Wednesday, October 22, 2008

Privacy

In George Orwell’s work of fiction 1984, the reader is presented with a narrative about a totalitarian world where every movement and action by the population were scrutinized and analyzed by tyrannical regime, personified by the Big Brother construct. Big Brother as the ever watchful entity was always quick to silence dissent and any form of expression was cause for trouble. As a result any notions of privacy were soon dispatched for the characters, aware that they were always being watched. Though presented as a work of fiction there are number of parallels that can be drawn with the narrative and the modern day society we now enjoy.

While it may seem the type of rhetoric conveyed by conspiracy theorists, we are increasingly living in a highly monitored and scrutinized society. A high price has been placed on the information we as communicators now generate, with both government and private industry looking to extract as much data as from our day to lives as possible. Consider for a moment a person’s digital footprint. In this day of technological advances, the use of communications mediums such as the Internet and telephones have become so ingrained in our lives that it’s not often thought about where all the information we generate is ending up. We use technology for banking, shopping, correspondence, networking and countless other activities we now consider routine in our lives. Yet how often do we consider where all this information is going? Who owns our digital footprints and what level of privacy and safety do we have as result of this and how does it differ from what we expect?

As a result this paper will focus on the privacy issues surrounding the digital communication age we now live in. It will discuss how the integrity of our ability to communicate effectively is being compromised by privacy concerns. An age where the majority of the first world population now exists simultaneously within two worlds, the physical and the virtual world of the Internet. In the same way that we etch out an existence in the real world, we are increasingly leaving our mark in cyberspace. An ever increasing database of knowledge is being built up by actions we casually go about everyday. From purchasing grocery items with a credit card to socializing online through networking sites, every contact made is leaving a virtual trace.

We live in an age where governments are increasingly active in the monitoring and scrutinizing of our communications, a practice often performed without consent or disclosure to the public. Finally, an age where an increasing portion of the Internet is based on the user generated content. The rise of Web 2.0 has seen the increasing popularity of social networks that encourage the sharing our lives in a relatively public forum, to video and photographic websites dependant on public submission, the modern world is putting it their lives on show. So with so much information being generated by our actions what levels of privacy can we expect?

Firstly the concept of privacy isn’t about the right of individual or a group to engage in an activity without their actions being scrutinized and monitored, nor is it about the ability to hide ones activities. Instead as Garfinkel (2000, p 11) points out, “it’s about self-possession, autonomy and integrity”. In that, it is about the right as individual to decide what information is made public for the rest of the world to see and what we choose to keep to ourselves. As Hughes (1993, p 285) sees it, “privacy is the power to selectively reveal oneself to the world”, in that the power should be with the individual.

Many of the everyday tasks we perform now involve what Garfinkel termed ‘privacy – invasive technology”, referring to devices that collect, store and transmit information based on our actions for processing and analysis. For example in order to have the convenience of a credit card for shopping there needs to be the gathering of private information. Information about who you are as a consumer, financial details and purchasing habits are collected by a number of entities such as the retail store, the bank, credit card provider. Information that has been deemed necessary for collection, by an organization making a conscious decision to do so, so that it can better understand the behavior of its customers and react accordingly..

In the majority we have come to accept this. In the interest of convenience we seemingly are willing to accept this information becoming a commodity. As Garfinkel states, “we are entering a new world in which ever purchase we make, every place we travel, every word we say, and everything we read is routinely recorded and made available for later analysis” (p 11). However, here we have a choice, if we don’t like the practice there are alternatives that can be made on the basis of an informed decision.

What is of concern, is when the use of intrusive technology is done covertly. Increasingly governments and businesses are engaging in practices that they themselves would prefer to maintain private and confidential. These practices often defended as being in the interests of national security and crime prevention, often involve the surveillance and recording of the communications activities of the general public. As Hunter (2007, p 1) points out “surveillance has evolved from a helpful investigatory tool in solving crimes, to an essential technique used to prevent minor violations of the law and large scale catastrophes from occurring”. As a result the ability to communicate freely is being impaired.

However, the issue is that in order to capture the few, the majority is also under increased surveillance and scrutiny. An individual’s right to privacy has been compromised and justified against the perceived prospect of greater security for the collective population. In Australia, legislation is continually being pushed that would allow law enforcement agencies (State and Federal) to access personal information pertaining to the following: telephone (including mobile), email and Internet records, Common to each new legislation is the ability to access private information without a warrant or the knowledge of the intended target of the surveillance.

Perhaps of even greater concern is the current proposal by the Australian government to mandate a “clean feed” for Internet connections to homes and schools. Under the proposed scheme, the government would censor content it deems inappropriate, denying access as a default. Individuals supposedly would be allowed to opt-out of the scheme but whether this would be an easy process remains to be seen, as would the possibility that in volunteering to “opt-out” would put those people under greater scrutiny.

As Electronic Frontiers Australia Chair Dale Clapperton (2008) stated about the proposed plan, “The proposals threaten the free speech rights of every Australian.... Australia is supposed to be a liberal democracy where adults have the freedom to say and read what they want, not just what the Government decides is ‘appropriate’ for them.” The concern is that once this technology is in place it becomes far too easy to monitor what people are doing online. Whilst it may impede some illegal activity, the question remains, under whose jurisdiction and governance does the notion of “appropriate content" get decided and what level of privacy can exist when the possibility exists that your actions are being monitored and recorded?

In the United States the Carnivore program was used to scan and monitor email traffic on the Internet during the early 1990’s. Developed by the United States Federal Bureau of Investigation, out of perceived need that it would allow for improved surveillance and detection of terrorist activities, the program would search for data that matched a predefined dataset. Naturally those engaged in criminal or terrorist activity don’t publicize the fact or their email address, so Carnivore worked by scanning/sniffing all communications traffic for keywords from the dataset. If the system flagged enough keywords, the email would be logged for further scrutiny regardless of who generated the message. The program was reportedly replaced by commercially available software that was deemed more suitable. This also raises a privacy concern that the technology for monitoring and capturing internet traffic covertly by governments is also available for exploitation by private commercial interests.

Similarly, in usage today, the Echelon system is used to intercept, voice, email, and facsimile communications around the world. A collaborative intelligence network consisting of the United States, Canada, United Kingdom, Australia and New Zealand was established for the sharing of information by circumventing each countries own national laws. In that, it is illegal to spy on one’s own citizens but it is not illegal to spy on another nation on their behalf and then pass on any information that may interest them.

Prior to these examples occurring, the United States government aand its agencies the Federal Bureau of Information (FBI) and the National Security Agency (NSA) pushed for the introduction of the “Clipper Chip”. A device that would encrypt communicated material, but the US government would also hold the “keys” to access these messages whenever it needed to. This meant that whilst voice and facsimile messages were secure and private because of the encryption for the wider public US government could still listen in when it so desired. When public protests about the government having such powers saw the plan reassessed, the US government offered to turn the technology over too private industry. This was done under the flawed view that allowing private industry to have access to the technology would calm concerns over a “Big Brother” style of government. Fortunately the plan was shelved after the realization that the majority of the populations weren’t too happy with the concept of the government being able to listen in on “private” conversations regardless of who was behind the technology.

These examples are demonstrative of governments that seem to think that in order to make the population safe, everyone needs to under suspicion and they highlight the increasing erosion of the peoples right to privacy. In the United States, as Miller (2007, p. 3) describes it “the government seizes the right to preemptively investigate anyone who is now, or might someday be opposed to the abolition of the nation’s civil liberties”. For those who are opposed to such scrutiny the official reply is always the same, again as Miller describes it, “ who but someone with something to hide would object in these imperiled times to granting the government free access to one’s mail, one’s phone conversation, one’s library records”.

The problem as Hunter (2007) sees it is the rapid evolution of these technologies has seen government so focus on what they could do rather than what they should. In that “technology continues to rapidly advance, far more quickly than most governments can create legislation. As a result, no international legal framework exists to deal with the issues of privacy rights and surveillance” (p. 13) As result in order for a perception of security within a community, citizen’s are being asked to give up on part of their right to privacy. The issue is how much are citizen’s willing to give and how much are those in power willing to take whilst our ability to communicate freely is being impeded..

When the United Kingdom government proposed a data-mining program called, “Total Information Awareness” there was an outcry from privacy advocates and concerned individuals. Data mining refers to the practice of scanning and extracting information from web pages, emails, and telephone conversations for later use. The program as described by Post (2002) would incorporate, “a surveillance technique it calls eDNA that would tag all Internet data with unique markers to make impossible the anonymous use of parts of the Internet”. In reality this would create a division on an Internet, one half unruled, but no doubt monitored, and the other half would require users to provide identification to access. As a result, freedom of information and expression would be lost under the watchful eyes of some governmental “Big Brother”. Fortunately the program was cancelled as a result of the backlash over the proposal and it perceived invasion into the people’s privacy.

Yet it’s a concept that won’t go away, with just this month the government of the United Kingdom announcing a plan to create a central database for the purpose of storing communications traffic. Defended as a means to counter terrorist activities, the £12 billion proposed system would allow live monitoring of the Internet and mobile phone networks. Currently, under UK law, a warrant is required for the interception of such traffic to monitor suspect illegal activity. Critics of this proposal and similar proposals argue that the potential for such a database to be abused and comprised is extremely high. As UK Shadow home secretary Dominic Grieve, quoted by Allen (2008) states, “It would mark a substantial shift in the powers of the state to obtain information on individuals. Given the Government's poor record on protecting data, and seeing how significant an increase in power this would be”

While it seems rational to be outraged and suspicious of intrusive practices being carried out by governments, the popularity of Web 2.0 and its user interactive content highlights another privacy issue. As mentioned many social networking, user content generated, and virtual community sites are profiteering from the apparent increasing narcissistic need to share and exposé oneself to the rest of the world.

Little thought seems to be given to the implications that posting personal information about one self may have. This is under the misguided or ill-informed opinion that the information they post is only accessible by those they intended to view it. Yet the Internet is for the majority a publicly accessible forum. Social networking sites for example do offer privacy setting designed to limit accessibility, yet all too often these are easily negated or not engaged at all.

Furthermore with the increasingly popularity of user generated content based websites, either video (e.g. YouTube), photographic, (e.g. Photobucket, Flickr) or a blog site (Livejournal, Blogger), there exists a greater chance that an individuals digital footprint and wider personal network, may reveal more information about its creator than they ever intended. Voluntary postings about personal thoughts, feelings and beliefs, combined with online activities helps to form a virtual archetype of those individuals depending on how they choose to be seen.

Current and future employers may find any number of pieces or personal information that may affect their judgement of the individual. A study by a United States recruitment firm, CareerBuilder, sighted by Brandenburg (2008); found that an increasing number of managers were scanning social networking sites for information about job applicants. The study also found that out of those managers surveyed, more than half would not hire a prospective employee based on the information that they had garnished from the web. Whilst the argument is that this could be an invasion of privacy of the prospective employee, is it not also the right of the employer to validate a potential employer through all available resources?

Also of concern is the greater number of opportunities the Internet has provided for those with criminal intent. Social networking sites can provide an abundance of information for identity thieves, hackers, crackers, phishers and predators with which they can use to their advantage. Furthermore as technology evolves the methods used by these protagonists are rapidly evolving making their activities harder to police.

Also one should consider that it standard practice for these sites to request the user to enter their personal likes and dislikes about a wide variety of subjects. For example through data mining, a music company can see how many people list their represented artists on their page. Combine this with the other demographic information provided by the user, (age, location, gender etc) and combine it with countless other users, the music company can get a greater understanding of who their customers like and dislike.

Taking this a step further, the Web 2.0 website operators are then able to provide targeted marketing efforts based on the content the user has provided. Content that although was provided by you the user, is now the property of the company whose website it was entered into. For the user this may result in them receiving targeted marketing based on the information they have unwittingly disclosed.

Facebook drew attention to itself earlier this year when its Beacon advertising feature caused a backlash amongst users of the social networking site. The application was incorporated into Facebook user profiles to data mine information about purchased items on web sites external to their own. The feature didn’t allow users to opt-out of the program initially and was seen (by those aware of it) as an invasion of privacy because the program would then broadcast user activities to their social network friends. The challenge for social networking sites is to balance their popularity and how to monetize the tremendous wealth of marketing and behavioral information that is available through these sites. It is become common practice to publicize aspects of one life in a public forum with little thought into the potential uses of this information.

Furthermore, in an effort to attract more traffic, these Internet websites are increasingly sharing information in effort to synchronize and amalgamate content from different sites. For example, both the popular websites, MySpace and Facebook, allow for users to input their email account details and then allow the social networking sites to harvest these email addresses and the user’s contacts details in attempt to find the users friends. In reality it also serves as another tool for obtaining marketing and behavioral information about the users of their website.

As a result of this a number of users of such sites are then deciding to delete the profiles and in there mind regain control over their personal information. However this isn’t always the case and many of these sites maintain archive copies of their content for backup purposes and future use. Aspan (2008) quoting Facebook’s terms of service that state that as a user “ you may remove your user content from the site and any time” and that while a user may delete their profile(s), they should be aware that, “you acknowledge that the company may retain archive copies of your user content”. Even still once requested data has been deleted; the company may still have retrievable information stored in backup copies.

This is because to the companies that operate these social networking sites; the amount of potential marketing information is exponentially linked to the number of users. Google attempted to take its market intelligence gathering process a step further when it launched its own web browser to compete with the likes of Microsoft’s Internet Explorer and Mozilla’s Firefox. Launched with great fanfare, Google’s Chrome browser promised faster user-friendlier interface for accessing the Internet.

What wasn’t initially made public was that the browser would harvest the page address of websites visited by a user and electronically report these back to Google. Through collecting about 2 percent of all keystrokes entered into the browser, over time a virtual catalogue of a person’s interests and activities would be built up over time. Compounding the issue was the in the browsers initial release, the terms and conditions of use stated that any content entered into the browser would become property of Google. Once again public outcry would see Google amend its terms and conditions of use but it still reserves the right to collect information obtained during its products usage.

So it is evident that with an increase in the availability of information there is an apparent need for greater security and awareness. One hope for better privacy lies in encryption. This process provides a secure means of transmitting encoded “scrambled” data. In that, the messages can only be read or heard by the intended receiver and the sender, through the use of a “key” necessary to decode the message. The intended receiver of the message is able to read and decipher it, as they have been made aware of the “key” previously.

The good news is that such technology to make the internet and a personal data more secure is already available with a number of commercially available products existing in the marketplace. However, because governments around the world consider the technology capable of being used by criminals and terrorist’s they lobby against the use of such techniques. In the United States for example encryption technology is closely monitored and regulated. Certain countries have had bans placed upon them and it is illegal to export or supply encryption technology to those nations.

Information at this time is not always safe and perhaps the key to maintaining privacy for the individual is ensuring that they are in charge of what they share. Technology is advancing so rapidly that information we once thought secure and private is now being put into a public forum. Privacy however should not be surrendered under an illusion of security as championed by governments. Instead careful judgement should be made by individuals when choosing what information they choose to reveal and showing wise judgement with whom they share with it.

Realising that whilst they may not care what information is available about them today, but there is always the possibility that tomorrow may bring a change in attitude. The ability to control what the world sees of us remains in part up to the individual. How much we chose to reveal should be based on how comfortable we are with other people knowing and those choices should always be informed knowing that a number of Orwellian “Big Brother’s” may be watching us.


On September 20, 2001, Georges W Bush’s addressed the citizens and congress of the United States of America and told them they had been put on notice. They may be the world’s most powerful country but they weren’t immune to attack and that their people had reason to be afraid. It was a speech that did little to allay the fears and concerns of the people. The terrorists who had attacked on September 11 had installed fear and now the government was going to ensure that that level of fear remained. For the fear of terrorisms allows for it to be useful as a propaganda and control device.

The challenge for the propagandist is to “inject” their ideas into the minds of the target population. The challenge is therefore to overcome the audience that thinks critically. As Rampton and Stauber point out,”an audience that thinks critically and is prepared to challenge you message becomes a problem that must be overcome” (2003, p 135). Fortunately for terrorists and governments alike one of the easiest ways to overcome objections to their actions is through the creation of a climate of fear and distrust. This process is aided by the media who benefit in the ratings and help in promoting a climate of fear that manage to keep audiences watching. A public that is afraid and untrusting of others, results in them being more easily manipulated and accepting of the influence of others.

As the late Nazi Reich Marshall Herman Goering quoted by Rampton and Stauber points out that the purpose of any propaganda campaign is to overcome resistance from the public directed at the government or terrorists ideology “but voice or no voice, the people can always be brought to the bidding of the leaders. That is easy. All you have to do is tell them that they are being attacked and denounce the pacifists for lack of patriotism and exposing the country to danger. It works the same way in any country” (2003, p135)

Now that the public exists in a climate of fear, governments are able to reign in civil liberties and those that protest are attacked for their lack of patriotism. Any controversial act is defended by the linking it to being in the best interest of national security. Proof of this can be demonstrated by the outcomes of the enacted USA Patriot Act. Enacted only 45 days after September 11, 2001, the legislation was sold to the public on the perceived intention of targeting terrorists and making the United States safer from terrorist attack. Riding a wave of nationalism and fear of future terrorist attacks, the Act was intended to unite the nation and see an amalgamation of national intelligence agencies and law enforcement.

Critics of the Act were denounced as unpatriotic and as such un-American. It also creates a climate of intolerance and groups looking to blame Law enforcement now under the act could now legally spy on the citizens of their country. As William’s points out, this type of measure “highlights the distinction between punishing what has already occurred and preventing what might happen in the future” (2002, p. 340). Agencies that previously were responsible for enforcing the law now were able to manipulate the law to their own means. As such the concept of innocent until proven guilty under the law has been reversed.

A number of personal freedoms previously protected by United States law have bee lost under the Patriot Act. Under the act law enforcement and government agencies are able to gather personal information such as medical records, taxation records etc, without the need for a warrant or even criminal suspicion. This information can be obtained through clandestine searches of an individual’s home or business without indefinite notification. Also the definition of domestic terrorism under the Patriot Act can now potentially include the simple act of political protest.

As a result the United States government now spies on its own citizens and assault their individual rights through programs like ‘Terrorism Information Awareness”, a centralized computer database that compile information from government and public sources. All under the banner of a campaign for freedom and protection from those who they’ve been told wish to harm them.

Similarly in Australia, intelligence services have been given the power to detain and interrogate individuals for up a week, without charge, persons sixteen and over for suspicion of knowledge or involvement of terrorist activity. Furthermore laws of sedition and control orders have limited the freedom of speech and the freedom of movement

Naturally the government wants its public to believe its actions are in their best interest. It not only endeavours to win the “heart and minds” of those it if fighting against but also of it own people. Instead of just defeating the enemy the new goal is to defeat them psychologically through the creation of a climate of constant fear. Sighting the work of political theorist Thomas Hobbes who wrote in his 1651 work Leviathan, Bethke Elshtain) wrote that, “If we live in constant fear of violent death we are likely to seek guarantees to prevent such” (2003, p 47). As a result governments are able to justify their actions through the promotion of fear in their rhetoric.

By creating a climate in which its citizen envisions anarchy and dread and a perceived threat of random violence their lies an ability to control. The ruling powers that be can exploit this fear knowing that if it fails in so called right to protect the people it will be perceived in dereliction of it duty. As a result they can justify an act of war. This however does not give it the right to abuse the authority given to it and seek unquestioned obedience and acceptance.

Under the perceived notion that the war is just in that it’s a war being fought under the right intention supposedly. For the United Stated their actions were justified in their eyes as they sort the punishment of the wrongdoers and the prevention of those who sought to harm and kill innocent civilian currently and in the future. But the both sides see themselves as being in the same position. They portray themselves through propaganda as being on the “good” side.
US President George W Bush used the term “crusade” in his post 9/11 speech, stating that the he and the power of the United States government would take action against the so called “axis of evil”. The government later realised the association this actually had with historical campaigns of Christian forces from the 11th to the 13th century that had the aim of expelling Muslims from the lands the occupied. Instead the government came up with “Operation Enduring Freedom” to describe it campaign of “liberation” of Afghanistan.

Moving forward the United States and its coalition of the allied countries began a long campaign involving Iraq. History will show that the world was lead into a War in Iraq on the basis of misinformation. The world was repeatedly told that Iraq had weapons of mass destruction and that their leader Saddam Hussein was willing to use them. Documents and evidence supporting this claim were reportedly fabricated to implicate Iraq in plans to possess nuclear weapons. These fabrications were used to convince the public and policy makers alike of the need for military action.

The use of propaganda and the misrepresentation of the truth have been carried out in a threat to the freedom of truth and expression, which those that are responsible for are supposedly trying to protect. As Bethke Elshtain wrote that a climate of fear can lead to harsh measures, “The condition of fearfulness leads to severe isolation as the desire to protect one-self and one’s family becomes overwhelming (2003, p 47).

When the truth was exposed about Iraq and its apparent lack of weapons of mass destruction it was linked to the war on terror. The country was now presented as a breeding ground for terrorists. The war on terror would continue, as would the use of propaganda to influence the hearts and minds of the enemy and the public. Historically, however there has been little to no history of co-operation between Iraq and al-Qaeda leading up to the invasion.
As a result of manipulating the truth to justify their actions, the United States possibly created the situation that lead to terrorists being in Iraq and attacking United States interest. Rampton and Stauber stated “The propaganda approach becomes more attractive during wartime, when each side becomes preoccupied with manipulating and coercing the thinking of their enemy or domestic” (2003, p 134).

The United States government endeavoured to garner support for their actions through the continued use of propaganda. To show that what they were doing was right and their actions were justified. However the propagandist generally doesn’t hold a high regard for the intelligence of their targeted audience. With support for the war in Iraq diminishing the United States government needed something or someone to distract the public from the war that they created under false pretences. More and more people had begun to think critically about the situation and challenge the message that they were being told. In response the United States government sought to manipulate people at a primal level, appealing to them with emotional symbolism.

Quartermaster Corps Private First Class Jessica Dawn Lynch became an icon of the United States war effort. Portrayed as the all-American girl who became a heroine when the supply convoy she was with took a wrong turn and was ambushed by Iraqi military. Nine US soldiers were killed in the ensuing battle. Initial reports released by the military claimed that PFC Lynch had stab and bullet wounds and suggestions that she had also been sexually assaulted. Prior to her capture PFC Lynch, according to the Pentagon had fought heroically, engaging the enemy with her weapon before succumbing to her injuries. The injured and then unconscious PFC Lynch was taken to a local Iraqi hospital, in which she would stay for eight days until members of the United States military rescued her. The rescue operation was filmed by the military and the highly edited and some argued scripted film and transcript were provided to the world media to distribute to a public who loved the supposed hero story. For terrorists and governments alike the use of the media to gain attention and support for their respective causes balances nicely with media outlets drive for ratings and commercial success.

However after the initial release of information, accusations arose that the rescue mission to extract PFC Lynch and the bodies of her fellow soldiers carried out by elite Special Forces operatives was a staged media event. What the public had been told and what had actually occurred were two very different scenarios. Filmed with night vision camera the footage shows something akin to a Hollywood action movie, with the military meeting no enemy resistance. Iraqi forces had reportedly fled in the days prior to the rescue. In her testimony to the United State Congress, Lynch said she never fired her weapon during the ambush that leads to her capture. Instead her weapon had jammed and furthermore that she had been knocked unconscious when her vehicle crashed. She awoke to find that she was in Iraqi hospital and being provided medical care for her injuries. Her real injuries instead of those first advised consisted of a broken arm and thigh and a dislocated ankle which were found to be consistent with a car accident.

Lynch would later state, that the US government used her as a propaganda tool. In an address the US congress, she stated that, "They used me to symbolize all this stuff. It's wrong. I don't know why they filmed [my rescue] or why they say these things. She also stated "I did not shoot, not a round, nothing." I went down praying to my knees. And that's the last I remember."

Then there is the story of Patrick Daniel Tillman, the professional American football player who gave up fame and fortune to enlist in the US army. Tillman and his brother enlisted out of call of national duty after the September 11, 2001 attacks on the United States. Tillman would become the United States poster boy for the War on Terror. After serving in Iraq and Afghanistan, Tillman was reportedly killed by hostile fire in combat. Championed by the United States government and the media as a soldier who died defending the so called freedoms of the country, it would be a month after his death that the reports about he died were announced to be inaccurate. Army medical examiners confirmed growing suspicions amongst the media and public when they found that the three bullet holes in Tillman’s forehead were fired by a United State issued M16 machine gun. A subsequent military criminal investigation concluded that Tillman had been killed by friendly fire.

Subsequent investigation by some members of the media revealed that US Army investigators were aware of the cause and circumstances of Tillman’s death within days of the initial incident, yet covered it up to protect the reputation of the US Military. Tillman was posthumously promoted and award the Purple Heart medal and a Silver Star Medal for valor in the face of the enemy. Tillman’s family was not informed of the real circumstance of death until weeks after his memorial service. Tillman’s father, Patrick Tillman Sr. has voiced his opinion on the military covered up, “After it happened, all the people in positions of authority went out of their way to script this. They purposely interfered with the investigation; they covered it up. I think they thought they could control it, and they realized that their recruiting efforts were going to go to hell in a hand-basket if the truth about his death got out. They blew up their poster boy.”

Under the banner of a war on terror, Bush was able to topple two governments in Iraq and Afghanistan, eased restraints and empowered intelligence and law enforcement agencies to almost draconian levels. All of which have been done out of the perceived threat and the propaganda associated with the war on terror and the wars in Iraq and Afghanistan.

Furthermore in calling countries to account by including in the so called ‘axis of evil’, the United States government has increased the amount of fear perceived by people by stating that they have more and more enemies. The rhetoric of ‘your either with us or against us” does little to foster a democratic society. One in which people and countries should be able to freely express opposition without the fear or reprisal. The media, turning patriotism into an emotive response elicited from the people, then further fuels this message.

Finally as a result of all this, the people were left asking, “why do they hate us”, projecting the blame onto an external entity. Instead perhaps they need to understand that one man’s terrorist is another mans freedom fighter. Terrorists are only there as a result of a perceived injustice they seek to change. Furthermore the fear that exists for such groups is compounded by the propaganda that comes from the so called good and bad sides.

With democracy supposedly built upon the basis that people are able rationally self govern themself. Given the necessary information in which to critical analyse and determine the truth they inturn should be able to act on own best interests. However for the propagandist the aim is the opposite. By keeping people in a state of misinformation, living in fear they are able to be manipulated and controlled. The goal once was supposedly to win the “hearts and minds” of the people to create a world of democracy and freedom from authoritarian regimes that seek to control the will of the people. Instead it appears we are headed for what we fear most, a life ruled by fear itself.

Tuesday, May 22, 2007

Never Be the Same Again

Never Be The Same Again
Glenn Knight
Protected by the anonymity of the Internet, they reach out to the world trying to find comfort and understanding from those who share their affliction.

"I have to admit I’m not coping very well with the fact that I have this incurable virus and it’s not ever going to go away and I’ll never be the same person again."

The incurable virus referred to by this anonymous poster in an Internet forum is the herpes simplex virus (HSV). Often the victim of misinformation and ignorance, estimates currently put the number of people infected with genital herpes at more than one in five worldwide.
Dr Angela Cooney, Medical Director for Family Planning WA Sexual Health Services endeavours to put this number into perspective.

"There is a lot of ignorance about HSV and ignorance equates to fear. The majority of those who carry HSV 2 have no idea that they do! So ‘how to relate to those who have it’ is awkward when no one knows who has it!" she says.

The herpes simplex virus can exhibit itself in two ways. HSV-1 most commonly exhibits itself around a person’s lips as cold sores. HSV-2 is usually found around the genital area.

However, the virus isn’t mutually exclusive to those areas, with it possible for HSV-1 to occur in the genital region and HSV-2 to exhibit around the oral area. Herpes infections are primarily exhibited by the presence of sores or lesions around the aforementioned regions.

Once the virus has infected a person, the virus travels through the bodies’ nervous system until it settles in the base of the spine where it can lay dormant until another outbreak occurs. There is currently no known cure for the virus and the frequency of outbreaks (exhibiting symptoms) varies from person to person.

A recent study completed by the University of Otago followed 884 participants from an original 1000 sample, born in 1972 or 1973 in Dunedin, New Zealand. The 35-year longitudinal study has found that men aged 26 to 32 have twice the risk of woman the same age of contracting the virus.

The study published in the Sexually Transmitted Infections international journal, attributes these findings in part due too, as we age there is a higher likelihood of coming into contact with an existing sufferer of the virus. According to statements made by one of the study’s authors, Dr Nigel Dickson;

"The most likely reason for the risk to increase with age is that, as a person gets older, there is a tendency for their new sexual partners also to be older and hence more likely to harbour HSV-2. Also, as relationships tend to last longer as people get older, this is also likely to increase the risk of transmission," he says.

The researchers feel that the studies findings are illustrative of the need of a greater global community focus on re-educating the adult demographic about safer sexual practices.

"The study has significant implications for public health policy. Prevention in relation to sexually-transmitted infections has tended to focus on young people. Yet, to control the spread in populations where a high prevalence of infection is driving a large number of new cases, it is important to address all factors which contribute to this at any age" said Dr Dickson.

It was also found that while the highest rate of infection was among those with 10 or more partners aged 26 to 32, there was still high enough risk amongst those with fewer partners.

"This is also an important finding. Two-thirds of new infections in women actually occurred among those having four or fewer partners in that time, compared to less than 20 per cent for women up to age 26. A similar pattern was seen for men," co-author of the Otago study, Professor Charlotte Paul says.

Dr Jenny McCloskey, Head of Sexual Health Services Royal Perth Hospital and Fellow of the Chapter of Sexual Health Physicians, RACP, attributes the increase in herpes simplex virus and other sexually transmitted infections, to the change in our sociological behaviour.

"More relationships are breaking down and people are meeting new partners when they are older. In addition there is a lack of community awareness about STD’s and the older generations seem not be so familiar with using condoms", says Dr McCloskey.

Also of increasing concern amongst health professionals is the link between the herpes simplex virus and the transmission of HIV.

"What's more, transmission of HIV is enhanced by HSV-2 infection, so controlling the current spread of HSV-2 is likely to reduce the spread of HIV though the population in the future," says Dr Dickson.

According to Dr McCloskey, genital herpes is now regarded as the single biggest contributor to the spread of HIV worldwide. This factor also increases the societal impact of the HSV virus.

"The more people infected with HIV, the more the financial burden of care for the government," she says.

Fortunately for countries like Australia with a comparatively low rate of HIV infection the data can be put into perspective says Dr Angela Cooney, Medical Director for Family Planning WA Sexual Health Services.

"I actually think, along with some other sexual health workers, that HSV is not that vital an issue in a country which doesn’t have a high risk of HIV, "says Dr Cooney.

Whilst there is an apparent lack of knowledge amongst the wider community about the affects and nature of herpes, the matter appears to be further compounded by a lack of recognition and knowledge by the medical fraternity.

The International Herpes Management Forum advises that medical practitioners see the educational and emotional needs of genital herpes patients as the same as any other lifelong condition.

However, too often the medical fraternity and government bodies overlook the virus.

According to Dr McCloskey, many Doctors don’t see genital herpes as a serious infection and as such don’t provide a level of adequate patient treatment to the diagnosed.

"Three weeks ago I had a young woman come in with her mother, having been given a diagnosis of genital herpes by another GP, but no treatment or information. I took swabs, provided treatment and information, and asked her to return in five days. By that time her swab had come back showing type one as expected, but her boyfriend had been to a doctor who had taken a blood test and told him that he couldn’t be the source of the infection, as he didn’t have the ‘serious’ one, only the ‘mild’ one!"

Unfortunately it appears that stories such as this are told often by sexual health practitioners and sufferers alike.

"I frequently pick up the pieces from some doctors’ less than ideal management. But it is just like in the general population, unless you are interested you won’t seek out information on how to do it better," says Dr Cooney.

Whilst the physical impact of the virus can be discomforting for many people the social, emotional and psychological impact of the virus is the biggest factor. The psychological morbidity in patients with first episode genital herpes is statistically significantly greater than that occurring in non-herpes patients attending sexually transmitted disease clinics.

"I seem to spend a lot of time reassuring new sufferers that it isn’t the end of the world, and that the majority of people who are actually seropositive for HSV-2 have no, or very few, symptoms," says Dr Cooney.

Overcoming the negative perception of the virus and its lifelong effects often compound the physical aspect of the virus. The hardest thing reportedly for any sufferers, is having too reveal their condition to someone else. Whether it is a family member, friend or a potential partner, the very real fear of infecting someone else is compounded by the fear of being rejected.

"I think we need community education to start reducing this perception of ‘the unclean’. I find that the people who don’t have a lot of distress about an infection are those who haven’t heard a lot of the negative stuff, "says Dr Cooney.

In a 2005 survey published by the International Herpes Management Forum of genital herpes sufferers from 78 countries identified the main concern was, "is this end of my love/ sex life?"

"There are some people who have had a diagnosis of genital herpes, and they are often in a terrible position when trying to discuss the issue with a new partner, who is likely to run away screaming because of the fear/shame factor. So even those who know they carry the virus are reluctant to talk about it for fear of rejection," says Dr Cooney.

For sufferers perhaps they should take comfort in the knowledge that they are not alone. As stated one in five people are living with the virus. Though it may be a discomforting and lifelong condition, it should not be what defines a person’s life and character.

Friday, June 2, 2006

Respect earned in blood

Link to Original: http://3degree.cci.ecu.edu.au/articles/view/515

Respect earned in blood
By Glenn Knight
02 June 2006

Too often overshadowed and overlooked, Vietnam Veterans are about to be shown a bit more of the respect they deserve thanks to new government initiatives.

Australia’s involvement in the Vietnam War will be the focus of the Federal Government’s commemorations program for 2006.

Minister for Veteran’s Affairs, Bruce Billson announced a funding boost earlier this month, to commemorate the service of Australians during the war.

"The Australian Government has committed $4.5 million to support a range of special events and initiatives to recognise the contribution of those Australians who served in Vietnam and to increase community awareness of their wartime and post-war experiences," said Billson.

Vietnam Veterans Day on August 18, 2006, will also mark the 40th anniversary of The Battle of Long Tan, arguably the most well-known Australian action of the war.

"This anniversary provides us with an opportunity to recognise and commemorate the service of all Australian servicemen and women in Vietnam,” said Billson.

In 1966, the 1st Australian Task Force established its Phuoc Tuy operations base at Nui Dat - a piece of high ground surrounded by rubber plantations in the midst of a Viet Cong dominated province.

The Viet Cong plan was to lure the Australians from their base with mortar and rifle fire, then ambush them and inflict a politically unacceptable defeat.

On the night of August 16, a barrage of shells was fired by the Viet Cong at the Australian base, wounding 24 Australians.

Australian forces had previously become aware through radio intercepts and sightings that a large enemy force was operating close to their base.

The following afternoon, Australian patrols from D Company encountered the Viet Cong 275 Regiment who attacked them with mortar, rifle and machine gun fire.

In pouring rain the Australians returned fire, supported by artillery support from the Nui Dat base five km away.

In the hours that followed, aggressive tactics and the artillery support would see the battle turn in Australia's favour.

The arrival of reinforcements from A Company would see the Viet Cong force, initially estimated at 2500 soldiers, withdraw from the battlefield.

The Battle of Long Tan saw 17 Australians killed in action, one dieing of inflicted wounds, and 24 personnel wounded.

A commemorative service will be held at the Australian Vietnam Forces National Memorial on August 18, as well as a special concert at the Australian War Memorial in Canberra to mark the occasion.

States and Territories will also be provided with incentives to hold their own ceremonies and reunions.

This will be in addition to existing grant-opportunities under the current “Saluting Their Service” commemorations program.

Other initiatives will include the establishment of a website focusing on Australia’s involvement in Vietnam and in other South-East Asian conflict.

Grants will also be provided to museums that record Australia’s experiences in Vietnam.

Friday, May 26, 2006

Pilots flying high

Link to Original: http://3degree.cci.ecu.edu.au/articles/view/460

Pilots flying high
By Glenn Knight
26 May 2006

Mandatory drug testing for aviation safety sensitive personnel will be come mandatory under new regulations introduced this month by the Federal Government.

The Federal Government has announced new mandatory drug and alcohol testing requirements for aviation industry workers this month.

Federal Minister for Transport and Regional Services, Warren Truss, has said that the new regulations will be aimed at safety-sensitive personnel.

“The road transport industry and other sectors such as mining and forestry have already moved to address the safety risk posed by drug and alcohol use. It is appropriate for the aviation sector to do likewise,” said Truss.

The move comes after a report prepared by the Department of Transport and Regional Services and the Civil Aviation Safety Authority (CASA) found estimates of between 5-8% of all pilots had alcohol or drug abuse problems.

The report found that aviation personnel should not be treated differently from the rest of the community in relation to substance abuse. It deemed that where it is appropriate for safety reasons that those employed in the aviation industry be subject to testing..

Australia’s biggest airline Qantas has welcomed the government’s decision. Qantas Executive General Manager People, Kevin Brown, has said that the new requirements are complementary to the airline's existing Alcohol and Other Drugs program.

“Our program was introduced in 2003 after extensive consultation with employees and provides for education and training, rehabilitation and testing for all employees,” Brown said.

According to Brown, Qantas has always maintained a zero blood alcohol and drug free policy within the workplace. Under the new regulations they will incorporate random testing into existing procedures.

“The Alcohol and Other Drugs program is part of our comprehensive occupational health and safety system and is one element of our commitment to providing a safe workplace for everyone at Qantas,” he said.

Regulation 256 of the Civil Aviation Regulations 1988, states that the use of drugs and alcohol by aircraft crew and air traffic controllers is prohibited whilst on duty and for eight hours prior to duty. They are also precluded from duty if affected by drugs and alcohol.

The report also found that in a survey conducted in June 2005, that 22.5% of the 1196 pilots who responded felt that in the previous 12 months, safety may have been compromised by alcohol, drugs or prescription medicine. This figure rises to 25.7% when private operations are discounted.

Similar testing in the United States saw over 30,000 positive tests reported between 1990 and 2003. The majority of these (21,000) were the result of pre-employment testing.

British authorities are also investigating the issue. Spurred by a number of incidents, they too have introduced legislation allowing “on suspicion” testing by police.

However calls for random testing were strengthened by an incident in February 2005 where a Pakistan International Airlines, Boeing 747 pilot was found to be drunk prior to departure.

The report recommended that random testing be used as it acts a “pro-active deterrent” on those who consider drug and alcohol use and abuse. It recommended that a flexible mix of testing be adopted that included, pre-employment, random, on suspicion, post incident and post treatment where appropriate.

Zero tolerance for certain illicit drug groups, including cocaine, marijuana, opiates, amphetamines and phencyclidine (commonly known as PCP) was also recommended.

Friday, May 12, 2006

Aussie's leave Bangladesh hungry

Link to Original: http://3degree.cci.ecu.edu.au/articles/view/366

Aussie's leave Bangladesh hungry
By Glenn Knight
12 May 2006

It was a cricket tour that Australia didn't want to participate in due to a percieved lack of competition. By the end Australia had won every game, but Bangladesh showed that they were no longer the cricket world's whipping boys.

It was a tour that started off with the unimaginable almost occurring. Australia, after a hard test series in South Africa, was on the ropes against a spirited Bangladeshi cricket team.

The first test saw the Australian bowling attack of Brett Lee, Shane Warne, Stuart MacGill and Jason Gillespie struggle on a pitch that gave them little to work with.

Shahriar Nafee took advantage of the favourable batting conditions to score his maiden first-class 100 and helped his side to a 427 first innings total. His innings of 138 included a record highest run partnership of 187 in Bangladeshi first-class cricket with Habibul Bashar (76).

Australia struggled in reply to be 6 for 93, thanks largely to the bowling of Mohammad Rafique who ended the innings on 5 for 62, however a recovery lead by Adam Gilchrist (144) saw Australia’s innings close at 269.

The Bangladeshi second innings was a dismal display. Scoring only 148, Australia was left a challenging 307 for victory. Captain Ricky Ponting regained his impressive form, scoring 118 to lead Australia to a lucky first test victory by three wickets. Rafique again bowled impressively with figures of 4 for 98 in the second innings.

The second test will go down in history as featuring one of the greatest batting displays by one of the game’s least likely cricketers. Bangladesh was bowled out for a low 197 on the first day.

Australia’s first innings saw pace bowler Jason Gillespie come to the wicket as night watchman with the score at 1 for 67. Gillespie batted through the rest of day one and day two, and entered the record books on the third day by bringing up his maiden first-class century.

He was well supported by Mike Hussey who made 182 before his wicket fell. By the time Australia declared at 4 for 581 on the fourth day, Gillespie had scored an impressive 201 runs, a rare feat for a player who had not previously scored a century in his entire cricketing career. After the innings Gillespie was a reluctant to accept the accolades.

“This is ridiculous,” he told The Sydney Morning Herald. “I was just lucky that the shots came off and I had a bit of a laugh all the way. It’s unbelievable. It’s a fairytale, really. Hansel and Gretel and Dizzy’s double hundred, it’s one and the same. Absolute fairytale,” he said.

Early in the innings Phil Jacques continued his push for a permanent spot with an impressive 66. Ponting also enjoyed some time at the crease with another half century before being dismissed for 52.

The only highlight for Bangladesh was Nafee’s continued form. His 79, in conjunction with Mohammad Rafique’s 65 in the second innings, showed that there is promise in the batting department for Bangladesh.

Unfortunately for them, the Australian spin trio of Warne, MacGill and test debutant Daniel Cullen tore through the Bangladeshi side with relative ease.

Warne’s eight wickets and MacGill’s seven for the match saw Australia win by an innings and 80 runs. The series win leaves Australia unbeaten at test level since the Ashes series against England. Gillespie was also named Man of the Series.

Boosted by their test success Australia looked to make a statement in the one-day series and atone for their upset loss to Bangladesh last year. Bangladesh managed to score 195 from their 50 overs, with Brad Hogg enjoying figures of 3 for 37.

Bashar (52) and Khaled Mashud (27) added 54 for the sixth wicket, the only partnership of note in the innings.

In reply, Gilchrist showed why he is considered the best one-day batsman with a blazing 76 off 46 deliveries to open the Australian innings. Australia faulted to be 5 for 155 but was lead to a four-wicket victory thanks the batting of Hussey (36) and Lee (12).

The second one-day international saw Australia seal a series victory. In a display of powerful batting Andrew Symonds (103) and Michael Clarke (54) lead Australia to a comfortable 4 for 250 from their 50 overs.

Mashrafe Mortaza was the best of the Bangladeshi bowlers with figures of 3 for 54. Bashar was again the only shining light in the locals’ run chase. His innings of 70, before losing his wicket to Clarke, started a Bangladeshi collapse.

Losing their last four wickets for only 26 runs, Bangladesh fell 67 runs short of the Australian total. Hogg again was impressive with the ball, ending the game with 3 for 34.

Any hope of a face-saving win by the locals in the third and final game was soon forgotten as Australia, using eight bowlers, rolled Bangladesh for 124.

Hogg continued his excellent form bowling 3 for 17. Young Queensland ‘quick’ Michell Johnson showed a glimpse of what he’s capable of with 2 for 24 from his eight overs.

In reply, debutante South Australia batsman Mark Cosgrove smashed 74 to help Australia surpass the target of 125 in only 22.4 overs and give the tourists a 3–0 sweep of the series. Hogg was rewarded for his fine bowling throughout by being named Man of the Series.

Tuesday, May 9, 2006

D’Orazio Dumped

Link to Original: http://3degree.cci.ecu.edu.au/articles/view/398

D’Orazio Dumped
By Glenn Knight
09 May 2006

BREAKING NEWS: WA Police and Justice Minister John D’Orazio has resigned from State Cabinet after being sacked on Monday by Premier Alan Carpenter after it was revealed he had been driving illegally after losing his licence.

D’Orazio ended the speculation over his immediate political future by announcing his resignation from State Cabinet on Tuesday at the State Labor party caucus meeting. Carpenter announced on Monday that D’Orazio has been removed from the Police and Justice portfolios in State Cabinet.

“In my view, and after careful consideration of the matter, I do not believe D’Orazio can continue as Minister with responsibilities for fines enforcement and road traffic matters,” said Carpenter.

Carpenter learnt from D’Orazio last week that his licence had been lost after failing to pay a $100 speeding fine that he incurred in August last year.

According to D’Orazio he had sent a cheque to pay the fine but was unaware that the cheque had not been accepted because it was too late. He claims that he received no follow up advice because reminder notices were sent to his previous residential address in Noranda. Failure to pay the fine resulted in his licence being suspended from February 22.

D’Orazio only discovered that his licence had been suspended when his wife went to pay another outstanding $100 fine for another incident in October last year. Payment of the fines automatically restored his licence but it meant that he had been driving illegally for the last two months.

The events leave the Premier and the State Government looking red faced. In September last year D’Orazio launched a campaign that targeted 40,000 Western Australians who had lost their drivers licences through non-payment of fines.

The drama for the State Government also comes as only last week D’Orazio announced tougher penalties for speeding and restraints offences.

“The aim of the Traffic Code is to make our roads safer, by penalising motorists who put their own lives and those of others at risk,” D’Orazio said in statements released last week.

D’Orazio’s resignation will lead to further shuffling of the ministerial front bench. The moves yesterday saw his portfolio divided amongst other ministers.

Minister John Kobelke will add Police, Emergency Services and Community Safety to his existing portfolios.

Woman’s Interests Minister, Margaret Quirk will take on the Justice portfolio.

David Templeman will relinquish Seniors and Volunteering while retaining Community Development; Youth and assisting Minister for Planning and Infrastructure.

Disability Services; Citizenship and Multicultural Interests and the Seniors and Volunteers Portfolios have yet to be reallocated.