NSW 2015 state election - electronic voting securely in the digital age - Ian Brightwell

Page created by Brian Webster
 
CONTINUE READING
NSW 2015 state election - electronic voting securely in the digital age - Ian Brightwell
NSW  2015  state  election  -­
                                      electronic  voting  securely  
                                      in  the  digital  age

                                       Ian  Brightwell              Clinton  Firth
                                       CIO                          General  Manager
                                       NSW  Electoral  Commission   CSC  Cybersecurity  ANZ

CSC  Proprietary  and  Confidential                                                           August  6 ,  2 015   1
NSW 2015 state election - electronic voting securely in the digital age - Ian Brightwell
What  will  be  covered
                                      1. What  is  iVote?
                                      2. Why  use  it?
                                      3. Sentiment  analysis  
                                      4. Security  and  trust
                                      5. Problems  with  paper  voting?
                                      6. Comparative  risks
                                      7. Threat  based  security  design
                                      8. Monitoring  – both  inside  and  outside  the  “walls”

CSC  Proprietary  and  Confidential                                                               August  6 ,  2 015   2
NSW 2015 state election - electronic voting securely in the digital age - Ian Brightwell
practise.ivote.nsw.gov.au

                                      What  is  iVote?
                                      1. Remote  electronic  voting  system  for  web  
                                         or  telephone:
                                         • Web  browser  over  internet  (including  mobiles)
                                         • DTMF  phone  over  PSTN
                                         • Human  operator  using  voice  from  telephone  to  web  
                                           browser  (only  in  2015)
                                      2. Registration  required  with  eligibility   only:
                                         • For  blind,  disabled,  remote  and  interstate  or  overseas
                                         • During  early  voting  period  (two  weeks  before  election  day)  
                                      3. Used  at  the  NSW  Parliamentary  election  in  March:
                                         • 2011  took  votes  for  46,864  electors  plus  6  by-­elections
                                         • 2015  took  votes  for  286,669  electors  
                                      4. Not  to  replace  ordinary  paper  ballots  voted  inside  elector’s  
                                         electorate  (over  80%  of  votes  at  federal  elections  currently  are  
                                         ordinary)
CSC  Proprietary  and  Confidential                                                                               August  6 ,  2 015   3
NSW 2015 state election - electronic voting securely in the digital age - Ian Brightwell
Why  use  iVote?  (no  particular  order)
                                      • Allow  independent  voting  for  blind  and  low  vision  
                                        voters  (BLV  want  all  electors  to  use  it)
                                      • Increase  participation  outside  NSW  voting  (about  20k  extra  votes  in  
                                        2011)
                                      • Potentially  greater  electoral  integrity  than  paper  votes  (see  Keelty and  
                                        ANAO  Report)
                                      • Replace  postal  voting (first  class  mail  may  not  exist  in  5  to  10  years  
                                        AustPost CEO)
                                      • Postal  voting  failing  overseas  voters  (over  60%  of  postal  decs not  
                                        returned)
                                      • Has  been  used  successfully by  other  jurisdictions  (Norway,  
                                        Switzerland,  Estonia)
                                      • More  accurate  result
                                      • Electors  want  it  (most  common  question  asked,  over  90%  of  iVoters  
                                        want  it,  see  NSWEC  2011  iVote  Report)
CSC  Proprietary  and  Confidential                                                                               August  6 ,  2 015   4
NSW 2015 state election - electronic voting securely in the digital age - Ian Brightwell
iVote sentiment  analysis  

                                                                                                             Neither  
                                                                      Very       Fairly         Total                          Fairly           Very  
                                      Mode  of  Voting              satisfied   satisfied   Satisfaction
                                                                                                           satisfied  nor  
                                                                                                           dissatisfied
                                                                                                                            dissatisfied     dissatisfied

                                      Election  Day  attendance  
                                      voting
                                                                     49%         37%          86%              4%              6%                     4%

                                      Pre-­poll  attendance  
                                      voting
                                                                     70%         23%          93%              2%              4%                     1%

                                      Postal  voting                 73%         22%          95%              0%              2%                     4%

                                      iVote                          80%         17%         97%*              1%              1%                     0%

                                                                                                                   *  Increase  from  2011  which  was  92%

CSC  Proprietary  and  Confidential                                                                                              August  6 ,  2 015        5
NSW 2015 state election - electronic voting securely in the digital age - Ian Brightwell
iVote security  and  trust
                                      • In  telephone  survey  9%  had  heard  news  about  iVote of  which  65%  of  
                                        them  said  the  news  was  negative,  with  28%  in  telephone  and  41%  online  
                                        survey  hearing  news  that  was  about  security  issues

                                      • 86%  to  90%  of  iVoters surveyed  trusted  the  iVote process
                                      • 1.7%  iVoters used  verification  service,  of  which  80%  to  87%  of  those  
                                       surveyed  did  so  to  be  confident  that  their  vote  was  successful

                                      • 91%  of  verification  service  users  were  satisfied or  very  satisfied  with  
                                       the  verification  service  

                                      • Overall  98% of  respondents  said  they  would  recommend  using  iVote

CSC  Proprietary  and  Confidential                                                                           August  6 ,  2 015   6
NSW 2015 state election - electronic voting securely in the digital age - Ian Brightwell
Problems  with  paper  voting?
                                      • Relies  on  trusting the  electoral  authority  and  staff

                                      • Partisan  scrutiny is  the  only  independent  check
                                      • Partisan scrutiny is  not  truly  independent

                                      • Voter  can not  check  their  vote  was  counted  correctly
                                      • Initial  count  is  often  of  poor  quality and  not  fully  scrutinised

                                      • Count  variances  are  not  justified  we  just  say:  “Last  count  best  count”

CSC  Proprietary  and  Confidential                                                                          August  6 ,  2 015   7
NSW 2015 state election - electronic voting securely in the digital age - Ian Brightwell
Comparative  risks
                                                                                                                                        Mitigation
                                      Risk                                                  Paper  Ballots                                                                 Electronic  Voting
                                                                    Using  the  current  paper  ballot  approach                Similar  to  current  paper  ballot  approach  
                                                                    potential  voters  only  require  a  verbal  declaration   requirement  but  with  option  to  provide  additional  
                                      Impersonation                 identifying  themselves.  The  declaration  requires   information  such  as  drivers  licence  or  passport  
                                                                    them  to  know  a  name,  DoB and  address  on  the   number  or  be  sent  a  registration  
                                                                    roll                                                        acknowledgement  to  their  enrolled  address
                                                                    Elector  can  vote  incorrectly  causing  their  vote  to  
                                      Cast  as                                                                                  Guided  to  ensure  vote  complies  with  formality  
                                                                    be  informal.  General  informality  for  paper  
                                                                                                                                rules.  Must  make  active  decision  to  cast  informal  
                                      intended                      ballots  between  3%  to  6%
                                                                                                                                vote.  Informality  typically  about  1%
                                                                    Once  the  ballot  paper  is  placed  in  the  ballot  box  
                                                                                                                                                       Voter  can  verify  their  vote  has  been  decrypted  
                                                                    the  voter  must  trust  the  Commission.  
                                      Captured*  as                                                                                                    by  personally  checking  the  vote  appears  on  
                                                                    Independent  scrutiny  is  sporadic  and  mainly  
                                                                                                                                                       receipt  website.  Also  independent  auditor  will  
                                      Cast                          focused  on  polling  place  votes.  The  30%  of  
                                                                                                                                                       confirm  the  votes  decrypted  match  the  votes  
                                                                    declaration  votes  are  typically  counted  without  
                                                                                                                                                       available  for  verification
                                                                    independent  scrutiny
                                                                                                                           Published  preference  data  which  is  validated  by  
                                      Counted  as                                                                          auditors  and  electors  can  be  counted  by  anyone  
                                                                    Trust  the  Commission  staff  manually  counts  the  
                                                                                                                           to  check  the  count  is  correct.  Compare  to  paper  
                                      Captured*                     ballot  papers  correctly
                                                                                                                           ballot results

                                      *  Captured  -­ is for  paper  ballots  when  the  ballot  box  is  emptied or  declaration   envelope   is  opened  or  for  iVote  is  when  the  ballots  are  decrypted.

CSC  Proprietary  and  Confidential                                                                                                                                                                          August  6 ,  2 015   8
NSW 2015 state election - electronic voting securely in the digital age - Ian Brightwell
Comparative  risks  (continued)
                                                                                                        Mitigation
                                      Risk                               Paper  Ballots                                           Electronic  Voting
                                                                                                                        Vote  encrypted by  voter’s  computer  and  not  
                                                                                                                        accessible  by  the  Commission  or  others  until  
                                                        It  is  difficult  to  identify  evidence of  vote  
                                      Tampering                                                                         decrypted.  Decrypted  votes  matched  to  verified  
                                                        tampering  with  paper  ballots
                                                                                                                        votes  to  ensure  valid.  Compare  to  paper  ballots
                                                                                                                        results
                                                                                                                        Ongoing  monitoring  of  registrations  against  votes  
                                      Ballot  Box                                                                       would  identify  stuffing  at  time  it  occurs  and  
                                                        It  is  difficult  to  identify  evidence  of  ballot  papers  
                                                                                                                        potentially  allow  added  papers  to  be  identified  
                                      “Stuffing”        which  may  resulted from  ballot  box  “stuffing”
                                                                                                                        and  removed.  Compare  to  paper  ballots  results

                                                        Integrity  of  paper based  elections  relies  on          Combination  of  technology and  procedures  give  
                                      Integrity         Commission  staff  following  procedures  and              the  ability  to  be  confident  votes  are  counted  as  
                                                        being  trusted                                             cast.  Compare  to  paper  ballots results
                                                        Ballot  secrecy  is  persevered  in  ordinary polling  
                                                                                                                   Voter identity  is  held  separately  from  the  actual  
                                                        place  voting  but  secrecy  could  be  breached  for  
                                                                                                                   preferences  voted  by  a  given  voter.  Voters  can  
                                      Ballot  Secrecy   declaration  votes  as  the  voter’s  details  are  
                                                                                                                   not  be  associated  with  their  vote  without  very  
                                                        available  to  Commission  staff  at  the  time  of  
                                                                                                                   significant  breaches  of  multiple  systems  security
                                                        opening  the  declaration  envelope

CSC  Proprietary  and  Confidential                                                                                                                       August  6 ,  2 015       9
NSW 2015 state election - electronic voting securely in the digital age - Ian Brightwell
New  approach  to  cyber

                                         Military   have  long  used                    Threats  traverse  ALL  in  a  
                                                intelligence                                global  cyber  war

                                              Threats  evolve                              Integrate  threat  data
                                               and  calibrate                                 with  monitoring  

                                                           “If  you  know  the  enemy  and  know  yourself,  you  need  
                                                                         not  fear  the  result  of  a  hundred  battles...”
CSC  Proprietary  and  Confidential                                                             -­ Sun  Tzu,  the  Art  of  War
                                                                                                                      August  6 ,  2 015   10
New  approach  to  cyber

CSC  Proprietary  and  Confidential                              August  6 ,  2 015   11
Strategic  Threat  Assessment

                                           Research
                                                                             Threat  Actor  
                                           &  Analysis
                                                                              Monitoring

                                                            Wargame,
                                                         Test  and  Assess

CSC  Proprietary  and  Confidential                                                   August  6 ,  2 015   12
iVote cyber  events

                                      • Chatter
                                        – “Suspension” to  correct  ballot
                                        – “Researcher” articles
                                        – Positive  
                                      • Vulnerabilities   (not  exploited)
                                        – FREAK
                                        – Bar  mitzvah
                                      • Overall
                                        – Comparatively  minimal  events

CSC  Proprietary  and  Confidential                                          August  6 ,  2 015   13
iVote registrations

CSC  Proprietary  and  Confidential                         August  6 ,  2 015   14
Events  triggered  by  location

CSC  Proprietary  and  Confidential                                     August  6 ,  2 015   15
Threat  actor  monitoring

CSC  Proprietary  and  Confidential                               August  6 ,  2 015   16
iVote attack  timeline

CSC  Proprietary  and  Confidential                            August  6 ,  2 015   17
iVote physical  events
                                      • Physical
                                       – Town  hall  breach
                                      • Logistics
                                       – 60%  overseas  postal  votes  
                                         not  returned
                                       – Difficult  to  reconcile  
                                         movement  of  declaration  
                                         votes
                                      • Manual  handling  
                                        inconsistencies
                                       – Unable  to  reconcile  ballot  
                                         papers  in  final  count  ballots  
                                         counted  at  the  issuing  point

CSC  Proprietary  and  Confidential                                            August  6 ,  2 015   18
Summary
                                      • iVote restricted  eligibility

                                      • Cybersecurity  forefront  of  design
                                      • Minimal  security  events

                                      • Comparative  risk
                                      • Public  success

CSC  Proprietary  and  Confidential                                            August  6 ,  2 015   19
MORE  INFORMATION

                                                         General  Information   on  iVote
                                                          https://www.ivote.nsw.gov.au

                                                               NSWEC  iVote reports
                                      https://www.elections.nsw.gov.au/about_us/plan
                                                          s_and_reports/ivote_reports

                                                        ANAO  Elections  Audit  Report
                                           http://www.anao.gov.au/Publications/Audit-­
                                         Reports/2014-­2015/Second-­Follow-­up-­Audit-­
                                        into-­the-­AEC-­Preparation-­for-­and-­Conduct-­of-­
                                                     Federal-­Elections/Audit-­summary

                                                         AEC  Report  into  WA  Election
                                                  http://www.aec.gov.au/media/media-­
                                                            releases/2013/12-­06a.htm

                                                                  Killesteyn Report
                                      http://www.law.unimelb.edu.au/files/dmfile/WP_
                                                                 26_Killesteyn1.pdf

                                      NSWEC  Strategic  Threat  Assessment  report
                                                         Example  report  (abridged)

                                                               CSC  Cybersecurity  site
                                                      http://www.csc.com/cybersecurity

                                                                     CSC  Whitepaper
                                                        CSC  Whitepaper  – Intelligence  
                                                         Driving  Security  Governance
CSC  Proprietary  and  Confidential                                August  6 ,  2 015   20
You can also read