Posted on 10/23/2006 7:18:25 PM PDT by wouldntbprudent
What will happen in November? Are electronic voting machines secure? One need not believe in a vast plot to rig the elections to take those questions seriously and to be pessimistic about the answers.
When Princeton researchers announced in September that the Diebold Accuvote TS voting machine software was vulnerable to tampering, it was the first time that independent computer scientists had confirmed the weaknesses long suspected in techie circles. A few days later, in a minute-and-a-half segment on Fox News, Professor Edward Felten demonstrated just how easy it would be to steal an election (to which the blonde and tanned anchors responded with the canned surprise you'd expect from a demonstration of a new food processor).
(Excerpt) Read more at cbsnews.com ...
No system is secure without physical control over the equipment, in the form of watchful eyes and chain-of-custody throughout all the relevant processes.
It's not the lock on the machine that matters, it's the person(s) charged with keeping eyes on the machine.
Given that the machine will be alone in the voting booth with the voters, there's no way for people to keep an eye on it. Hence the need for locks.
One might argue that allowing people private access not only to their own ballot, but the device that stores all the others, is a bad idea. I'd be inclined to agree. In optical-scan systems or even manual paper-ballot systems, voters mark their ballots within a private booth but then insert them into the ballot box in view of the poll watchers.
Still, having a machine which is well secured with locks that can only be opened by trusted people, and which is within earshot of poll watchers, is probably adequate. Someone with the proper low-security key may be able to tamper with a voting machine silently. Someone without a key isn't going to be able to force a well-designed locking system without being heard.
What booth? The machines just sit there in a row, and there's a shade around the screen so others can't see it. What's wrong with that?
It really just doesn't matter that the votes are tabulated electronically or mechanically. The security processes are ultimately going to be the same or similar, and ~all~ systems can be gamed if somebody has the time, the money and the inclination.
The Daley's in Chicago were rigging elections long before they had electric ~light~ in the polling places, let alone electric voting machines. :-)
It's pretty easy, at least if one isn't concerned about people using advanced forensic techniques on the machines in question. If one is only concerned about removing all trace from a file-level view, it's really easy. The fake software, upon installing itself, renames the old version. Then, when the fake software is run for the last time, it deletes itself from the disk/flash (still running in RAM) and then renames the old version back to its proper name.
If one is worried about people doing sector-level analysis, things are a bit tougher. For best stealth, one should identify some highly-compressible files in the original installation. Compress them, and put the malware in the space that's freed up. The last time the malware is run, it should uncompress those files and put them back where they belong.
Why do you regard these techniques as some impossible magic? The techniques have been common in bootloader design for a long time.
Horse. Barn door.
If in a particular election, some machines are found to have been compromised and the number of voters who used those machines exceeds the difference between the vote tallies the top two candidates received elsewhere, how can the election be salvaged?
Of course, at least in Washington State, such a thing wouldn't matter so long as the Democrats win. But not all states have such attitudes.
BTW, why use WINCE? I've designed graphical systems on 'bare metal' that would be entirely adequate for use in a vote entry device. Such a system can be constructed to account for every byte of RAM or flash usage. Can the same be said for WINCE?
They have boxes and boxes of voter registration cards that are fraudulent. One person signed three different voter registration cards with three different addresses but all in the same handwriting.
You specify that your technique would not stand up to forensic examination- why do you assume that if a voting machine election was contested, the FBI, FEC, or state police forensic computer lab would not get involved? Especially if the wrong party got elected.
I think it highly unlikely that the Princeton magicware could do all it is spec'd to do and remain undetectable to a forensic investigation.
Now, how does the magicware know it is being run for the last time?
I offered two methods. The first technique is easier to understand, and gives the general principle, but would probably be uncovered with forensic examination. The second technique (compress part of the original code so that the altered code takes up the same amount of space as the original) would be more difficult, if not for all practical purposes impossible, to uncover via forensic means.
In particular, if someone used the latter approach, all sectors of data on the storage media would contain the same data as they would without the hack, except for those parts which the hacker explicitly changed (such as the vote counts). The sectors may not get written in the same order as they would in a legitimate election scenario, so if the inner workings of the media allow one to ascertain the order in which data were written, it may be possible to tell that something fishy was going on. Even that sort of analysis, however, could be complicated if someone knew how the storage media worked.
Insider knowledge would probably be required to produce phony software that could withstand the tougher levels of forensic analysis. On the other hand, good election systems should be immune to even insider attacks provided there is at least one honest person monitoring them.
A good election system should be unhackable, even by someone with full insider knowledge, if there is even one honest person monitoring things. I see no good reason why an election system should be constructed that does not satisfy that criterion.
If code was changed on one storage system, comparison with a verified system would reveal discrepancies. A forensic lab would have a good chance at discovering tampering, especially if they hashed all the memory entries and compared sigs from the hashing.
The problem is that after the election the code in the machine would be exactly as it should be. To thwart forensic analysis one needs to know what types of 'residue' are left by writing to the attached storage media, but unless the systems use hardware that's designed to prevent undetectable rewrites (and I've seen no indication that Diebold has attempted to use such) an attacker could make his software undetectable after the fact.
Perhaps you don't view insider attacks as a real threat, but I see no reason to discount them. Slot machines go to great lengths to prevent insider attacks, and elections can be worth more than a few jackpot payouts.
Actually, what's best is to provide hardware that can prove (1) the contents of the media containing all code and election parameters can be write-protected; (2) such media can be read after being write-protected, but before the election, by members of both parties, without actually having to execute code on the medium; (3) during the election, anyone can see that the correct media are being used; (4) after the election, the media can be re-read by both parties and confirmed to be unaltered.
It's trivial to design hardware meeting those requirements. Something like an 80C32 may be a tiny bit underpowered if one wants a nice fancy graphical display (using a processor-based display would add its own issues) but if all the unit has to do is show some canned messages it shouldn't be too hard.
So, for the main unit, include a controllerless LCD, an 80C32 or ROMless equivalent, some buttons, a printer, couple edge connectors, a few glue logic chips (74HC138, 74HC00, etc.). Each plug-in cartridge would simply contain a 128Kx8 flash memory chip, a small glue chip (probably 74C00), two resistors, and a bypass cap, with a multi-segmented card edge such that certain pins could be physically protected aganst access by a removable block. The housing would be constructed of transparent material to allow visual inspection, and would be protected against tampering by seals of all interested parties.
The code storage cartridge would have the /WE pin blocked off (pulled high by internal resistor) and sealed after the code was loaded. It would remain blocked off and sealed until after it was adequately inspected post-election.
The ballot storage cartridge would have one of its data pins blocked off (and pulled to the another's state) in such fashion as to allow byte-write operations to take place (writing 7 bits of useful data) but not allow any sort of erase operations to take place. The glue-logic chip would be used to prevent the use of funny voltage levels to get around that restriction. I don't remember off-hand the exact operation sequences required for writing vs. erasing, but I think this would be doable even with something like a 74HC00.
I could design the whole thing in less than a month. Entirely open code, since there's really not much to it. To get around CPU horsepower limiations, I'd simply keep candidate names as bitmaps and arrange the display code to simply show different bitmaps (stored in non-writable flash) on different parts of the screen. The 8x32 can't run code from anything but the external ROM, so there'd be no danger of someone inserting a fake cartridge, powering the machine up, having the code copy itself to ROM, and then putting in the real cartridge (whose code would not actually be used).
I could do this thing in less than a month. Not a whole lot of bells and whistles, but much more immune to insider tampering than anything Diebold has proposed.
Also, with paper ballots, how can one tamper with those if there is even one honest person who monitors the ballot box continuously until such time as he puts an effective tamper-reistant lock on it, and if all occasions when the box is unlocked in future are likewise monitored by at least one honest person?
To be sure, some places put in rules to prevent honest people from monitoring their election conduct, but that's a problem with the rules, not the balloting medium.
Yeah, but there's not really much original there. And given a choice between fancy color touchscreens and simple cheap monochrome LCD's, which are politicians who don't have to spend their own money going to prefer? If seals are inadequate to prevent ballot tampering by unauthorized people, the solution should be pretty easy. Construct a box with locking bars such that it cannot be opened while a padlock is attached to any of several spots. Give a trustworthy person a good padlock for whom no untrusted people have the key. If the box and lock are good, no matter how many locks are installed by untrustworthy people. One trustworthy person will ensure election integrity.
Bingo. There does need to be a hardcopy audit trail. Centuries of double-entry bookkeeping has proven that.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.