|
1
|
- Prof. David L. Dill
- Department of Computer Science
- Stanford University
- http://www.verifiedvoting.org
|
|
2
|
- Principles & concepts
- Trust and DREs
- Voter verifiable audit trail
- Future
- Conclusion
|
|
3
|
- Democracy depends on everyone, especially the losers, accepting the
results of elections.
|
|
4
|
- It is not enough for elections to be accurate.
- We have to know that they are accurate.
- All critical aspects of the process must be
- publicly observable, or
- independently checkable
- (Preferably both)
|
|
5
|
- Paper ballots are compatible with transparent processes.
- Voter makes a permanent record of vote.
- Locked ballot box is in public view.
- Transportation and counting of ballots are observed by political
parties and election officials.
- Everyone understands paper.
- Any new system should be at least this trustworthy.
|
|
6
|
- We often have to trust people, but we rarely trust them without accountability.
- Levels of accountability
- Can we detect error?
- Can we correct it?
- Simple error detection is the most condition for trustworthiness.
|
|
7
|
- “You have to trust somebody.”
- We only need to trust groups of people with diverse interests (e.g.,
observers from different political parties).
|
|
8
|
- Principles & concepts
- Trust and DREs
- Voter verifiable audit trail
- Future
- Conclusion
|
|
9
|
- DRE = “Direct Recording Electronic”
- For this talk, “DRE” does not include machines with voter verifiable
paper records.
|
|
10
|
- Suppose voting booth has a man behind a curtain
- Voter is anonymous
- Voter dictates votes to scribe.
- Voter never sees ballot.
- There is no accountability in this system!
- (analogy due to Dan Wallach and Drew Dean)
|
|
11
|
|
|
12
|
- Paperless electronic voting requires DRE software and hardware to be perfect.
- It must never lose or change votes.
- Current computer technology isn’t up to the task.
|
|
13
|
- We don’t know how to eliminate program bugs.
- Inspection and testing catch the easy problems.
- Only the really nasty ones remain
- obscure
- happen unpredictably.
|
|
14
|
- What assets are being protected?
- At the national level, trillions of dollars.
- Who are potential attackers?
- Hackers, Candidates, Zealots,
- Foreign governments, Criminal organizations
- Attackers may be very sophisticated and/or well-financed.
|
|
15
|
- Programmer, system administrator, or janitor adds hidden vote-changing
code.
- Code can be concealed from inspection in hundreds of ways.
- Code can be triggered only during real election
- Using “cues” - date, voter behavior
- Explicitly by voter, poll worker, or wireless network.
- Change small % of votes in plausible ways.
|
|
16
|
- DREs are creating new kinds of risks.
- Nationwide fraud becomes easier than local fraud.
- Local election officials can’t stop it!
|
|
17
|
- FBI: “The disgruntled insider is a principal source of computer crimes.”
- The 1999 Computer Security
Institute/FBI report notes that 55% of respondents reported malicious
activity by insiders.
- Crimes are easier for insiders (e.g., embezzling).
|
|
18
|
- Unlike almost every other secure system, voting must discard vital
information: the connection
between the voter and the vote.
|
|
19
|
- Electronic audit records have names of everyone involved in every
transaction.
- Banks usually have paper backup!
- . . . And computer crime still occurs -- especially by insiders.
- but
- Fraud can be quantified (we can tell when it happens).
- Customers are protected.
|
|
20
|
- Votes have definitely been lost due to bugs (Wake County, NC, 2002).
- Fraud has never been investigated.
- Candidates don’t bother asking for recounts
- Danger and motivation increases with number of DREs (twice as many votes
this election than 2002).
- Applications with much more security and lower stakes have had
sophisticated fraud (e.g., gambling).
|
|
21
|
- We cannot verify that desired software is running on a computer.
- Stringent software design/review (even formal verification) doesn’t
solve the problem.
- Open source does not solve the problem.
- “Disclosed” source is, however, highly desirable!
|
|
22
|
- It is currently (practically) impossible to create trustworthy DREs
because:
- We cannot eliminate program bugs.
- We cannot guarantee program security.
- We cannot verify that the desired software is running on the computer.
|
|
23
|
- Principles & concepts
- Trust and DREs
- Voter verifiable audit trail
- Future
- Conclusion
|
|
24
|
- Now, suppose the man who filled out the ballot
- Shows you the ballot so you can make sure it is correct.
- Lets you put it in the ballot box (or lets you watch him do it).
- There is accountability
- You can make him redo the ballot if it’s wrong.
- He can be fired or arrested if he does it wrong.
|
|
25
|
- Voter must be able to verify the permanent record of his or her vote
(i.e., ballot).
- Ballot is deposited in a secure ballot box.
- Voter can’t keep it because of possible vote selling.
- Voter verified records must be audited, and must take precedence over
other counts.
- This closes the auditing gap.
|
|
26
|
- Closing the audit gap is necessary but not sufficient.
- Additional conditions:
- Physical security of ballots through final count must be maintained.
- Process must be transparent (observers with diverse interests must be
permitted at all points).
- There are many other requirements, e.g., accessibility.
|
|
27
|
- Computer counts cannot be trusted.
- Like other audits, independent recounts should be performed at least
- When there are doubts about the election
- When candidates challenge
- On a random basis
- Computer-generated ballots can have additional security features.
- Digital signatures/time stamps
- Matching identifiers for reconciling with paper ballots.
|
|
28
|
- Manual ballots with manual counts.
- Optically scanned paper ballots.
- Precinct-based optical scan ballots have low voter error rates.
- Touch screen machines with voter verifiable printers.
- Other possibilities
- Other media than paper?
- Cryptographic schemes?
- For now, paper is the only option that is available and well-understood.
|
|
29
|
- Principles & concepts
- Trust and DREs
- Voter verifiable audit trail
- Future
- Conclusion
|
|
30
|
- We’ve done what we can to get paper.
In the short term, we’re focusing on other initiatives.
- TechWatch
- Computer-literate volunteers to observe election.
- They will observe & document pre-election testing.
- They will observe election (often as poll workers) & vote counting
- Election Scorecard
- Questions about basic “best practices” related to election security
- Working with Brennan Center, Leadership Conference on Civil Rights,
Center for American Progres
|
|
31
|
- Online capture of election incident reports.
- The Verified Voting Foundation is partnered with CPSR for SW
development.
- Reports will be entered by Election Protection Coalition (60+ members)
- Hotline 1-866-OUR-VOTE
- Goals
- Deal with incidents in real-time, when possible
- Collect knowledge on how elections really work.
|
|
32
|
- Get a nationwide requirement for voter-verified paper ballots.
- Document existing practices based on Tech Watch results.
- Recommend best practices for election integrity.
|
|
33
|
- A continuing campaign for election transparency and trustworthiness
- Technology
- Procedures
- Election law
- Monitoring
|
|
34
|
- Principles & concepts
- Trust and DREs
- Voter verifiable audit trail
- Future
- Conclusion
|
|
35
|
- Election equipment should be proved reliable and secure before it is
deployed.
- There is little evidence that DREs are safe, and a lot of evidence to
the contrary.
- The problems cannot be fixed without a voter verifiable audit trail of
some kind.
- With a voter verifiable audit trail and due attention to election
practices, the problem can be solved.
|
|
36
|
- All elections conducted on DREs are open to question.
|
|
37
|
- More information is available at our website.
|
|
38
|
|
|
39
|
- “If we can trust computers to fly airplanes, why can’t we trust them to
handle our votes?”
- Accountability: Failures in
safety-critical systems are detectable
- Standards and practices of safety-critical software are not used in
voting machine development.
- “If we required that, we could only afford one voting machine for the
state of Texas!”
- Safety-critical systems are not designed to be secure against attacks
by insiders.
|