COMELEC: A Question Of Confidence


Published on

Published in: News & Politics
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

COMELEC: A Question Of Confidence

  1. 1. Comelec: A Question of Confidence<br />By Joey de Venecia III<br />Senatorial Candidate & Spokesman <br />on Poll Automation<br />PwersangMasang Pilipino<br />Presented at the Kapihansa Manila Hotel, May 3, 2010<br />
  2. 2. D Day -- May 10, 2010<br />One week from today, 50 million Filipino voters will head for their respective precincts to elect the next president, vice president, 12 senators, party-list representatives, and local government officials. This will be the first time that the Commission on Elections will conduct automated (AKA computerized) elections.<br />
  3. 3. There are serious issues the Comelec needs to address<br />The Comelec has not succeeded in winning the trust and confidence of the electorate for a number of reasons:<br />The PCOS machines have failed or underperformed in a number of instances;<br />The entire voting system appear to have numerous pitfalls/shortcomings; and<br />It is not clear if cheating – in the form of digital dagdagbawas – can still take place. <br />
  4. 4. COMELEC & the AES<br />Evaluation<br />COMELEC has been trying to create this link without any success<br />Source Code Review<br />Assurance<br />Stakeholders<br />(PUBLIC)<br />CONFIDENCE<br />THE MISSING LINK<br />Automated Electoral System<br />RISKS<br />Systems<br />Concerns<br />Countermeasure<br />Minimize/<br />mitigate<br />risks<br />By: DrexxLaggui<br />Information Security Consultant<br />The COMELEC has been unsuccessful in providing information on the AES to gain voter confidence<br /><ul><li>Release of critical documents were delayed giving the perception that they are hiding something.</li></li></ul><li>Documents<br />On Monday, April 26, 2010, 5:00 PM, The following documents were requested.<br />On Friday, April 30, 2010, 3:00 PM, The following documents were received.<br /><ul><li>Systest Labs Report – promised to be provided on April 27
  5. 5. Technical Evaluation Committee (TEC) certification and report – promised to be provided today April 27
  6. 6. PCOS Machine Test Results (and the PCOS test procedures that generated these results)– promised to be provided April 27
  7. 7. Three (3) test results in particular: mean time between failures (MTBF); average rejection rate of valid ballots; and accuracy rate (given x test ballots, how many were miscounted, if any) If we can have full access to the reports per machine, we can do statistically analysis and have a good idea about the % of failures, ballot rejections, and count accuracy levels to expect on May 10
  8. 8. Random Manual Audit (RMA) Procedures – promised to be provided by April 27
  9. 9. Design Specifications – still to be discussed during en banc on Tuesday, April 27
  10. 10. Test Protocols – to be discussed during en banc on Tuesday, April 27
  11. 11. TEC Resolution 2010-002.pdf
  12. 12. Tabular Information 03 03 2010.pdf
  13. 13. Systest Source Code Review Readiness and Security.pdf
  14. 14. System Acceptance Test.pdf
  15. 15. Systest Certification Report Summary.pdf
  16. 16. RMA Resolution No 8873.pdf
  17. 17. PCOS Firmware Extract Hash 03 03 2010.pdf
  18. 18. Other Certifications.pdf
  19. 19. DOST Discrepancies Reports Analysis.pdf
  20. 20. Certification on Final Trusted Build.pdf
  21. 21. ANNEX J - TEC Compensating Controls.pdf
  22. 22. ANNEX G - Revised Continuity Plan.pdf
  23. 23. ANNEX F - TEC Validation and Verification Procedures.pdf</li></ul>Hard copy of the documents were received then converted to PDF format for proper distribution.<br />Downloadable through Joey’s website: <br /><br />Remaining documents were promised to be given on Monday, May 3, 2010<br />
  24. 24. IMPORTANT NOTE<br />Of all the documents provided us by the Comelec, we consider the Certification Test Report for Source Code Review, Readiness and Security Testing the most important. This is also known as the SysTest Lab report.<br />The copy of the report provided us <br /> had a potentially important page missing.<br /><ul><li>The report indicated the extent of the test performed on the system.
  25. 25. The report showed the strength and weaknesses of the system.
  26. 26. A statement in the SysTest Labs website says a comprehensive test was done </li></ul> to the system<br />
  27. 27. COMELEC MATERIALS & THEIR SIGNIFICANCE<br />Technical Evaluation Committee (TEC) certification and report <br /><ul><li>These certifications and reports are mandated by law.
  28. 28. Test Results on accuracy, security and quality of the system.
  29. 29. The Certification released to the public does not satisfy the requirement of the Law.
  30. 30. RA 9369 states: “"SEC. 11. Functions of the Technical Evaluation Committee. - The Committee shall certify, through an established international certification entity to be chosen by the Commission from the recommendations of the Advisory Council, not later than three months before the date of the electoral exercises, categorically stating that the AES, including its hardware and software components, is operating properly, securely, and accurately, in accordance with the provisions of this Act based, among others, on the following documented results:”</li></ul>PCOS Machine Test Results (and the PCOS test procedures that generated these results) <br /><ul><li>The test results show the basis for both COMELEC and Smartmatic’s acceptance of the system.
  31. 31. Smartmatic received the machines from their Chinese manufacturer.
  32. 32. What was the basis for accepting these machines?
  33. 33. COMELEC received the machines from Smartmatic.
  34. 34. What was the basis for accepting these machines?
  35. 35. There has to be some form of Test Data for both COMELEC and Smartmatic to accept these machines. None were provided.
  36. 36. The report should also show the strength and weaknesses of the system.</li></li></ul><li>SYSTEMIC PITFALLS<br />PCOS Machines<br /><ul><li>82,200 PCOS machines & backup batteries purchased
  37. 37. 75, 471 precinct clusters
  38. 38. 6,729 spare PCOS machines available. ( 8.9% of the total number of clustered precincts )</li></ul>Memory Cards<br /><ul><li>180,640 memory cards purchased.
  39. 39. Two Memory Cards per precinct cluster (one firmware, one data) yields a requirement of 150,942 memory cards.
  40. 40. 29,698 spare memory cards available. (39% of the total number of clustered precincts)
  41. 41. These cards could either be used for data or firmware.
  42. 42. Spare PCOS machines can be used to generate multiple ERs and store the corresponding data file to the spare memory cards.
  43. 43. Could be used as the basis when a candidate questions the results.
  44. 44. Could be used to switch the data card during transport.
  45. 45. These Compact Flash cards are small enough to cover with the palm of your hand.
  46. 46. Spare PCOS machines could be used to connect to the servers.
  47. 47. There is more than enough spare data cards to attach to the spare machines.
  48. 48. Identity and profile for these spare machines could be easily be configured. </li></li></ul><li>SYSTEMIC PITFALLS<br /><ul><li>Disabling the feature to read UV markings.
  49. 49. The official COMELEC reason is “alignment problems.”
  50. 50. Empowering the BEI to control the fate of the Ballots.
  51. 51. To date, voters are unaware of how this UV markings should look like.
  52. 52. Disabling the voter verification feature which implements the provision of the law allowing the voter to confirm that the machine (PCOS) registered his/her choice.
  53. 53. Although it is very clear in RA 9369, the COMELEC decided solely to disable this function
  54. 54. RAs can only be changed by amending the law in Congress.</li></li></ul><li>SYSTEMIC PITFALLS<br /><ul><li>The BEI will no longer be required to Digitally Sign the ERs.
  55. 55. The Digital Signature will automatically be embedded by the PCOS machine.
  56. 56. This contradicts the original General Instruction document released by the COMELEC. Although a revised GI was released to reflect this change.
  57. 57. All Digital Signatures were prepared and generated by Smartmatic/COMELEC.
  58. 58. The Comelec has removed another significant security feature which makes it possible to transmit data from other PCOS machines without the presence of any BEI member.</li></li></ul><li>SYSTEMIC PITFALLS (CCS)<br />Audit Functionality<br />Several of the logging functions in the Smartmatic CCS project appear to omit the inclusion of the time and date from the logged messages. These functions are accessed throughout the system as logging functionality is required. This apparent omission may result in audit log entries without complete date and time information being included as part of each individually logged message. (Page 18, Certification Test Report for Source Code Review, Readiness and Security Testing, Rev 1.06, Feb 9 2010, Systest Labs)<br /><ul><li>The CCS (Consolidating/Canvassing System) will be the basis for protests. Just like during the manual voting days wherein the COCs were the basis for electoral protests.
  59. 59. With the absence of time and date logs, records & results can be accessed during and after elections without the public knowing the time and date they were accessed.
  60. 60. Systest Labs even acknowledges this problems stating “it is however, an impediment to an accurate re-creation of election actions, should the need arise.”</li></li></ul><li>SYSTEMIC PITFALLS (CCS)<br />Security Functionality<br />SysTest's processing of the Dominion EMS source code through the Parasoft tool application, however, indicated that there are possible susceptibilities to SQL injections within the Dominion EMS…Several instances were found to exist in which user-entered data-related commands may be submitted to the database in such ways that the implemented protective coding may be bypassed. (Page 19, Certification Test Report for Source Code Review, Readiness and Security Testing, Rev 1.06, Feb 9 2010, Systest Labs)<br /><ul><li>This simply states that it is possible to make changes to the database bypassing the implemented security measures.
  61. 61. Remote operations on the database is possible.
  62. 62. These injections are actual database related instructions that can manipulate data stored in the system.</li></li></ul><li>SYSTEMIC PITFALLS (CCS)<br />Security Functionality<br />It was also determined that, in at least one instance, encryption keys were found to be explicitly coded into the source code of the system. That encryption keys were discovered within the source code could potentially make them available to anyone that might have access to the executable binary version of the EMS application.(Page 19, Certification Test Report for Source Code Review, Readiness and Security Testing, Rev 1.06, Feb 9 2010, Systest Labs)<br /><ul><li>Encryption Keys provide added security features to the system by turningvarious data into unreadable format.
  63. 63. Any threat to the system (such as hackers) have basically their work cut out for them making it faster to access the system.</li></li></ul><li>SYSTEMIC PITFALLS (CCS)<br />Other Functionality<br />Mixed mode operations may have risks involved if the value being converted is of a floating type, and it is converted to a decimal type, thereby potentially losing precision, or if the type being converted is assigned to a type implemented as a smaller variable type, in what is known as a narrowing conversion..(Page 20, Certification Test Report for Source Code Review, Readiness and Security Testing, Rev 1.06, Feb 9 2010, Systest Labs)<br />Type of Variable is Integer<br /><ul><li>Programming languages require you to define the type of numerical value of all variable that will be processed. (i.e. Decimal, Integer, etc.)
  64. 64. Converting types during program execution could affect the values during the conversion process (round up, round down, etc).
  65. 65. This could be a threat especially when dealing with number values in the millions range.</li></li></ul><li>SYSTEMIC PITFALLS (PCOS)<br />Audit Functionality<br />It appears that multiple entities may have the possibility of writing to a single log file using class method logFile.LogMsg() without clear controls over ownership of the file handle, or clear comments indicating that that is the single audit logging thread….. It is however, an impediment to an accurate re-creation of election actions, should the need arise.(Page 21, Certification Test Report for Source Code Review, Readiness and Security Testing, Rev 1.06, Feb 9 2010, Systest Labs)<br /><ul><li>The appears to have the same issues as the CCS
  66. 66. The log file could be overwritten thus clearing the previous log records.
  67. 67. Could be a challenge in re creating events as mentioned in the report.</li></ul>Ballots<br />A few instances were found where the source code did not include checks for the possibilities of vote count variables being overflowed. Numeric variable overflow is possible if the value assigned to the variable becomes more than the maximum permitted value for the numeric type of the variable. The risk can only become manifest if a large number of votes are processed through a single PCOS.(Page 22, Certification Test Report for Source Code Review, Readiness and Security Testing, Rev 1.06, Feb 9 2010, Systest Labs)<br /><ul><li>This states that the PCOS machine can generate more votes than the prescribed amount.</li></li></ul><li>Digital Dagdag - Bawas<br /><ul><li>Majority of the findings in the Systest Labs Report have been tagged as either Major or Minor
  68. 68. Statements like “the implementation of manual processes and procedures will further mitigate any potential issues” are frequently used in the document to downplay the gravity of the findings.
  69. 69. Relying on manual processes to address shortcomings of the system contradicts the entire idea of AUTOMATION.
  70. 70. Issues creating opportunities for Digital Dagdag – Bawas
  71. 71. CCS Security issues allow database manipulation.
  72. 72. Adding and removing records in the database.
  73. 73. Log issues will make make it almost impossible to recreate events when needed.
  74. 74. Significant amount of Backup Memory Cards in tandem with the spare PCOS machines can be used to generate ERs.
  75. 75. Lack of Test Data for the 48,000 modems makes the transmission of ERs questionable.
  76. 76. Could create the scenario to transfer Data Card to a different machine for transmission due to modem failure.
  77. 77. Switching of Data Cards is always possible once it is removed from the PCOS machine.
  78. 78. Could create the scenario to send the ERs manually.
  79. 79. Cannot discount the fact that there are still 5,000 signal jammers at large. </li></li></ul><li>Digital Dagdag - Bawas<br /><ul><li>Issues creating opportunities for Digital Dagdag – Bawas (cont’d)
  80. 80. Alignment issues (as demonstrated and confirmed in the UV marking controversy) could result to significant Ballot rejection.
  81. 81. There is no certainty at this point that the alignment issues applies to the names and ovals in the Ballot.
  82. 82. Digital Signatures of the BEI are no longer required by the PCOS in order to transmit the ER.
  83. 83. Allows any PCOS machine to transmit ERs without any BEI officer present.
  84. 84. There are 6,726 spare PCOS machines on standby.
  85. 85. There are 29,698 spare memory cards readily available. </li></ul>COMELEC – SMARTMATIC - TIM<br />Voting<br />Transmission<br />Canvassing<br />With the COMELEC having absolute control and access to the entire Voting System, it should truly secure this and ensure honest elections.<br />
  86. 86. Notes on Digital Dagdag - Bawas<br />Of the 48,000 voting centers nationwide, only 36,000 have been surveyed for signal, power, etc.<br />Only 48,000 field technicians were recruited to handle 75,471 machines to be used on election day<br />Comelec assigned only 438 trainers to train 260,000 Board of Election Inspectors (1 trainor for every 593 BEIs) <br />
  87. 87. Notes on Digital Dagdag - Bawas<br />There are only 48,000 modems for the 75,471 PCOS machines.<br /><ul><li>For all the SIM cards to be used in the elections, Smartmatic generates passwords, issues digital certificates, verifies the certificates, and operates the machines. This is like merging in a single person the functions of accountant, cashier, auditor, operator and vendor!
  88. 88. Data centers are in secret locations which the Comelec refuses to reveal to the public. This is equivalent to conducting a canvass in a secret place only the Comelec and Smartmatic know</li></li></ul><li>RECOMMENDATION<br />To request the COMELEC for full transparency in the steps taken in addressing the findings indicated in the Systest Labs Report.<br />To request the COMELEC for full disclosure on how spare PCOS machines and CF cards be secured against misuse.<br />The COMELEC should educate the voters on how the UV Markings look like.<br />Discolose features of the PCOS machines that can be configured without modifications to the software.<br />
  89. 89. Thank You<br />