handouts/ho02.tex
changeset 386 3c69029f4a1c
parent 369 6c7996b6b471
child 404 4e3bc09748f7
equal deleted inserted replaced
385:b7d055cf16e8 386:3c69029f4a1c
    42 
    42 
    43 \begin{itemize}
    43 \begin{itemize}
    44 \item The Netherlands between 1997--2006 had electronic voting
    44 \item The Netherlands between 1997--2006 had electronic voting
    45       machines, but ``hacktivists'' had found they can be
    45       machines, but ``hacktivists'' had found they can be
    46       hacked to change votes and also emitted radio signals
    46       hacked to change votes and also emitted radio signals
    47       revealing how you voted.
    47       revealing how you voted. Now e-voting has been abandoned
       
    48       in the Netherlands.
    48 
    49 
    49 \item Germany conducted pilot studies with e-voting, but in
    50 \item Germany conducted pilot studies with e-voting, but in
    50       2007 a law suit has reached the highest court and it
    51       2007 a law suit has reached the highest court and it
    51       rejected e-voting on the grounds of not being
    52       rejected e-voting on the grounds of not being
    52       understandable by the general public.
    53       understandable by the general public.
    74       secure as paper ballots, the parliamentary committee 
    75       secure as paper ballots, the parliamentary committee 
    75       in charge concluded.
    76       in charge concluded.
    76 
    77 
    77 \item India uses e-voting devices since at least 2003. They
    78 \item India uses e-voting devices since at least 2003. They
    78       use ``keep-it-simple'' machines produced by a
    79       use ``keep-it-simple'' machines produced by a
    79       government owned company.
    80       government owned company. There was some trouble for
       
    81       an Indian researcher after he and an international 
       
    82       team of hackers showed that the devices are not 
       
    83       as secure as the government claimed.
    80 
    84 
    81 \item South Africa used software for its tallying in the 1993
    85 \item South Africa used software for its tallying in the 1993
    82       elections (when Nelson Mandela was elected) and found
    86       elections (when Nelson Mandela was elected) and found
    83       that the tallying software was rigged, but they were
    87       that the tallying software was rigged, but they were
    84       able to tally manually. 
    88       able to tally manually. 
   182 evolved. Because also good-old-fashioned paper ballot voting
   186 evolved. Because also good-old-fashioned paper ballot voting
   183 is not entirely trivial and immune from being hacked. We know
   187 is not entirely trivial and immune from being hacked. We know
   184 for sure that elections were held in Athens as early as 600
   188 for sure that elections were held in Athens as early as 600
   185 BC, but might even date to the time of Mesopotamia and also in
   189 BC, but might even date to the time of Mesopotamia and also in
   186 India some kind of republics might have existed before the
   190 India some kind of republics might have existed before the
   187 Alexander the Great invaded it. Have a look at Wikipedia about
   191 Alexander the Great invaded them. Have a look at Wikipedia about
   188 the history of democracy for more information. These elections
   192 the history of democracy for more information. These elections
   189 were mainly based on voting by show of hands. While this
   193 were mainly based on voting by show of hands. While this
   190 method of voting satisfies many of the requirements stipulated
   194 method of voting satisfies many of the requirements stipulated
   191 above, the main problem with hand voting is that it does not
   195 above, the main problem with hand voting is that it does not
   192 guaranty ballot secrecy. As far as I know the old Greeks and
   196 guaranty ballot secrecy. As far as I know the old Greeks and
   224 paper ballots are given out to each voter at the polling
   228 paper ballots are given out to each voter at the polling
   225 station. Then an attacker can give the prefilled ballot to a
   229 station. Then an attacker can give the prefilled ballot to a
   226 voter. The voter uses this prefilled ballot to cast the vote,
   230 voter. The voter uses this prefilled ballot to cast the vote,
   227 and then returns the empty ballot paper back to the attacker who now
   231 and then returns the empty ballot paper back to the attacker who now
   228 compensates the voter. The blank ballot can be reused for the
   232 compensates the voter. The blank ballot can be reused for the
   229 next voter. 
   233 next voter. I let you ponder why it is important for this
       
   234 attack that the voter returns the empty ballot to the 
       
   235 attacker.
   230 
   236 
   231 To sum up, the point is that paper ballots have evolved over some time 
   237 To sum up, the point is that paper ballots have evolved over some time 
   232 and no single best method has emerged for preventing fraud.
   238 and no single best method has emerged for preventing fraud.
   233 But the involved technology is well understood in order to
   239 But the involved technology is well understood in order to
   234 provide good enough security with paper ballots.
   240 provide good enough security with paper ballots.
   309 shown that seals can easily be circumvented. The moral of this
   315 shown that seals can easily be circumvented. The moral of this
   310 story is that election officials were incentivised with money
   316 story is that election officials were incentivised with money
   311 by the central government to obtain new voting equipment and
   317 by the central government to obtain new voting equipment and
   312 in the process fell prey to pariahs which sold them a
   318 in the process fell prey to pariahs which sold them a
   313 substandard product. Diebold was not the only pariah in this
   319 substandard product. Diebold was not the only pariah in this
   314 area, but one of the more notorious ones.
   320 area, but one of the more notorious ones.\footnote{An e-voting 
       
   321 researcher recently made a connection between the VW-exhaust
       
   322 scandal and e-voting: His argument is that it is very hard
       
   323 to test whether a program works correctly in a hostile
       
   324 environment. The program can often recognise when it is
       
   325 tested and behave correctly, but in the ``real test'' can 
       
   326 behave maliciously, just like the VW diesel engines.}
   315 
   327 
   316 Optical scan machines are slightly better from a security
   328 Optical scan machines are slightly better from a security
   317 point of view but by no means good enough. Their main idea
   329 point of view but by no means good enough. Their main idea
   318 is that the voter fills out a paper ballot, which is then 
   330 is that the voter fills out a paper ballot, which is then 
   319 scanned by a machine. At the very least the paper ballot can 
   331 scanned by a machine. At the very least the paper ballot can 
   364 which of course is an important problem if you are allowed to
   376 which of course is an important problem if you are allowed to
   365 vote via Internet.
   377 vote via Internet.
   366 
   378 
   367 However, the weak spots in any Internet voting system are the
   379 However, the weak spots in any Internet voting system are the
   368 voters' computers and the central server. Unfortunately, their
   380 voters' computers and the central server. Unfortunately, their
   369 system is designed such that they needs to trust the integrity
   381 system is designed such that they need to trust the integrity
   370 of voters’ computers, central server components and also the
   382 of voters’ computers, central server components and also the
   371 election staff. In 2014, a group of independent observers around
   383 election staff. In 2014, a group of independent observers around
   372 Alex Halderman were able to scrutinise the election process in
   384 Alex Halderman were able to scrutinise the election process in
   373 Estonia. They found many weaknesses, for example careless
   385 Estonia. They found many weaknesses, for example careless
   374 handling of software updates on the servers. They also
   386 handling of software updates on the servers. They also
   442 the Internet cannot be made secure with current technology.
   454 the Internet cannot be made secure with current technology.
   443 Voting has just too high demands on integrity and ballot
   455 Voting has just too high demands on integrity and ballot
   444 secrecy. This is different from online banking where the whole
   456 secrecy. This is different from online banking where the whole
   445 process is designed around authentication. If fraud occurs,
   457 process is designed around authentication. If fraud occurs,
   446 you try to identify who did what (somebody’s account got zero;
   458 you try to identify who did what (somebody’s account got zero;
   447 somewhere the money went). Even if there might be more 
   459 somewhere the money went). Even if there might be more
   448 gigantic sums at stake in online banking than with voting,
   460 gigantic sums at stake in online banking than with voting, it
   449 it can be solved. That does not mean there are no problems
   461 can be made reasonably secure and fraud-safe. That does not
   450 with online banking. But with enough thought, they can
   462 mean there are no problems with online banking. But with
   451 usually be overcome with technology we have currently. This
   463 enough thought, they can usually be overcome with technology
   452 is different with e-voting: even the best have not come
   464 we have currently. This is different with e-voting: even the
   453 up with something workable yet.
   465 best have not come up with something workable yet.
   454 
   466 
   455 
   467 
   456 This conclusion does not imply that in some special cases
   468 This conclusion does not imply that some special cases of
   457 of Internet voting cannot be made to work securely. Just in a
   469 Internet voting cannot be made to work securely. Just in a
   458 general election where stakes are very high, it does not work.
   470 general election where stakes are very high, it does not work.
   459 For example a good-enough and workable in-lecture online
   471 For example a good-enough and workable in-lecture online
   460 voting system where students' votes are anonymous and students
   472 voting system where students' votes are anonymous and students
   461 cannot tamper with the outcome, I am sure, can be implemented. 
   473 cannot tamper with the outcome, I am sure, can be implemented
       
   474 (see some of my MSc projects). 
   462 
   475 
   463 
   476 
   464 \subsubsection*{Further Reading}
   477 \subsubsection*{Further Reading}
   465 
   478 
   466 If you want to know more about e-voting, I recommend
   479 If you want to know more about e-voting, I recommend