Advertisement
Guest User

Untitled

a guest
Jul 21st, 2017
339
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 54.64 KB | None | 0 0
  1. **from Securing Digital Democracy by J. Alex Halderman**
  2.  
  3. 01 Voting as a security problem
  4.  
  5. In the digital age, voting can be a very big computer security problem.
  6.  
  7. Is technology being used appropriately and safely in our voting process? Can it be?
  8.  
  9. **The Security Mindset**
  10.  
  11. Trying to make a system fail; trying to see what could go wrong with a system as a result of human forces.
  12.  
  13. **The Adversary** - computer security studies how systems behave in the presence of an _adversary_ - someone trying to make the system fail. a.k.a "the attacker", etc.
  14.  
  15. _Thinking like an attacker:_
  16.  
  17. - find the weakest links
  18.  
  19. - identify assumptions that security depends on - are they false?
  20.  
  21. - think outside the box - the attacker won't be constrained by the system designer's worldview
  22.  
  23. _Thinking like a defender:_
  24.  
  25. Security policy:
  26.  
  27.      - what are trying to protect?
  28.  
  29.      - what properties are we trying to enforce?
  30.  
  31. Threat model:
  32.  
  33.      - who are the potential attackers? Capabilities? Motivations?
  34.  
  35.      - what kind of attack are we trying to prevent? 
  36.  
  37. Risk assessment:
  38.  
  39.      - where are the weaknesses of the system?
  40.  
  41.      - what will successful attacks cost us?
  42.  
  43.      - how likely are they?
  44.  
  45. Countermeasures:
  46.  
  47.      - costs vs benefits?
  48.  
  49.      - technical vs nontechnical? Nontechnical defenses could be things like the police, the legal system, etc.
  50.  
  51. **Security Requirements for Voting**
  52.  
  53. __Integrity__: the _outcome_ matches _voter intent_.
  54.  
  55. - Votes are cast as intended.
  56.  
  57. - Votes are counted as cast.
  58.  
  59. (there's room for fraud/error in both parts).
  60.  
  61. _Ballot Secrecy_:
  62.  
  63. - Weak form: ensure that nobody can figure out _how you voted_...
  64.  
  65. - Strong form: ...even if you _try to prove it to them_
  66.  
  67. The strong form can help protect against coercion/buying votes/other pressures against you voting how you want to vote.
  68.  
  69. _Voter Authentication_:
  70.  
  71. - Only _authorized voters_ and can cast votes
  72.  
  73. - Each voter can only vote up to the permitted number of times
  74.  
  75. _Enfranchisement_:
  76.  
  77. - The right to vote
  78.  
  79. - All authorized voters have the _opportunity_ to vote.
  80.  
  81. _Availability_:
  82.  
  83. - The election system is able to accept all votes on schedule and produce results in a timely manner.
  84.  
  85. These security requirements can be in tension with each other. For instance, a system high in integrity could be at the sacrifice of some ballot secrecy.
  86.  
  87. _Other important properties:_
  88.  
  89. - Cost effectiveness
  90.  
  91. - Accessibility
  92.  
  93. - Convenience (can't be too difficult, esp. in places of non-compulsory voting)
  94.  
  95. - Intelligibility (can't be too complicated)
  96.  
  97. **02 How We Got Here**
  98.  
  99. **_Voice voting_**, or "viva voce".
  100.  
  101.      - Voters just announce out loud who they want to vote for.
  102.  
  103.      - Voters are sworn in, they announce who they are, and then they cast their vote
  104.  
  105.      - Multiple clerks for redundant record keeping
  106.  
  107.      - Done in the presence of their community, so some basic identity security (i.e. people will recognize if someone doesn't belong)
  108.  
  109.      _Problems:_
  110.  
  111.      - No ballot secrecy whatsoever
  112.  
  113.      - Coercion/voter intimidation 
  114.  
  115.                - The political candidates might be present at the polls
  116.  
  117.                - Physical coercion
  118.  
  119.      - Vote buying
  120.  
  121. **_Early paper ballots_**
  122.  
  123.      - Voting by ballots & tokens has been around for awhile
  124.  
  125.      - c. 1870, US - wooden ballot box
  126.  
  127.           - had a lock on it
  128.  
  129.           - at the beginning of voting, the box would be opened to show that it was empty
  130.  
  131.           - vote is just slipped into the slot at the top
  132.  
  133.           - voters had to provide their own paper ballots
  134.  
  135.           - at the end of voting, the slot would be sealed, such as with wax
  136.  
  137.           - each vote is taken out of the box by clerks, examined, and then recorded
  138.  
  139.                - done under the watch of representatives from the community
  140.  
  141.      _Problems:_
  142.  
  143.           - those observers from the community could easily be excluded from the process
  144.  
  145.           - ballot boxes could be replaced by "cheater's" ballot boxes with false sides or bottoms with precast ballots behind them. When the box is opened, it _looks_ like the box is empty. Later the false sides/bottoms are removed.
  146.  
  147.           - the ballot box locks weren't very secure; could be pressured open even w/o the key
  148.  
  149.      - 1884, US - glass ballot box - made it harder to incorporate false sides, esp. when the glass ballot box was a sphere. problems of ballot secrecy though.
  150.  
  151.      - c.1880, US - Acme voting machine - a voting box with a crank & gears inside.
  152.  
  153.           - the vote is fed in using the crank, then a bell goes off notifying people that a vote had been cast, then a counter on the front of the box would increment
  154.  
  155.      - 1964, D.C. - cardboard ballot box - cheaper & disposable
  156.  
  157.      - c.1936, CA - metal ballot box w/ stronger locks
  158.  
  159.      - early printed ballots printed in the newspaper, sponsored by an individual candidate
  160.  
  161.      - later printed ballots were sponsored by parties (~1880)
  162.  
  163.      - you could write in your own candidate, so later ballot designs leave little room for write-ins (~1888)
  164.  
  165.      - voters could get whole sheets of ballots and cast their votes multiple times
  166.  
  167.           - inspired voter registration systems, so voters' names could be crossed off once they had voted
  168.  
  169.      - parties printed their ballots on particular colors, which compromised ballot secrecy (others could tell how you were voting based on your ballot color)
  170.  
  171. **_The Australian Ballot_**
  172.  
  173.      - the pre-printed ballot
  174.  
  175.      - rather than have the voter bring their own ballots or let parties provide their own ballots, the gov't would print and distribute them
  176.  
  177.           - had to determine who was on the ballot in advance
  178.  
  179.      - ballots looked the same except for where the voter made their marks, so increased ballot secrecy
  180.  
  181.      - around this time, voter registration was coming into use, as were voting booths
  182.  
  183.           - increased complexity and costs, though more secure
  184.  
  185.      _Problems:_
  186.  
  187.           - counting of the ballots
  188.  
  189.                - Boss Tweed & New York's Tammany Hall, controlled NYC's political system…dishonest counting (among other things)
  190.  
  191.                - with the simplified marking on the ballot, it was easier for counters to add marks to ballots
  192.  
  193.                     - someone could add more marks, so that the person "overvoted", thus nullifying that vote
  194.  
  195.           - the law discounts any ballots with any unique identifying marks, other than the marks used to vote
  196.  
  197.                - so someone else could just add these extra marks to get that ballot discounted
  198.  
  199.           - **chain voting** - an alternate method to buying votes (since w/ Australian ballots you can't check if someone voted how they said they would)
  200.  
  201.                - an adversary waits by the voting booths and provides pre-filled ballots that the voter brings in and uses, then returns the adversary the blank ballot they didn't use, and repeat
  202.  
  203.                - one defense is having a serial number on every ballot so you can ensure they return the same ballot they were given, but now that vote can be traced to an individual
  204.  
  205.                     - an even better approach is to have the serial numbers as detachable stubs that you rip off after the ballot has been submitted
  206.  
  207. **_Mechanical Voting Machines_**
  208.  
  209. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-09%20at%208.03.30%20PM.png)![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-09%20at%208.03.25%20PM.png)
  210.  
  211.      - end of the 1800's**
  212.  
  213.      - make a direct record of a vote
  214.  
  215.      - used well into the 1900's
  216.  
  217.      - purported to have "absolute secrecy"
  218.  
  219.      - Lever Voting Machines
  220.  
  221.      ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-09%20at%208.04.38%20PM.png)
  222.  
  223.      ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-09%20at%208.05.24%20PM.png)
  224.  
  225.      - physical manifestation of voting rules, such as only voting for one candidate
  226.  
  227.      - a counter mechanism inside the machine, under lock-and-key (this is the only record of the votes!)
  228.  
  229.      - a big lever to close the curtains, little levers to make your votes, then the big lever again to open the curtains, tabulate the votes, & reset the machine
  230.  
  231.      - eliminated threat of chain voting
  232.  
  233.      _Problems:_
  234.  
  235.      - the fact that the counter mechanism is the only record of vote was a problem
  236.  
  237.      - complex machines, so failure occurred often. for instance, if a tab on one of the counters broke off, it would stop incrementing (and those uncounted votes would be unrecoverable).
  238.  
  239.           - would be very hard to impossible to distinguish natural mechanical failure and intentional sabotage
  240.  
  241.      - very expensive
  242.  
  243. **_Punched Card Voting_**
  244.  
  245.      - computer punch cards:
  246.  
  247.           - IBM port-a-punch (1959):
  248.  
  249.                ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-09%20at%208.16.44%20PM.png)
  250.  
  251.      - The Votomatic (punchcard technology applied to voting, developed in partnership with IBM):
  252.  
  253.      ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-09%20at%208.17.38%20PM.png)
  254.  
  255.           - the punchcards would be sent to facility where they'd be counted by an IBM computer.
  256.  
  257.           - the voter would take a blank punchcard, slide it in at the top, then punch out the holes according to the names in the book. Each page exposes a different column of holes in the punchcard
  258.  
  259.      ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-09%20at%208.19.34%20PM.png)
  260.  
  261.      - these butterfly ballots caused the problems in the 2000 presidential elections
  262.  
  263.      
  264.  
  265.      _Problems:_
  266.  
  267.      - poor ballot design can make voting difficult, especially figuring out which holes align with which candidates
  268.  
  269.           - in Florida, this led to people marking the wrong candidates, as evidenced by abnormal vote distributions across candidates, compared to neighboring counties
  270.  
  271.      - chad, the result of punching out holes, accumulate inside the machine, and if they aren't properly cleaned in the machines, they make the voting more difficult
  272.  
  273.           - also - "hanging chad"…ambiguous if vote has been made or not:
  274.  
  275.                ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-09%20at%208.31.19%20PM.png)
  276.  
  277.           - the chad are fragile and can easily get modified during the counting process
  278.  
  279.           - hanging chad could also easily be modified - a dimpled one could be smoothed out, or a hanging one could be torn off. almost impossible to tell if it's been tampered, except under a microscope
  280.  
  281. In response to the 2000 election, money was distributed to upgrade voting systems to:
  282.  
  283. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-09%20at%208.34.03%20PM.png)
  284.  
  285. **03 Computers at the Polls**
  286.  
  287. _**Kinds of Fraud**:_
  288.  
  289.      - _Retail attack_ - attack on an individual voter/vote
  290.  
  291.      - _Wholesale attack_ - attack on the counting process
  292.  
  293.      Also:
  294.  
  295.      - _Insider attack_ - from some person inside the system (i.e. some voting official w/ some privileges)
  296.  
  297.      - _Outsider attack_ - from some person outside the system
  298.  
  299.      ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-12%20at%207.38.15%20AM.png)
  300.  
  301.      ex. chain voting in the example above is an outsider retail attack, Boss Tweed is an insider wholesale attack.
  302.  
  303. **DREs & optical scan voting** are both **_computer_** voting machines, which set them apart from previous voting mechanisms.
  304.  
  305. **_Optical scan voting_**
  306.  
  307.      - "optical mark sense technology"
  308.  
  309.      - originally used for scoring standardized tests (w/ the little bubbles)
  310.  
  311.      - replaces humans with the ballot counting box with an impartial & automated machine
  312.  
  313.      - voter fills out ballot, slides into machine, the ballot goes into a box directly attached to the scanner. At the end of the voting the machine prints out a paper with the vote counts of all the candidates.
  314.  
  315.                - most of these machines also have a memory card for a digital record
  316.  
  317.      - a couple different styles of ballot:
  318.  
  319.           ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-12%20at%207.44.07%20AM.png)
  320.  
  321.      - inside the machine are light sources (LEDs) coupled with light detectors (phototransistors):
  322.  
  323.      ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-12%20at%207.45.17%20AM.png)![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-12%20at%207.46.27%20AM.png)
  324.  
  325.           - the rectangles on the left and right are alignment marks
  326.  
  327.           - the detectors can only detect brightness or darkness, defined by a preset threshold
  328.  
  329.           - because of the arrangement of the detectors, the design implications of the ballot are that it must conform to a grid defined by the spacing of the detectors
  330.  
  331.           -a more modern form of optical scanning are more like a fax machine or scanner, producing output more like what you'd take with a digital camera:
  332.  
  333.           ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-12%20at%207.48.35%20AM.png)
  334.  
  335.           - then, in software, some algorithms take the output and determine whether or not it was marked
  336.  
  337.      - there are two main styles of optical scan voting:
  338.  
  339.           - **precinct count** - in the precinct, the voter inserts their ballot right there (less a risk that the ballots get tampered with and can immediately notify the voter if they made any mistakes with their ballot)
  340.  
  341.           - **central count** - ballots are collected in a more traditional ballot box, then transferred to a central scanner in bulk. have the advantage of requiring less equipment (just the scanner(s) at the central counting location)
  342.  
  343.      - _Problems:_
  344.  
  345.           - problems w/ people following the instructions (i.e. #2 pencil, completely fill in the oval, etc). some people use blue or red ink, some just mark "X"s or checks (inappropriate marks might not align with the light sensors in the older scanners and thus not be detected)
  346.  
  347.           - people's method of marking bubbles is so distinct that you can identify them with it
  348.  
  349.           - the computer software can be hacked, or the memory card could be compromised
  350.  
  351.                - Hursti's attack - preloaded a memory card w/ some votes for his preferred candidate (say 10 votes), and then preloaded 990 votes for the opposing candidate, when the opposing candidates votes hit 999, the next vote would roll them over to 0 (that's how the vote counting in those scanners worked). As a result, the number of votes on the memory card will match the number of ballots in the machine. But if fraud is suspected, the individual paper ballots can be counted to check!
  352.  
  353. **_DRE Voting Machines_**
  354.  
  355.      - eliminated the paper ballot entirely
  356.  
  357.      - DRE = "direct recording electronic"
  358.  
  359.      - functions similarly to a lever machine
  360.  
  361.      - only record of vote is a digital record (no paper trail)
  362.  
  363.      - in the 70's + DRE's had a paper of candidates overlaid mechanical switches in a booth much like the lever machine booths
  364.  
  365.      - in the 90's touchscreen DRE's were introduced
  366.  
  367.           - candidates displayed screen-by-screen, allowing for flexibility for how they're displayed (so, different languages, different sizes for people w/ bad sight, etc). Made administration of voting easier
  368.  
  369.      - Diebold DREs:
  370.  
  371.           - voter handed an authenticating smart card which the voter inserts into the machine, allowing them to cast their votes
  372.  
  373.                - at the end of their voting, they're presented with a summary screen of their votes
  374.  
  375.           - the voting officials have a "supervisor card" which gives them access to certain functions at the end of the voting, such as seeing the counts & printing them, which are then sent to a central location
  376.  
  377.           - there's also a memory card with the counts of the votes that are sent to the central location
  378.  
  379.      - _Problems_
  380.  
  381.           - the "black box" - the counting software is developed by a private company and is kept secret
  382.  
  383.                - counting process should be transparent
  384.  
  385.                - assuming keeping it secret will help it remain secure is a dangerous assumption
  386.  
  387.                - **Diebold** wouldn't allow independent security audits of their systems
  388.  
  389.                     - Bev Harris unexpectedly found the entire source code through a Google search and then a team did a security analysis, and found:
  390.  
  391.                          - the voter access cards could be easily counterfeited
  392.  
  393.                          - the encryption was applied incorrectly…all of the voting machines used the same encryption key:
  394.  
  395.                                    ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-12%20at%208.17.13%20AM.png)
  396.  
  397.                          - on the memory card the votes are recorded sequentially so it's relatively easy to figure out who voted according to the order people went into the booth (in a normal ballot box, the ballots are shuffled so this is harder to figure out)
  398.  
  399.                          - a lot of evidence of poor engineering practices…the comments in the code:
  400.  
  401.                          ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-12%20at%208.19.20%20AM.png)
  402.  
  403.                          - in general, a result of poor, insecure development practice. merely "fixing" the code is not enough!
  404.  
  405.           - _errors_ - very easy to make a mistake in the software code: design flaws, bugs, glitches, reliability problems
  406.  
  407.           - _vulnerabilities_ - even harder to write secure software: security, hardware sabotage, data manipulation, privacy leaks
  408.  
  409.           - maintaining the balance between integrity and ballot secrecy makes it even harder!
  410.  
  411.           - _system integrity_ - secret software, unapproved software, COTS software (commercial-of-the-shelf), dishonest lookalikes
  412.  
  413. **_Paper as a defense_**
  414.  
  415.      - paper provides very important security advantages when coupled with a computer system
  416.  
  417.      - old technologies can provide a reliable backup for modern systems
  418.  
  419.           - eg. a simple magnetic compass is required by law in modern airliners
  420.  
  421.      - redundant electronic & paper records; harder to manipulate _both_:
  422.  
  423.           ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-12%20at%208.23.32%20AM.png)
  424.  
  425.           - optical scan voting does this! and as such, **optical scan voting w/ audits is considered the gold standard for voting technology today**.
  426.  
  427.           - the problem is auditing to compare the two records is very rare
  428.  
  429.           - DRE + VVPAT (Voter-verifiable paper audit trail OR voter-verified physical audit trail)
  430.  
  431.                - a DRE that also prints a paper record of votes, which the voter can see and check if correct at the time of their vote
  432.  
  433.                - _Problems:_
  434.  
  435.                     - if the software has been compromised, fake/misleading paper records could be printed
  436.  
  437.                     - the printing devices used are economical, but not particularly reliable, nor are it's records permanent, and the quality of the printing is low enough that many may not bother to check the record
  438.  
  439.                     - if the records aren't removed by each voter then there's a trail showing everyone's votes! compromising ballot secrecy
  440.  
  441. **04 Problems with DREs**
  442.  
  443. **Diebold AccuVote-TS**
  444.  
  445. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-19%20at%2012.07.39%20AM.png)
  446.  
  447. basically a computer w/ a touchscreen, running windows CE. the voting machine was provided by an anonymous source and the studies completed in complete secrecy to prevent legal interference from Diebold.
  448.  
  449. _three main layers:_
  450.  
  451. BallotStation (Internal Flash)
  452.  
  453.                ^
  454.  
  455. WinCE Kernel (Internal Flash) - starts the BallotStation program
  456.  
  457.                ^
  458.  
  459. Bootloader (Internal Flash or EPROM) - low-level, simple software responsible for turning on the machine & starting up the operating system (WinCE)
  460.  
  461. _Three main security flaws:_
  462.  
  463. 1\. design flaws in the bootloader that allows people to replace parts of its code. bootloader will run updates from a memory card if certain files are present on it to overwrite itself, the WinCE Kernel, or the BallotStation software. all you had to know were the necessary file names!
  464.  
  465. 2\. including explorer.GLB on the memory card would launch the windows file explorer instead of BallotStation, allowing access to the system's files
  466.  
  467. 3\. could physically hack the hardware to load software from a different memory chip
  468.  
  469. note that election officials will often use the same memory card on multiple machines (to load votes from them, for instance), providing an easy attack vector for attackers (i.e. with a memory card virus)
  470.  
  471. there was a lock-and-key over the memory key slot to provide a form of physical security. BUT the same key was used for ALL machines. also, the lock was fairly easy to pick, even with just two paperclips. furthermore, that same key was commonly used for other consumer locked devices, such as jukeboxes or hotel mini-fridges; googling the number found on the side of key was enough to find them for purchase online.
  472.  
  473. diebold also sold the keys on their site. you had to have purchased voting machines to be able to purchase the key, BUT the photos of the keys were hi-res enough that you could easily copy the key by buying a similar key and filing it down according to the photos.
  474.  
  475. **2007 - study of all electronic voting machines in CA**
  476.  
  477. sponsored by the secretary of  state, so machines were provided
  478.  
  479. Hart, Sequoia, & Diebold machines - all susceptible to memory card attacks and could compromise ballot secrecy. as a result of the study they were all decommissioned
  480.  
  481. one thing to consider: _if we develop a computer voting machine/DRE that is secure now, will it remain secure over a long period of time?_
  482.  
  483. machines' security is designed with existing attacks in mind, but new kinds of attacks could crop up in the future.
  484.  
  485. governments often sell or auction old/decommissioned voting machines, but the data is often not securely erased. but these files are usually encrypted. BUT the encryption key is also available on the machine. but that file is encrypted too. BUT the key for _that_ file is not encrypted. in fact, that key is dependent on the serial number of the voting machine (which is displayed to every voter in the interface!)
  486.  
  487. the votes in these files are stored in the order that they are cast, thus compromising ballot secrecy!
  488.  
  489. **05 Security Procedures**
  490.  
  491. Voting security is more than about the voting machines, but also the whole procedure/process of voting.
  492.  
  493. **_Voter Registration_**
  494.  
  495. in the US, voters are required to register in advance (most other countries _don't_ have a system like this)
  496.  
  497. Helps filter out in advance who are eligible voters, and also helps prevent duplicate voting
  498.  
  499. Measures have been introduced to make registering easier. Registration law varies from state to state (North Dakota doesn't even have it).
  500.  
  501. Some places have online registration which introduce other potential security problems.
  502.  
  503. Almost 1/3 of eligible US citizens aren't registered to vote!
  504.  
  505. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-19%20at%207.53.46%20AM.png)
  506.  
  507. Requires an ID number (varies from state to state, but usually a driver's license number) and a signature.
  508.  
  509. Also has many accessibility features:
  510.  
  511. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-19%20at%207.54.33%20AM.png)
  512.  
  513. For instance, if you don't have a street address, you can draw a map to where you live (example above).
  514.  
  515. This info goes into a state-maintained Voter Registration Database (VRD), which has it's own set of security issues.
  516.  
  517. They often try to match this data against data in other databases, such as driver's licenses databases, to authenticate information.
  518.  
  519. But how strictly do you match? For instance, convicted felons aren't allowed to vote in some states, but sometimes matching is approximate enough that anyone with the same name as a felon will be barred from voting. However, matching that's too strict makes it harder to match information.
  520.  
  521. Who can access this data? It's typically publicly accessible and also used by the government for other purposes such as jury selection. It's often used for marketing or campaigning purposes by others.
  522.  
  523. _Example of unsecure VRD practices:_ Washington State's online voter registration. Provides an online means for voters to see and update their records.
  524.  
  525. In Washington, most voting occurs by mail.
  526.  
  527. Say you know the name of someone in Washington and want to redirect their mail-in ballot so they don't receive it.
  528.  
  529. WA's registration login only requires a first and last name, and a date of birth. If you don't know your target's date of birth, you can look it up in the publicly-accessible voter registration database!!
  530.  
  531. Now you can login and change their address. But if you try to change it, the site will also ask for a middle name and a driver license/ID number as authentication. But in WA, the driver's license number is calculated from other info about the person. This algorithm is publicly known, so you can find a site that will calculate this license number based on publicly-available information about this person.
  532.  
  533. **_Voter Authentication_**
  534.  
  535. How to authenticate voters when they arrive at their polling place?
  536.  
  537. Most countries have national IDs and use this for voting. The US doesn't have national IDs, but various forms of IDs varying from state to state, making things complicated.
  538.  
  539. For awhile, voting authentication was accomplished on paper, and signatures would be compared. But often the signature being compared is right next to you as you're signing in.
  540.  
  541. The voter's name is also called out loud enough for others to hear, so like voice voting, in a small polling place people may recognize that person and see if it's really them or not.
  542.  
  543. There are authentication machines in some places, which offer the advantage of allowing voters to go to any polling place that's convenient, since the machines are networked and can cross you off the lists of other polling places once you vote. But network access introduces security problems.
  544.  
  545. ~32 states require a form of non-expired gov't issued photo ID. But not everyone has ID - about 8% of the US population don't have a gov't issued ID. Also voting fraud in this way is very small (~50 convicted in a year) and wouldn't have been prevented by this rule, so it may do more harm than good. Also, getting a fake ID is pretty easy and volunteers at polling places aren't very well trained (if trained at all) to spot fakes.
  546.  
  547. Some places use "indelible" ink which is (supposed to be) impossible to wash off for a few days to mark that you have already voted. But any chemist can tell you how to remove it, so it's not _really_ indelible, and it could be considered a breach of voter privacy since it indicates to others that you have voted (though some countries use an invisible ink to protect against this).
  548.  
  549. **_Guarding against tampering_**
  550.  
  551. With a DRE machine, tampering could happen at any time (as opposed to traditional ballot boxes where tampering could only happen between polling and counting).
  552.  
  553. Need to be stored and transported securely.
  554.  
  555. "Two-person rule" - have to have at least two people watching/guarding at any time.
  556.  
  557. In practice, these procedures are far too lax. Sometimes the machines are delivered early and then left unguarded at polling places (called "sleepovers").
  558.  
  559. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-19%20at%208.19.51%20AM.png)
  560.  
  561. Also use "tamper-evident seals" which changes in some way if the machine is tampered with. However there are some procedural checks that need to be followed (e.g. checking the seal serial numbers to see if they've changed) to make them effective. The seals are pretty easy to replace without leaving a mark; even the "high-security" & expensive ones.
  562.  
  563. Some machines use a lot of different kinds of seals, but they've been shown to also be easily defeated. For instance, some of the sticker tamper-evidence seals can be removed with a heat gun and then replaced. Some tamper-evident screws and padlocks can also be easily removed and replaced without a trace.
  564.  
  565. One suggested alternative is "anti-evidence" seals, which have some secret information that isn't displayed, but can be proven to know if needed. If the seal is tampered with, this secret information is completely and untraceable destroyed, indicating that it had been tampered with.
  566.  
  567. **_Field testing_**
  568.  
  569. _"Zero" tape_ - at the beginning of polling, a DRE will print a receipt indicating there are 0 votes to begin with
  570.  
  571. _Logic & accuracy testing_ - election officials will have a mock vote just to make sure everything's working, but unlike mechanical voting machines (from which these tests are inherited), with DREs these have little effect in revealing if the software's been compromised (the software could just detect if it's in logic & accuracy testing mode and behave accordingly)
  572.  
  573. _Parallel testing_ - randomly select some machines on voting day and run mock votes on them according to a script, then print out the results and see if they match the script. But this can also be fooled by sophisticated attacker software by noticing differences between the scripted voting and real voting. Also - if you _do_ detect fraud on voting day, what do you do in response? The votes have already been cast and there's no paper trail.
  574.  
  575. **06 E-Voting Around the World**
  576.  
  577. E-voting has been used in many countries - Australia, Belgium, Canada, Brazil, Estonia, Finland, France, etc…
  578.  
  579. _The Netherlands:_
  580.  
  581. Used push-button-style DREs. Had a lot of security problems revealed by independent hackers. Afterwards went back to old-fashioned paper ballots, hand counted by citizens.
  582.  
  583. _Germany:_
  584.  
  585. A group fought against DRE use in court, and made a constitutional ruling that voting machines/techniques had to be understandable by the average German citizen without requiring any specialized logic, so in effect, because DREs require specialized computer knowledge, DREs became illegal under German law (they mostly went back to paper ballots)
  586.  
  587. _Brazil:_
  588.  
  589. Uses paperless DREs nationwide. A public test found some extremely disturbing security problems. For instance, researchers were able to reverse the vote-randomizing process (meant to protect ballot secrecy) to see the votes cast in order (compromising ballot secrecy). In a country with a history of military rule like Brazil, people are especially worried about coercion and thus ballot secrecy is of great importance there.
  590.  
  591. Adding a paper trail is considered unconstitutional in Brazil because they believe it violates voter privacy. In reality, it would probably help improve the integrity of the system, if it's done properly.
  592.  
  593. _India:_
  594.  
  595. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-20%20at%2011.16.37%20AM.png)
  596.  
  597. Uses EVMs (electronic voting machines) produced by two gov't owned companies. Over 400 million+ voters, with very unique constraints/conditions. Over 1.4million of these machines deployed in India.
  598.  
  599. India's EVMs, compared to US/European equivalents, are simple machines & embedded system (as opposed to US/Europe's PC-like designs), and vulnerable in different ways.
  600.  
  601. Because of the scale at which India requires these machines, they must be cheap & cost-effective (unlike US/European DREs which can cost thousands of dollars). India's EVMs are ~$200 each.
  602.  
  603. India also has a lot of problems with it's power grid, so these EVMs must run off internal battery power.
  604.  
  605. They must function correctly across all of India's extreme climate conditions, sturdy to be transported over rocky roads or to places without roads. 
  606.  
  607. India's literacy rate is 66% so 1/3 of the population wouldn't be able to read the ballot. So EVMs include party symbols next to the candidate names.
  608.  
  609. Since many parts of India don't have any exposure to electronics, the user interface had to be very simple - it just requires one button press, points to who you voted for, and that's it.
  610.  
  611. "Booth capture" - a problem in India where goons of a particular party would come to a polling place and tell everyone to just go home, with implicit threats of harm. Then they would go in and stuff the ballot box. To guard against this, EVMs can only accept a vote every 10 seconds or so, so ballot box stuffing would go at a lower rate to soften the damage from such an attack.
  612.  
  613. A control unit is attached via cable to the EVM (box on the right I'm the image above). This is where the votes are stored.
  614.  
  615. There's no memory card & no printer. Instead there's a series of switches guarded by the gray plastic doors in the image:
  616.  
  617. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-20%20at%2011.17.57%20AM.png)
  618.  
  619. The switches are grouped by "phase" (when they're needed to be used).
  620.  
  621. The counting process is a public event. The machine counts the votes and the election official holds up the machine for all to see the number of votes for candidates.
  622.  
  623. Inside the machine is a micro controller with the election firmware, which is programmed at the factory and can't be changed later. There are two memory chips that store redundant copies of the votes (but the data isn't encrypted). Then there's a display board that displays the numbers.
  624.  
  625. Indian election officials made very grand claims about the machines being "tamperproof", "infallible", and "perfect".
  626.  
  627. The machines are often stored together in large volumes in not-so-secure places, such as a school. They used tamper-evident seals but they aren't very high-tech (they are candle wax + paper + string). Thus an attacker could conceivably get access to these machines to hack them with the following attacks:
  628.  
  629. A team mimicked the display board but hide extra components underneath the LED displays. This intercepts the messages from the machine's own micro controller and re-writes numbers on the fly to send to the displays. There's also a small bluetooth chip embedded under one of the displays, which connects to an application allowing you to pick which candidate you want to win.
  630.  
  631. A team also built a simple, small electronic device that attaches to the memory chips and rewrites the votes on them.
  632.  
  633. The firmware on the micro controller has some problems too. The Election Committee doesn't own or ever see the source code, only "3-4 guys" at the companies "know what's in the code", and the Election Committee can't even verify that the chips contain the original code.
  634.  
  635.      
  636.  
  637. **07 Human Factors**
  638.  
  639. Voting systems have to be designed to be easy to use. So usability is a big factor - how accurately/correctly are people able to use the system, such that the outcome matches voter intent.
  640.  
  641. For instance, the effects of banner blindness can cause voters to completely skip sections in poorly designed ballots. Also problems of slow response machines & poorly calibrated touch screens. 
  642.  
  643. Most DREs present a review screen at the end of voting so voters can look over their choices. however, in a usability study where changes were made to their votes on the review screen, 95% of voters reported checking the review screen, but 63% failed to detect the changes made to their votes!
  644.  
  645. Banner blindness example:
  646.  
  647. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-20%20at%2011.50.29%20AM.png)
  648. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-20%20at%2011.50.47%20AM.png)(banner blindness for the top section)
  649.  
  650. _Usable paper ballots:_
  651.  
  652. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-20%20at%2011.52.39%20AM.png)
  653.  
  654. The highlighted section on the right is actually the first question on the ballot, but 10% of voters skipped it because it looks like it's part of the voting instructions (which most voters don't read - everyone assumes they know how to fill out a piece of paper).
  655.  
  656. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-20%20at%2011.53.59%20AM.png)
  657.  
  658. Here the vote for governor is split across two columns. 12% didn't cast a valid vote for governor, probably because they made a choice in each section and had their vote invalidated due to over voting.
  659.  
  660. _Accessibility:_
  661.  
  662. In the US:
  663.  
  664. 1.8 million unable to see
  665.  
  666. 2.7 million use a wheel chair
  667.  
  668. 9.1 million need a cane, crutches, etc.
  669.  
  670. 1 million unable to hear
  671.  
  672. (people 15 & older, based on US census bureau data)
  673.  
  674. DREs thought to be the answer to accessibility with their potential for modularity. But this isn't necessarily true. For instance, DRE audio ballots can be drawn out, with every word being read in low quality audio & excessively long pauses, making it a bad experience for disabled voters.
  675.  
  676. Suggested solutions: adding a braille template overlay for paper ballots, or developing special modular machines for the disabled.
  677.  
  678. _Absentee Voting:_
  679.  
  680. Voting for when the voter can't make it to the polls - maybe traveling or in the military or otherwise immobile.
  681.  
  682. There a few forms of absentee voting:
  683.  
  684. _Early voting_ - allow the voter to show up at the polls a few days before the election. Means that the DREs or ballot boxes must be supervised from that point until the general population's voting day.
  685.  
  686.  
  687.  
  688. _Proxy voting_ - having someone else vote for you. Of course has vote integrity concerns and compromises your own secrecy.
  689.  
  690. _Remote voting_ - most commonly postal voting (vote-by-mail). In some states postal voting is the most common method of voting general. Voter fills out the ballot at home, encloses it in a provided privacy envelope, which is enclosed in another envelope, signed by the voter, sent to an election official. The inner privacy envelope isn't opened until the votes are ready to be counted.
  691.  
  692. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-20%20at%206.42.57%20PM.png)
  693.  
  694. _Problems with postal voting:_
  695.  
  696. - Ballot misdirection is a potential problem, where a hacker has mail-in ballots sent to the wrong addresses so that voters can't vote.
  697.  
  698. - Blank ballots could be taken out of the mailbox and sold.
  699.  
  700. - The filled-out ballot could be taken out of the mailbox.
  701.  
  702. - You could sell the ballot to someone to fill for themselves.
  703.  
  704. - Coercion is a greater problem since election officials have less/no control over voting conditions
  705.  
  706. - Mail system might be too slow for voters out-of-country. Ballots often aren't decided until only a few weeks before the election. Some jurisdictions allow voting by fax or by e-mail which have the same problems as postal voting and more. A better solution would be to download the ballot online and then send it in by mail (but this isn't a perfect solution either).
  707.  
  708.      
  709.  
  710. **08 Internet Voting**
  711.  
  712. Seems like the logical next step, but…
  713.  
  714. A "bad idea".
  715.  
  716. Some countries have internet voting (in limited forms). Estonia has the most pervasive internet voting.
  717.  
  718. Pilot projects in the US: West Virginia, Arizona, and DC. DC stopped using it.
  719.  
  720. Greater amount of potential attackers: traditional fraudsters discussed before, online fraudsters, "hacktivists", foreign states
  721.  
  722. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-21%20at%201.43.20%20PM.png)
  723.  
  724. _Client-side threats_
  725.  
  726. - coercion, such as coercion in the workplace, if you're voting at work, or spousal coercion, or peer pressure
  727.  
  728.      - weak protection of ballot secrecy
  729.  
  730. - credential theft - someone getting your password/identity card; phishing attacks
  731.  
  732. - impostor sites - someone directing voters to the wrong site so they_ think_ they've voted, but they really haven't
  733.  
  734. - malware
  735.  
  736.      - could steal personal information for logging in & voting
  737.  
  738.      - might actively change your vote as you're trying to cast it, changing it while making it look like you voted how you intended
  739.  
  740. - botnet:
  741.  
  742.           ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-21%20at%201.51.22%20PM.png)
  743.  
  744.           infects other computers with a botclient to control these other computers. then access to this botnet is rented out to criminals. can be very difficult to detect.
  745.  
  746. _Server-side threats_
  747.  
  748. - denial of service (DDOS - distributed denial of service attack, can be accomplished with a botnet)
  749.  
  750.      - flooding the server
  751.  
  752.      - used by hacktivists such as anonymous
  753.  
  754. - insider attacks
  755.  
  756.      - includes people who develop the software, run the voting, install the software, etc
  757.  
  758. - remote intrusion
  759.  
  760.      - if there's certain flaws in the software then hackers can gain access to the server and modify its content (i.e. change the votes)
  761.  
  762.      - Advanced persistent threat (APT) - a hacker that has devoted all his/her resources into attacking a single target, which makes it very hard to defend against (typical hacking is more about acquiring more bots for a botnet as opposed to a targeted attack). Even google & the pentagon have a hard time defending against APTs
  763.  
  764. - state-sponsored attacks
  765.  
  766.      - for example: stuxnet
  767.  
  768. These attacks are much easier to carry out on the internet than say with postal voting.
  769.  
  770. A lot of the security measures with online banking can't be replicated with voting because of voting's specific requirements, such as ballot secrecy and integrity. It's also easier to identify fraud in online banking - I can tell when my money's missing. With voting, it's very hard to know if fraud has been committed. Online banking already suffers losses of millions of dollars due to online fraud, but it's just a cost of doing business. The same can't be said for voting.
  771.  
  772. A lot of the problems with internet voting are problems with internet security in general, and very hard to solve (everyone's trying to solve them).
  773.  
  774. **09 Using Technology Wisely**
  775.  
  776. _Criteria_
  777.  
  778. - **transparency** - voters can observe and understand the process
  779.  
  780.      - a fully transparent election system supports accountability as well as public oversight, comprehension, and access to the entire process.
  781.  
  782. - **verifiability** - voters have some means to convince themselves that the outcome is correct _without_ _having to blindly trust_ the technology or the election authorities
  783.  
  784.      - DREs with black-box software is not verifiable
  785.  
  786. - **auditability** - the system can be manually checked after the election to ensure that the votes have been counted properly
  787.  
  788. - **software independence** - a voting system is software-independent if an undetected change/error can not possibly cause an undetectable change in an election outcome (so any potential fraud must be "catchable")
  789.  
  790. _Post-Election Auditing_
  791.  
  792. Manual recounts = important security feature
  793.  
  794. DREs have limited opportunities for manual recounts (other than just clicking the print button again; there's often no paper trail)
  795.  
  796. Recounts of paper ballots can be slow and costly, so they only happen in specific circumstances. Anyone can request a manual recount so long as they pay for the cost (which can be as much as $1+ per ballot)
  797.  
  798. _An alternative to manual recounts are post-election audits:_
  799.  
  800. Some systems have redundant records: for instance, with optical scans you have the original scantron (slow and difficulty but verifiable) and then the memory card (fast & easy to count but unverifiable)
  801.  
  802. Using these redundant records,
  803.  
  804. pick some precincts randomly for a paper recount, if electronic tallies disagree, recount everywhere
  805.  
  806. These places must be picked randomly and can't be announced beforehand (or else the attacker could change their plan accordingly)
  807.  
  808. Standard practice is to use a fixed fraction of precincts (e.g. 10%) but a better practice is to use the number of percents required to have a 99%  (or so) confidence level that hand-counting _all_ of the paper records would match the digital records
  809.  
  810. It may be cheaper/more efficient to do _ballo__t-_based auditing rather than precinct-based auditing
  811.  
  812. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-24%20at%2010.27.17%20AM.png)
  813.  
  814. But it's difficult to do this without compromising the secret ballot (because how would you match individual ballots to their digital records? by serial number?)
  815.  
  816. _A solution: _machine-assised auditing__
  817.  
  818. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-24%20at%2010.33.06%20AM.png)
  819.  
  820. Say we have a set of paper ballots and computer tolls (i.e. digital vote record).
  821.  
  822. _Step 1_: Check electronic records against paper records using a recount machine, after original voting. This recount machine scans in the ballots and produces a digital record of the votes with ballot numbers, then prints out on the ballots that same ballot number. Since this is after the original voting the ballots will have been shuffled. Now the records are compared with the original records.
  823.  
  824. But how do we know we can trust the recount machine?
  825.  
  826. _Step 2_: Audit the recount machine by selecting random ballots for human inspection
  827.  
  828. Machine-assied auditing is way more efficient. In 2006 Virginia US senate race, for 99% confidence, machine-assied auditing only required 2,339 ballots, rather than 1,141,900 ballots in the alternative precinct-based method
  829.  
  830. **The Gold-Medal Standard in Voting Today:**
  831.  
  832. Precinct-count optical scan at the polling place + mandatory risk-limiting post-election audits, before election results are declared
  833.  
  834. _End-to-end verifiable voting_
  835.  
  836. E2E voter-verifiability allows voters to be sure that:
  837.  
  838.      - their vote is cast as intended
  839.  
  840.      - their vote is counted as cast
  841.  
  842.      - all votes are counted as cast
  843.  
  844.      - no voter can demonstrate how he or she voted to a third-party
  845.  
  846. Voting happens normally but at the end of the process they get a verifiable receipt with an encrypted record of their vote
  847.  
  848. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-24%20at%2010.38.32%20AM.png)
  849.  
  850. These votes are listed in their encrypted form with identifying information of all voters
  851.  
  852. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-24%20at%2010.39.54%20AM.png)
  853.  
  854. But:
  855.  
  856. How do voters know that their receipt matches their choices?
  857.  
  858. How are voters convinced that the published encrypted votes correspond to the announced tally?
  859.  
  860. Solution: Voter-initiated auditing:
  861.  
  862. Once you cast your vote and receive your receipt, you can either _accept_ the receipt/cast your ballot or _challenge_ it, which then makes the ballot officials decrypt your vote and show you that it matches your choices.
  863.  
  864. Helios - E2E internet voting, but not yet ready for public elections. still too many problems with internet voting in general, not sure if E2E can resolve them
  865.  
  866. Scantegrity - E2E + optical scan, system with most use/real-world experience.
  867.  
  868. 1\. first given ballot with bubbles that are pre-printed with verification codes written in invisible ink. You are given a special pen to mark the bubbles that reveal the verification codes that correspond to each choice you made. the voter can write these numbers down with the serial number of their ballot and that forms their cryptographic receipt.
  869.  
  870. 2\. then voters can go and check online to verify they match
  871.  
  872. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-24%20at%2010.47.53%20AM.png)
  873.  
  874. The verification codes are cryptographically generated
  875.  
  876. Verifying the scantegrity results (happens in software):
  877.  
  878. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-24%20at%2010.49.16%20AM.png)
  879.  
  880. ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-24%20at%2010.52.03%20AM.png)![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-24%20at%2010.53.13%20AM.png)![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-24%20at%2010.57.30%20AM.png)
  881.  
  882. 1) 
  883.  
  884. Table on the left:
  885.  
  886. Shows for each verification code for each candidate (here candidates A and B) on each ballot
  887.  
  888. The column order doesn't match the order of the candidates on the ballot to protect voter secrecy
  889.  
  890. The table in the middle:
  891.  
  892. Correspondence between entries in the left table and in the right table (also in shuffled order)
  893.  
  894. The table on the right will be where the voter choices are recorded
  895.  
  896. 2) The voted choice table is calculated through the other two tables, and then
  897.  
  898. 3) Only encrypted versions ("cryptographic commitments") of the first two table's cells are published. The choices that voters have actually made on their ballots are left unencrypted in the confirmation code table. The entries that have votes will be revealed in the correspondence table but it won't be revealed what those votes correspond to (i.e. all that's shown is that a vote has been made in that row).
  899.  
  900. The voted choice table is made public.
  901.  
  902. 4) election officials pick a random number, then for each row in the correspondence table they will decrypt either the encrypted value on the left or the one on the right. This way you won't be able to see a direct path from the confirmation code to the voted choice.
  903.  
  904. However, since the values were published after they were encrypted (i.e. the "cryptographic commitment") officials can't go back and change what's in one of those encrypted "envelopes" after the results have been revealed.
  905.  
  906. E2E still has some problems:
  907.  
  908. - it's very complex - would this work on a large scale?
  909.  
  910. - usability - can regular voters understand how to follow and use this system?
  911.  
  912. - comprehensibility - can regular voters understand why/how this works?
  913.  
  914. - security - still some potential problems; researchers trying to find them all
  915.  
  916. **10 E-Voting and Public Policy**
  917.  
  918. _Election policy in the US_
  919.  
  920. Begins at the federal level:
  921.  
  922.      - ensuring citizens'  civil rights are upheld (it's strongest role)
  923.  
  924.      - sets minimum standards for elections
  925.  
  926.      - provides advisory guidelines for states
  927.  
  928. Most of the policy is set at the state level:
  929.  
  930.      - set requirements for elections within their borders
  931.  
  932.      - perform certification of election equipment
  933.  
  934.      - central focus of election administration
  935.  
  936.      - usually the state's secretary of state is responsible for administering elections & resolving issues
  937.  
  938. Most of the work happens at the local level:
  939.  
  940.      - equipment purchases
  941.  
  942.      - implementation
  943.  
  944.      - run elections
  945.  
  946.      - mostly done by volunteers
  947.  
  948. State Laws:
  949.  
  950.      - lack of uniformity or consistency across states
  951.  
  952.           - country-wide voting systems have to conform to each states' laws which can make them very complex
  953.  
  954.      - vendors try to influence state law to ensure their products have a market (and make it harder for competitors to sell their products)
  955.  
  956.           - leads to "regulatory capture": where the laws end up favoring certain vendors and then the vendors try to reinforce those laws in a loop
  957.  
  958.                     ![](assets/Securing%20Digital%20Democracy/Screen%20Shot%202012-11-24%20at%2011.06.57%20AM.png)
  959.  
  960.      - antiquated rules (can emerge from regulatory capture)
  961.  
  962. 1990 FEC standards (FEC = Federal Election Commission)
  963.  
  964.      - voluntary minimum standards, eventually adopted by majority of states
  965.  
  966.      - but weren't very good at addressing security needs of voting
  967.  
  968. After 2000 florida recount, Congress passed Help America Vote Act (HAVA) in 2002.
  969.  
  970. - mandated states to replace punched cards and lever machines, $2 bil provided to states to do so, deadline in 2006 (pretty short timeframe, driving states to go out and buy DRE machines to meet the deadline, and driving vendors to push products out to take advantage of the federal subsidy in this timeframe)
  971.  
  972. - created a new agency, the Election Assistance Commission (EAC), responsible for setting guidelines for standards of voting (Voluntary Voting System Guidelines, VVSG)
  973.  
  974.      - first VVSG standards took effect 2007 (but this was after the 2006 deadline, so states had already purchased all their equipment)
  975.  
  976. VVSG - developed using an improved process by the Technical Guidelines Development Committee, managed by NIST (one of the most scientifically-focused government agencies)
  977.  
  978.      - 2005 guidelines became effective in 2007
  979.  
  980.           - much more detailed than the 1990 FEC standards
  981.  
  982.           - but still had large loopholes (e.g. COTS/commercial off-the-shelf software, doesn't require paper trail)
  983.  
  984.      - 2007 draft guidelines, never adopted by the EAC
  985.  
  986.           - complete rewrite
  987.  
  988.           - software independence required
  989.  
  990.           - open-ended vulnerability testing, much better
  991.  
  992. The Holt Legislation
  993.  
  994.      - require a voter-erified paper record (later: a voter marked paper ballot)
  995.  
  996.      - prohibit undisclosed software
  997.  
  998.      - prohibit internet connection as part of the software
  999.  
  1000.      - mandatory random audits
  1001.  
  1002. but never managed to pass the house, despite broad bipartisan support
  1003.  
  1004. At present, 31 states require a paper ballot
  1005.  
  1006. _Testing and certification_
  1007.  
  1008. Independent Testing Authorities (ITAs) test the equipment, small private companies that specialize in testing.
  1009.  
  1010.      - majority of states incorporate federal guidelines
  1011.  
  1012.      - require machines to be tested for compliance by ITAs
  1013.  
  1014.      - ITAs want to please vendors (because thats' their source of business) they may be more likely to publish glowing reports rather than critical ones
  1015.  
  1016.      - the testing process doesn't necessarily have a lot of transparency 
  1017.  
  1018.      - evidence that their testing standards aren't adequate, using conformance testing
  1019.  
  1020.           - Conformance testing
  1021.  
  1022.                - checklist approach
  1023.  
  1024.                - mechanical inspection and application of tools
  1025.  
  1026.                - presence of required mechanism
  1027.  
  1028.                - basically, just seeing if some pre-defined stuff/checklist items are there
  1029.  
  1030.           - Better approach: _open-ended testing_
  1031.  
  1032.                - adversarial approach (i.e. thinking like an attacker)
  1033.  
  1034.                - creative application of security mindset
  1035.  
  1036.                - demonstrates presence of exploitable vulnerabilities
  1037.  
  1038.                - but can be expensive and also not 100% guaranteed to find all flaws
  1039.  
  1040. For example, Diebold DRE machine passed ITA certification but many, many groups of researchers, using open-ended testing, found many, many security flaws
  1041.  
  1042. _Recommendations_
  1043.  
  1044. - strengthened, uniform standards
  1045.  
  1046.      - standards that cover the _entire_ election system, not just equipment
  1047.  
  1048.      - address accuracy, security, accessibility, usability, transparency
  1049.  
  1050.      - require public reporting and disclosure of problems
  1051.  
  1052. - election administration
  1053.  
  1054.      - ensure transparency and public participation in the process, thus increasing voter confidence
  1055.  
  1056.      - provide adequate resources to election officials
  1057.  
  1058.      - reduce number of races, simplify ballot design
  1059.  
  1060. - routine testing and auditing
  1061.  
  1062.      - auditability must be a technical requirement
  1063.  
  1064.      -mandate realistic pre-election testing of usability and function
  1065.  
  1066.      - mandate routine risk-limiting post-election audits to high confidence
  1067.  
  1068.      - allow time to conduct audits and recounts before certification
  1069.  
  1070. - conservative approach to new technology
  1071.  
  1072.      - internet voting should be prohibited for the foreseeable future
  1073.  
  1074.      - ensure new technology _really_ solves an _actual_ problem
  1075.  
  1076.      - open technology to realistic, public, independent review and simulated adversarial testing
  1077.  
  1078.      - systems used for counting votes must be software independent
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement