Professional Documents
Culture Documents
NBN-ZTE SCANDAL
After 13 hearing and 4 technical working groups, the Blue Ribbon Committee came up
with the following indisputable facts:
This is a story of how people in high places-the relatives of the most powerful men and
women in government took advantage of their relationships, either with their parent or spouse , to
cajole the Executive into entering a national broadband contract that would obtain something our
country did not need, and which is manifestly disadvantageous to the Filipino people. It is about
the war of the most powerful, most influential and most organized syndicates in government, some
members of which are public officers, who were at each other’s throats because of an alleged
double-cross. It is about the never ending battle among the political elite for economic power,
domination and control.
On the one hand, we have former Comelec Chairman Benjamin S. Abalos who claims to
have no less that the First Gentleman as his political sponsor. With him are Leo San Miguel, Ruben
Reyes and General Qurino De La Torre. They are known as the Filipino group. They are the group
that were lobbying for ZTE.
On the other hand, we have Mr. Jose De Venecia III, the son of then House Speaker Jose
De Venecia, Jr. who had no less than former NEDA Director General Romulo Neri as well as
Neri’s confidante, Engineer Rodolfo Noel “Jun” Lozada, as staunch supporters to hus BOT
scheme. Mr. Jose De Venecia III claims that he is a whistleblower. However, there were many
times in this scandal that he could have blown the whistle, but did not. He only started complaining
when he did not get his way. Mr. Jose De Venecia III and his group were pushing for Amsterdam
Holdings to capture the national broadband project.
In the middle of it all, is a President who was unable to control and discipline her own men
as they fight over their kickbacks. She kept her silence in the midst of the corruption- acquiescing
and condoning the deed. The facts pointing to her may not be total, but the stink is perceived to
have reached her office.
Because the NBN-ZTE controversy has reached fever pitch, the Philippine government had
to cancel the contract. Former Comelec Chairman Benjamin Abalos also resigned from his position
in the Constitutional Commission.
The NBN-ZTE scandal remains to be one of the most acrimoniously debated issues in the
Philippines. If people look at the opportunists in this scandal, they will discover that they are all
scavengers and predators ready to feast on the carrions of their preys. And when they cannot get
their rightful share of the booty, one of them squeals and they start pointing fingers at one another.
Everyone in this story stands accountable to the Filipino nation. This deal would been kept
hidden if all of the characters were able to “moderate their greed” and if ever they lived up to the
saying that there is “honor among thieves.” But, the situation got out of hand and the self-
proclaimed loser, Mr. Jose De Venecia III, spilled the beans.
Source: https://www.senate.gov.ph/lisdata/1293411633!.pdf
ARGAYOSO, KIM S.
With the advent of technology, innovations are constantly evolving in today’s world. Each
country are slowly adapting to the technological advances that we have in hope of making things
easier. However, not all the times, the intentions of those under transactions are entirely good.
These kind of projects pave the way to corruption.
But what is actually the relevance of this issue in the subject matter? As I delved deeper on
the issue of NBN-ZTE scandal, I found out that this mess is unethical and unconstitutional. The
people involved in agreement violated Article VII (Telecommunications Development) Section 22
of the Public Telecommunication Policy Act of the Philippines. Among the people who were sued
are officials from ZTE and DOTC for violating the Telecoms Policy Act, which required
privatization of all telecommunications facilities.
Also the deal was not entirely meant to benefit the Filipino people. The supposed main
benefactor of this deal is basically the government as it will the government communications
capabilities.
ARGAYOSO, KIM S.
CYBERCRIME
Cybercrime goes beyond the technical, transnational dimension and involves offenders
who deliberately fashion their attacks to exploit the potential weaknesses present in the
infrastructure’s transnational nature. It threatens the substantial and growing reliance of commerce,
governments, and the public upon the information infrastructure to conduct business, carry
Cybercrime is one of the fastest growing non-violent crimes in the Asian region. It takes
a great deal of technical expertise and co-operation, both local and foreign, in order to address such
problems. This crime affects different countries in varying degrees, depending on the extent of the
legislative enactment of each country. In the Philippines, as technical and electronic landscapes
change, there is a need to enact laws or amend existing laws to fully address cyber threats.
Source: http://www.unafei.or.jp/english/pdf/RS_No79/No79_12PA_Sosa.pdf
ARGAYOSO, KIM S.
Reaction: (Cybercrime)
Ethics are grounded in the notion of responsibility (as free moral agents, individuals,
organizations, and societies are responsible for the actions that they take) and accountability
(individuals, organizations, and society should be held accountable to others for the consequences
of their actions). In most societies, a system of laws codifies the most significant ethical standards
and provides a mechanism for holding people, organizations, and even governments accountable.
The world of Internet today has become a parallel form of life and living. Public are now
capable of doing things which were not imaginable few years ago. The Internet is fast becoming a
way of life for billions of people and also a way of living because of growing dependence and
reliance of the mankind on these machines. Internet has enabled the use of website communication,
email and a lot of anytime anywhere IT solutions for the betterment of mankind. Internet, though
offers great benefit to society, also present opportunities for crime using new and highly
sophisticated technology tools. The abuse of technology has been rampant since the innovations
Raising awareness about cybercrime law could somehow prevent the abuse of our
technological advancements from these low key or nonviolent crimes happening online. These
cybercrime acts has countless effects not only in the present but future generations. Among these
are moral degradation among the new generations, loss of revenue, tarnished reputations, breached
user’s privacy and etc. which are all eye-opener to everyone to not take these problems lightly.
The best way to slowly impair cybercrime is think not only solutions to overcome these problems
but also ways to prevent the factors that contribute to these abomination.
ARGAYOSO, KIM S.
DOMAIN NAME
The identification string that defines an authority or control within the Internet formed by
the rules and procedures of the Domain Name System (DNS) is called the Domain Name. Any
name registered in the DNS is a domain name. Domain names are used in various networking
contexts and application-specific naming and addressing purposes. In general, a domain name
represents an Internet Protocol (IP) resource, such as a personal computer used to access the
Internet, a server computer hosting a web site, or the web site itself or any other service
communicated via the Internet.
Domain names serve to identify Internet resources, such as computers, networks, and
services, with a text-based label that is easier to memorize than the numerical addresses used in
the Internet protocols. A domain name may represent entire collections of resources or individual
instances. Individual Internet host computers use domain names as host identifiers, also called host
names. The term host name is also used for the leaf labels in the domain name system, usually
without further subordinate domain name space. Host names appear as a component in Uniform
Resource Locators (URLs) for Internet resources such as web sites. Domain names are also used
as simple identification labels to indicate ownership or control of a resource. Example of these are
the identifiers used in the Session Initiation Protocol (SIP), the Domain Keys used to verify DNS
domains in e-mail systems, and in many other Uniform Resource Identifiers (URIs).
Domain names are often simply referred to as domains and domain name registrants are
frequently referred to as domain owners, although domain name registration with a registrar does
not confer any legal ownership of the domain name, only an exclusive right of use for a particular
duration of time. The use of domain names in commerce may subject them to trademark law.
Sources: en.wikipedia.org
ARGAYOSO, KIM S.
A special approach of hacking is by using enticing domain names to acquire other people’s
personal data. Through the use of homographs, hackers can now create domain names that
supersedes an English characters with another like characters from another language which serves
as a bait for netizens to click websites and lures them from entering their personal information
such as passwords or PIN. Most of the time, security becomes unreliable as it fails to determine
the hacking procedure beforehand which makes the problem more difficult to get rid of and worse
Another term for such act is domain hijacking which can be very devastating to original
domain name holder not only financially as they may have derived commercial income from a
website hosted at the domain or conducted business through that domain's e-mail accounts but also
in terms of readership and/or audience for non-profit or artistic web addresses. Additionally, the
hijacker or hackers can use the domain name to facilitate illegal activity such as phishing, where a
website is replaced by an identical website that records private information such as log-in
INTERNET PIRACY
More and more people are choosing the internet for accessing films, music, books and
games because of the rapid advancement of the internet and technology and the increasing
reliability of it whether it’s for a mobile phone, personal computers or smart TV. However, with
the increase demand for online consumption and as the broadband speeds becoming faster and
more affordable also comes the increase in online piracy.
Pirate sites displays advertising also to prevent detection and to look more legitimate to
users but the criminals behind them generate millions of dollars of revenue. Pirate sites are haven
for theft enabling criminals behind it to profit from intellectual property of other people. These
sites are also a sanctuary for malware, viruses and frauds and almost 95 % of these websites contain
these harmful data.
There are types of online piracy that provide access to copyrighted content. The first one
is the streaming site, it allows users to view copyrighted content freely without downloading the
actual file. Sites may stream directly or provide links to contents hosted in other websites. Similar
to legal streaming websites, these illegal websites are also user friendly. The second one is the
cyber lockers which are file – storage and file – sharing websites. These websites are common for
music and video files. It is convenient to user since it offers fast and anonymous distribution
content. These sites generate a huge amount of revenue through subscription. The oldest and most
common type of online piracy is the P2P (peer to peer) sharing, p2p sharing allows your computer
to store files and be available for copying other users. The most common website that uses this
type are the torrent sites. You can then transfer exact copies of files from one user to another. It is
legal to share large amount of data however it is being used to share copyrighted files.
Different countries are trying to enforce laws and regulations to bring down these sites and
are almost successful in implementing it as well as the developers and distributors of various types
of media are more focus in combating piracy and the profit carried by these files.
Widespread piracy over the Internet seriously harms artists, the famous and struggling
alike, who create content, as well as the technicians who produce it. It ultimately also hurts law-
abiding consumers who must pay higher prices for content, enjoy less content, or pay higher prices
for Internet access to compensate for the costs of piracy. Moreover, digital piracy not only results
in the unauthorized distribution of content, it hurts the ability of content producers to create
legitimate business models for selling digital content; as the saying goes, “It’s hard to compete
with free.” While many companies have rallied to the challenge and created compelling businesses
to sell content legally, on the whole, digital content is more profitable to distribute illegally than
legally and always will be.
ARGAYOSO, KIM S.
FREEDOM OF SPEECH
forms of expression, reach new audiences and quickly disseminate information around the world.
From emails and blogs, to YouTube and Twitter, new digital technologies are enabling people who
otherwise might not have been heard to express themselves and engage in far-flung conversations
However, threats to free expression are just as prevalent online as they are off. As the
benefits of the Internet and digital technologies continue to present new opportunities for free
expression, the challenges of defending this right have also grown increasingly complex. Is the
world of free expression online a reflection of traditional media? Yes. The underlying challenges
remain the same. Authorities continue to try to control messages, just as others continue to try and
share important news and information, and have their voices heard.
But the intricacies of the online world have added just as many challenges as opportunities.
We must remain vigilant in defending and protecting this important human right, online and off.
The circumstances surrounding free expression online are increasingly complex, and we need to
be aware of the intricacies. We need to be vigilant about our privacy, and stand up for our right to
free expression. We need to continue to work to create spaces for people to connect, share their