Adventures in Electronic Voting Research - IC Research Day

Page created by Vernon Dean
 
CONTINUE READING
Adventures in Electronic Voting Research - IC Research Day
Adventures in Electronic Voting Research

Dan S. Wallach
Professor, Department of Computer Science
Rice Scholar, Baker Institute for Public Policy
Rice University
Adventures in Electronic Voting Research - IC Research Day
Many problems in voting!
Traditional concerns: vote casting, tallying, gerrymandering

Newer concerns: nation-state adversaries, misinformation

Today: Where we are, what’s next
Adventures in Electronic Voting Research - IC Research Day
January
 Su Mo Tu We Th Fr Sa
 2016 February
 Su Mo Tu We Th Fr Sa
 March
 Su Mo Tu We Th Fr Sa
 January
 Su Mo Tu We Th Fr Sa
 2017 February
 Su Mo Tu We Th Fr Sa
 March
 Su Mo Tu We Th Fr Sa
 1 2 1 2 3 4 5 6 1 2 3 4 5 1 2 3 4 5 6 7 1 2 3 4 1 2 3 4
 3 4 5 6 7 8 9 7 8 9 10 11 12 13 6 7 8 9 10 11 12 8 9 10 11 12 13 14 5 6 7 8 9 10 11 5 6 7 8 9 10 11
 10 11 12 13 14 15 16 14 15 16 17 18 19 20 13 14 15 16 17 18 19 15 16 17 18 19 20 21 12 13 14 15 16 17 18 12 13 14 15 16 17 18
 17 18 19 20 21 22 23 21 22 23 24 25 26 27 20 21 22 23 24 25 26 22 23 24 25 26 27 28 19 20 21 22 23 24 25 19 20 21 22 23 24 25
 24 25 26 27 28 29 30 28 29 27 28 29 30 31 29 30 31 26 27 28 26 27 28 29 30 31
 31

 April May June April May June
 Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa
 1 2 1 2 3 4 5 6 7 1 2 3 4 1 1 2 3 4 5 6 1 2 3
 3 4 5 6 7 8 9 8 9 10 11 12 13 14 5 6 7 8 9 10 11 2 3 4 5 6 7 8 7 8 9 10 11 12 13 4 5 6 7 8 9 10
 10 11 12 13 14 15 16 15 16 17 18 19 20 21 12 13 14 15 16 17 18 9 10 11 12 13 14 15 14 15 16 17 18 19 20 11 12 13 14 15 16 17
 17 18 19 20 21 22 23 22 23 24 25 26 27 28 19 20 21 22 23 24 25 16 17 18 19 20 21 22 21 22 23 24 25 26 27 18 19 20 21 22 23 24
 24 25 26 27 28 29 30 29 30 31 26 27 28 29 30 23 24 25 26 27 28 29 28 29 30 31 25 26 27 28 29 30
 30

 July August September July August September
 Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa
 1 2 1 2 3 4 5 6 1 2 3 1 1 2 3 4 5 1 2
 3 4 5 6 7 8 9 7 8 9 10 11 12 13 4 5 6 7 8 9 10 2 3 4 5 6 7 8 6 7 8 9 10 11 12 3 4 5 6 7 8 9
 10 11 12 13 14 15 16 14 15 16 17 18 19 20 11 12 13 14 15 16 17 9 10 11 12 13 14 15 13 14 15 16 17 18 19 10 11 12 13 14 15 16
 17 18 19 20 21 22 23 21 22 23 24 25 26 27 18 19 20 21 22 23 24 16 17 18 19 20 21 22 20 21 22 23 24 25 26 17 18 19 20 21 22 23

Our story starts here.
 24 25 26 27 28 29 30
 31
 28 29 30 31 25 26 27 28 29 30 23 24 25 26 27 28 29
 30 31
 27 28 29 30 31 24 25 26 27 28 29 30

 October November December October November December
 Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa
 1 1 2 3 4 5 1 2 3 1 2 3 4 5 6 7 1 2 3 4 1 2

 The election is 9here.
 2 3 4
 10
 5 6 7 8 6 7 8 9 10 11 12 4 5 6 7 8 9 10 8 9 10 11 12 13 14 5 6 7 8 9 10 11 3 4 5 6 7 8 9
 11 12 13 14 15 13 14 15 16 17 18 19 11 12 13 14 15 16 17 15 16 17 18 19 20 21 12 13 14 15 16 17 18 10 11 12 13 14 15 16
 16 17 18 19 20 21 22 20 21 22 23 24 25 26 18 19 20 21 22 23 24 22 23 24 25 26 27 28 19 20 21 22 23 24 25 17 18 19 20 21 22 23
 23 24 25 26 27 28 29 27 28 29 30 25 26 27 28 29 30 31 29 30 31 26 27 28 29 30 24 25 26 27 28 29 30
 30 31 31

 Federal Holidays 2016 Federal Holidays 2017
 Jan 1 New Year's Day Jul 4 Independence Day Nov 24 Thanksgiving Day Jan 1 New Year's Day May 29 Memorial Day Nov 10 Veterans Day (observed)
 Jan 18 Martin Luther King Day Sep 5 Labor Day Dec 25 Christmas Day Jan 2 New Year's Day (observed) Jul 4 Independence Day Nov 11 Veterans Day
 Feb 15 Presidents' Day Oct 10 Columbus Day Dec 26 Christmas Day (obs.) Jan 16 Martin Luther King Day Sep 4 Labor Day Nov 23 Thanksgiving Day
 May 30 Memorial Day Nov 11 Veterans Day Feb 20 Presidents' Day Oct 9 Columbus Day Dec 25 Christmas Day
 Data provided 'as is' without warranty Data provided 'as is' without warranty
 © Calendarpedia® www.calendarpedia.com © Calendarpedia® www.calendarpedia.com
Adventures in Electronic Voting Research - IC Research Day
Adventures in Electronic Voting Research - IC Research Day
Adventures in Electronic Voting Research - IC Research Day
“33 states and 11 counties or local election officials” have requested help.
(October 2016)

39 states compromised (June 2017)
Adventures in Electronic Voting Research - IC Research Day
Adventures in Electronic Voting Research - IC Research Day
The scope and sophistication so concerned Obama administration
officials that they took an unprecedented step -- complaining directly to
Moscow over a modern-day “red phone.” In October, two of the people
said, the White House contacted the Kremlin on the back channel to offer
detailed documents of what it said was Russia’s role in election meddling
and to warn that the attacks risked setting off a broader conflict.
Adventures in Electronic Voting Research - IC Research Day
What did the Russians do?
Adventures in Electronic Voting Research - IC Research Day
Phishing 101 Dear Sir:

 I have been requested by the Nigerian National Petroleum
 Company to contact you for assistance in resolving a matter.
 The Nigerian National Petroleum Company has recently
Spammed emails, trying to steal concluded a large number of contracts for oil exploration in the
things from users sub-Sahara region. The contracts have immediately produced
 moneys equaling US$40,000,000. The Nigerian National
Passwords / credentials: useful for later Petroleum Company is desirous of oil exploration in other parts
 of the world, however, because of certain regulations of the
hacking attacks (e.g., ransomware) Nigerian Government, it is unable to move these funds to
Bank account data: steal their money another region.

 You assistance is requested as a non-Nigerian citizen to assist
Response rate is tiny, but the activity the Nigerian National Petroleum Company, and also the Central
is still profitable Bank of Nigeria, in moving these funds out of Nigeria. If the
 funds can be transferred to your name, in your United States
 account, then you can forward the funds as directed by the
 Nigerian National Petroleum Company. In exchange for your
 accommodating services, the Nigerian National Petroleum
 Company would agree to allow you to retain 10%, or US$4
 million of this amount.

 …
“Spear phishing”
Phishing a specific person
Here, John Podesta
(HRC’s campaign
manager in 2016)

Spear phishing attempts are harder
to automatically detect
Regular spam is high volume
Spear phishing emails are customized
WikiLeaks
Julian Assange: “hacktivist”
Early 2000’s, working on privacy
technologies
http://caml.inria.fr/pub/ml-archives/caml-list/2000/08/6b8b195b3a25876e0789fe3db770db9f.en.html

WikiLeaks founded in 2006
“Collecting” and disseminating
newsworthy information
One technique: Ran a Tor “exit
node”, sifted through the data
Chelsea Manning leaks in 2007
“Collateral Murder” drone videos
https://www.commondreams.org/views/2015/04/04/five-years-wikileaks-collateral-murder-video-matters-more-ev
Russia + WikiLeaks
Assange denies it, but U.S. intelligence says:
Russian intel agencies collected on Hillary Clinton, DNC, etc.
 • Exact methods we don’t know
 • Definitely phishing, possibly other hacking techniques

Used WikiLeaks as a cut-out / front organization
 • Assange may well believe his sources weren’t Russian

Also: “DCLeaks” and “Guccifer 2.0”
July 2018: U.S. Special Counsel Mueller indicted 12 Russian GRU agents
Propaganda
Propaganda: Always a part of military strategy
“Win the hearts and minds”

Modern Russian military theory: “hybrid warfare”
Includes cyber attacks, propaganda, etc.

 U.S. M105 Leaflet Bomb,1950’s
Agitprop = Agitation + Propaganda

 French anti-Jewish book, 1938 Russian anti-capitalist poster, German anti-American poster, WWII
 post-Communist Revolution
Russian agitprop in the 2016 election

https://www.nytimes.com/interactive/2018/02/16/us/politics/russia-propaganda-election-2016.html
Russian agitprop in the 2016 election
 Facebook ad, purchased by Russians

https://www.nytimes.com/interactive/2018/02/16/us/politics/russia-propaganda-election-2016.html
Russian agitprop in the 2016 election

https://www.nytimes.com/interactive/2018/02/16/us/politics/russia-propaganda-election-2016.html
Russian agitprop in the 2016 election
 Actual Tennessee GOP
 Russians

https://www.nytimes.com/interactive/2018/02/16/us/politics/russia-propaganda-election-2016.html
Russian agitprop in the 2016 election

 Russians

Targeting the American left as well.

 https://www.nytimes.com/interactive/2018/02/16/us/politics/russia-propaganda-election-2016.html
“Texas Antifa”
Russian fake antifascist Facebook group
Threatened to remove Sam Houston statue in
Hermann Park Russians

Right-wing counter group (“This is Texas”)
organized a rally in “defense”

 https://www.thedailybeast.com/texas-conservatives-fall-for-anti-antifa-hoax
 https://thinkprogress.org/hermann-park-protest-houston-28895d563f38/
“Texas Antifa”
Russian fake antifascist Facebook group
Threatened to remove Sam Houston statue in
Hermann Park Russians

Right-wing counter group (“This is Texas”)
organized a rally in “defense”

 https://www.thedailybeast.com/texas-conservatives-fall-for-anti-antifa-hoax
 https://thinkprogress.org/hermann-park-protest-houston-28895d563f38/
“Texas Antifa”
Russian fake antifascist Facebook group
Threatened to remove Sam Houston statue in
Hermann Park Russians

Right-wing counter group (“This is Texas”)
organized a rally in “defense”

 Nobody ever planned to touch the statue

 Actual KKK symbols and slogans

 https://www.thedailybeast.com/texas-conservatives-fall-for-anti-antifa-hoax
 https://thinkprogress.org/hermann-park-protest-houston-28895d563f38/
Star Wars: The Last Jedi (!?) Mission: Impossible Heat Vision Breakdown

 OCTOBER 01, 2018
 4:31pm PT by Graeme McMillan

Study by Morten Bay, USC Annenberg School
Collected 1273 tweets mentioning the film’s director
 • 973 unique accounts after cleanup, deduplication
 • Manually analyzed the sentiment of each tweet
 • Manually categorized each tweeting account
 • Also used Indiana U.’s “Botometer”
 Courtesy of Walt Disney Studios Motion Pictures
 'Star Wars: The Last Jedi' (2017)

Results?
 • 22% of accounts were negative
 • 44 bot accounts, 61 “political” users Did Star Wars: The Last Jedi destroy the franchise and
 permanently rupture the fandom as its critics
 • 101 “fans” who were negative on the film (melodramatically) have accused it of doing? According to a
 new academic paper by researcher Morten Bay, the answer is
 clearly no.

 The paper, titled Weaponizing The Haters: The Last Jedi and the
Star Wars: The Last Jedi (!?) Mission: Impossible Heat Vision Breakdown

 OCTOBER 01, 2018
 4:31pm PT by Graeme McMillan

Study by Morten Bay, USC Annenberg School
 “Russian trolls weaponize Star Wars
Collected 1273 tweets mentioning the film’s director
 criticism as an instrument of
 • 973 unique accounts after cleanup, deduplication
 information warfare with the purpose
 • Manually analyzed the ofsentiment ofpolitical
 pushing for each tweet
 change, while it
 is weaponized
 • Manually categorized each tweetingbyaccount
 right-wing fans to
 forward a conservative agenda and for
 • Also used Indiana U.’s “Botometer”
 Courtesy of Walt Disney Studios Motion Pictures
 'Star Wars: The Last Jedi' (2017)

 some it is a pushback against what they
Results? perceive as a feminist/social justice
 onslaught.”
 • 22% of accounts were negative
 • 44 bot accounts, 61 “political” users Did Star Wars: The Last Jedi destroy the franchise and
 permanently rupture the fandom as its critics
 • 101 “fans” who were negative on the film (melodramatically) have accused it of doing? According to a
 new academic paper by researcher Morten Bay, the answer is
 clearly no.

 The paper, titled Weaponizing The Haters: The Last Jedi and the
Social networks respond
Social networks respond
 ‫ا‬ ESP РУС DE FR ИНОТВ RTД RUPTLY Applications

 Russia Today, Feb. 2018 QUESTION MORE LIVE s
 16:11 GMT, Oct 02, 2018

 News USA UK Sport Russian politics Business Op-ed RT360 Shows Projects

 Home / US News /
 Where to watch Schedule

 ‘Russian bots’ outcry: Is Twitter cracking down on people who
 ‘challenge the status quo’?
 Published time: 22 Feb, 2018 13:16
 Edited time: 23 Feb, 2018 08:55 Get short URL

 0.016% of accounts: Twitter catches a few more 'Russian
 trolls' as Congress-spurred hunt continues

 © Richard James Mendoza / Global Look Press Twitter dismisses Russian interference in Brexit referendum

 It seems that ‘the bots’ (especially the ‘Russian bots’) narrative is being used as a kind of defensive mechanism, journalist
 and human rights activist Mike Raddie told RT amid reports of a massive account purge on Twitter.

 A crackdown on bot spam or dissent?

 “The whole meme of the bots, especially the ‘Russian bots,’ is actually being used as a kind of defensive mechanism,”
 said Mike Raddie. “Whenever people criticize the corporate media in the West – we’ve done it with the Guardian – they
 come back and say, ‘oh, you’re part of a Russian bot army,’ or a typical question is, ‘what’s the weather like in St.
 Petersburg? Is it snowing in Moscow yet?’ So it’s a very useful meme for corporate journalists to de ect any kind of
 criticism, especially over hot topics such as Syria, Ukraine – things like this.”
 A number of Twitter accounts are said to have been agged over the past few days, in what many have speculated is part
 of the company’s e orts to clamp down on the much-touted army of Russian-controlled automated accounts, or “bots.”
 However, Twitter has yet to elaborate on the reported mass purge, which allegedly also targeted users with right-wing Twitter doubles number of users it warned about interaction
 views – raising concerns of political censorship on the popular social media platform. The hashtag #TwitterLockOut began with 'Russian trolls'
 trending on the site shortly after the suspensions.
Social networks respond
xclusive: Twitter is suspending millions of bots and fake accou... https://www.washingtonpost.com/technology/2018/07/06/twitter...

 The Washington Post Washington Post, July 2018 ‫ا‬ ESP РУС DE FR ИНОТВ RTД RUPTLY Applications

 The Switch s
 QUESTION MORE LIVE
 16:11 GMT, Oct 02, 2018

 Twitter is sweeping out fake accounts like never before, News USA UK Sport Russian politics Business Op-ed RT360 Shows Projects

 putting user growth at risk Home / US News /
 Where to watch Schedule

 ‘Russian bots’ outcry: Is Twitter cracking down on people who
 ‘challenge the status quo’?
 Published time: 22 Feb, 2018 13:16

 Twitter suspended more than 70 million accounts in May
 Edited time: 23 Feb, 2018 08:55 Get short URL

 and June, and the pace has continued in July
 By Craig Timberg and 0.016% of accounts: Twitter catches a few more 'Russian

 Elizabeth Dwoskin trolls' as Congress-spurred hunt continues

 July 6

 SAN FRANCISCO — Twitter has sharply escalated its battle against fake and suspicious
 accounts, suspending more than 1 million a day in recent months, a major shift to lessen the
 flow of disinformation on the platform, according to data obtained by The Washington Post.

 The rate of account suspensions, which Twitter confirmed to The Post, has more than doubled © Richard James Mendoza / Global Look Press Twitter dismisses Russian interference in Brexit referendum

 since October, when the company revealed under congressional pressure how Russia used fakeItandseems that ‘the bots’ (especially the ‘Russian bots’) narrative is being used as a kind of defensive mechanism, journalist
 human rights activist Mike Raddie told RT amid reports of a massive account purge on Twitter.

 accounts to interfere in the U.S. presidential election. Twitter suspended more than 70 million A crackdown on bot spam or dissent?
 “The whole meme of the bots, especially the ‘Russian bots,’ is actually being used as a kind of defensive mechanism,”
 accounts in May and June, and the pace has continued in July, according to the data. said Mike Raddie. “Whenever people criticize the corporate media in the West – we’ve done it with the Guardian – they
 come back and say, ‘oh, you’re part of a Russian bot army,’ or a typical question is, ‘what’s the weather like in St.
 Petersburg? Is it snowing in Moscow yet?’ So it’s a very useful meme for corporate journalists to de ect any kind of
 criticism, especially over hot topics such as Syria, Ukraine – things like this.”
 The aggressive removal of unwanted accounts may result in a rare decline in the number of A number of Twitter accounts are said to have been agged over the past few days, in what many have speculated is part
 of the company’s e orts to clamp down on the much-touted army of Russian-controlled automated accounts, or “bots.”
 monthly users in the second quarter, which ended June 30, according to a person familiar with However, Twitter has yet to elaborate on the reported mass purge, which allegedly also targeted users with right-wing Twitter doubles number of users it warned about interaction
 views – raising concerns of political censorship on the popular social media platform. The hashtag #TwitterLockOut began with 'Russian trolls'
 the situation who was not authorized to speak. Twitter declined to comment on a possible trending on the site shortly after the suspensions.

 https://www.washingtonpost.com/technology/2018/07/06/twitter-is-sweeping-out-fake-accounts-like-never-before-putting-user-growth-risk/
 decline in its user base.
Social networks respond
xclusive: Twitter is suspending millions of bots and fake accou... https://www.washingtonpost.com/technology/2018/07/06/twitter...

 The Washington Post Washington Post, July 2018 ‫ا‬ ESP РУС DE FR ИНОТВ RTД RUPTLY Applications

 The Switch s
 QUESTION MORE LIVE
 16:11 GMT, Oct 02, 2018

 Twitter is sweeping out fake accounts like never before, News USA UK Sport Russian politics Business Op-ed RT360 Shows Projects

 putting user growth at risk Home / US News /
 Where to watch Schedule

 ‘Russian bots’ outcry: Is Twitter cracking down on people who
 ‘challenge the status quo’?
 Published time: 22 Feb, 2018 13:16

 Twitter suspended more than 70 million accounts in May
 Edited time: 23 Feb, 2018 08:55 Get short URL

 and June, and the pace has continued in July
 By Craig Timberg and 0.016% of accounts: Twitter catches a few more 'Russian

 Elizabeth Dwoskin trolls' as Congress-spurred hunt continues

 July 6

 SAN FRANCISCO — Twitter has sharply escalated its battle against fake and suspicious
 accounts, suspending more than 1 million a day in recent months, a major shift to lessen the
 flow of disinformation on the platform, according to data obtained by The Washington Post.

 The rate of account suspensions, which Twitter confirmed to The Post, has more than doubled © Richard James Mendoza / Global Look Press Twitter dismisses Russian interference in Brexit referendum

 since October, when the company revealed under congressional pressure how Russia used fakeItandseems that ‘the bots’ (especially the ‘Russian bots’) narrative is being used as a kind of defensive mechanism, journalist
 human rights activist Mike Raddie told RT amid reports of a massive account purge on Twitter.

 accounts to interfere in the U.S. presidential election. Twitter suspended more than 70 million A crackdown on bot spam or dissent?
 “The whole meme of the bots, especially the ‘Russian bots,’ is actually being used as a kind of defensive mechanism,”
 accounts in May and June, and the pace has continued in July, according to the data. said Mike Raddie. “Whenever people criticize the corporate media in the West – we’ve done it with the Guardian – they
 come back and say, ‘oh, you’re part of a Russian bot army,’ or a typical question is, ‘what’s the weather like in St.
 Petersburg? Is it snowing in Moscow yet?’ So it’s a very useful meme for corporate journalists to de ect any kind of
 criticism, especially over hot topics such as Syria, Ukraine – things like this.”
 The aggressive removal of unwanted accounts may result in a rare decline in the number of A number of Twitter accounts are said to have been agged over the past few days, in what many have speculated is part
 of the company’s e orts to clamp down on the much-touted army of Russian-controlled automated accounts, or “bots.”
 monthly users in the second quarter, which ended June 30, according to a person familiar with However, Twitter has yet to elaborate on the reported mass purge, which allegedly also targeted users with right-wing Twitter doubles number of users it warned about interaction
 views – raising concerns of political censorship on the popular social media platform. The hashtag #TwitterLockOut began with 'Russian trolls'
 the situation who was not authorized to speak. Twitter declined to comment on a possible trending on the site shortly after the suspensions.

 https://www.washingtonpost.com/technology/2018/07/06/twitter-is-sweeping-out-fake-accounts-like-never-before-putting-user-growth-risk/
 decline in its user base.
Social media summary
 Annals of Politics October 1, 2018 Issue

 A meticulous analysis of online activity during the 2016 campaign makes a powerful case that targeted
 cyberattacks by hackers and trolls were decisive.

 By Jane Mayer

 https://www.newyorker.com/
 magazine/2018/10/01/how-
 russia-helped-to-swing-the-
 election-for-trump
Social media summary
 Annals of Politics October 1, 2018 Issue

 Joel Benenson, the Clinton pollster, was stunned when he learned, from the July
 indictment, that the Russians had stolen his campaign’s internal modelling. “I
 saw
 A meticulous analysis of online it during
 activity and the said, ‘Holy shit!’
 2016 campaign ” he told
 makes a powerful me.
 case that Among the proprietary information that
 targeted
 the Russian hackers could have obtained, he said, was campaign data showing
 cyberattacks by hackers and trolls were decisive.

 By Jane Mayer
 that, late in the summer of 2016, in battleground states such as Michigan,
 Wisconsin, and Pennsylvania, an unusually high proportion of residents whose
 demographic and voting profiles identified them as likely Democrats were
 “Hillary defectors”: people so unhappy with Clinton that they were considering
 voting for a third-party candidate. The Clinton campaign had a plan for winning
 back these voters. Benenson explained that any Clinton opponent who stole this
 data would surely have realized that the best way to counter the plan was to
 bombard those voters with negative information about Clinton. “All they need
 to do is keep that person where they are,” he said, which is far easier than
 persuading a voter to switch candidates. Many critics have accused https://www.newyorker.com/
 Clinton of
 taking Michigan and Wisconsin for granted and spending virtually magazine/2018/10/01/how-
 no time there.
 But Benenson said that, if a covert social-media campaign targeting russia-helped-to-swing-the-
 “Hillary
 defectors” was indeed launched in battleground states, it might well have
 changed the outcome of the election.
 election-for-trump
Social media summary
 Annals of Politics October 1, 2018 Issue

 Joel Benenson, the Clinton pollster, was stunned when he learned, from the July
 indictment, that the Russians had stolen his campaign’s internal modelling. “I
 saw
 A meticulous analysis of online it during
 activity and the said, ‘Holy shit!’
 2016 campaign ” he told
 makes a powerful me.
 case that Among the proprietary information that
 targeted
 the Russian hackers could have obtained, he said, was campaign data showing
 cyberattacks by hackers and trolls were decisive.

 By Jane Mayer
 that, late in the summer Jamieson,of ever the social
 2016, scientist, emphasizes
 in battleground states insuch
 her book that there is much that Americans still
 as Michigan,
 don’t know about the campaign, including the detailed targeting information that would clarify
 Wisconsin, and Pennsylvania, an unusually high proportion of residents whose
 exactly whom the Russian disinformation was aimed at, and when it was sent. She told me, “We need
 demographic andto voting know the profiles
 extent toidentified
 which the them astargeted
 Russians likely Democrats
 the three keywere
 states, and which citizens’ voting
 “Hillary defectors”: people
 patterns differedso substantially
 unhappy with fromClinton
 the onesthat
 you they
 wouldwere considering
 have predicted in the past.”
 voting for a third-party candidate. The Clinton campaign had a plan for winning
 Philip Howard, the Oxford professor, believes that Facebook possesses this data, down to the
 back these voters. Benenson
 location explained
 of a user’s computer,that andany
 that Clinton opponent
 such information who
 could stole this
 conceivably reveal whether an
 data would surely have realized
 undecided voter was that the best
 swayed way tocertain
 after viewing counter the plan
 content. was
 He also to that, if there was any
 thinks
 bombard those voters collusionwith
 betweennegative
 the St.information
 Petersburg trollsaboutand Clinton.
 the Trump“All they need
 campaign, Facebook’s internal data could
 to do is keep that personit,where
 document theycoordination
 by revealing are,” he said, which posts.
 on political is far But,
 easier thanFacebook has so far resisted
 he says,
 persuading a voter divulging such candidates.
 to switch data to researchers, Manyclaiming
 critics have https://www.newyorker.com/
 that doing so would
 accused be a breach
 Clinton of of its user agreement.
 taking Michigan and Wisconsin for granted and spending virtually magazine/2018/10/01/how-
 no time there.
 But Benenson said that, if a covert social-media campaign targeting russia-helped-to-swing-the-
 “Hillary
 defectors” was indeed launched in battleground states, it might well have
 changed the outcome of the election.
 election-for-trump
So, how did the 2018 election go?
Military response! POLICY US & WORLD TECH

 US Cyber Command a acked Russian troll farm
 9

 on Election Day 2018
 ‘Preventing this interference is one of our highest priorities,’ said US agencies at
 the time
 By Russell Brandom Feb 26, 2019, 2:07pm EST

 Illustration by Alex Castro / The Verge

 The United States Cyber Command launched an offensive campaign to silence one of
 Russia’s most notorious troll operations on the day of the 2018 midterm elections,
 according to a new report by The Washington Post. The operation targeted the Internet
 Research Agency, a private company linked to the Kremlin and often used for
 disinformation campaigns.
Military response! POLICY US & WORLD TECH

 US Cyber Command a acked Russian troll farm
 9

 on Election Day 2018
 Some U.S. officials argued that ‘Preventing
 “grand strategic deterrence”
 this interference is one of our highest priorities,’ said US agencies at
 is not always the goal. “Part ofthe ourtime
 objective is to throw a
 little curveball, inject a little friction, sow confusion,” said
 By Russell Brandom Feb 26, 2019, 2:07pm EST

 one defense official. “There’s value in that. We showed
 what’s in the realm of the possible. It’s not the old way of
 doing business anymore.”

 The action has been hailed as a success by Pentagon
 officials, and some senators credited Cyber Command with
 averting Russian interference in the midterms.

 “The fact that the 2018 election process moved forward
 without successful Russian intervention was not a
 coincidence,” said Sen. Mike Rounds (R-S.D.), who did not
 Illustration by Alex Castro / The Verge

 discuss the specific details of the operation targeting the St.
 Petersburg group. Without Cybercom’s efforts, he said, there
 The United States Cyber Command launched an offensive campaign to silence one of
 Russia’s most notorious troll operations on the day of the 2018 midterm elections,
 “would have been some very according
 serioustocyber-incursions.”
 a new report by The Washington Post. The operation targeted the Internet
 Research Agency, a private company linked to the Kremlin and often used for
 disinformation campaigns.
How well defended are the voting machines, themselves?
Viral attack vulnerabilities (Hart InterCivic)
California Top to Bottom Review (2007)
 End of election inventory
 SERVO management / auditing

 Attacked
 by voter
Viral attack vulnerabilities (Hart InterCivic)
California Top to Bottom Review (2007)
 End of election inventory
 SERVO management / auditing

 Attacked
 by voter
Viral attack vulnerabilities (Hart InterCivic)
California Top to Bottom Review (2007)
 End of election inventory
 SERVO management / auditing

 Attacked
 by voter
Viral attack vulnerabilities (Hart InterCivic)
California Top to Bottom Review (2007)
 End of election inventory
 SERVO management / auditing

 Exploit

 Attacked
 by voter
Viral attack vulnerabilities (Hart InterCivic)
California Top to Bottom Review (2007)
 End of election inventory
 SERVO management / auditing

 Exploit

 Attacked
 by voter
Viral attack vulnerabilities (Hart InterCivic)
California Top to Bottom Review (2007)
 End of election inventory
 SERVO management / auditing

 Exploit

 All subsequent machines compromised.

 Attacked
 by voter
Post-2016 improvements
Better “cyber-hygiene” for election officials, political campaigns
Example: Growing use of “two factor authentication”
EI-ISAC: Election Infrastructure Information Sharing and Analysis Center
 • A direct consequence of the DHS “critical infrastructure” designation
 • Federal assistance to states and counties

Some federal funds to improve security
But not enough to replace existing equipment

Summary: Better than nothing.
More publicity: DefCon Voting Village / CORY DOCTOROW / 5:42 AM FRI

 Defcon Voting Village report shows that hacking voting machines takes less
 time than voting
 MAGAZINE EVENTS LEADERS NETWORK INSIGHT

 SUBSCRIPTIONS SIGN IN
 Sign Up Log In

 CAN DEAD HACKERS VOTE TWICE? —
 Latest
 Defcon Voting Village report: Bug in one system could “flip Electoral
 TLS is Dead, Long Live TLS College”
 High-speed tabulator vulnerable to remote attacks, and that's only part of the problem.
 SEAN GALLAGHER - 9/27/2018, 5:24 PM

 News Topics Features Webinars White Papers Events & Conferences Directory

INFOSECURITY MAGAZINE HOME » NEWS » DEF CON VOTING VILLAGE REPORT CALLS FOR STANDARDS & FIXES

 28 SEP 2018 NEWS

 DEF CON Voting Village Report Calls for Standards &
 Fixes
 BEST PRODUCTS REVIEWS NEWS VIDEO HOW TO SMART HOME CARS DEALS DOWNLOAD JOIN / SIGN IN

 Dan Raywood Contributing Editor, Infosecurity Magazine Why Not Watch?
 Email Dan Follow @DanRaywood Connect on LinkedIn

 Sean Gallagher
 SECURITY

 Congress and national security leaders have been urged to take action to address issues in
 voting machines. Half of US states using voting machines with a Enlarge / A voting machine is submitted to abuse in DEFCON's Voting Village.

 After DEF CON’s Voting Village came under fire from the National Association of Secretaries
 of State (NASS) over the introduction of an area designed to test voting machines, DEF CON’s
 known vulnerability, says report
 12 MAR 2015 16 APR 2015 Today, six prominent information-security experts who took part in DEF CON's Voting Village in Las Vegas last month issued a report on vulnerabilities they had
 discovered in voting equipment and related computer systems. One vulnerability they discovered—in a high-speed vote-tabulating system used to count votes for
 report on the voting village said that Congress must act, as “problems outlined in this report March Patch Update April Patch Update - entire counties in 23 states—could allow an attacker to remotely hijack the system over a network and alter the vote count, changing results for large blocks of

 are not simply election administration flaws that need to be fixed for efficiency’s sake, but - Sponsored by The security flaw was flagged in
 Sponsored by 2007.
 Every year, security researchers gather at Defcon's Voting Village to probe voting machines and report on the longstanding, systematic security prob-
 voters. "Hacking just one of these machines could enable an attacker to flip the Electoral College and determine the outcome of a presidential election," the
 authors of the report warned.
 rather serious risks to our critical infrastructure and thus national security.” Qualys Qualys lems with them, in order to give secure voting advocates the ammunition they need to convince Congress and local o cials to take action into im-
 B Y M A R R I A N Z H O U / S E P T E M B E R 2 7, 2 0 1 8 1 1 : prove
 5 2 A MAmerica's
 PDT voting security. The machine in question, the ES&S M650, is used for counting both regular and absentee ballots. The device from Election Systems & Software of Omaha,
 In four steps to be taken, the report claims that Congress must take action, and also fund Nebraska, is essentially a networked high-speed scanner like those used for scanning standardized-test sheets, usually run on a network at the county clerk's office.
 Whether it's showing that "secure" rmware can be dumped with a $15 electronic component or that voting systems can be hacked in minutes, the Based on the QNX 4.2 operating system—a real-time operating system developed and marketed by BlackBerry, currently up to version 7.0—the M650 uses Iomega
 election security as “no state or local government will ever be able to raise enough capital to Zip drives to move election data to and from a Windows-based management system. It also stores results on a 128-megabyte SanDisk Flash storage device directly
 Voting Village researchers do yeoman duty, compiling comprehensive reports on the dismal state of America's voting machines, nearly 20 years af-
 defend itself from a determined nation state” and security standards must be funded and ter Bush v Gore put the country on notice about the defective systems behind our elections. mounted on the system board. The results of tabulation are output as printed reports on an attached pin-feed printer.
 implemented.
 This year's report is the most alarming yet: it singles out the ES&S M650 tabulating machine, manufactured by Election Systems & So ware of Om- The report authors—Matt Blaze of the University of Pennsylvania, Jake Braun of the University of Chicago, David Jefferson of the Verified Voting Foundation, Harri
 Hursti and Margaret MacAlpine of Nordic Innovation Labs, and DEF CON founder Jeff Moss—documented dozens of other severe vulnerabilities found in voting
 aha, Nebraska, which still has outstanding defects that were reported to the manufacturer a decade ago. The M650's manifest unsuitability is so terri-
 The other points called for a “Crisis Communications Plan” as State and local government systems. They found that four major areas of "grave and undeniable" concern need to be addressed urgently. One of the most critical is the lack of any sort of
 ble that it would be funny if it wasn't so serious: this is a machine that uses an operating system developed for the Blackberry phone (!) and then uses
 election results web pages are “the most insecure component of our election infrastructure,” 12 FEB 2015 5 FEB 2015 supply-chain security for voting machines—there is no way to test the machines to see if they are trustworthy or if their components have been modified.
 Zip cartridges (!!) to move data around.
 and while many local election officials have advocated for Congress to act and fund robust February Patch Encryption Under
 security practices, the report said it is not enough. The M650 is one of the most widespread pieces of equipment in American election systems, used to count in-person and absentee ballots by optical- Yikes!
 Update - Sponsored Attack: Government
 ly scanning ballot papers whose bubble-in forms have been lled in by voters. The system -- connected to the internet by default -- is used for coun-
 by Qualys vs Privacy ty-wide tabulations in 23 states. As the report states: "Hacking just one of these machines could enable an attacker to ip the Electoral College and de- "If an adversary compromised chips through the supply chain," the report notes, "they could hack whole classes of machines across the US, remotely, all at once."
 “National security leaders must also remind Congress daily of the gravity of this threat and And despite the claim by manufacturers that the machines are secure because they are "air gapped" from the Internet during use, testing over the last two years at
 termine the outcome of a presidential election."
 national security implications,” it said. “It is the responsibility of both current and former DEF CON discovered remote hacking vulnerabilities requiring no physical access to the voting machines.
 national security leaders to ensure Congress does not myopically view these issues as election The researchers identi ed defects in other systems, too: one could be compromised in two minutes, less time than it takes the average voter to cast a
 administration issues but rather the critical national security issues they are.” Related to This Story ballot on it. Another could be wirelessly hacked with a nearby mobile device and made to register an arbitrary number of votes. The report goes on
 to warn about attacks on voting machine supply chains, which could compromise whole batches of machines before they even reached the polling
 place.
 DEF CON officials said that among the “dozens of vulnerabilities identified in the last two
 years” of the Voting Village, the insecure supply chain, capability for remote attacks despite #DEFCON Vote Hacking Village Refute NASS 'Unfair' As always, this year's Voting Village report closes with a set of clear, sensible recommendations, focusing on legislative and regulatory action as well
 insistence that the machines are ‘air gapped’, the ability to hack a machine in an average of Claims as technical advice for manufacturers and electoral o cials making purchase decisions.

 six minutes and failure to fix serious flaws all prove a persistent problem. This summer, Senate Republicans killed bipartisan legislation to fund additional cybersecurity funding for American election systems.
 #DEFCON DHS Says Collaboration Needed for
 “The failure to fix existing, reported vulnerabilities and the disconnect between the reports of Secure Infrastructure and Elections The machine in question, the ES&S M650, is used for counting both regular and absentee ballots. The device from Election Systems & So -
 ware of Omaha, Nebraska, is essentially a networked high-speed scanner like those used for scanning standardized-test sheets, usually run on a
 election security experts and the reactions of some election equipment vendors speaks
 network at the county clerk's o ce. Based on the QNX 4.2 operating system—a real-time operating system developed and marketed by Black-
California's voting makeover: All 58 counties race to update voting systems by 2020
 Most California counties think they will make the deadline to update their voting systems, but 10 are requesting exemptions or extensions.

 California's 58 counties race to update voting systems by 2020
 MAY 29, 201902:54

 May 29, 2019, 1:06 PM CDT

 By Kevin Monahan, Cynthia McFadden and Adiel Kaplan
https://www.nbcnews.com/
politics/2020-election/ SANTA ANA, Calif. — A sprawling warehouse on South Grand Avenue holds the 11,000 voting machines that Orange County,
 California — the nation's fifth-largest voting district — has used in its elections for the past two decades. Every single one of them is
california-s-58-counties-
 about to become scrap metal, thanks in part to the stroke of a state official's pen.
must-update-voting-
systems-march-or- California Secretary of State Alex Padilla has long been concerned about the vulnerability of the nation's voting machines. "We have
 done more to respond to hanging chads," he told NBC News, "than we have done to respond to Vladimir Putin and the threats by
n1009041 Russian intelligence officials against our elections."
California's voting makeover: All 58 counties race to update voting systems by 2020
 Most California counties think they will make the deadline to update their voting systems, but 10 are requesting exemptions or extensions.

The problem is not unique to California, as states across the country scramble
to deal with outdated voting technology before 2020. A study by the Brennan
Center for Justice shows that 38 states use discontinued voting machines —
machines that are no longer manufactured — in one or more jurisdictions.
Another seven states use voting machines that have been discontinued in
every jurisdiction. That means only five states don't use at least some
 California's 58 counties race to update voting systems by 2020

machines that are no longer manufactured.
 MAY 29, 201902:54

 May 29, 2019, 1:06 PM CDT

 By Kevin Monahan, Cynthia McFadden and Adiel Kaplan
https://www.nbcnews.com/
politics/2020-election/ SANTA ANA, Calif. — A sprawling warehouse on South Grand Avenue holds the 11,000 voting machines that Orange County,
 California — the nation's fifth-largest voting district — has used in its elections for the past two decades. Every single one of them is
california-s-58-counties-
 about to become scrap metal, thanks in part to the stroke of a state official's pen.
must-update-voting-
systems-march-or- California Secretary of State Alex Padilla has long been concerned about the vulnerability of the nation's voting machines. "We have
 done more to respond to hanging chads," he told NBC News, "than we have done to respond to Vladimir Putin and the threats by
n1009041 Russian intelligence officials against our elections."
I know, let’s vote on the Internet!
The pitch: Convenience, turnout, cost
Similar arguments in favor of vote-by-mail
Vote from the convenience of your home!
We can do banking on the Internet! Why not voting?
We’ll just use blockchain, that will solve it!
The pitch: Convenience, turnout, cost
Similar arguments in favor of vote-by-mail
Vote from the convenience of your home!
We can do banking on the Internet! Why not voting?
We’ll just use blockchain, that will solve it!
Issue #0: Not everybody has a computer
 You’re making voting more accessible to some people, but not others
Figure 3: Households with Internet Access
 Households with Internet Access

 90

 80

 70
 Source: A Comparative
 60
 Assessment of Electronic
 Voting (Feb. 2010), Canada-
 Percentage

 50

 40 Europe Transatlantic Dialog
 30 http://www.elections.ca/res/
 20 rec/tech/ivote/comp/
 10 ivote_e.pdf
 0
 2001 2002 2003 2004 2005 2006 2007
 Year

 Canada Switzerland United Kingdom Estonia
Issue #0: Not everybody has a computer
 You’re making voting more accessible to some people, but not others
Figure 3: Households with Internet Access
 Households with Internet Access

 90

 80

 Case studies of
 70
 prior Internet / Source: A Comparative
 60 phone voting pilot Assessment of Electronic
 projects.
 Voting (Feb. 2010), Canada-
 Percentage

 50

 40 Europe Transatlantic Dialog
 30 http://www.elections.ca/res/
 20 rec/tech/ivote/comp/
 10 ivote_e.pdf
 0
 2001 2002 2003 2004 2005 2006 2007
 Year

 Canada Switzerland United Kingdom Estonia
SECTIONS NIGHTLY NEWS MEET THE PRESS DATELINE

Issue #1: Local coercion
 INVESTIGATIONS

 DISCUSS AS:
 Sign in

 The real vote-fraud opportunity has arrived:
 casting your ballot by mail
 Tuesday Sep 25, 2012 7:13 AM
 EMAIL

 From a continuing series of articles, Who Can Vote?, a News21 investigation of voting
 rights in America. Read the full series.

 By Sarah Jane Capper and Michael Ciaglo

Also an issue with vote-by-mail: you’re not in a
 News21

 In the partisan controversies over
 changes in voter eligibility and

secure polling place
 voter ID requirements, the growth
 of mail voting and no-excuse
 absentee voting have received
 little attention. While voter-
 impersonation fraud at the polls

No requirement for voter anonymity
 is nearly unheard of, both sides in
 the voter fraud debate
 acknowledge that absentee
 ballots are susceptible to fraud.

 Early voting has begun, and more Michael Ciaglo/News21

Allows for bribery, coercion, retribution
 Americans than ever are Jason Randall, 26, places his mail-in ballot in a drop
 expected to vote by mail this fall box outside the Lane County Elections Office in
 in the presidential, state and local Eugene, Ore. Although Oregon conducts all of its
 elections. A gradual loosening of elections by mail, residents have the option of
 absentee voting laws in many mailing their ballots or returning them at drop boxes
 states, especially in the West, and located throughout the county.
 universal mail voting in Oregon
 Texas Public Policy Foundation and Washington have contributed to a significant shift in how Americans vote.

 In 1972, less than 5 percent of American voters used absentee ballots, according to

 LEGISLATORS’ GUIDE TO
 census data. By 2010, almost 16 percent of votes cast in the 2010 general election were
 absentee ballots, and nearly 5 percent more were mail ballots, according to the U.S.
 Election Assistance Commission's Election Administration and Voting Survey. If in-person
 early voters are counted, nearly 30 percent of the voters in 2010 did not go to the polls on

 THE 85th LEGISLATURE
 Election Day.

 "By 2016, casting a ballot in a traditional
 polling place will be a choice rather than a
 requirement," said Doug Chapin, a University
 Discuss this series of stories on the
 of Minnesota researcher and director of the
 Facebook page for Open Channel, the
 Program for Excellence in Election
 NBC News investigative blog.
 Administration. "There will still be people
 who go to the polling place because it's
 familiar, it's convenient, it's traditional. I think

 S P E C I A L S E S S I O N 2 0 1 7
 there will be fewer of those places."

 More susceptible to fraud

Cracking Down on Mail-in Ballot Fraud Election fraud is rare, but it usually involves absentee or mail ballots, said Paul Gronke, a
 Reed College political scientist, who directs the Early Voting Information Center in
 Oregon. He cites what he calls a classic example of election fraud, a local official
 stealing votes by filling out absentee ballots. That was the case in Lincoln County, W.Va.,

The Issue ended. Election law prohibits a polling place staffed by paid agents where the sheriff and clerk pleaded guilty to distributing absentee ballots to unqualified
 voters and helping mark them during a 2010 Democratic primary.
 of one candidate or one political party, yet, ballot harvesters are
 Mail-in ballot fraud is “‘the tool of choice’ for those who are functionally the same in many key respects as election judges.
 Curtis Gans, director of the Center for the Study of the American Electorate, said vote-
 buying and bribery could occur more easily with mail voting and absentee voting. At a
engaging in election fraud.” polling place, someone who bribed voters would have no way to verify that the bribe
 worked. A person who bribes mail voters could watch as they mark ballots or even mark
 Once rare and only used when voters knew they were going The Facts ballots for them.

to be out of town on Election Day, mail-in ballots have become Gans also points to the potential to influence voters in gatherings that some call ballot-
 • Texas first allowed absentee voting in 1917; voting by mail signing parties. A caregiver could mark a dependent's ballot.
Issue #2: Your computer is insecure

 1-2% of U.S.
 computers have
malware on them.
 Maybe much
 more.
Issue #2a: Older computers are worse
Issue #2a: Older computers are worse

 } Obsolete Android versions
 with dangerous security holes
 (3.8%).

 }
 Android versions which
 support newer security
 features (e.g., “hardware
 attestation”) that would be
 useful (57.9%).
Issue #3: Unreliable Internet
 Home Video World US & Canada UK Business Tech Science Stories Ente

 World Africa Asia Australia Europe Latin America Middle East

 How a cyber attack transformed Estonia
 By Damien McGuinness
 BBC News, Tallinn, Estonia

 27 April 2017

Attackers could do “denial of service” attacks against
election officials
Knock servers offline, unable to receive votes GETTY IMAGES

 It all began when Estonian authorities decided to move a memorial to the Soviet Red Army to a

The Russians (allegedly) did this to Estonia in 2007
 position of less prominence in the capital, Tallinn

 Cyber-attacks, information warfare, fake news - exactly 10 years ago Estonia
 was one of the first countries to come under attack from this modern form of

A 2014 independent study found many more issues
 hybrid warfare.

 It is an event that still shapes the country today.

https://estoniaevoting.org/
 Head bowed, one fist clenched and wearing a World War Two Red Army uniform,
 the Bronze Soldier stands solemnly in a quiet corner of a cemetery on the edge of
 the Estonian capital Tallinn.

 Flowers have been laid recently at his feet. It is a peaceful and dignified scene. But
 in April 2007 a row over this statue sparked the first known cyber-attack on an
 entire country.

 The attack showed how easily a hostile state can exploit potential tensions within
 another society. But it has also helped make Estonia a cyber security hotshot today.

 From outrage to outage
 Unveiled by the Soviet authorities in 1947, the Bronze Soldier was originally called
 "Monument to the Liberators of Tallinn". For Russian speakers in Estonia he
 represents the USSR's victory over Nazism.

 But for ethnic Estonians, Red Army soldiers were not liberators. They are seen as
 occupiers, and the Bronze Solider is a painful symbol of half a century of Soviet
 oppression.

 In 2007 the Estonian government decided to move the Bronze Soldier from the
 centre of Tallinn to a military cemetery on the outskirts of the city.

 The decision sparked outrage in Russian-language media and Russian speakers
 took to the streets. Protests were exacerbated by false Russian news reports
Best  practices  for  HTTPS  include  supporting  the  newest  version,  TLS  1.2,  of  the  protocol  which
 resolves  certain  vulnerabilities  in  earlier  versions  (such  as  1.0),  prioritizing  the  use  of  at  least

Issue #4: The election server is insecure
 128-­bit  encryption,  and  disallowing  anything  less  than  128-­bits.  Servers  should  mitigate  certain
 attacks  that  emerge  with  the  use  of  TLS  compression  (e.g.,  the  CRIME  attack),  TLS
 renegotiation,  CBC-­mode  block  ciphers  in  1.0  and  earlier  (e.g.,  the  BEAST  attack),  and  the  RC4
 stream  cipher  (we  cannot  rule  out  the  applicability  of  these  attacks,  although  we  note  they  do
 require  specific  assumptions  that  may  not  apply  to  specific  voting  systems).  Finally,  it  is
 advisable  to  use  a  key  exchange  algorithm  that  provides  forward  secrecy  (i.e.,  DHE  or  ECDHE)
 which  will  ensure  that  a  future  compromise  of  the  election  server’s  HTTPS  key  (potentially  years
 after  the  election)  will  not  reveal  how  voters  voted.

Many vendors get even the basics Of  the  three  vendors,  Dominion  had  the  best  SSL/TLS  server  configuration:

wrong (here, encryption settings) ● Scytl’s  grade:  B  (source:  SSL  Labs  Grade  for  demo.scytl.com).  Scytl’s  server  gets  a
 mediocre  score  for  its  TLS  configuration.  Issues  include:  not  supporting  TLS  1.1  or  1.2;;
 allowing  the  use  of  weak  key  lengths  (via  56-­bit  DES);;  and  for  not  explicitly  preferring

 • Internet Voting for Persons
 stronger  connections  over  DES.  Scytl’s  server  also  supports  TLS  compression,  a  known
 vulnerability.  While  the  server  supports  cipher  modes  that  provide  forward  secrecy,  it

 with Disabilities - Security does  not  explicitly  prefer  them.  Scytl’s  use  of  client-­side  encryption  may  moot  this  point  if
 the  client-­side  encryption  uses  a  semantically  secure  (randomized)  encryption  algorithm

 Assessments of Vendor
 (though  we  were  not  able  to  confirm  it).

 Proposals (2014)
 ● Dominion’s  grade:  A  (source:  SSL  Labs  Grade  for  intvoting.com).  Dominion’s  server
 gets  a  strong  score  for  its  TLS  configuration.  It  supports  TLS  1.2  and  only  offers
 encryption  with  at  least  128  bits.  It  is  not  perfect  as  it  prefers  RC4,  which  mitigates
 BEAST,  but  has  its  own  vulnerabilities  (see  the  Traffic  Analysis  section  below),  and  it
 • Commissioned by the City of does  not  offer  forward  secrecy  at  all.

 Toronto ● Everyone  Counts’  grade:  B  (source:  SSL  Labs  Grade  for  elect.everyonecounts.com).
 Everyone  Counts’  server  gets  a  mediocre  score  for  its  TLS  configuration.  It  support  TLS
 1.2,  prefers  to  use  strong  256-­bit  encryption,  but  does  support  weak  (56  bit)  DES

https://s3.amazonaws.com/ encryption.  It  does  not  explicitly  mitigate  BEAST  server-­side.  It  offers  and  prefers  forward
 secrecy.

s3.documentcloud.org/documents/ We  note  again  that  the  grading  scheme  is  not  our  own,  and  it  is  designed  for  general  purpose

1310860/toronto-internet-voting-security- HTTPS  configurations,  however  we  believe  it  is  a  useful  benchmark  to  establishing  the  degree  to
 which  the  vendors  comply  with  best  practices.

report.pdf
 FOI Request 2014-01542
 Page 182
Best  practices  for  HTTPS  include  supporting  the  newest  version,  TLS  1.2,  of  the  protocol  which
 resolves  certain  vulnerabilities  in  earlier  versions  (such  as  1.0),  prioritizing  the  use  of  at  least

Issue #4: The election server is insecure
 128-­bit  encryption,  and  disallowing  anything  less  than  128-­bits.  Servers  should  mitigate  certain
 attacks  that  emerge  with  the  use  of  TLS  compression  (e.g.,  the  CRIME  attack),  TLS
 renegotiation,  CBC-­mode  block  ciphers  in  1.0  and  earlier  (e.g.,  the  BEAST  attack),  and  the  RC4
 stream  cipher  (we  cannot  rule  out  the  applicability  of  these  attacks,  although  we  note  they  do
 require  specific  assumptions  that  may  not  apply  to  specific  voting  systems).  Finally,  it  is
 advisable  to  use  a  key  exchange  algorithm  that  provides  forward  secrecy  (i.e.,  DHE  or  ECDHE)
 which  will  ensure  that  a  future  compromise  of  the  election  server’s  HTTPS  key  (potentially  years
 after  the  election)  will  not  reveal  how  voters  voted.

Many vendors get even the basics Of  the  three  vendors,  Dominion  had  the  best  SSL/TLS  server  configuration:

wrong (here, encryption settings) ● Scytl’s  grade:  B  (source:  SSL  Labs  Grade  for  demo.scytl.com).  Scytl’s  server  gets  a
 mediocre  score  for  its  TLS  configuration.  Issues  include:  not  supporting  TLS  1.1  or  1.2;;
 Of the proposals evaluated in the context of the
 allowing  the  use  of  weak  key  lengths  (via  56-­bit  DES);;  and  for  not  explicitly  preferring

 • Internet Voting for Persons [Toronto, Canada] RFP process, it is our opinion that
 stronger  connections  over  DES.  Scytl’s  server  also  supports  TLS  compression,  a  known
 vulnerability.  While  the  server  supports  cipher  modes  that  provide  forward  secrecy,  it

 with Disabilities - Security no proposal provides adequate protection against
 does  not  explicitly  prefer  them.  Scytl’s  use  of  client-­side  encryption  may  moot  this  point  if
 the  client-­side  encryption  uses  a  semantically  secure  (randomized)  encryption  algorithm
 the risks inherent in internet voting. It is our
 Assessments of Vendor
 (though  we  were  not  able  to  confirm  it).

 recommendation, therefore, that the City not
 Proposals (2014)
 ● Dominion’s  grade:  A  (source:  SSL  Labs  Grade  for  intvoting.com).  Dominion’s  server

 proceed with internet voting in the upcoming
 gets  a  strong  score  for  its  TLS  configuration.  It  supports  TLS  1.2  and  only  offers
 encryption  with  at  least  128  bits.  It  is  not  perfect  as  it  prefers  RC4,  which  mitigates
 municipal election. If the City, contrary to this
 BEAST,  but  has  its  own  vulnerabilities  (see  the  Traffic  Analysis  section  below),  and  it
 • Commissioned by the City of does  not  offer  forward  secrecy  at  all.
 recommendation, remains committed to the use of
 Toronto ● Everyone  Counts’  grade:  B  (source:  SSL  Labs  Grade  for  elect.everyonecounts.com).
 internet voting, we advise that the system be limited
 Everyone  Counts’  server  gets  a  mediocre  score  for  its  TLS  configuration.  It  support  TLS

 to voters with disabilities, and not offered to the
 1.2,  prefers  to  use  strong  256-­bit  encryption,  but  does  support  weak  (56  bit)  DES

https://s3.amazonaws.com/ encryption.  It  does  not  explicitly  mitigate  BEAST  server-­side.  It  offers  and  prefers  forward
 electorate
 secrecy. at large.
s3.documentcloud.org/documents/ We  note  again  that  the  grading  scheme  is  not  our  own,  and  it  is  designed  for  general  purpose

1310860/toronto-internet-voting-security- HTTPS  configurations,  however  we  believe  it  is  a  useful  benchmark  to  establishing  the  degree  to
 which  the  vendors  comply  with  best  practices.

report.pdf
 FOI Request 2014-01542
 Page 182
You can also read