Skip to main content

When AI isn't delivering on expectations

Their limitation to  this  could be predominant and the fact that they can only artificially provide with data which was practically fed from third-party sources without any initiative to find, associate and use the most updated account. Presently, AI is definitely a little farther than what search engines could do when giving out information. Although, AI seemed to have changed how search engines deal with data entirely.  Their large language models, unless prudently orchestrated either by AI or human, or hybrid entities, we shall say that, we'll continue to see their performance, in such context, to be stillborn or lagging, if not full of primitive suggestions and information which can be useful, somehow, to the humans. In the meantime, the original source and those with firsthand information, if still around, shall be sought out.

How functional and secure AES is

How functional and secure AES is?

The Philippine electorate will once again go to polls and decide who will lead the nation in the next six years of their lives. This important event which will elect new president, vice president and 12 senators for national posts, and seats are also being contested for provincial, city and municipal levels, is expected to be counted unofficially in 24 hours, concluded or canvassed officially in a few days or so but authorities and observers expected it to be done in less than a week. Last presidential election, it was known three days after close of election precincts. This is especially true for nation states, not only the Philippines, that conducts their elections using automated election or computerized-and-networked voting systems.

In PH, the past automated elections were encumbered with technical issues and fraudulent results, uttered and written everywhere by many concerned and affected individuals and institutions alike.

This time, we could say, these technical issues must have been eliminated and any possibility of risks to the functionality and security of the AES must have been anticipated and contingencies have been put in place to thwart any incident towards the voting machines, servers, transmission of votes or data, governance and support, electricity, well-being of electorate, since we are still in the middle of pandemic following of basic health protocols and emergency backup systems.

In technology parlance, especially for mission critical systems, vulnerability in the entire operation is attended to immediately, either in the form of software fix or some improvise mechanisms to control such threats.

The proper functionality, and shall we say, stringent security of voting machines, processing and transmission of votes or data are paramount to successful, and as a result, an evidently clean election exercise. Without such technical considerations, thoughtful and careful examinations of mechanisms, assured by and for stakeholders, encompassing the nationwide voting system, concerns of technical issues and fraudulent election results will definitely turn up in no time. Protest of election result is excruciatingly slow, expensive if money is even relevant, and most of the time they are not resolved accordingly.

Let’s identify the basic what makes AES functional and secure. While we are not part of the organizations facilitating, running and managing the AES, we have few ideas what makes up the whole system. Functional means processing and transmission of votes have been perfected or at least the system have been finalized for election proper and that during the time which the AES is being used, there will be no need to do anything, that is to say no more system setup and correction necessary. Secure means anything related to the question of code, setup, build, network of the system have been thoroughly examined, tested and validated, based on security and data protection protocols agreed upon by involved parties, if not the requirement expressed in Philippine election-and-related laws and AES-specific rules, and only authorized personnel must have access to the system’s administrative interface for monitoring and incident response purposes, removing the ability to manipulate both the system and data. That must be the default setting. Security is also about being restrictive, and this is very helpful for a network environment like AES which is serviced and provided by different telecommunications and internet service providers that connected and linked every voting machines and servers deployed in precincts and protected facilities designated nationwide. Depending on the agreement of parties involved in AES, the network environment must have been vetted and assured for security without sacrificing the systems overall functionality, disabling unnecessary configuration, interfaces and access.

Dig a little deeper and that would let us consider some of the primary security technologies playing different roles including DMZ and if used properly it may differentiate virtually-segmented subnetworks within the whole system; firewall(s) can block, reject, drop and redirect traffic with the newer ones now capable of rendering permissions for end-users based on their given role and applications, meaning it may or may not allow effective access to an AES resource and data; access control may specifically permit and authenticate authorize credentials specific to a certain role and application as well as some functionalities that may be available in a firewall; anti-malware may be use to identify malicious data or applications which can then be quarantined for further investigation or removed immediately; network monitoring can attest network traffic authenticity and that no other devices are connected to the network unless authorized; directory services can authenticate roles and devices, facilitate cryptographic methods to encrypt and decrypt protected, in transit or at rest data. There are other security technologies specific for DNS, routing, information and events management, technical and administrative operations, surveillance camera including but not limited to artificial intelligence. There is, however, the most important element in security, the stakeholder, with the roles the entities and their staff got we can easily identify what those meant for the AES in which case their actions should be guarded and their computers connected to the system are limited with only the applications they need to monitor and for non-interfering operation. All others, must be taken out and computers with full operational capability must only be used if necessary, especially if there was a persistent security incident or threat being identified.

Don’t allow super privilege accounts and programming tools in which these must have been removed in any machines to be connected to the election system once it has been finalized for deployment, during and even after voting. Let no one know of any of these credentials except for a few authorized personnel. This is not so easy to handle if things are not systematic.

The organizations that operates the AES during this important juncture in which the electorate wants to be heard of their decision, a final and significant one in a six-year time basis, that is critical to people’s lives, must make this election as comme il faut as one of their missions, not just delivering the votes to the deserving future leader of our nation.

Absent of any contortion, the future is being determined by the people themselves, with vigilance and respect to the process and with zero tolerance to unacceptable practices, we must expect only the best.

Comments

Anonymous said…
The fast turn-out of votes was clearly due to the decisiveness in PH leadership. Perhaps courtesy to the proceeding itself, and for the people no less.

~&
Anonymous said…
I believe when technology was designed and rigorously validated and tested to operate, and when the time comes and is working, properly, it's more convincingly that it can facilitate the job, as fast as it was to be in actual setting, without doubt of anomaly. S. Adam

Jj said…
Do you think the entire election system and its security was facing the Internet? Looks like it with this: https://www.gmanetwork.com/news/topstories/nation/831335/gov-t-blocked-over-20-000-attempts-to-hack-eleksyon-2022-esperon/story/
Anonymous said…
Seems like everywhere, not only in PH, there is always doubt, could be worst, by the losing parties. That the election was somehow manipulated. Fast or slow turnout of elections, you'd see such one-sided claims of fraud or whatever that suits them. It is fine to have doubts, but make that a sinister play, without listening and looking to the cerebral rationalization and facts, is simply a bad rejoinder. I think the voters are really being cognizant to this kind of politics, and they could see clear-as-sunlight useless plastics, copycats and pretenses.

Popular posts from this blog

Jobs we observed in a system performance

They are made either any of the following- - Tech job, - Business job, - Nut job, or - Enterprise job. What's yours? Can you do it better from your existing drive? Whatever you do, your output should facilitate not just your organization's goal but a little more than what you originally planned. Leaders usually kept them in the mind, so subtle only them knows it, but with some useful and delicate strategies employed people really are doing a good job, and working to improve them, too. That's the beginning why corporate social responsibility, or even the consequential environmental, social and governance initiatives can be a potent move to do something, if pertinent or weighty is even the right word. That doesn't need an ostentatious resources but the effect is meaningful for stakeholders, everyone we meant.

Philippine telcos blocking entire SMS text with internet addresses in it

If you are sending SMS texts to your friends, family or colleagues and they contain internet or web address including IP and email addresses, and even a period or dot separating, regardless of, your words and numbers, they are automatically blocked and not going to be received by your waiting recipient. Cooler heads must prevail here especially if an important message is urgently being expected. IP version 6 address is fine. However, an IPv4 including localhost address (given automatically to every computers and network interfaces as their own alone designed for troubleshooting purposes), and your money in the billion figure using dot as separators would be blocked.  If you send "local.business, naman.naman etcetera" or any words that made you use dot in between them, as part of the text, they will be blocked. There are some, that isn't blocked in this category. Like check.iclassed, some.ent, whatever.local etcetera, that is because they do not form any domain name at all...

How to save from Microsoft 365 or Teams and learn the basics of the solution from our first license and transaction

 Subscription and license fees for cloud services is not always appealing to small businesses. For big businesses, we are on a spending spree because we simply can, even if a license if not being used purposely and productively. With small businesses, no matter the need for Microsoft 365, we won't even try it. We did try but stopped and never subscribed back again. We consider the cost to be very high not just because of the service or product's license cost only. If accumulated for years compared to simply buying physical media, which is still the best bet. This, however, is going away. For some markets, it is not available anymore. How can a business get Microsoft 365 without breaking the planned budget allocation just for this service? There are options available from Microsoft 365 website. Pick the business, not family, personal or enterprise, which we may want to consider as well. With the cost the only consideration, any of this may not be a good choice. But then some fea...