E-voting in an Untrustworthy World Rebecca Mercuri, Ph.D.

Slides:



Advertisements
Similar presentations
I Think I Voted. E-voting vs. Democracy Prof. David L. Dill Department of Computer Science Stanford University
Advertisements

Electronic Voting Systems
County Canvassing Board Training 2010 Sheryl Moss Certification and Training Manager Office of the Secretary of State (360)
Good or Bad?.  One of the closest contests in US history  Florida was the pivotal state  Neither Democrat Al Gore nor Republican George W. Bush had.
ThreeBallot, VAV, and Twin Ronald L. Rivest – MIT CSAIL Warren D. Smith - CRV Talk at EVT’07 (Boston) August 6, 2007 Ballot Box Ballot Mixer Receipt G.
ETen E-Poll ID – Strasbourg COE meeting November, 2006 Slide 1 E-TEN E-POLL Project Electronic Polling System for Remote Operation Strasbourg.
ICT IN THE ELECTORAL PROCESS: LESSONS LEARNED Susanne Caarls International Electoral Affairs Symposium May 2012.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
VOTING SYSTEMS TESTING SUMMIT NOV. 29, 2005 COPYRIGHT © 2005 MICHAEL I. SHAMOS Security, Paper Trails, Accountability Michael I. Shamos, Ph.D., J.D. Institute.
By Varun Jain. Introduction  Florida 2000 election fiasco, drew conclusion that paper ballots couldn’t be counted  Computerized voting system, DRE (Direct.
Auditing Concepts.
Election Observer Training 2008 Elections Certification & Training Program
Observation of e-enabled elections Jonathan Stonestreet Council of Europe Workshop Oslo, March 2010.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
© VoteHere, Inc. All rights reserved. November 2004 VHTi Data Demonstration Andrew Berg Director, Engineering.
17-803/ ELECTRONIC VOTING FALL 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS / Electronic Voting Session 2: Paper Trails Michael I. Shamos,
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Electronic Voting Linh Nguyen. Electronic Voting  Voting Technologies  The Florida 2000 Election  Direct Recording Electronic Devices (DREs)‏ - Diebold.
Guide to the Voting Action Planner Voting is the way we elect government officials, pass laws and decide on issues…
Voting System Qualification How it happens and why.
TESTING THE SECRUITY OF ELECTRONIC VOTING SYSTEM Presented By: NIPUN NANDA
Ballot Processing Systems February, 2005 Submission to OASIS EML TC and True Vote Maryland by David RR Webber.
Objectives Analyze how the administration of elections in the United States helps make democracy work. Define the role of local precincts and polling places.
Today’s Lecture application controls audit methodology.
Requirements for Electronic and Internet Voting Systems in Public Elections David Jefferson Compaq Systems Research Center Palo Alto, CA
Election Administration. Ensuring legitimacy of the government Legitimacy: acceptance of the right of public officials to hold office and to promulgate.
Electronic Voting: A Challenge to Democracy? Rebecca Mercuri, Ph.D. Presentation for the Open Rights Group at University College,
Commercial Database Applications Testing. Test Plan Testing Strategy Testing Planning Testing Design (covered in other modules) Unit Testing (covered.
Information Systems Security Computer System Life Cycle Security.
Chapter 7: The Electoral Process Section 2
TOWARDS OPEN VOTE VERIFICATION METHOD IN E-VOTING Ali Fawzi Najm Al-Shammari17’th July2012 Sec Vote 2012.
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 4 – 1 Transaction Processing and the Internal Control.
Implications of Information Technology for the Audit Process
E-Voting Dissent Sara Wilson, Katie Noto, John Massie, Will Sutherland, Molly Cooper.
California Secretary of State Voting Systems Testing Summit November 28 & 29, 2005, Sacramento, California Remarks by Kim Alexander, President, California.
AN OVERVIEW OF THE ELECTORAL SYSTEM. election period pre-election period post-election period period in-between elections pre-election period electoral.
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
Andreas Steffen, , LinuxTag2009.ppt 1 LinuxTag 2009 Berlin Verifiable E-Voting with Open Source Prof. Dr. Andreas Steffen Hochschule für Technik.
S4: Understanding the IT environment of the entity.
Georgia Electronic Voting System Testing and Security Voting Systems Testing Summit November 29, 2005.
Electronic Voting: The 2004 Election and Beyond Prof. David L. Dill Department of Computer Science Stanford University
County Canvassing Board Training 2010 Sheryl Moss Certification and Training Manager Office of the Secretary of State (360)
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Idaho Procedures M100 OPTICAL SCAN PRECINCT TABULATOR.
How and what to observe in e-enabled elections Presentation by Mats Lindberg, Election Adviser, Organisation for Security and Co-operation in Europe (OSCE)
Against E-Voting Ryan Egan, Amber Jones, Alyssa Sankin, Page Stephens, Amber Straight, Philip Sugg, and Diana Troisi Direct recording electronic (DRE)
Computers in Society Electronic Voting. Team Projects What is your name? Application? Presentation? Copyright The software industry The open source business.
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
WHY THE vvpat has failed
VVPAT Building Confidence in U.S. Elections. WHAT IS VVPAT ? Voter-verifiable paper audit trail Requires the voting system to print a paper ballot containing.
Election Reform The Open Voting Consortium. Elections are important Voting is how we ultimately control.our government Many elections are decided by just.
Creating Accessibility, Usability and Privacy Requirements for the Voluntary Voting System Guidelines (VVSG) Whitney Quesenbery TGDC Member Chair, Subcommittee.
Election Assistance Commission 1 TGDC Meeting High Level VVSG Requirements: What do they look like? February, 09, United States.
Auditing Concepts.
Ronald L. Rivest MIT NASEM Future of Voting Meeting June 12, 2017
EVoting 23 October 2006.
ThreeBallot, VAV, and Twin
E-voting …and why it’s good..
Con Electronic Voting Preston Pope, Zach White, Ankit Shrivastava, Max Alexander.
Ronald L. Rivest MIT NASEM Future of Voting December 7, 2017
Improving Reliability of Direct Recording Electronic Voting Systems
Texas Secretary of State Elections Division
ISI Day – 20th Anniversary
Texas Secretary of State Elections Division
Texas Secretary of State Elections Division
E Voting Josh Gold.
Chapter 7: The Electoral Process Section 2
Chapter 7: The Electoral Process Section 2
Chapter 7: The Electoral Process Section 2
Chapter 7: The Electoral Process Section 2
Presentation transcript:

E-voting in an Untrustworthy World Rebecca Mercuri, Ph.D.

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri Election Administration Assumptions  People in power run elections  Power corrupts  Election administrators have a vested interest in:  remaining in control and/or  passing control to like-minded individuals  Election systems that rely on procedural or validatory controls that are performed by election administrators are inherently subvertible

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri The 6 Commandments of Voting - Michael Shamos I.*Thou shalt keep each voter’s choices an inviolable secret.* II.Thou shalt allow each eligible voter to vote only once, and only for those offices in which the voter is authorized to cast a vote. III.Thou shalt not permit tampering with thy voting system, nor the exchange of gold for votes. IV.Thou shalt report all votes accurately. V.Thy voting system shall remain operable throughout each election. VI.Thou shalt keep an audit trail to detect sins against Commandments II-IV, but thy audit trail shall not violate Commandment I.

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri Voters Want  To know that their ballot is cast and counted as intended  Counts and recounts to be:  independent  unbiased  reproduceable  accurate  understandable

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri Recounts  Fully electronic systems do not provide any way for the voter to independently verify that the ballot cast corresponds to the data that was recorded and transmitted.  Election officials are given no way to conduct an independent recount since the audit trails that are provided lack checks and balances.  “Recounts” are really only “Reprints” because they use computer-generated ballot images. (GIGO -- Garbage In, Garbage Out.)  “Fail-safe” vendor claims are misleading – machines can and have failed in actual use, resulting in unrecoverable data loss.

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri Vulnerabilities  Inherent in the nature of all computers (including those used for ballot preparation and vote tallying) are aspects that can be intentionally or accidentally used to subvert the systems.  Elections are large-stakes, adversarial processes that occur in a short, identifiable time frame, hence they are high-risk targets.  The anonymity requirement for voting prevents the use of traditional forms of auditing.  Earlier forms of election fraud typically required collusion, computers provide opportunity for a lone insider to affect outcomes on a broad scale.  Such corruption is nearly impossible to prevent or detect.

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri The Perfect Crime  Occurs invisibly  Weapon is part of regular toolset  Potential suspects are allowed to tamper with crime scene before evidence is collected  Critical evidence is prevented from disclosure  “Hearsay” evidence -- not from original source  Prosecutors are falsely maligned  Incorrect suspect is charged

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri The Smell Test  Are Generally Accepted Principles and Procedures being used?  auditing  security  testing  manufacture  configuration management  Are standards biased to favor vendors over users?  Do claims violate laws of science?  Do you need a Ph.D. to understand it?

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri The Eyeball Test  Are there parts of the system that are prevented from disclosure?  Are all elements in the critical data path open for independent verification and validation?  How can all administrators and users confirm that appropriate modules (for software, hardware, crypto, etc.) are installed?  How do we know it really works?

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri The Taste Test  Allow others to try it out before you do  Collect data from results  Compare with other products  Obtain ingredients list  Discard if toxic

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri Auditory Feedback for the Blind “Very few of our members were able to vote privately, independently, despite Santa Clara County’s [Calif.] supposed ‘accessible’ [Sequoia] touch screens.” -- Dawn Wilcox, president of the Silicon Valley Council of the Blind Features include: poor sound quality, delayed response time, upside-down Braille, 30+ minutes to cast ballot. Mercer County New Jersey was charged $2,000 per machine on top of the $6,000 pricetag for the Sequoia “audio option.”

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri Tactile Ballots  Allow visually impaired citizens to vote privately at the precinct or at home.  Approved by the United Nations and used by the State of Rhode Island and also by various democratic countries.

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri California Recall Data Analysis Based on information compiled by Chad Michael Topaz and Rebecca Mercuri from data provided by the California Secretary of State at:

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri Accuracy  Every vote does NOT count!  Lost vote rate of 3 - 5% far exceeds manufacturer’s stated “error rates”  Residual vote is an inappropriate metric  Testing is performed on pristine data sets under controlled conditions and does not reflect real voting environment

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri David Chaum’s Crypto Solution

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri Cryptographic Solutions  Modules must be subjected to formal correctness proofs  Who trusts the trustees?  Must be understandable by general public  Must be transparent to all  Independent auditing is essential Could/should be used to secure paper ballots

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri Open Source …can NOT provide sufficient verification and validation assurances. “You can’t trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source- level verification or scrutiny will protect you from using untrusted code.” -- Ken Thompson, 1984

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri Ballots ≠ Receipts  Ballot has a distinct legal connotation  Verified is not the same as verifiable  Must retain anonymity  Must not demonstrate proof of vote

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri Election Lotto Ballots should be:  Easy to obtain  Usable by all  Controlled when cast

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri Voting Machine Hacking Contest  Proof of hack will not prevent vendors from playing the “we’ve fixed that” shell game  Lack of hack provides no assurance of security  Despite this....DEFCON 12 has offered a contest venue (Las Vegas, July 30 - Aug. 1)  Put up or shut up challenge -- Shamos, Neff/Adler, other vendors  Rules will need to be well-defined in advance  Must allow insider or outside attack  SEE ME FOR DETAILS!

E-voting in an Untrustworthy World Copyright © 2004 Rebecca Mercuri For More Information... Rebecca Mercuri