42 |
42 |
43 \begin{itemize} |
43 \begin{itemize} |
44 \item The Netherlands between 1997--2006 had electronic voting |
44 \item The Netherlands between 1997--2006 had electronic voting |
45 machines, but ``hacktivists'' had found they can be |
45 machines, but ``hacktivists'' had found they can be |
46 hacked to change votes and also emitted radio signals |
46 hacked to change votes and also emitted radio signals |
47 revealing how you voted. |
47 revealing how you voted. Now e-voting has been abandoned |
|
48 in the Netherlands. |
48 |
49 |
49 \item Germany conducted pilot studies with e-voting, but in |
50 \item Germany conducted pilot studies with e-voting, but in |
50 2007 a law suit has reached the highest court and it |
51 2007 a law suit has reached the highest court and it |
51 rejected e-voting on the grounds of not being |
52 rejected e-voting on the grounds of not being |
52 understandable by the general public. |
53 understandable by the general public. |
74 secure as paper ballots, the parliamentary committee |
75 secure as paper ballots, the parliamentary committee |
75 in charge concluded. |
76 in charge concluded. |
76 |
77 |
77 \item India uses e-voting devices since at least 2003. They |
78 \item India uses e-voting devices since at least 2003. They |
78 use ``keep-it-simple'' machines produced by a |
79 use ``keep-it-simple'' machines produced by a |
79 government owned company. |
80 government owned company. There was some trouble for |
|
81 an Indian researcher after he and an international |
|
82 team of hackers showed that the devices are not |
|
83 as secure as the government claimed. |
80 |
84 |
81 \item South Africa used software for its tallying in the 1993 |
85 \item South Africa used software for its tallying in the 1993 |
82 elections (when Nelson Mandela was elected) and found |
86 elections (when Nelson Mandela was elected) and found |
83 that the tallying software was rigged, but they were |
87 that the tallying software was rigged, but they were |
84 able to tally manually. |
88 able to tally manually. |
182 evolved. Because also good-old-fashioned paper ballot voting |
186 evolved. Because also good-old-fashioned paper ballot voting |
183 is not entirely trivial and immune from being hacked. We know |
187 is not entirely trivial and immune from being hacked. We know |
184 for sure that elections were held in Athens as early as 600 |
188 for sure that elections were held in Athens as early as 600 |
185 BC, but might even date to the time of Mesopotamia and also in |
189 BC, but might even date to the time of Mesopotamia and also in |
186 India some kind of republics might have existed before the |
190 India some kind of republics might have existed before the |
187 Alexander the Great invaded it. Have a look at Wikipedia about |
191 Alexander the Great invaded them. Have a look at Wikipedia about |
188 the history of democracy for more information. These elections |
192 the history of democracy for more information. These elections |
189 were mainly based on voting by show of hands. While this |
193 were mainly based on voting by show of hands. While this |
190 method of voting satisfies many of the requirements stipulated |
194 method of voting satisfies many of the requirements stipulated |
191 above, the main problem with hand voting is that it does not |
195 above, the main problem with hand voting is that it does not |
192 guaranty ballot secrecy. As far as I know the old Greeks and |
196 guaranty ballot secrecy. As far as I know the old Greeks and |
224 paper ballots are given out to each voter at the polling |
228 paper ballots are given out to each voter at the polling |
225 station. Then an attacker can give the prefilled ballot to a |
229 station. Then an attacker can give the prefilled ballot to a |
226 voter. The voter uses this prefilled ballot to cast the vote, |
230 voter. The voter uses this prefilled ballot to cast the vote, |
227 and then returns the empty ballot paper back to the attacker who now |
231 and then returns the empty ballot paper back to the attacker who now |
228 compensates the voter. The blank ballot can be reused for the |
232 compensates the voter. The blank ballot can be reused for the |
229 next voter. |
233 next voter. I let you ponder why it is important for this |
|
234 attack that the voter returns the empty ballot to the |
|
235 attacker. |
230 |
236 |
231 To sum up, the point is that paper ballots have evolved over some time |
237 To sum up, the point is that paper ballots have evolved over some time |
232 and no single best method has emerged for preventing fraud. |
238 and no single best method has emerged for preventing fraud. |
233 But the involved technology is well understood in order to |
239 But the involved technology is well understood in order to |
234 provide good enough security with paper ballots. |
240 provide good enough security with paper ballots. |
309 shown that seals can easily be circumvented. The moral of this |
315 shown that seals can easily be circumvented. The moral of this |
310 story is that election officials were incentivised with money |
316 story is that election officials were incentivised with money |
311 by the central government to obtain new voting equipment and |
317 by the central government to obtain new voting equipment and |
312 in the process fell prey to pariahs which sold them a |
318 in the process fell prey to pariahs which sold them a |
313 substandard product. Diebold was not the only pariah in this |
319 substandard product. Diebold was not the only pariah in this |
314 area, but one of the more notorious ones. |
320 area, but one of the more notorious ones.\footnote{An e-voting |
|
321 researcher recently made a connection between the VW-exhaust |
|
322 scandal and e-voting: His argument is that it is very hard |
|
323 to test whether a program works correctly in a hostile |
|
324 environment. The program can often recognise when it is |
|
325 tested and behave correctly, but in the ``real test'' can |
|
326 behave maliciously, just like the VW diesel engines.} |
315 |
327 |
316 Optical scan machines are slightly better from a security |
328 Optical scan machines are slightly better from a security |
317 point of view but by no means good enough. Their main idea |
329 point of view but by no means good enough. Their main idea |
318 is that the voter fills out a paper ballot, which is then |
330 is that the voter fills out a paper ballot, which is then |
319 scanned by a machine. At the very least the paper ballot can |
331 scanned by a machine. At the very least the paper ballot can |
364 which of course is an important problem if you are allowed to |
376 which of course is an important problem if you are allowed to |
365 vote via Internet. |
377 vote via Internet. |
366 |
378 |
367 However, the weak spots in any Internet voting system are the |
379 However, the weak spots in any Internet voting system are the |
368 voters' computers and the central server. Unfortunately, their |
380 voters' computers and the central server. Unfortunately, their |
369 system is designed such that they needs to trust the integrity |
381 system is designed such that they need to trust the integrity |
370 of voters’ computers, central server components and also the |
382 of voters’ computers, central server components and also the |
371 election staff. In 2014, a group of independent observers around |
383 election staff. In 2014, a group of independent observers around |
372 Alex Halderman were able to scrutinise the election process in |
384 Alex Halderman were able to scrutinise the election process in |
373 Estonia. They found many weaknesses, for example careless |
385 Estonia. They found many weaknesses, for example careless |
374 handling of software updates on the servers. They also |
386 handling of software updates on the servers. They also |
442 the Internet cannot be made secure with current technology. |
454 the Internet cannot be made secure with current technology. |
443 Voting has just too high demands on integrity and ballot |
455 Voting has just too high demands on integrity and ballot |
444 secrecy. This is different from online banking where the whole |
456 secrecy. This is different from online banking where the whole |
445 process is designed around authentication. If fraud occurs, |
457 process is designed around authentication. If fraud occurs, |
446 you try to identify who did what (somebody’s account got zero; |
458 you try to identify who did what (somebody’s account got zero; |
447 somewhere the money went). Even if there might be more |
459 somewhere the money went). Even if there might be more |
448 gigantic sums at stake in online banking than with voting, |
460 gigantic sums at stake in online banking than with voting, it |
449 it can be solved. That does not mean there are no problems |
461 can be made reasonably secure and fraud-safe. That does not |
450 with online banking. But with enough thought, they can |
462 mean there are no problems with online banking. But with |
451 usually be overcome with technology we have currently. This |
463 enough thought, they can usually be overcome with technology |
452 is different with e-voting: even the best have not come |
464 we have currently. This is different with e-voting: even the |
453 up with something workable yet. |
465 best have not come up with something workable yet. |
454 |
466 |
455 |
467 |
456 This conclusion does not imply that in some special cases |
468 This conclusion does not imply that some special cases of |
457 of Internet voting cannot be made to work securely. Just in a |
469 Internet voting cannot be made to work securely. Just in a |
458 general election where stakes are very high, it does not work. |
470 general election where stakes are very high, it does not work. |
459 For example a good-enough and workable in-lecture online |
471 For example a good-enough and workable in-lecture online |
460 voting system where students' votes are anonymous and students |
472 voting system where students' votes are anonymous and students |
461 cannot tamper with the outcome, I am sure, can be implemented. |
473 cannot tamper with the outcome, I am sure, can be implemented |
|
474 (see some of my MSc projects). |
462 |
475 |
463 |
476 |
464 \subsubsection*{Further Reading} |
477 \subsubsection*{Further Reading} |
465 |
478 |
466 If you want to know more about e-voting, I recommend |
479 If you want to know more about e-voting, I recommend |