Well intended misstep on Connecticut’s horizon?

The Hartford Courant editorial board celebrates a step towards a mistake for which they have long advocated

There is always an easy solution to every human problem–neat,
plausible, and wrong.- H.L. Mencken

There is always an easy solution to every human problem–neat, plausible, and wrong.
– H.L. Mencken

The Hartford Courant editorial board celebrates a step towards a mistake for which they have long advocated: Registrar Reduction On Hartford Horizon, Hartford Charter Commission wisely proposes end to five-year fiasco <read>

Hartford has wasted more than $1 million in the last five years on a top-heavy registrars of voters’ office. The city has three registrars, while every other municipality in the state has two.
Under a law that apparently dates back to when the Socialist Party had a strong presence in the state, the candidates for registrar who garner the highest and second-highest number of votes win the posts. But if a major-party candidate — Democrat or Republican — is not among the top two finishers, that candidate must also be named a registrar.
In 2008, the Working Families Party candidate outpolled the Republican candidate, so both, along with the Democrat, became registrars. The cost of each party registrar, with staff, benefits, etc., approaches $250,000 a year…

Two more things must happen. The change must be approved by voters in November, and the General Assembly must make a small change in state law.

While the Editorial Board may have their heart in the right place, they may be oblivious to the demanding job of registrar and the record of human nature. They have regularly been fighting this battle since before the third party registrar was elected. We have been arguing for better solutions then and now.

  • There is a reason for two registrars and three. The idea is to have checks and balances. Since the Working Families Party is the real challenger in Hartford, they need a registrar to watch out for their interests and the interests of their voters. Yet, as the one of the major parties in statewide elections, the Republicans need someone watching out for their interests in Hartford as well. Not so long ago we saw that a single registrar was insufficient to protect the interests of one party. Does the Editorial Board remember or read the news in the Courant?
  • Replacing three uncertified registrars with one uncertified registrar, without oversight is a formula for disaster.We have argued for replacing all registrars with civil service professionals, yet not the simplistic way apparently recommend by the Editorial Board: We have recommended: Doing for election what we have done for probate: Regionalize, Professionalize, Economize. But changing one city or only a simple change allowing for a single professional to run a city’s elections is false economy. We have professional iown clerks, yet the ycan be certified and supervised. To do the job right there needs to be training and qualifications; there needs to be standards for town councils to judge potential candidates; there needs to be a career path from deputy to registrar, from smaller districts to larger ones; there must be oversight in place to see that registrars do the job as intended and are even-handed to all parties, candidates and voters. Here is the bill we proposed last year <read> for a blue ribbon commission.
  • There is more than one way to save money, in spite of the city and Courant’s lack creativity. As we have said before there is no state law mandating that a third registrar cost $250,000. There are plenty of registrars across the state that work part time, so can three Hartford registrars work 2/3 time and be supported by three deputies with fewer assistants in total.

We appreciate that the Editorial Board understands the value of auditing.

Another change would expand the powers and scope of the city’s internal audit commission. The commission has been remarkably busy this year rooting out waste and should have the tools it needs. The revision also enables the creation of a public campaign financing mechanism, a nice idea when the city can afford it.

If only we had effective, comprehensive, independent election audits.

Electronic voting as safe as electricity and nuclear power?

In a recent Hartford Courant Op-Ed, Arthur House, chair of the Connecticut Public Utilities Regulatory Authority and previous Director of Communications of the Director of National Intelligence addressed cyber threats to public utilities. We cannot help but compare the concern of Mr. House for our utilities ability to protect the infrastructure, with the sure confidence of our Governor and Legislature in the ability of the Secretary of the State and local election officials to develop systems, at no cost, to make the Internet safe for online voting. Democracy is at least as important as the infrastructure.

In a recent Hartford Courant Op-Ed, Arthur House, chair of the Connecticut Public Utilities Regulatory Authority and previous Director of Communications of the Director of National Intelligence addressed cyber threats to public utilities: State Utilities Girding Their Cyber Defenses <read>

Cyber offense and defense are rapidly evolving forms of warfare. Our public utilities are among the target s foreign powers have penetrated. Our vital public services are vulnerable. U.S. national security leadership has seen the exercise of cyber probes and weaponry, some in overt military action and others, including foreign actions in the United States, more exploratory — “battlefield preparation,” in military terms.

For public utilities and the states that regulate them, cyber threats risk denial of electricity, water, natural gas and telecommunications. Our state emergency managers include cyber threats in their portfolio of hurricanes, ice storms, other natural disasters and physical sabotage. Cyber threats present a new dimension to emergency management with potentially devastating consequences and without the certainty of adequate defenses…

.Connecticut is intensifying its work with its public utilities, which long ago started their cyber defense programs and initiated planni ng for dealing with disruption. Several strengthening steps are possible, such as requiring utilities annually publish a statement from a reputable security company affirming (or not) that the company takes reasonable steps to ensure cyber security.

The most difficult adjustment lies with all of us — understanding and accepting the reality of cyber vulnerability and its unpredictable consequences. In the past, Americans have been able to take action, find reasonable solutions and do what makes sense without giving up the essential. We can do it with cyber, but it’s time to kick into gear.. The threat is real, and the work will be demanding.

We cannot help but compare the concern of Mr. House for our utilities ability to protect the infrastructure, with the sure confidence of our Governor and Legislature in the ability of the Secretary of the State and local election officials to develop systems, at no cost, to make the Internet safe for online voting. Democracy is at least as important as the infrastructure.

Student hijacks election, case highlights internet voting vulnerability

Another challenge for Secretary of the State Denise Merrill and the state Military Department in creating a safe online voting system for Connecticut. We would add that one of the key (pun intended) vulnerabilities in online voting is in the user id’s and passwords required for voting.

A former Cal State student was sentenced to one year in jail for hacking a student election, to gain positions which pay much better than most town council positions in Connecticut. Two excellent articles by Doug Chapin: Cautionary Tale: Student Gets Jail Time for Stealing Online School Election <read> and a follow-up by David Jefferson: <read>

The gist of the story from Chapin:

Technically, this isn’t the kind of election news I usually blog about (because it doesn’t involve a public election) but I thought it was worth sharing … From UTSanDiego:

A former Cal State San Marcos student who rigged a campus election by stealing nearly 750 student passwords to cast votes for himself and friends was sentenced Monday in federal court to a year in prison …Weaver, 22, of Huntington Beach was a third-year business student when he carried out the elaborate plan to win election as president of the school’s student council in March 2012. He pleaded guilty this year to three federal charges, including wire fraud and unauthorized access to a computer …

The plan to steal the election was months in the making.

On Weaver’s computer, authorities found a PowerPoint presentation from early 2012, proposing that he run for campus president and that four of his fraternity brothers run for the four vice president spots in the student government. The presentation noted that the president’s job came with an $8,000 stipend and the vice presidents each got a $7,000 stipend.

Weaver also had done a bit of research, with computer queries such as “how to rig an election” and “jail time for keylogger.”

A month before the election, Weaver purchased three keyloggers — small electronic devices that secretly record a computer user’s keystrokes [pictured above – ed.].

Authorities said Weaver installed keyloggers on 19 school computers, stole passwords from 745 students and cast ballots from the accounts of more than 630 of those victims.

The plot was discovered, however, when technicians spotted unusual activity on the last day of the election period:

Using remote access, technicians watched the computer user cast vote after vote. They also watched as the user logged into the account of a university official and read an email from a student complaining that the system would not let her vote.Weaver had already cast a ballot from the student’s account, which was why she couldn’t vote.

The techs called campus police, who found Weaver at the school computer. He had keyloggers with him and was arrested.

The student didn’t help himself when he engaged in an elaborate cover-up afterwards

Jefferson adds several cautionary concerns that the hacker could have been a bit smarter and been less likely to be caught or the hack discovered, and that a similar public election hack would have been more difficult to discover, concluding:

In the many debates on the subject of Internet voting it is important not to allow anyone to use this Cal State San Marcos student election experience to argue that online public elections can be made safe because those who would cast phony votes will be caught. Mr. Weaver’s actions were detected because he was voting from computers controlled by the university IT staff, and he was identified and caught because he was not even minimally technically skilled in the techniques that could have distanced him from the crime. In a high stakes public election we will not be so lucky.

What would we add?

We would add that one of the key (pun intended) vulnerabilities in online voting is in the user id’s and passwords required for voting.

What if Matthew Weaver had spent his time getting a job in the computer lab and obtained the list of passwords from a central server and then made some timely changes to alter logs of the ip addresses used for voting?

The now famous D.C. Hack among other things demonstrated that even outsiders have the possibility of gaining a list of voters and their passwords.

One of those pesky details that would confront Connecticut Secretary of the State, Denise Merrill and the Sswtate Military Department when they design a safe online voting system for Connecticut.  If they choose web based voting, how in the age of Bradley Manning access can they insure that military computers and individuals’ computers are safe for internet voting? How can they assure that passwords sent through the mail arrive in time, to the intended recipient, and uncompromised?

Military Justice, the NSA, and Independent Election Audits

Recently there were highly publicized hearings in Washington, D.C. on the subject of rape of sexual harassment in the U.S. Military and the military’s failure to make progress in reducing incidents and induce individuals to actually report crimes. One aspect of that is the fact that commanding officers have the responsibility/authority to reduce charges or even pardon the alleged or convicted perpetrators.

Recently there were highly publicized hearings in Washington, D.C. on the subject of rape of sexual harassment in the U.S. Military and the military’s failure to make progress in reducing incidents and induce individuals to actually report crimes. One aspect of that is the fact that commanding officers have the responsibility/authority to reduce charges or even pardon the alleged or convicted perpetrators.

The senior officers were concerned for discipline if an independent authority were made responsible for cases involving rape or sexual harassment. They also said that if a soldier had a very good record of valor, that should be taken into account. Let me explain why an independent authority would be a good idea. The basic reason is that an authority that is not independent can often let self interest get in the way of justice.

I learned that lesson vividly when I was in the Army, serving in Korea during the Vietnam War. As Company Clerk I was seldom directly involved in military justice. A couple of times I helped draft some charges in minor instances and once helped transcribe interrogations as part of an investigation. But in many cases I was privy to the operation of the system on the surface and scuttlebutt behind the scenes. For the most part the system worked reasonably. Sometimes it resulted in trumped-up charges, while in other cases significant crimes or errors were completely overlooked. Why? One reason was that enlisted members often knew of errors and transgressions, including sexual exploits, of others including senior officers. Without any stated threats it seemed that nobody was interested in disciplining those that knew too much, only in helping them avoid problems. Perhaps some of those who avoid discipline today is less for valor than knowledge.

That is why we need independent post-election audits, not overseen by the registrars and Secretary of the State responsible for conducting elections. That is why we need transparency and public verification of elections. Everyone makes mistakes from time to time in executing their responsibilities. Most are innocuous, some result in vulnerabilities, and others are intentional transgressions or fraud – from stealing elections, impeding or assisting candidates in ballot access, to lucrative contracts, to cutting corners. In reality, most employees know of some of their bosses and colleagues skeletons and vice-verse, in the military, in business, and government. Whistle blowers can help but transparency and independence are much reliable.

Lets add the same applies for the NSA revelations of Edward Snowdon. We cannot be sure how extensive the problem of access to information actually is. But there are huge limits on the “trust me” model that says there are limits on how the information is used. Human nature tells that if someone can get at the data it will be used for whatever purpose the person desires, to whatever benefit that person desires, at least in some cases. Say what one will about the low level education or rank of Bradley Manning and Edward Snowdon, they had access to huge amounts of information – they and many others have that access. It does not take that much expertise if you are given the keys to the information vault – we and the Congress are in no position to know what the actual access is.

Sometimes what sounds convincing and workable, is not. We need independent military justice, independent transparent election verification, and independent transparent information security.

Gov Malloy signs bill similar to one he said was risky and unconstitutional last year

Last year in 2012, after several weeks of consideration, Governor Malloy vetoed H.B. 5556 writing in his veto message:

Upon close examination, however, I find that some portions of this bill likely violate the United States Constitution…I cannot support the bill before me given its many legal and practical problems…First, as a matter of policy, I do not support any mechanism of voting that would require an individual to waive his or her constitutional rights in order to cast a timely, secret ballot, even if such waiver is voluntary. Second, as the Secretary of the State has pointed out, allowing an individual to email or fax an absentee ballot has not been proven to be secure. In 2011, the United States Department of Commerce, National Institute of Standards and Technology, issued a report on remote electronic voting. The report concluded that remote electronic voting is fraught with problems associated with software bugs and potential attacks through malicious software, difficulties with voter authentication, and lack of protocol for ballot accountability. None of these issues are addressed in this bill.

Last year in 2012, after several weeks of consideration, Governor Malloy vetoed H.B. 5556 (see Pages 51-55) writing in his veto message:

Upon close examination, however, I find that some portions of this bill likely violate the United States Constitution…I cannot support the bill before me given its many legal and practical problems…
HB 5556 also contains a provision allowing deployed service members to return an absentee ballot by email or fax if the service member waives his or her constitutional right to a secret ballot. I agree with Secretary of the State Denise Merrill that this provision raises a number of serious concerns. First, as a matter of policy, I do not support any mechanism of voting that would require an individual to waive his or her constitutional rights in order to cast a timely, secret ballot, even if such waiver is voluntary. Second, as the Secretary of the State has pointed out, allowing an individual to email or fax an absentee ballot has not been proven to be secure. In 2011, the United States Department of Commerce, National Institute of Standards and Technology, issued a report on remote electronic voting. The report concluded that remote electronic voting is fraught with problems associated with software bugs and potential attacks through malicious software, difficulties with voter authentication, and lack of protocol for ballot accountability. None of these issues are addressed in this bill. To be clear, I am not opposed to the use of technology to make the voting process easier and more accessible to our citizens. However, I believe that these legitimate problems have to be carefully studied and considered before enacting such a provision.

Last year the fax and email voting provisions were a glaring ‘rat’ stuffed into an unrelated emergency bill. Some said the Governor was against the underlying bill, but wanted more cover for the veto. We hoped, that even if that were the case, the accurate analysis of that ‘rat’ would still prevail this year. Apparently not.

There is a distinction without a difference in this year’s bill, S.B. 647, with regard to the elements of the veto message. Last year’s bill specified email or fax return of ballots. This year’s bill requires the Secretary of the State and the CT Military Department to determine a safe method of Internet voting. But all known methods have the same security risks and they all violate the Connecticut and U.S. Constitutions.

We could argue that this year’s bill is worse in at least three regards, requiring two impossible feats by the Secretary of the State, although she will have the help of the CT Military Department the three feats. One which the U.S. Defense Department has found impossible:

  • Develop a secure electronic voting system which does not violate the Constitutions.
  • Have that system transmit results immediately to the appropriate town hall.
  • Develop , implement, and operate such a system at no cost to the state and towns.

Summary Of The Problems With The Bill

  • This bill is a threat to the security, accuracy, and secrecy of the votes of our military members and their dependents, and thus to the certified outcomes of our elections.
  • It is unconstitutional since it violates the Connecticut Constitution, which states: “The right of secret voting shall be preserved.”
  • It requires the Secretary of the State and the Connecticut Military Department to develop a system for secure and private online voting by October 1st. A task that security experts, computer scientists, and experts at Homeland Security, and NIST (The National Institutes of Standards and Technology) believe is technically impossible.
  • It is further complicated by provisions for voting by deployed military dependents. It also is not restricted to deployed military, not even restricted to military actually on duty.
  • It sets a requirement for guaranteed receipt immediately in each voter’s municipality. This cannot be accomplished by either fax or email return.
  • While online voting through a web page might be developed to meet the guaranteed return requirement, it is also insecure, risks the secret vote, and would be very expensive.
  • All known methods of Internet voting would likely violate Connecticut’s Voter Verified Paper Records law established in 2005.

The Requirements of the Bill*
[Our comments in brackets]

  • On or before October 1, 2013, the Secretary of the State, in consultation with the Military Department, shall select a method for use in any election or primary held after September 1, 2014 [After the August 2014 Primary]
  • may be used by any elector or applicant for admission as an elector who is a  member of the armed forces and expects to be living or traveling outside the several states of the United States and the District of Columbia before and on election day, [Any travel or living change would apply, duty related or not. A National Guard member not deployed but on vacation or a business trip could presumably vote under this act]
  • or such member’s spouse or dependent if living where such member is stationed, [It includes spouses and dependents but not those on vacation, at college, or on business trips]
  • gives due consideration to the interests of maintaining the security of such ballot and the privacy of information contained on such ballot, [due consideration’ should include assuring the Constitutional requirement of a secret vote be strictly maintained. It should include evaluation by computer security experts, and effective security testing]
  • and…ensures receipt, prior to the closing of the polls on the day of the election or primary, of such ballot by the municipality in which the member or member’s spouse or dependent is enrolled or has applied for admission as an elector, if such method is properly utilized by such  member or such member’s spouse or dependent prior to the closing of  the polls on the day of the election or primary. [Thus, it must be guaranteed to be received by some official, inbox, or machine in the appropriate municipality by 8:00pm EST, if voted by 8:00pm EST (i.e. this is immediately). And 8:00pm EST could be almost any hour of the 24 hours in a day, depending on the deployment, business, or vacation location(*)]
  • Not later than January 1, 2014, the Secretary of the State shall submit a report, in accordance  with section 11-4a of the general statutes, to the joint standing committees of the General Assembly having cognizance of matters relating to elections and veterans’ and military affairs describing such  method and any legislative changes necessary for its implementation. [But necessary legislation enacted or not, implementation is required by this bill]

* After the bill was passed by the CT House and Senate we sent a letter to Governor Malloy asking for a veto, reminding him of his veto last year.  We made one mistake in that letter – using an older version of the bill, we misinterpreted the time requirement, stating that the bill did not require ‘immediate’ transmittal, but transmittal in four hours, by the close of election day, not the close of the polls. The actual bill creates a tougher, much more difficult barrier to implementation. This post updates portions of the details in that letter to conform to our corrected interpretation.

Analysis of the three known options: Email, Fax, and Online Voting

  1. Email is (1) of course, not secure with the NSA listening in, interceptable by bad external actors, and directly accessible by insiders such as email vendors, insiders at data centers all along the way from personal computers or military computers, state computers, local town computers, and every stop along the way. (2) Email cannot meet the mandated fimmediate delivery requirement – often emails take much longer to traverse the Internet, presumably especially from remote locations the military must protect (3) Email frequently is not delivered at all. Several times a year we become aware of emails sent to us that never arrive. (4) Email schemes we are aware of, in other states, all require that an individual in an elections office or town hall receive and print the “ballot” for counting – a clear violation of the secret vote. (5) Email would have to cover personal computers for spouses and dependents, not military computers. And the military member might be on vacation or business in an area where no military computer access is available.
  2. Fax, (1) like email is subject to interception in transmission (2) and like mail is subject to individuals in town hall or state government viewing the fax as it is received. (3) Subject to viewing and potential viewing by multiple members of the military as it is passed up the chain-of-command and to the Voting Assistance Officer, as articulated by Representative Alexander. (4) We cannot expect the chain-of-command to pass votes and wake Voting Assistance Officers to pass votes along at all hours and within four hours, nor to provide services to dependents – Note the deployed military chain-of-command also has a war to fight and enemies that might not avoid attacking during that critical four-hour period.
  3. Online Voting – By online voting we mean some interactive means of voting on a web page or sending a .pdf ballot under the control of a webpage, not via email. (1) Online voting can be more secure that email or fax voting, yet is still not secure as confirmed by NIST and Homeland Security. And no online voting system has proven secure by sufficient evaluation and testing – in fact, the only system subject to some public testing quickly failed spectacularly and another was broken by an average citizen, while vendors refuse to open their systems to scrutiny.  (2) Online voting may be difficult to administer and use, when the system is too hard to use vendors often blame the voters. (3) Online voting is expensive! Will the state and local officials making home-grown solutions, do better than highly funded vendors or turn to the vendors expensive, ineffective solutions? Such a system would have cost just Edmonton, Alberta $400,000. (4) Online systems entail emailing or paper mailing IDs to the voters – email can be compromised, and avoiding especially slow and unreliable outgoing mail to deployed military is a major motivation for this bill. (5) Once again, online voting cannot be restricted to military computers and serve dependents or serve soldiers away from home, not on Military business.

Another Miracle for the Secretary, Military Department, and Local Officials

The Legislature requires that the report, voting implemented, and run at no cost! It was passed with a note from the Office of Fiscal Analysis stating: “NO FISCAL IMPACT”. Note: A similar, yet less challenging task for the Secretary of the State to evaluate in another proposed bill this year, was estimated at $150,000. (See the Fiscal Note for S.B. 777).

Additional Documentation

Bruce McConnell Expert from the Department of Homeland Security
NPR:
 Online Voting ‘Premature,’ Warns Government Cybersecurity Expert
http://tinyurl.com/BMDHSNPR

Warnings about the dangers of Internet voting have been growing as the 2012 election nears, and an especially noteworthy one came Thursday from a top cybersecurity official at the U.S. Department of Homeland Security.

Bruce McConnell told a group of election officials, academics and advocacy groups meeting in Santa Fe, N.M., that he believes “it’s premature to deploy Internet voting in real elections at this time.”

McConnell said voting systems are vulnerable and, “when you connect them to the Internet, that vulnerability increases.” He called security around Internet voting “immature and underresourced.”

McConnell’s comments echo those of a number of computer scientists who say there’s no way to protect votes cast over the Internet from outside manipulation.

NIST: Internet Voting Not Yet Feasible http://tinyurl.com/NISTeVote

Internet voting is not yet feasible, researchers from the National Institute of Standards and Technology have concluded. ”Malware on voters’ personal computers poses a serious threat that could compromise the secrecy or integrity of voters’ ballots,” said Belinda Collins, senior advisor for voting standards within NIST’s information technology laboratory, in an May 18 statement. ”And, the United States currently lacks an infrastructure for secure electronic voter authentication,” she added. Collins released the statement in response to an inquiry from Common Cause, a Washington, D.C. nonprofit active in campaign finance and election reform.

“This statement should serve as a blunt warning that we just aren’t ready yet and proves that we can’t trust the empty promises of ‘secure Internet voting’ from the for-profit vendors,” said Susannah Goodman, head of Common Cause’s Voting Integrity Project. ”We urge election officials and state and federal lawmakers to heed NIST’s warning and step back, support further research and STOP online voting programs until they can be made secure,” Goodman added…

Secretary of the State’s Symposium on Online Voting

An exceptional panel of experts on voting technology and the challenges of overseas voting. Credit is due to the panelists, the Secretary, and those who contributed behind the scenes in making this event possible. John Dankowski, of Connecticut Public Broadcasting did an exemplary job of moderating a very civil, thorough debate. Video: http://tinyurl.com/SOTSOVS

Secretary of the State Denise Merrill’s testimony on S.B. 283, 2/22/2013:

Now, Senate Bill 283 concerning — AN ACT CONCERNING ON-LINE VOTING FOR MILITARY PERSONNEL SERVING OUT OF STATE. Again, I think everyone in this room supports the ability of our brave men and women in uniform, especially those serving overseas in places like Afghanistan, to vote and have their ballot counted.

I still have two, major concerns with this bill that prevent me from supporting it at this time. I mean, first, it talks about on-line voting. There — you should be aware, there’s a lot of different versions of what that actually means. So I’m presuming here it would mean developing an on-line application where the Soldier, Sailor, Airman or Airwoman or Marine can, again, have a secure log-in and — and actually select their ballot choices on the computer through a web-based application, which is different than some other proposals that have been made with electronic transmission.

This system, again, would be very costly, very expensive; and I’m talking millions of dollars to develop. My main objection to this, besides the cost which is significant — and, again, I’d like to make sure we have a problem before we spend that kind of money — but my main objection is that we simply — I don’t think we have the technology to guarantee the security, integrity of that ballot and prevent tampering or hacking these votes that are submitted on-line. It’s the same objection we have to any ballot submitted on-line at this time.

We had a — we convened a public forum on this topic with foremost experts in this field, last year at CCSU. The forum was televised; we have it on our web site; you can see what was said by these people. We asked one of the top computer science experts in the country what it would take to make on-line voting secure, and he said, Let me put it this way, saying you can have secure on-line voting is like saying you can have safe smoking.

Many people say, well, we can do bank on — banking on-line; why can’t we vote on-line? Again, I posed that exact question to the experts at that forum, and the answer was that the banking industry builds into their revenue forecast a two-to-three percent loss of funds every year due to fraud and hacking through on-line banking. I don’t think we can afford to have that kind of leeway, shall we say, in our election system. I don’t think we can adopt that kind of a model. And I, certainly, would never be able to accept the loss of a number of votes due to fraudulent hacking, just in the name of convenience. So I just don’t think we’re ready to go there.

Who knows; in the future, this may change. But I would just need to be assured before we came up with any system like that for any voter, that no one could tamper with the ballots. And I think right now, as you all know, if you have an e-mail system, yourself, I’m sure every one of us have had our e-mails hacked in some way or another or gotten or not received mail because it went into the wrong folder or whatever. It would be very difficult to design that kind of a system, so I’d be able to — I’d be — want to be able to look every Connecticut military person and their family in the eye and tell them that the vote is secure. And I don’t feel I can do that at this time.

From Representative Alexander’s Statement in Veterans Affairs Committee Hearing 2/19/2013:

REP. ALEXANDER: Thank you, Mr. Chair. I’ll be real quick. I appreciate the Clerk’s position in trying to make it easier to have servicemen and women vote any where deployed or — or in a unit wherever, and have a Voting Assistance Officer. I really took that to heart myself. But did you ever think of possible fraud when it comes to allowing military men and women to fax in their ballot, where, you know, as someone who — who was an Adjutant and ran an S1 in a battalion, the — the way usually squadrons and battalions work, you know, you’d have a Lance Corporal, a 19 or 20-year-old, fine, outstanding young man or woman who wanted to vote fill out the ballot, and then bring that piece of paper to the S1 office to be faxed. He or she doesn’t fax it themselves. Another clerk does.

ANTOINETTE SPINELLI: Oh, is that right?

REP. ALEXANDER: That — that would probably be the very common way this is implemented in most units, at the unit level, where you have a 19-year-old individual, a 20-year-old person, a Lance Corporal wants to vote — good on him for wanting to do that — brings that to their Platoon Sergeant up the chain. That Platoon Sergeant maybe, or a Squad Leader, facilitates the Lance Corporal to go to the S1 office. He submits that, and that will get faxed with a whole stack of other faxes that are going to go out in the office. And as someone that was an Adjutant, I was running an office like this day in and day out. And as an Adjutant, I would worry, as being sort of the person who is managing this type of office, that I would have a fellow maybe Lance Corporal faxing this information, where you might have someone that, being 19 or 20 years old, didn’t realize that, oh, changing it from, you know, Senator McCain, to President Obama is not a serious felony offense, which it is, and because of that chain of custody in — in reality, and — and the way maybe the military works in — in professional office spaces, I would just worry that during this handover to the fax, that you’re opening the door for potential fraud.

But the individual’s not, themselves, faxing it. Most likely, and most of the times in squadrons, you’re going to have a third party doing it, usually a 20, 21, 22-year-old Corporal or Lance Corporal doing that. And as an Adjutant running an S1, I’d be very concerned about this, and — and monitoring this very carefully, but — but that is something that would really concern me, and — and trouble me. Have the clerks thought of it from — from that angle at all? Where you could have potential voter fraud coming out of this?

 

A Positive Note: There is much we can do to improve elections

Looking over our recent posts, they are focused on warnings about risky ideas proposed in the Connecticut Legislature and risks to our elections nationwide from cyber attack and actual absentee ballot fraud, often from insiders. We want to remind readers of the many positive improvements that can be made in elections in Connecticut and nationwide.

Looking over our recent posts, they are focused on warnings about risky ideas proposed in the Connecticut Legislature and risks to our elections nationwide from cyber attack and actual absentee ballot fraud, often from insiders. We want to remind readers of the many positive improvements that can be made in elections in Connecticut and nationwide.

As the General Assembly was heading for the season of considering bills by the Senate and House we made our recommendations on a raft of election bills, several of which we recommend be passed:

Committee Approves 39 Bills In Last Meeting

Bills Approved Earlier by the GAE Committe

Then responding to President Obama’s suggestion that “we can fix that” we suggested several suggestions for national voting integrity, Connecticut voting integrity, and for improving elections beyond integrity:

Basic and Bold Steps To Improve Connecticut Elections

Basic and Bold Steps To Improve U.S. Elections

Bold Steps Beyond Integrity To Improve U.S. Elections

With other advocates, we helped create and signed on to two letters to the President taking him up on his challenge.

Mr. President: Improve voting, shorten lines with optical scanning. Avoid the risks of Internet Voting

We recognize that things move slowly in Washington and in Connecticut. But they move, not always in the best direction. So we will be back encouraging the General Assembly in the direction of positive reform next year. And in the meantime watching and reporting on election integrity here in Connecticut.

 

If elections can be protected at no cost, what about the electric grid?

Tongue in cheek, we note that this may be a major redundancy in effort and expense by utility regulators, since the Legislature has mandated that the Secretary of the State and the Military Department come up with a plan to provide secure electronic voting to the military by October 1st. The Secretary is also mandated in that bill to not only come up with the plan but to implement it without any expenditure!

When we see everybody from the CIA to Lockheed Martin and the Bank of America being hacked, along with concerns for our grid from our utility regulators, it’s pure hubris to think that our elections could not be compromised.

An article in the Courant last week highlights the risks to our electric grid and the plans slowly moving forward to enhance its security: State Plan For Cyber Threats To Electric Grid Taking Shape – Utilities Cooperating With Regulators On Plan <read>

Dan Esty, the state’s energy commissioner, sat across a conference table from Art House, Connecticut’s head utility regulator, in the bunker of the State Armory in Hartford last July for a drill that simulated a statewide response to a major hurricane.

Esty, with other state officials and utility executives nearby, asked whether House remembered exercises like these from his days doing intelligence work for the federal government.

“There are two kinds of drills I’ve done in Washington,” House said. There’s the predictable type of emergency, like hurricanes and ice storms, that the state needs to be ready for. And then there’s the unpredictable.

“I worry more about unforeseen type, like a cyber attack,” he said.

That conversation, the two officials said, seeded a quickening and serious discussion of the state’s liability to hackers that would aim to control or damage critical facilities, like the electric grid. House, chairman of the state’s Public Utilities Regulatory Authority, is drafting a plan with utilities on how to prepare for, address and respond to cyber attacks.

“Cyber probes are a fact of life,” House said in an interview this week. “Connecticut needs to look at it in terms of defense. Are we doing everything we can?”…

Federal security officials warn that electronic attacks on these critical facilities could create “the potential for large-scale power outages or man-made environmental disasters” and cause “physical damage, loss of life and other cascading effects that could disrupt services,” the Department of Homeland Security’s deputy inspector general, Charles Edwards, said in a congressional testimony last month…

In Connecticut, House plans for a rough draft of the state’s cybersecurity plan to be finished by Labor Day, with a final version completed by January 2014. It will examine how state utilities could build up their electronic defenses against cyber attacks as well as how private and municipal emergency managers should be prepared in the event of such an attack.

A major piece of the state’s cybersecurity efforts will lean on the federal intelligence and security resources that track and investigate cyber attacks, said House, adding that his previous work for the U.S. National Geospatial-Intelligence Agency will aid in the state’s efforts. “Cyber defense is not a matter of geography. It’s a matter of national defense. It goes across state line and across industries.”

Joel Gordes, president of West Hartford energy consultancy Environmental Energy Solutions, has long called for attention to the cyber security issue. He cites testimonies attached to names like Defense Secretary Chuck Hagel, Former Defense Secretary Robert Gates and Former CIA Director Leon Panetta that raised concerns about the issue, concluding that it’s about time Connecticut takes a clear-eyed look at cyber security.

“When we see everybody from the CIA to Lockheed Martin and the Bank of America being hacked, it’s pure hubris to think that our electric grid could not be compromised,” he said…

Data sharing was one of inspector general Edwards’ concerns. He said that the Department of Homeland Security’s cyber security office needs to consolidate its information sharing efforts with other agencies and the private sector to “ensure that these stakeholders are provided with potential [industrial control systems] threats.”

A group of energy companies and public and private groups expressed concerns about the timeliness of federal assessments on cyber threats, specifically noting that they feel that “a great deal of time might elapse until stakeholders were made aware of the same of similar incident that could affect their systems.”

Tongue in cheek, we note that this may be a major redundancy in effort and expense by utility regulators, since the Legislature has mandated that the Secretary of the State and the Military Department come up with a plan to provide secure electronic voting to the military by October 1st. The Secretary is also mandated in that bill to not only come up with the plan but to implement it without any expenditure!

For the utilities “A major piece of the state’s cybersecurity efforts will lean on the federal intelligence and security resources that track and investigate cyber attacks”, however, we doubt that support would do much good since experts at Homeland Security and NIST claim that Internet voting cannot be made save.

For more details on the feats to be accomplished by the Secretary of the State and Military department, see our recent post: Governor Malloy: Please Veto Internet Voting Bill

To paraphrase Mr.House,

When we see everybody from the CIA to Lockheed Martin and the Bank of America being hacked, along with concerns for our grid from  our utility regulators, it’s pure hubris to think that our elections could not be compromised.

Governor Malloy: Please Veto Internet Voting BIll

Earlier this week we sent a letter to Governor Malloy requesting that he veto Senate Bill 647, now Public Act 13-185. It is now up to the Governor to protect voting integrity, uphold the Connecticut Constitution, and remain steadfast to the principles articulated to his veto message last year for a similar bill.

Earlier this week we sent a letter to Governor Malloy requesting that he veto Senate Bill 647, now Public Act 13-185. It is now up to the Governor to protect voting integrity, uphold the Connecticut Constitution, and  remain steadfast to the principles articulated to his veto message last year for a similar bill. <full letter>

Here is the summary from the letter articulating why a veto is appropriate:

  • This bill is a threat to the security, accuracy, and secrecy of the votes of our military members and their dependents, and thus to the certified outcomes of our elections.
  • It is unconstitutional since it violates the Connecticut Constitution, which states: “The right of secret voting shall be preserved.”
  • It requires the Secretary of the State and the Connecticut Military Department to develop a system for secure and private online voting by October 1st. A task that security experts, computer scientists, and experts at Homeland Security, and NIST (The National Institutes of Standards and Technology) believe is technically impossible.
  • It is further complicated by provisions for voting by deployed military dependents. It also is not restricted to deployed military, not even restricted to military actually on duty.
  • It sets a requirement for guaranteed receipt within four hours in each voter’s municipality. This cannot be accomplished by either fax or email return.
  • While online voting through a web page might be developed to meet the guaranteed return requirement, it is also insecure, risks the secret vote, and would be very expensive.
  • All known methods of Internet voting would likely violate Connecticut’s Voter Verified Paper Records law established in 2005.

Political Disclosure: Sausage making is clearer and cleaner

This year the disclosure bill was back with full public hearings and some of the objections mitigated, heading for a legitimate debate and vote. Yet, it has been marred again with at least three additional concepts added. At minimum these concepts/bills deserve individual debate and up and down votes. The only concept that should be adopted is a good disclosure bill.

Last year the political disclosure bill was marred by the last minute inclusion of email and fax voting and provisions crafted behind closed doors in an “emergency bill”. Drawing the Governor’s veto based partially on the risks of the Internet and the unconstitutionality of an individual waiving the secret vote <read> As we pointed out earlier this week, this year there is an even stranger Internet voting bill.

This year the disclosure bill was back with full public hearings and some of the objections mitigated, heading for a legitimate debate and vote <read>

But once again that bill is apparently being stuffed with other, unrelated, and additional controversial items. A grab-bag of items only insider politicians would love, CTNewsJunkie:  Despite Latest Evidence of Corruption, Lawmakers Consider Giving More Money to Parties, PACs <read>

Behind closed-doors Tuesday, lawmakers were crafting legislation that would help them funnel more money to political party committees, legislative leadership committees, and political action committees.

According to Rep. Ed Jutila, who co-chairs the General Administration and Elections Committee, the “essence” of the bill is an attempt to address the Citizens’ United decision that allowed unlimited amounts of money to be spent by Super PACs either for or against candidates — even if those candidates participated in the public campaign finance system. Close to $700,000 in independent expenditures from Super PACs was spent in the 2012 election cycle.

“It’s one way to try and even the playing field,” Jutila said Tuesday.

Jutila said the amount of money individuals can give to the candidates participating in the Citizens’ Election Program will not change under the omnibus campaign finance bill, but the amount of money individuals can give to the two major parties, leadership PACs, and town committees will increase under the proposal.

The proposal comes just one week after a federal corruption trial demonstrated exactly how much sway money has over Connecticut politics and policymaking. During that trial, a cooperating witness detailed how he was able to use the donations to former House Speaker Chris Donovan’s failed congressional campaign and three Republican leadership PACs controlled by House Minority Leader Lawrence Cafero in an effort to kill legislation detrimental to the interests of smoke shop owners…

The bill is an aggregation of a number of the concepts from four pieces of legislation introduced earlier this year by the General Administration and Elections Committee.

One of those bills would increase the amount of money an individual could donate to a State Central Committee from $5,000 to $10,000. The amount a town committee or leadership committee could receive from an individual would go from $1,000 to $2,000, and all other PAC limits would increase from $750 to $1,000.

It would also allow State Central Committees for the Democratic and Republican Parties to sell ad books as another way to raise money. The ability to sell advertising space in booklets handed out at public events was removed from the parties in 2005 when the Citizens’ Election Program was created.

Another bill, which has been lumped into the campaign finance package, would lift a ban on donations from state contractors and would allow them to give up to $1,000 to their local town committee. The 2005 law prohibited anyone doing business with the state from donating money.

In addition, the bill would include Sen. President Donald Williams’ ban on cross-endorsements by third parties. It would also prohibit the use of certain words such as “Independent” from the names of political parties in the state.

So a bill designed to counter some of the effects Citizens United will actually increase the money flowing from state contractors into elections. Worse it would end cross-endorsements and make the name of an existing political party illegal. The cross-endorsement bill was the subject of almost uniform opposing testimony and statements from Committee members who then voted for that bill.

At minimum these concepts/bills deserve individual debate and up and down votes. The only concept that should be adopted is a good disclosure bill.

CT Senate’s Magical Mystery Military Voting Tour

In summary the bill requires the Secretary of the State, Military Department, and Local Officials to defy science and economics, performing at least two miracles!

Just in time for Memorial Day, the Connecticut Senate has passed unanimously, an amended version of S.B. 647, An Act Concerning Voting By Members Of The Military Serving Overseas – To permit voters who are members of the armed forces and serving overseas to return ballots by electronic means

Just in time for Memorial Day, the Connecticut Senate has passed unanimously,  an amended version of S.B. 647, An Act Concerning Voting By Members Of The Military Serving Overseas – To permit voters who are members of the armed forces and serving overseas to return ballots by electronic means <amended version>

In summary the bill requires the Secretary of the State, Military Department, and Local Officials to defy science and economics, performing at least two miracles!

The previous version directed that the Secretary and the Military department develop a method for safe electronic voting and produce a report outlining needed changes in the law by next January. This bill requires them to develop that method by October 1st this year and that it be implemented in 2014, apparently regardless of their success in developing such a method and their success in passing such legislation.

The Requirements of the Bill
[Our comments in brackets]

  • On or before October 1,  2013, the Secretary of the State, in consultation with the Military Department, shall select a method for use in any election or primary held after September 1, 2014 [After the August 2014 Primary]

  • may be used by any elector or applicant for ad ission as an elector who is a  member of the armed forces and expects to be living or traveling outside the several states of the United States and the District of Columbia before and on election day, [So any travel or living change applies, duty related or not, so, a National Guard member not deployed but on vacation or a business trip could presumably vote under this act]

  • or such member’s spouse or dependent if living where such member is stationed, [It includes spouses and dependents but not those on vacation, at college, or on business trips]

  • due consideration to the interests of maintaining the security of such ballot and the privacy of information contained on such ballot, [We assume ‘due consideration’ should include assuring the Constitutional requirement of a secret vote be strictly maintained]

  •  and…ensures receipt, prior to the closing of the polls on the day of the election or primary, of such ballot by the municipality in which the member or member’s spouse or dependent is enrolled or has applied for admission as an elector, if such method is properly utilized by such  member or such member’s spouse or dependent prior to the closing of  the polls on the day of the election or primary. [So, within 4 hours of voting by 8:00pm EST, it must be guaranteed to be received by some official, inbox, or machine in the appropriate municipality. 8:00pm EST could be almost any hour of the 24 hours in a day, depending on the deployment, business, or vacation location]

  • Not later than January 1, 2014, the Secretary of the State shall submit a report, in accordance  with section 11-4a of the general statutes, to the joint standing committees of the General Assembly having cognizance of matters relating to elections and veterans’ and military affairs describing such  method and any legislative changes necessary for its implementation.

Lets look at the three known options: Email, Fax, and Online Voting

  • Email is (1) of course, not secure with the NSA listening in, interceptable by bad external actors, and directly accessible by insiders such as email vendors, insiders at data centers all along the way from personal computers or military computers, state computers, local town computers, and every stop along the way. (2) Email cannot meet the mandated four hour delivery requirement – often emails take much longer to traverse the Internet, presumably especially from remote locations the military must protect (3) Email frequently is not delivered at all. Several times a year I become aware of emails sent to me that never arrived. (4) Email schemes we have seen all require that an individual along the way receive and print the “ballot” for counting – a clear violation of the secret vote. (5) Email would have to cover personal computers for spouses and dependents, not military computers. And the military member might be on vacation or business in an area where no military computer access is available.
  • Fax, (1) like email is subject to interception in transmission (2) and like mail is subject to an individuals in town hall or state government viewing the fax as it is received. (3) subject to viewing and potential viewing by multiple members of the military as it is passed up the chain-of-command and to the Voting Assistance Officer as articulated by Rep Alexander. (4) We cannot expect the chain-of-command to pass votes and wake Voting Assistance Officers to pass votes along at all hours and within four hours, nor to provide services to dependents – did we mention they also have a war to fight and enemies that might not avoid attacks during that critical four hour period.
  • Online Voting – By online voting we mean some interactive means of voting on a web page or sending a .pdf ballot under the control of a webpage, not via email. (1) Online voting can be more secure that email or fax voting, yet is still not secure as confirmed by NIST and Homeland Security. And no online voting system has proven secure by sufficient evaluation and testing – in fact, the only system subject to some public testing failed spectacularly and another was broken by an average citizen, while vendors refuse to open their systems to scrutiny.   (2) Online voting may be difficult to administer and use, when the system is too hard to use they blame the voters. (3) Online voting is expensive! Will the state  and local officials do better than highly funded vendors or turn to their ineffective solutions? It would have cost just Edmonton Alberta $400,000. (4) Online systems entail emailing or paper mailing IDs to the voters – email can be compromised, and avoiding especially outgoing mail is the whole motivation for this bill.  Which brings us to an additional miracle. (5) Once again, it cannot be restricted to military computers.

Another Miracle for the Secretary, Military Department, and Local Officials

The Legislature requires that the the report, voting implemented, and run at no cost! It was passed with a note from the Office of Fiscal Analysis: “NO FISCAL IMPACT”. Or as articulated in more detailed note for the committee approved bill:

State Impact: None

Municipal Impact: None

Explanation

The bill, which requires the Secretary of the State to develop and report on a method for returning the ballot of a military member stationed overseas, has no fiscal impact.

The Out Years

State Impact: None

Municipal Impact: None

We doubt anything close to claiming some level of security or privacy can be done at no cost. An online system would be in the hundreds of thousands, a credible study and report on fax and email would require extensive expertise and time.

An interesting comparison is with a somewhat similar but much easier and feasible requirement in another bill passed by the same committee this year, and also analyses with a note from the Office Fiscal Analysis. The bill allows municipalities to use, at their option, electronic check-in. It requires, probably in response to our testimony, that the Secretary provide a list of acceptable electronic check-in equipment, much less a task:

State Impact:

Agency Affected Fund-Effect FY 14 $ FY 15 $
Secretary of the State GF – Cost 150,000 10,000

 Municipal Impact:

Municipalities Effect FY 14 $ FY 15 $
Various Municipalities Potential Cost Less than 20,000 Less than 20,000

 Explanation

The bill would allow registrars of voters to use electronic systems that are approved by the Secretary of the State (SOTS) to check in voters. The bill would also require SOTS to create and maintain a list of electronic devices that municipalities may use for electronic checking in of voters.

The SOTS is anticipated to incur a cost of $150,000 in FY 14 to review, approve, and create a list of approved electronic devices for use in the voter check in process. The SOTS is anticipated to incur on-going costs of $10,000 per year beginning in FY 15 to maintain and update the list of approved electronic devices. Given the technical nature of device approval it is expected that the costs identified for SOTS will support a contracted consultant.

To the extent that municipalities decide to utilize electronic resources to check in voters, there is a potential cost to municipalities arising from their purchase of such devices. The cost potentially incurred by municipalities is dependent upon the type of equipment utilized and number of polling stations in a municipality. Such costs are not anticipated to exceed $20,000 for municipalities that decide to utilize this type of equipment.

The Out Years

The annualized ongoing fiscal impact for SOTS identified above would continue into the future subject to inflation. Municipal costs in the out years would be dependent upon the lifecycle of the equipment utilized.

What is Secretary Merrill to Do?
(If this bill passes the House and is not vetoed again by the Governor)

We presume the Secretary is expected to obey the law, and that Secretary Merrill maintains her past opposition to electronic voting as expressed in her testimony on this bill and on S.B 283, stated by experts in her Online Voting Symposium, and confirmed by the Governor’s veto last year.

Normally, we presume Connecticut has a government of men (and women), of a Constitution, and not of miracles! We do not believe the Constitution requires that any official perform miracles. If it did then it would be easy to command the Governor to solve all our budget, tax, and funding problems in a similar manner.

While her response is up to the Secretary, we would suggest she insist that the report include:

  • Even experts at Homeland Security and the National Institute of Standards and Technology agree with the vast majority of computer scientists and security experts that the Internet is not safe and cannot be made safe for voting.
  • That while we have a dedicated state Military Department and legendary state and local Information Technology Departments, it is unlikely that they can defy science to do better than the U.S. Military, and large financial institutions which are regularly hacked.
  • That she and the Military Department cannot meet the requirements of the law that secrecy and security be protected.
  • That any requirements not include directives to the U.S. Military, which has shown a lack of enthusiasm and compliance with directives regarding military voting from the U.S. Congress.
  • At minimum the Constitution would need to be amended to eliminate or adjust the requirement of a secret vote, and this law amended to eliminate the requirement for ‘due consideration’ of security and privacy.
  • That the Office of Fiscal Analysis incorrectly stated the costs of study, implementation, and operation.
  • Any system should be subject to extensive independent, contracted security evaluation and testing along with well notified extensive public testing, and public comment, to guarantee its security and secrecy. Such testing should include random unannounced testing using typical equipment in the typical environments to be used by the military members and their dependents. Our voters and our military are worth this and deserve it!