for Communal Discernment and Action
to Address the National Crisis


The Context

1. The ZTE-NBN controversy has once again raised questions about abuse of power and systemic corruption in the government of President Gloria Macapagal-Arroyo (GMA). This is just the most recent in a series of events that indicates a worrisome pattern of behavior in government, particularly of anomaly and cover-up, leading to the weakening of Philippine democratic institutions. Among these are the “Hello Garci” scandal, the fertilizer scam, the promulgation of calibrated preemptive response (CPR), EO 464 and PP 1017, the unresolved extrajudicial killings and disappearances of activists and media practitioners, the undermining of impeachment proceedings, the pursuit of self-serving charter change, and the lack of a decisive response by the government to the farmers of Sumilao, Bukidnon due to political compromises in the implementation of agrarian reform. Good governance and longterm reform are being sacrificed for short-term political survival.

2. Many Filipinos are outraged by this situation because of what appears to be a deliberate suppression of truth, and the refusal of the government to be made accountable. Many also feel confused and powerless, leading to a sense of hopelessness and deepening distrust of political leaders and institutions. There is a real danger that citizens will become disempowered and disengage themselves from politics. At the same time, there are also those whose frustrations have led them to join armed insurgent groups or are seriously considering insurrectionary and other unconstitutional options because of the inability of government to effectively address the issues of the poor and respond to the call for truth and accountability. Then there are some members of the economic and political elite, who out of pragmatic considerations, have adopted a “wait-and-see” position and have therefore not helped in providing clear leadership in terms of clarifying the issues and options.

These include the politicians who are potential presidential candidates in the 2010 elections.

3. While there is anger and despair because of what is happening to the country, there are also possibilities that have opened up with the recent events, for bringing about serious and much-needed changes in the political and governance institutions and culture of the country. How we respond as a people to this crisis will determine whether we can make the most of this opportunity for a renewal of Philippine democracy.

Diversity of Responses

4. Part of the reality of the present crisis is the diversity of views and even division among people, across and within sectors, in their analyses of and reactions to the situation. Therefore, it is important to note the range of political positions and options among those who have responded. This range represents a continuum, that allows a capture of the essential differences across groups, while at the same time recognizing that there are real overlaps among the positions and those who represent them.

a. “The economy is good. Let’s move on.” The Arroyo government and its allies insist on projecting a picture of a growing economy, on the one hand, which is undermined by unnecessary and debilitating “political noise,” on the other hand, created by “partisan” groups whose only agenda is to unseat the President. This type of politics is seen as bad, not just for economic growth, but also for addressing the poverty problem because it is the poor who are most affected by political instability. Therefore in this view, the country must move on, since it argues that the administration has a mandate to rule until 2010. Likewise, there are those who may not explicitly support GMA, but believe that given the alternatives, the President represents the lesser evil. Effectively, they do not support any moves to hold the government accountable.

b. “All politicians are corrupt. Let’s focus on jobs, services and the poor.”
Some business associations, socio-civic organizations and faith-based groups are highly cynical of national politics or have given up on it altogether, and thus do not see it as the avenue for meaningful change. They concentrate on what they see as the more important tasks of job-creation and service delivery (e.g., housing, health, education). They believe that what they are doing has more long-term impact because they address the more basic issues of poverty and hopelessness, which breed corruption and a culture of dependence.

c. “Let the 2010 elections resolve the crisis.” Strict rule-of-law advocates hold that President Arroyo legitimately won the 2004 elections, even if there are serious and impeachable questions of cheating. They believe in accountability through constitutional mechanisms like an independent factfinding commission, impeachment and ultimately elections. In this perspective, there is no doubt that the search for truth must be pursued, even as they believe that the crisis can only be eventually and truly resolved through the electoral exercise scheduled for 2010.

d. “Bring out the truth, hold GMA accountable, and work for reform.” There are faith-based and civil society organizations that call for “truth, accountability and reform,” emphasizing concrete measures like resolving the issue of executive privilege, calling for an independent counsel (with investigative and prosecutorial powers), pushing for possible impeachment, and advocating long-term reforms pertaining to freedom of information and transparency, electoral and civil service reform, and social justice (especially agrarian reform). These initiatives are meant to provide constructive ways for people to participate in meaningful democratic governance and institution-building. e. “No real reform is possible under GMA.” There are prominent concerned individuals and groups who also adopt a truth-accountability-and-reform framework, but are more emphatic that a precondition for genuine long-term reform is holding President Arroyo directly accountable for the undermining of institutions. Thus, they would tend to be more explicit in taking a principled position that the government should step down, and that a succession should hew as much as possible to the Constitution.

f. “Oust GMA.” Various groups from both the Left and the Right of the political spectrum, many of them not sharing a long-term agenda, are tactically coming together on the objective of ousting the Arroyo government, even through extra-constitutional means. This may take the form of an EDSA-like people power, military withdrawal of support, a Cabinet coup, or some combination thereof. They are not in agreement on who or what should assume power in the aftermath of an Arroyo ouster. Some may accept Vice President Noli de Castro taking over, while others prefer special elections (on the premise that the Vice President will also step down or be made to do so) or “snap elections” or an interim civilian-military junta that will put key reforms in place and oversee a return to constitutional government. It is important to note that groups on the Left recognize the need for bringing in more long-term structural reform, beyond merely replacing the President.

Non-negotiable Principles

5. Given these and other options that may be taken, it is important to identify some non-negotiables, for more thoughtful and responsible communal discernment and action:

a. Uphold the truth. Truth, especially regarding cases of graft and corruption, cannot be sacrificed in the name of stability. Stability that is the product of unresolved issues tends to be shallow and short-lived, as the credibility and capacity of institutions designated to pursue the truth are weakened, and other cases of corruption surface again and again. Moreover, this situation contributes to the reinforcement of a culture of impunity.

b. Exact accountability. Government must be held accountable by the people, for all its actions and decisions, in all policy areas, and at every point of its stay in power. This means that the exacting of accountability should not take place only at the time of elections because democracy cannot be confined to the single act of casting a vote, but is a continuing process of citizen participation. Nevertheless, elections are also a core mechanism of accountability, especially since the present political crisis is linked to unresolved questions of electoral cheating. Part of the response necessary at this time involves the rebuilding of public trust and confidence in institutional mechanisms of accountability.

c. Pursue meaningful reforms. Even in situations of crisis, efforts at electoral, bureaucratic, and social reform should not cease because many of the country’s problems are really of a structural and institutional nature, needing continuing transformation. There is a need to recognize the problems and propose concrete solutions.

d. Build and strengthen democratic institutions. The country needs to establish and fortify democratic institutions, which provide consistent, organized and self-regulating procedures, applied to all citizens equally. Among these institutions are due process, civilian supremacy, rule of law, checks and balances. While Philippine democracy is still flawed, the genuine gains that came with the dismantling of the Marcos dictatorship and the restoration of democratic institutions should not be lost. The alternatives (e.g. a military junta, a civilian-military authoritarian regime, a communist government) are even more unstable, unpredictable, unsustainable, and potentially harmful. A second democratic breakdown, moreover, will be much more difficult to undo. Strong democratic institutions can likewise help address the present conditions of real divisions among Filipinos. By providing agreed-upon rules and mechanisms which are accepted as credible and fair, institutions facilitate the peaceful resolution of conflicts among dissenting positions and approaches.

e. Promote responsible and engaged citizenship. Moral outrage in the present moment is called for, and is critical for a committed response; but it must also lead to a serious and responsible consideration of consequences for the medium and long term. Hopefully, such a responsible and engaged citizenship will lead to the transformation of the present culture of one-sided dependency on leaders. The country’s problems have been reinforced by generations of patronage that have led Filipinos to depend disproportionately on those who have more resources and more power, in politics and society at large, in the Church, and even in the ordinary barrio or baranggay.

f. Champion active nonviolence and protect human rights. Action is to be guided by principles of active nonviolence. “Violence is evil… violence is unacceptable as a solution to problems…. Violence destroys what it claims to defend: the dignity, the life, the freedom of human beings” (Compendium of the Social Doctrine of the Church, 496). Human and civil rights must always be respected and promoted (Centesimus Annus, 22). Any coercive means is unacceptable, including forms of harassment, detention without due process, and policies that seriously undermine the freedom of the press and the right to self-expression and organization.

g. Prioritize the poor. The real and urgent concerns of the poor should be given highest priority amidst all efforts to search for the truth and promote accountability. If many Filipinos seem to be uninvolved or uninterested, it is primarily because of an overriding concern for economic survival during very hard times. Indeed, the search for the truth is integrally linked to the fate of the poor. Corruption and dishonesty have made the lot of the poor worse. Programs and initiatives from both government and the private sector to address poverty and inequality, and to respond to the urgent needs of the poor, in fields such as education, health, housing, livelihood and the environment should continue to be supported, and indeed intensified.

h. Engage and involve the youth. It is important that all activities should seek to involve the youth, and harness their energies, especially for truly sustainable reforms and institution-building. Significantly, recent events have awakened many young Filipinos and stirred them to become more politically involved. Today, there is an opportunity to do political education and mobilization of the youth on a scale not seen for many years.

Analysis of Options

6. Given these guiding non-negotiable principles, the different positions and options presented above can now be reviewed, in order to help build common ground and move towards a consensus on how best to respond to the ZTE-NBN scandal and the broader political crisis:

“There is no problem with GMA.”

a. Business as usual, status quo. Not holding government accountable in any way is unacceptable. “Political authority is accountable to the people…. Those who govern have the obligation to answer to the governed” (Compendium, 408, 409). The nature of the allegations of corruption in this particular case is so serious, that any government with some sense of responsibility to its citizens cannot but respond, to work towards establishing the truth beyond any major question or doubt, and so confirm its legitimacy. “Political corruption… betrays both moral principles and the norms of social justice.” (Compendium, 411) Moreover, there is much truth to the view that fighting corruption is not against the economy. Indeed, corruption is antidevelopment and anti-poor.

“GMA is not the main problem.”

b. Give up on politics. Among those who hold this position include a range that spans from the exhausted, to the cynical, to the apathetic. All of them move towards a position that views all politicians as being equally self interested. Effectively, none of them focuses on GMA as the problem. Such a view that disengages from all politics and does not identify concrete points of action and reform only contributes to the sense of hopelessness and paralysis. At all times, participation in the social and political realms, either as individuals or as members of organizations, is a duty to be fulfilled with responsibility and with a view to the common good (Compendium, 189).

c. Focus on the delivery of services to the grassroots. The preferential option for the poor necessitates a long-term perspective on development beyond mere regime change. It also makes the delivery of services to the grassroots essential, regardless of who is in power. Thus, those who have opted to concentrate on this course of action are to be commended. However, while citizen-involvement in particular areas of social development and local politics is a form of participation, they will always be constrained by large-scale anomalies and abuse of power on the national political level. All citizens must work towards the eradication of the evils of patronage politics and national political corruption, in order to promote the common good.

“How does one address the GMA problem?”

d. Call on GMA to resign. There are individuals and groups who have been calling for President Arroyo’s resignation since 2005 and continue to hold that position as a matter of principle. At that time, the CBCP itself recognized the call for the President’s resignation, as well as for a “Truth Commission” and impeachment, as legitimate options under the guiding principles of accountability, constitutionality, non-violence and effective governance. While the bishops did not call on President Arroyo to step down, they asked her to discern “to what extent she might have contributed to the erosion of effective governance and whether the erosion is so severe as to be irreversible.” Therefore, those who in conscience have made a decision that the President should not remain in office deserve respect. Their call for her to resign voluntarily is one of the options provided for in the Constitution. However, it also needs to be pointed out that while this position is one of principled moral conviction, it ceases to be a real political option if GMA remains resolute that she will not resign voluntarily.

e. Cabinet declaration of incapacity of the President. The Constitution provides that a majority of Cabinet members can declare in writing to the Senate President and the House Speaker that “the President is unable to discharge the powers and duties of his [her] office” (Article VII, Section 11). This is a constitutional way of removing a President who is seen to be physically or mentally incapacitated, but the meaning of this provision may be interpreted more broadly. This is one scenario for an “internal or Palace coup” within the GMA regime. But such decisions on regime change tend to be elitist, as they are dependent on so few people. This declaration can be challenged, however, by the President, in which case Congress may confirm the Cabinet decision by a two-thirds vote of the two houses of Congress voting separately. Note that this requirement is even more stringent than the one-third percentage required for the House of Representatives to send an impeachment complaint to the Senate for trial.

f. Oust GMA. When faced with the President’s refusal to resign voluntarily, those who are willing to push the demand for her to step down to the point of employing even extra-constitutional means must be reminded that democratic institutions may be harmed in the long-term, especially if a political vacuum is created for groups with an anti-democratic, adventurist or power-grabbing agenda to try to seize power and hold on to it indefinitely.

g. People Power. People power is a precious legacy from the struggle against the dictatorship and the restoration of democracy in the Philippines . EDSA I was the culmination of a long process of political education, organization and mobilization throughout the martial law years and especially during the nearly three years after the assassination of former Senator Benigno Aquino. Active nonviolence was a defining characteristic of EDSA People Power. It is enshrined in the Constitution, which values initiatives from below as a way of harnessing the direct participation of the people in politics and governance. In its current usage, however, it is problematic because it is often equated with popular insurrection and takeover as a method of regime change. This creates a dynamic where crisis situations continue to be resolved through extra-constitutional means which are not predictable, weaken democratic institutions and install leaders with questionable mandates. Thus an endless series of EDSA’s spells serious instability.

h. Snap elections. Any call for “snap elections” would be extra-constitutional, since there is no such provision in the present charter. What the Constitution provides for is the holding of “special elections,” should vacancies arise in the offices of both the President and the Vice President. Therefore, those who are advocating this option presume that both the President and Vice President will step down or will be made to do so. Moreover, special elections before 2010 without meaningful preparation and electoral reforms will only lead to a contest between those already entrenched in power and thus will not produce genuine change.

i. Military intervention. Some have called for an interventionist role of the military to effect regime change. While recognizing that there are reform-minded members of the military who have a genuine concern for the good of the country, military intervention in whatever form must be eschewed, especially in the present context of a weak Philippine democracy. Allowing the military to become the arbiter to resolve political conflicts and stalemates undermines civilian supremacy, long-term democratization and political stability.

j. An Independent Counsel. Some have called for an independent institution with the credibility and capacity for investigating and prosecuting government corruption at the highest levels. This proposal has been made because some see the Senate investigations as partisan, while the Ombudsman is overloaded with corruption cases and is perceived as partial to the government in power, given its recent track record. For this option to prosper, however, three difficult issues need to be addressed: (i) creating such a body through a law approved by Congress, (ii) defining the scope of its power and responsibilities, especially in relation to the Ombudsman, and (iii) giving it real autonomy, particularly from the President, who would be the appointing official.

k. Impeachment. This mechanism is provided for by the Constitution to exact accountability from the President. It is also a way by which allegations can be verified, thus giving the President a fair hearing and an opportunity to defend herself. However, impeachment will only work if people are willing to participate actively in pushing for and making sure that this process is effective (e.g. sustained lobbying, pressuring their representatives in Congress to prioritize the search for truth and accountability). Thus, it can provide excellent opportunities for active political participation, especially for citizens outside Metro Manila.

“How does one go beyond GMA?”

l. Elections. The forthcoming elections in 2010 will be critical. Not only will a new president be chosen, but this national exercise will also be crucial in the restoration of trust in the democratic system and the emergence of a new alternative leadership. It is imperative that they are conducted freely, honestly and credibly. Furthermore, there is a need for responsible citizens to organize around candidates, leaders and parties who are upright and capable, and who can contribute positively to the strengthening of weak institutions.

Action Points

7. It is precisely during times of great upheavals and crises that the call to hope becomes more urgent. Desperation and cynicism cannot be allowed to eat up people’s inner resources. To move forward from this crisis means identifying and pursuing specific forms of action, such as: (a) joining circles of ongoing reflection and discernment, and efforts at political education and organization, including training in anti-corruption advocacy (Ehem) and active nonviolence; (b) supporting institutional efforts to get to the truth and creating a broader climate of truth-telling which encourages and protects whistleblowers; (c) joining activities that promote accountability; (d) articulating long-term ideals and policies for national political reform; and (e) establishing sectoral and multi-sectoral organizations and networks to promote dialogue and concerted action.

Concretely, eight action areas fall within the range of options which are consistent with the principles identified above, especially the need to build strong democratic institutions and promote engaged citizenship for socio-political reform:

a. Support for the ongoing Senate investigation of the ZTE-NBN case not only to bring out the whole truth on matters of public interest but also to strengthen the institutional system of checks and balances that seek to prevent the abuse of power.

b. Creation of a credible Independent Counsel , in order to ferret out the veracity of various allegations and promote accountability within the judicial system, in which unfortunately many of the official institutions are seen as severely compromised politically. Thus there is a need for an institutional venue and mechanism that will be viewed as autonomous of the government currently in power and free of the antics of traditional politicians.

c. Initiation of a genuine impeachment process, particularly by pressuring Representatives in the House to hold the President accountable for serious violations of public trust if there are sufficient bases for doing so.

d. Pursuit of reforms towards government transparency in all its transactions, especially in processes like procurement, decisions on loans, development projects, social reforms, and on issues such as mining, energy and land use that have a profound impact on poor communities and the environment. There is a need to ensure rigorous implementation of laws and policies, the institutionalization of a culture of social accountability, free access to information, and the enhanced participation of civil society in governance decisions at all levels.

e. Promotion of electoral reforms to ensure the conduct of clean, honest, and credible elections in 2010, including the revamp of the Comelec, beginning with the appointment and confirmation of commissioners of unquestioned integrity and competence; the modernization of the electoral system; the eradication of warlordism; the monitoring of campaign finance and expenditure; and the continuing political education of voters.

f. Search for worthy candidates and potential leaders, parties/coalitions and platforms for 2010, through positive preparations, planning and strategizing. This would mean clarifying political values and development priorities, candidate selection and recruitment, resource mobilization, and political organizing.

g. Organization of and support for basic sectors, to enable them to have a real say in democratic processes and to address the urgent needs of economic development and social justice.

h. Engagement of the youth in current issues, through political education, organization and mobilization for democratic institution-building, lobbying for transparency and accountability, policy reform, and involvement in electoral politics.

8. These specific and concrete calls for action are not isolated and discrete but are precisely interconnected in a framework that seeks to promote truth, accountability and reform. They address gross injustices in the country through active citizen participation that will support and be supported by efforts at political education, organization, mobilization and network-building in order to strengthen and transform democratic political institutions under the Constitution.

Responding to the Call for Communal Discernment, Conversion and Action

9. We offer these guidelines as a response to the call of our bishops for “circles of discernment” to “pray together, reason together, decide together, act together.” We trust that these reflections help clarify the context, principles and options for people – especially the youth – who seek to respond in action to the current crisis rather than succumb to the temptations of despair. For as Pope Benedict XVI has said, “All serious and upright human conduct is hope in action” (Spe Salvi 35).

Philippine Province of the Society of Jesus

Commission on the Social Apostolate
Easter Sunday, 23 March 2008
Albert E. Alejo, S.J.
Xavier C. Alpasa, S.J.
Anna Marie A. Karaos
Antonio M. La ViƱa
Jose Cecilio J. Magadia, S.J.
Antonio F. Moreno, S.J.
Ermin B. Pimentel
Karel S. San Juan, S.J.
Benjamin T. Tolosa, Jr.
Primitivo E. Viray, Jr., S.J.
Peter W. Walpole, S.J.
Roberto C. Yap, S.J.

Thursday, March 27, 2008

The Fish

Elizabeth Bishop


I caught a tremendous fish
and held him beside he boat
half out of water, with my hook
fast in a corner of its mouth.
He didn't fight.
He hadn't fought at all.
He hung a grunting weight,
battered and venerable
and homely. Here and there
his brown skin hung in strips
like ancient wallpaper,
and its pattern of darker brown
was like wallpaper:
shapes like full-blown roses
stained and lost through age.
He was speckled with barnacles,
fine rosettes of lime,
and infested
with tiny sea-lice,
and underneath two or three
rags of green weed hung down.
While his gills were breathing in
the terrible oxygen
--the frightening gills,
fresh and crisp with blood,
that can cut so badly--
I thought of the coarse white flesh
packed in like feathers,
the big bones and the little bones,
the dramatic reds and blacks
of his shiny entrails,
and the pink swim-bladder
like a big peony.
I looked into his eyes
which were far larger than mine
but shallower, and yellowed,
the irises backed and packed
with tarnished tinfoil
seen through the lenses
of old scratched isinglass.
They shifted a little, but not
to return my stare.
--It was more like the tipping
of an object toward the light.
I admired his sullen face,
the mechanism of his jaw,
and the I saw
that from his lower lip
--if you could call it a lip--
grim, wet, and weaponlike,
hung five old pieces of fish-line,
or four and a wire leader
with the swivel still attached,
with all their five big hooks
grown firmly in his mouth.
A green line, frayed at the end
where he broke it, two heavier lines,
and a fine black thread
still crimped from the strain and snap
when it broke and he got away.
Like medals with their ribbons
frayed and wavering,
a five-haired beard of wisdom
trailing from his aching jaw.
I stared and stared
and victory filled up
the little rented boat,
from the pool of bilge
where oil had spread a rainbow
around the rusted engine
to the bailer rusted orange,
the sun-cracked thwarts,
the oarlocks on their strings,
the gunnels--until everything
was rainbow, rainbow, rainbow!
And I let the fish go.

How Do I Love Thee?

Elizabeth Barrett Browning


How do I love thee? Let me count the ways.
I love thee to the depth and breadth and height
My soul can reach, when feeling out of sight
for the ends of being and ideal Grace.
I love thee to the level of every day's
Most quiet need, by sun and candlelight.
I love thee freely, as men strive for Right:
I love thee purely, as they turn from Praise:
I love thee with passion put to use
In my old griefs, and with my childhood's faith;
I love thee with a love I seemed to lose
With my lost saints,--I love thee with the breath,
Smiles, tears, of all my life!--and, if God choose,
I shall but love thee better after death.

Do Not Go Gently Into That Good Night

Dylan Thomas


Do not go gentle into that good night,
Old age should burn and rave at close of day;
Rage, rage against the dying of the light.

Though wise men at their end know dark is right,
Because their words had forked no lightning they
Do not go gentle into that good night.

Good men, the last wave by, crying how bright
Their frail deeds might have danced in a green bay,
Rage, rage against the dying of the light.

Wild men who caught and sung the song in flight,
And learn, too late, they grieved it on its way,
Do not go gentle into that good night.

Grave men, near death, who see with blinding sight
Blind eyes could blaze like meteors and be gay,
Rage, rage against the dying of the light.

And you, my father, there on the sad height,
Curse, bless me now with your fierce tears, I pray.
Do not go gentle into that good night.
Rage, rage against the dying of the light.

Tuesday, March 25, 2008

Delight in Disorder

Robert Herrick


A sweet disorder in the dress
Kindles in clothes a wantonness:
A lawn about the shoulders thrown
Into a fine distraction,
An erring lace, which here and there
Enthralls the crimson stomacher,
A cuff neglectful, and thereby
Ribbands to flow confusedly,
A winning wave (deserving note)
In the tempestuous petticoat,
A careless shoe-string, in whose tie
I see a wild civility,
Do more bewitch me than when art
Is too precise in every part.