4/22/2016

Hackers copied Comelec's database of registered voters!

.

When you went to your local Comelec office to register as a voter, could you recall how long it took you to fill out completely the voter's registration form? Do you remember how very detailed were the bits of information being asked -- including the digitized bio-metrics of your fingerprints and your digitized signature and your picture? All of that amount of information about you are now in the hands of the hackers! And if they wish to, they could know any piece of information about you down to the last detail that you provided in your registration!

As a consequence, all of us innocent registered voters are being unnecessarily exposed to certain risks that could range from not serious to very serious.

God forbid, but if those database could somehow find its way into the hands of real cyber criminals of very high expertise, then the following are possible to happen:

1.) Information about you held in other establishments may get hacked.

2.) Your bank accounts may get hacked and funds may get stolen.

3.) Your I.D. cards, ATM cards, credit/debit cards, passport may get reproduced or get faked using the information about you in the stolen database. Then transactions using the reproduced or faked cards may happen without your knowledge.

4.) Your identity may get stolen and assumed by another person and use your name to engage in transactions that could make your person responsible to whatever accountability the transactions may have caused.

5.) By using your stolen identity, your person could be sabotaged by someone with a malicious intent to destroy your reputation or your career.

6.) And lastly, since there are pictures, signatures, and fingerprints bio-metrics in the stolen database, fake voter I.D.s can be produced and used on May 9, 2016 elections.

This is not a trivial matter. Let us be warned and let us follow the advice that the experts are recommending concerning this incident.

Thanks to the hackers for busting Comelec's claim of a good security system they have put in place for their computer system network which will also be used this coming elections in May. If no stronger system security fortification is done to address this situation, then during the elections, the integrity of the computerized consolidation of votes could potentially be jeopardized and the outcome of the elections might be rendered questionable.