National: Unlocking Democracy: Inside the Most Insecure Voting Machines in America | Yahoo Tech

Like hundreds of thousands of other Virginians, I’ve been casting ballots for over a decade using Winvote voting machines. I now have physical proof of how catastrophically insecure those machines are. It’s a tiny key that opens the plastic door hiding the USB port on every Winvote terminal. This keepsake came my way at an eye-opening presentation about voting-machine security at this past Tuesday’s Usenix Security Symposium in Washington. Jeremy Epstein, a security scientist with SRI International, has spent years investigating the weaknesses of these and other electronic voting systems. But even he didn’t know how bad Winvote terminals were untilthis past April.

Editorials: How not to measure security | Jeremy Epstein/Freedom to Tinker

A recent paper published by Smartmatic, a vendor of voting systems, caught my attention. The first thing is that it’s published by Springer, which typically publishes peer-reviewed articles – which this is not. This is a marketing piece. It’s disturbing that a respected imprint like Springer would get into the business of publishing vendor white papers. There’s no disclaimer that it’s not a peer-reviewed piece, or any other indication that it doesn’t follow Springer’s historical standards. The second, and more important issue, is that the article could not possibly have passed peer review, given some of its claims. I won’t go into the controversies around voting systems (a nice summary of some of those issues can be found on the OSET blog), but rather focus on some of the security metrics claims.

Colorado: The high risk of e-voting | The Denver Post

If we can bank and shop online, why can’t we also vote online? This once-common refrain — I certainly used to ask the question — has been answered in recent years by revelations that hackers have penetrated some of our largest financial institutions, retailers, entertainment studios and, of course, the federal government. We can do our banking and shopping online because, as Lawrence Livermore computer scientist David Jefferson said earlier this year, “Financial losses in e-commerce can be insured or absorbed, but no such amelioration is possible in an election. And, of course, the stakes are generally much higher in a public election than in an e-commerce system.” Jefferson’s view that online voting — and especially e-mail — is extremely vulnerable to being hacked, intercepted or manipulated is shared by many experts, including those at the National Institute of Standards and Technology and the U.S. Election Assistance Commission.

National: Seeking High Tech and Low Tech Solutions to Low Voter Turnout | Silicon Hills

Why don’t more people vote? Only about 36 percent of the voting population turned out for the 2014 midterm elections, the lowest turnout election since 1942, according to stats from the United States Election Project. That’s a big problem and a group of experts in technology, journalism, civics and elections met at the Belo Center for New Media at the University of Texas at Austin campus last week to discuss how to get more people civically engaged. They participated in an invitation-only daylong conference hosted by the Annette Strauss Institute for Civic Life focused on increasing civic engagement before, during and after elections. The conference featured speakers from Google, Microsoft, Code for America, Rock the Vote, Vox Media, Texas Tribune, the clerk of Travis County and many more.

Kansas: Wichita State mathematician says Kansas voting machines need audit | Associated Press

A mathematician at Wichita State University who wanted to check the accuracy of some Kansas voting machines after finding odd patterns in election returns said she is finding out how difficult it can be to get government officials to turn over public documents. Beth Clarkson, a certified quality engineer with a doctorate in statistics, said her calculations from the November election showed enough patterns to suspect that “some voting systems were being sabotaged.” Sedgwick County election officials refused to allow the computer records to be part of a recount and told her that to get paper recordings of votes, she would have to go to court and fight for them, said Clarkson, who is also the chief statistician for WSU’s National Institute for Aviation Research.

Editorials: Internet balloting too risky | Washington Times

“Your vote counts” is a snappy slogan just short enough to fit on a lapel button, but snappy is not the same as “secure.” As the 2016 campaign unfolds, there’s renewed interest in enabling voters to vote over the Internet. The notion that choosing a president could be as easy as using a smartphone to order a pizza is tempting to some, but until cybersecurity wizards prove that a vote cast is a vote counted, Internet balloting is unreliably risky. Internet voting has its passionate advocates. One California pundit argues that since his bills, banking, shopping, even the data on his children’s homework is on the Internet, why shouldn’t his voting be there, too. It’s not safe to vote where he shops? Exactly, says David Jefferson, a computer scientist at Lawrence Livermore National Laboratory who was the chairman of the technology committee of the California Internet Task Force.

Editorials: The Dangers of Internet Voting | Hans A. von Spakovsky/Heritage

Those who believe that “voting online is the future” or that it is “possible given current technology” to create a secure online voting system are dangerously mistaken.[1] According to computer experts, Internet voting is vulnerable to cyber-attack and fraud—vulnerabilities inherent in current hardware and software, as well as the basic manner in which the Internet is organized. It is unlikely that these vulnerabilities will be eliminated at any time in the near future. State legislators and secretaries of state who are considering implementing Internet voting, or even the delivery by e-mail of voted ballots from registered voters, should reconsider such measures. These programs would be vulnerable to a variety of well-known cyber-attacks, any of which could be catastrophic. Such attacks could be “launched by anyone from a disaffected lone individual to a well-financed enemy agency outside the reach of U.S. law.” They also “could result in large-scale, selective voter disenfranchisement,” privacy violations, vote buying and selling, and vote switching “even to the extent of reversing the outcome of many elections at once….” The biggest danger, however, is that such attacks “could succeed and yet go completely undetected.”

National: Internet voting isn’t ready yet, but it can be made more secure | Computerworld

A push to allow Internet voting in elections is growing stronger along with advances in the underlying technology, but systems are not yet secure enough to use with relative certainty that the vote counts will be accurate, according to a new report. Still, while “no existing system guarantees voter privacy or the correct election outcomes,” election officials could take several steps to significantly improve the security and transparency of Internet voting systems, said the report, commissioned by the U.S. Vote Foundation, an organization that helps U.S. residents vote. Election officials considering Internet voting must embrace an end-to-end verifiable Internet voting system, or E2E-VIV, said the report, released Friday. An E2E-VIV would be difficult to build, but it would allow voters to check that the system recorded their votes correctly, to check that it included their votes in the final tally and to double-check the announced outcome of the election, the report said. An Internet voting system must be transparent, useable and secure, said the report, echoing some recommendations security groups have made about other electronic voting systems. “An Internet voting system must guarantee the integrity of election data and keep voters’ personal information safe,” the report said. “The system must resist large-scale coordinated attacks, both on its own infrastructure and on individual voters’ computers. It must also guarantee vote privacy and allow only eligible voters to vote.”

Editorials: Bruce Schneier movie-plot threat contest: Winning entry imagines online voting gone wrong. | Slate

Imagine this: It’s the morning of Election Day, 2020. Americans across the country cast secure, encrypted votes from their smartphones and laptops, electronically choosing their president for the first time in history. Turnout reaches record highs. Live results online show that it’s a close race between the two leading candidates. But by early afternoon, an independent candidate—a sketchy figure with ties to multiple terrorist organizations and no public support whatsoever—mysteriously takes the lead. At 4 p.m., he officially wins the election. The American people rise up in protest: Clearly, hacking, bribery, or other nefarious activity has taken place. However, because the voting software is designed with end-to-end encryption to ensure anonymity, no audit or recount is possible. America’s next president is a terrorist. This is the hypothetical scenario that won Bruce Schneier’s annual online “movie-plot threat” contest by popular vote this past weekend.

National: The rise of the machines: Many states, localities get new voting equipment for 2016 | electionlineWeekly

While issues like early voting, voter registration and voter ID have certainly grabbed the headlines of late, another elections issue will literally be in front thousands of voters in 2016 — new voting systems. Nationwide many states and counties are moving to new voting systems for the first time in more than a decade in advance of the 2016 election cycle. For some jurisdictions the switch to a new voting system was mandated by state legislatures that wanted to move to paper-based systems. For others, it’s a matter of age. Many states and counties replaced their voting machines following the 2002 election and in a world where people replace their phones every two years and personal computers almost as frequently, 10+-year old voting machines are, well, old. Although budgeting and procurement are certainly taking center stage now, soon enough it will be training and voter education. It’s a lot to get done with an election calendar that grows shorter as more and more states jockey for position with their elections calendars.

Editorials: You can transfer your paycheck, fill out your taxes and control airplanes online. Why can’t you vote? | Bangor Daily News

You can transfer your life’s earnings between bank accounts online. You can apply for a credit card and file your tax returns online. If you’re an air traffic controller, you probably use a Web-based system to direct the planes — and people’s lives — above you. So what’s the deal with voting? Why can’t you use your phone or computer to cast your ballot remotely? Experts don’t have faith in the ability of the Internet to maintain what’s needed in a voting system: keeping your vote secret, preventing coercion, verifying your identity, allowing you to vote only once, and recording your vote correctly. If not now, though, will the option to vote online be available in the future? … Skeptics of online voting are of course concerned about security breaches. Could a third party hack into the system and interfere with an election’s results? What about the potential for violations of voter privacy?

National: Elections Technology: Nine Things Legislators May Want to Know | The Canvass

What makes you lose sleep?” That’s what NCSL staff asked members of the National Association of State Election Directors back in September 2012. The answer wasn’t voter ID, or early voting, or turnout, as we expected. Instead, it was this: “Our equipment is aging, and we aren’t sure we’ll have workable equipment for our citizens to vote on beyond 2016.”That was NCSL’s wake-up call to get busy and learn how elections and technology work together. We’ve spent much of the last two years focusing on that through the Elections Technology Project, funded by the MacArthur Foundation. One thing we learned is that virtually all election policy choices have a technology component. Just two examples: vote centers and all-mail elections. While both can be debated based on such values as their effect on voters, election officials and budgets, neither can be decided without considering technology. Vote centers rely on e-poll books, and all-mail elections depend on optical scan equipment to handle volumes of paper ballots.Below are nine more takeaways we’ve learned recently and that legislators might like to know too.

National: Cheap And Fast, Online Voter Registration Catches On | NPR

Voters in more than half the states will soon be able to register online, rather than filling out a paper form and sending it in. Twenty states have implemented online voter registration so far, almost all in the past few years. Seven other states and the District of Columbia are now in the process of doing so. That includes Florida, where Republican Gov. Rick Scott signed a bill last Friday requiring the state to allow online voter registration by 2017. Online voter registration has become so popular because election officials say it’s more efficient than a paper-based system, and cheaper. Voters like it because they can register any time of day from home, said David Becker, director of election initiatives for the Pew Charitable Trusts. “What election officials are finding, is they’re saving a ton of money, because they’re having to process a lot fewer pieces of paper by hand, right before an election, and get that into the system,” he said.

National: The White House Names Princeton University Professor Ed Felten as Deputy U.S. Chief Technology Officer | Planet Princeton

Edward Felten, a Princeton University computer scientist who is a leading expert on computer security, has been named deputy chief technology officer in the White House’s Office of Science and Technology Policy. The White House announced the appointment this afternoon. Felten has been teaching at Princeton University since 1993. In 2005, he was named director of Princeton’s Center for Information Technology Policy. His research interests include public policy issues related to information technology, including electronic voting, cybersecurity policy, technology for government transparency, and Internet policy.

National: Secure e-voting: 20 to 30 years away | Computer Weekly

Jeremy Epstein, senior computer scientist at non-profit research institute SRI International spoke to the Computer Weekly Developer Network blog this week to share his views on the possibility of electronic voting security. Epstein says that although some e-voting is happening in the US, Estonia and other countries — this is not *secure* e-voting, it’s just e-voting. Every system developed so far has been found to be insecure. “From a technical perspective, we’re at least 10 years away from secure e-voting, and many experts think we’re 20 or 30 years away,” he said.

Editorials: Is online voting a security risk? | ESET

The world is moving online and so too now is politics. But as online, electronic voting (e-voting) increasingly becomes a reality, are we opening ourselves up to vote rigging by power-hungry politicians or fame-seeking hackers? Voting has traditionally been a pen and paper exercise; a slip filled-in and placed into a sealed ballot, with results counted and recorded by independent volunteers. Of course, this doesn’t mean that the result can’t be swayed, unintentionally or otherwise. There have been some notorious examples of foul play – Slobodan Milošević was accused of rigging elections in 1996 and 2000 in Yugoslavia – while errors can also occur, as best illustrated by the 2000 US presidential election, when a fault with Florida’s ballot paper led some people to vote for the wrong candidate. … These risks are only magnified when voting systems are pushed online. Brazil, Belgium and Estonia are just a few examples of the countries to have taken to e-voting, and while they have seen the benefits from the improved speed, accessibility and legibility (no more illegible ticks or crosses), they are arguably more open to attack.

United Kingdom: How feasible would it be to introduce online voting? | BBC

People can shop, date and bank online. How feasible would it be to allow internet voting at the general election? Imagine democracy had just been invented. Would the UK government decide to set up 50,000 polling stations on Thursday 7 May? Or would the vote be taking place online instead? Until the 1870s those people allowed to vote did so openly with no privacy. The 1872 Ballot Act changed this with the invention of the “modern” polling station – the church hall with its wooden booths, a pencil on string and piles of ballot papers handed out by earnest election workers. Since then the way we vote has hardly changed. Today people shop, find a partner and bank online. Surely voting online is possible? The government says not. In January, Sam Gyimah, the constitution minister, told the House of Commons: “I feel [that] moving to electronic voting would be a huge task for any government. We can’t be under any illusion that this would be easy to achieve.” Remote voting was “incredibly rare” around the world and would require a “very robust and secure” system, Gyimah said.

Editorials: AVS WinVote: The Worst Voting Machine in America | Jeremy Epstein/Slate

On April 14, the Virginia State Board of Elections voted to immediately decertify use of the AVS WinVote touch-screen Direct Recording Electronic voting machine. That means that the machine, which the Washington Post says was used by “dozens of local governments” in Virginia, can’t be used any more, though the commonwealth is holding primaries in just two months. The move comes in light of a report that shows just how shoddy and insecure voting machines can be. As one of my colleagues taught me, BLUF—bottom line up front: If an election was held using the AVS WinVote, and it wasn’t hacked, it was only because no one tried. The vulnerabilities were so severe, and so trivial to exploit, that anyone with even a modicum of training could have succeeded. A hacker wouldn’t have needed to be in the polling place—he could have been within a few hundred feet (say, in the parking lot) and or within a half-mile if he used a rudimentary antenna built using a Pringles can. Further, there are no logs or other records that would indicate if such a thing ever happened, so if an election was hacked any time in the past, we will never know.

Australia: Votes gone walkabout after Australian election voting flaw | SC Magazine UK

As many as 66,000 votes in the New South Wales state election 2015 could have been tampered with. The election was held on  28 March 2015 and is now closed. Voters used the iVote system which is described by its makers as “private, secure and verifiable” in its operation. Further, the Australian Electoral Commission insists that all Internet votes are and were “fully encrypted and safeguarded” at this time. The iVote system is a form of voting where eligible voters can vote over the Internet or telephone as an alternative to voting at a physical polling station. Security is provided using an 8-digit iVote number, a 6-digit PIN and a 12-digit receipt number for each individual. Australia is arguably a perfect test case for electronic voting with its vast distances that prevent some voters from getting to a polling location. A system like this also benefits the disabled and other less mobile voters. However, the system has been derided by non-profit digital rights group the Electronic Frontier Foundation (EFF), “The problem is that the system was not ready to be one of the biggest online voting experiments in the world.” EFF’s Farbod Faraji says that a FREAK flaw has been discovered in the Australian system by Michigan Computer Science Professor J Alex Halderman and University of Melbourne Research Fellow Vanessa Teague.

Editorials: Decertifying the worst voting machine in the US | Jeremy Epstein/Freedom to Tinker

On Apr 14 2015, the Virginia State Board of Elections immediately decertified use of the AVS WinVote touchscreen Direct Recording Electronic (DRE) voting machine. This seems pretty minor, but it received a tremendous amount of pushback from some local election officials. In this post, I’ll explain how we got to that point, and what the problems were. As one of my colleagues taught me, BLUF – Bottom Line Up Front. If an election was held using the AVS WinVote, and it wasn’t hacked, it was only because no one tried. The vulnerabilities were so severe, and so trivial to exploit, that anyone with even a modicum of training could have succeeded. They didn’t need to be in the polling place – within a few hundred feet (e.g., in the parking lot) is easy, and within a half mile with a rudimentary antenna built using a Pringles can. Further, there are no logs or other records that would indicate if such a thing ever happened, so if an election was hacked any time in the past, we will never know.

Verified Voting in the News: Voting machine password hacks as easy as ‘abcde’, details Virginia state report | Guardian

Touchscreen voting machines used in numerous elections between 2002 and 2014 used “abcde” and “admin” as passwords and could easily have been hacked from the parking lot outside the polling place, according to a state report. The AVS WinVote machines, used in three presidential elections in Virginia, “would get an F-minus” in security, according to a computer scientist at tech research group SRI International who had pushed for a formal inquiry by the state of Virginia for close to a decade. In a damning study published Tuesday, the Virginia Information Technology Agency and outside contractor Pro V&V found numerous flaws in the system, which had also been used in Mississippi and Pennsylvania. Jeremy Epstein, of the Menlo Park, California, nonprofit SRI International, served on a Virginia state legislative commission investigating the voting machines in 2008. He has been trying to get them decertified ever since.

Verified Voting in the News: Hacked Touchscreen Voting Machine Raises Questions About Election Security | NPR

Computer security experts have warned for years that some voting machines are vulnerable to attack. And this week, in Virginia, the state Board of Elections decided to impose an immediate ban on touchscreen voting machines used in 20 percent of the state’s precincts, because of newly discovered security concerns. The problems emerged on Election Day last November in Spotsylvania County. The AVS WINVote touchscreen machines used in precinct 302 began to shut down. “One machine would go and crash. They’d bring it back up. Another one would crash,” said Edgardo Cortes, the state’s elections commissioner. “Starting in the early afternoon, they brought in a piece of replacement equipment that experienced the same issues when they set it up in the precinct.” Cortes added that elections workers had a theory about what had caused the problem. “There was some interference,” he said, “potentially from a wireless signal from an election officer [who] was streaming music on their phone.”

Verified Voting in the News: Meet the e-voting machine so easy to hack, it will take your breath away | Ars Technica

Virginia election officials have decertified an electronic voting system after determining that it was possible for even unskilled people to surreptitiously hack into it and tamper with vote counts. The AVS WINVote, made by Advanced Voting Solutions, passed necessary voting systems standards and has been used in Virginia and, until recently, in Pennsylvania and Mississippi. It used the easy-to-crack passwords of “admin,” “abcde,” and “shoup” to lock down its Windows administrator account, Wi-Fi network, and voting results database respectively, according to a scathing security review published Tuesday by the Virginia Information Technologies Agency. The agency conducted the audit after one Virginia precinct reported that some of the devices displayed errors that interfered with vote counting during last November’s elections.

National: Technology aims to improve the voting experience | The Washington Post

In an age where people can transfer money using their mobile device, it’s not hard to envision a future where citizens wake up on Election Day, pull out their phones and choose the next leader of the Free World on the way to work. Last week, a federal election agency took a small step toward that futuristic vision. … The updated guidelines will allow manufacturers to test machines against modern security and disability standards and get them certified for use by states ahead of the 2016 presidential election. … When it comes to Internet-based voting systems, many experts argue there’s no clear solution to address the issues of security and verifiability. A securely designed online system also needs to be easy to use, and so far that goal has eluded researchers, said Poorvi Vora, an associate professor of computer science at George Washington University who has researched Internet voting systems. Vora is part of a group of academics, computer scientists, election officials and activists working on a project led by the Overseas Vote Foundation, an Arlington, Va.-based nonprofit, to answer one question: Is it possible to design a system that lets people vote remotely in a secure, accessible, anonymous, convenient and verifiable manner? The answer so far is no, but the group says it is close to a possible solution and will present its design to the election research community and federal agencies this summer. As with health records or financial data, online security remains an obstacle.

Australia: NSW iVote ballot mistake put down to human error | ZDNet

New South Wales Electoral Commission (NSWEC) CIO Ian Brightwell has defended the state’s online iVote system for the second time in as many weeks, after concerns were raised that a ballot error could put the state’s Legislative Council results in question for some seats. In the first two days of voting for the NSW state election, which was held on March 28, an error on the electronic ballot paper used for the online iVote system saw voters unable to vote above the line for two parties. … Brightwell’s defence of the NSW iVote system comes just two weeks after he fended off claims by online security researchers that the system had been vulnerable to a range of potential attacks, including those using the FREAK vulnerability. At the time, Brightwell played down the findings of the two researchers, Michigan Computer Science professor J Alex Halderman and University of Melbourne research fellow Vanessa Teague, saying that the vulnerability claims had been “overstated”.

Australia: New South Wales Attacks Researchers Who Found Internet Voting Vulnerabilities | Electronic Frontier Foundation

A security flaw in New South Wales’ Internet voting system may have left as many as 66,000 votes vulnerable to interception and manipulation in a recent election, according to security researchers. Despite repeated assurances from the Electoral Commission that all Internet votes are “fully encrypted and safeguarded,” six days into online voting, Michigan Computer Science Professor J. Alex Halderman and University of Melbourne Research Fellow Vanessa Teague discovered a FREAK flaw that could allow an attacker to intercept votes and inject their own code to change those votes, all without leaving any trace of the manipulation. (FREAK stands for Factoring RSA Export Keys and refers to the exploitation of a weakness in the SSL/TLS protocol that allows attackers to force browsers to use weak encryption keys.) But instead of taking the researchers’ message to heart, officials instead attacked the messengers.

Illinois: Chicago mayor’s race: Why you aren’t voting from a smartphone | Chicago Tribune

As Chicagoans trek to the polls Tuesday for the city’s first-ever mayoral runoff election, some may wonder why they can’t yet vote from the palms of their hands. “For me the biggest benefit of online voting would be convenience,” said K.C. Horne, a 26-year-old accountant from Edgewater. “If I can file my taxes from my phone, I should be able to vote from my phone.” But so far, both technological and legislative hurdles have sharply limited the use of online voting. One major difference: The need to keep the user’s identity secret makes filing ballots different from other secure online transactions. “It’s an unconventional transaction where you have to be able to do business with me, but I can’t know exactly what you’re buying,” said Chicago Board of Election Commissioners spokesman Jim Allen.

Editorials: Online voting still faces security issues | Mark Pomerleau/GCN

For those interested in expanding voting access by allowing voters to cast their ballots over the Internet, one government expert/activist has bad news – the security and privacy risks associated with Internet voting won’t be resolved anytime soon. David Jefferson, computer scientist in the Lawrence Livermore’s Center for Applied Scientific Computing, has studied electronic voting and security for more than 15 years. He believes “security, privacy, reliability, availability and authentication requirements for Internet voting are very different from, and far more demanding than, those required for e-commerce.” In short, voting is more susceptible to attacks, manipulation and vulnerabilities. Some champions of Internet balloting believe the safeguards that protect online shoppers from hackers can also protect the sensitive information and meet the legal regulations associated with voting online. Advocates further believe that Internet voting will increase turnout, cut costs and improve accuracy. Jefferson refuted these claims by asserting that there currently is no strong authentication or verification solution for online shopping. Also, while proxy shopping is a common occurrence and is not against the law, proxy voting is not allowed.

New Zealand: Online voting is not the answer | Brian Rudman/New Zealand Herald

Mayor Len Brown wants the Government to rethink its ban on Auckland taking part in the online voting trial at the 2016 local body elections. Auckland has been excluded at this stage because, with 1,050,000 electors, the bureaucrats are worried about their ability “to mitigate any risk”. Auckland Council sees online voting as part of its campaign to lift voter turnout to “at least” the 2013 national average of around 40 per cent at next year’s poll. In 2013, only 34 per cent of enrolled Auckland voters bothered. … In the aftermath of the 2013 low turnout, Local Government Minister Chris Tremain announced plans to fast-track trials of online voting. Last December, the Cabinet agreed to a limited number of local authorities trialling it in 2016. But not Auckland. Their fears about risk seem well placed.

Australia: NSW election result could be challenged over iVote security flaw | The Guardian

The result of the NSW election this Saturday is likely to be challenged after a security flaw was identified that could potentially have compromised 66,000 electronic votes. A number of parties, including the Greens, the National party and the Outdoor Recreation party have told Guardian Australia they would consider all of their options after the “major vulnerability” was revealed in the iVote system, an internet voting program being trialled for the first time this year. But a senior NSW Electoral Commission official said fears of vote tampering were overblown and the work of “well-funded, well-managed, anti-internet voting lobby groups”. While the iVote website itself is secure, Melbourne University security specialist Vanessa Teague discovered on Friday that it loaded javascript from a third-party website that was “vulnerable to an attack called the FREAK attack”. “The implication is that an attacker who controls some point through which the user’s traffic is passing could substitute that code for a code of the attackers’ choice,” she said. In layman’s terms, a hacker could intercept a vote for party A and turn it into a vote for party B without alerting the voter or the NSW Electoral Commission.