The System That Won’t Prove It Is Accurate

Jonathan Simon says it so well at Truthout: Between Trump and a Hard Place: The Truth About “Rigged” Elections 

It should be rather obvious that the unidentified insiders charged with the programming, and anyone working through them, enjoy an even greater level of access to the counting process than do foreign hackers targeting our systems from the outside. It should be obvious that this is a colossally stupid risk for our nation to take. And it should be obvious that there is something wake-up-and-smell-the-coffee wrong when those upon whom the public relies for information refuse to seriously address and come clean about that risk…Only a public, observable counting process (i.e., hand-counted paper ballots or uniform public audits with gleaming teeth) can rebuild our shattered faith in the fidelity of our electoral process.

I chose the post title deliberately. “The System” is not computers or pollworkers, but the whole voting system created by people we have put in charge. That system could be changed moderately to provide proof of its accuracy. It is that the system of people won’t recognize and address the problem.

Jonathan Simon says it so well at Truthout: Between Trump and a Hard Place: The Truth About “Rigged” Elections <read>

The truth Trump is inadvertently pointing to is not that elections in the United States are rigged, but that our privatized, electronic vote counting system is unobservable and incapable of proving that it is not rigged. This is a true crisis for American democracy…

Lost, though, in the bipartisan condemnation of Trump and passionate renditions of America the Beautiful is an undeniable reality. Our computerized, unobservable vote counting system actually cannot prove or demonstrate that it is fraud-free. It simply cannot answer a challenge to its fidelity from Trump or anyone else, whether the challenge is justified or baseless, sincere or cynical…

It is true that our electronic voting machines are vulnerable to both hacking by outsiders and rigging by insiders. And it is not true that the experts have proclaimed our voting system “sound.” In fact, the experts — from Princeton to NYU’s Brennan Center to the US Government Accountability Office — have concluded that vote counting computers in wide use across the US can easily and undetectably be programmed to miscount votes and swing elections…

Sold on speed and convenience as our democratic priority rather than integrity, our nation has privatized, outsourced, and computerized our vote counting process. It should be rather obvious that the unidentified insiders charged with the programming, and anyone working through them, enjoy an even greater level of access to the counting process than do foreign hackers targeting our systems from the outside. It should be obvious that this is a colossally stupid risk for our nation to take. And it should be obvious that there is something wake-up-and-smell-the-coffee wrong when those upon whom the public relies for information refuse to seriously address and come clean about that risk…

Instead of chanting mantras about the security and fidelity of our elections, we need to respond to the truth that has been revealed by fast-tracking transparency reforms embodied in such proposed legislation as the Electoral Integrity Act, which now has more than 70 sponsors in Congress.

If vote counting continues to be unobservable, with the process outsourced to a few corporations, mere assurances will not be enough to restore trust in our elections. Only a public, observable counting process (i.e., hand-counted paper ballots or uniform public audits with gleaming teeth) can rebuild our shattered faith in the fidelity of our electoral process.

I chose the post title deliberately. “The System” is not computers or pollworkers, but the whole voting system created by people we have put in charge. That system could be changed moderately to provide proof of its accuracy. It is that the system of people won’t recognize and address the problem.

Another Annotation: Don’t stop being concerned about election integrity.

Lately the news is filled with Donald Trump saying the election is rigged and with election officials and others saying that is impossible.  We continue to disagree with both. As we have said:

The truth is that there is no more or less risk to elections this year than in the recent past. The bad news is that the risks of election skullduggery are significant and do not come only from one adversary.

So, lets annotate a recent Op-Ed in the Hartford Courant: Nothing Rigged About American Elections

Lately the news is filled with Donald Trump saying the election is rigged and with election officials and others saying that is impossible.  We continue to disagree with both.  As we have said: (And we and others have said again, again, and again more this year,)

The truth is that there is no more or less risk to elections this year than in the recent past. The bad news is that the risks of election skullduggery are significant and do not come only from one adversary. A report from the Institute for Critical Infrastructure technology says it all: “Hacking Elections is Easy!” The report discusses how our election infrastructure, from voting machines to registration and reporting systems, are all at risk.

In Connecticut, like most states, a disruption in our centralized voter registration system on Election Day or its compromise before voter lists are printed, would disrupt an election. In many municipalities, voted ballots are easily accessible to multiple single individuals, “protected” only by all but useless tamper-evident seals. Partisans run our elections from top to bottom. Most are of high integrity, yet there is high motivation for manipulation.

We can do much better in the long run, if the actual risks are not forgotten after November.

So, lets annotate a recent Op-Ed in the Hartford Courant

Nothing Rigged About American Elections
By SCOTT BATES
Amid the rubble of war, a woman stood against a cold and bitter wind. I asked her why she stood patiently waiting in a line with hundreds of her neighbors. “I have waited 90 years to cast my vote,” she said with a smile. “I can wait just a little longer.”
In the autumn of 2001, I had the privilege to be with this woman and thousands of others for the first parliamentary elections in war torn Kosovo. For decades, the people of this east European land were ruled by kings and dictators, and occupied by Nazis and Communists. But at the dawn of a new century, with American help, they emerged from the shadow of genocidal war and put their faith in a future decided by free and fair elections.
In the past quarter century, I have worked alongside people in more than a dozen countries on four continents to help advance the democratic process by holding free and fair elections. Here at home, I
worked on a team that called on the U.S. Justice Department to push back against voter intimidation against African-Americans in east Texas. As a member of the National Association of Secretaries of State,
I stood with Republican and Democratic election officials to ensure that the integrity of our electoral system is respected and protected.
[There are, of course, deserved respect and blind faith. One can work for either or both.]
That’s why I’ve taken claims that our election system is “rigged” very seriously. Once faith in the integrity of the electoral system is undermined, the legitimacy of government is called into question. Democracy itself cannot long endure in such an environment.
[If faith in the integrity of the electoral system is undermined, then we should use facts and reason to determine if faith is justified, or if the system needs attention.]
Fortunately, there are some internationally accepted guidelines that help us determine if an electoral system is rigged.
First, there needs to be a legal framework that specifies the time, place and manner of holding elections. We’ve got that—it’s in the Constitution along with 50 state constitutions and related local regulations.
Second, there should be universal and equal suffrage and nondiscrimination when it comes to who canvote. This has not always been the case in the United States. It could be said that elections in which African-Americans and women were denied the vote in the past were rigged, but fortunately that is no longer the case.
[Unfortunately, our 50-state system is not uniform and in many states barriers are in-place to make it easier or more difficult for particular classes of citizens to vote.]
Third, electoral management bodies should be formed that can hold and monitor the conduct of elections. In the United States, each of the 50 states separately controls conduct of the electoral processthrough their respective offices of the secretary of state. Today, the majority of these officers are, infact, Republicans. All of these offices are staffed with career professionals. At the local level, tens of thousands of municipalities across the United States have town or city clerks or registrars of voters who administer elections and count ballots.
[This are not necessarily an exhaustive list of requirements. Also often the devil is in the details.  There is no guarantee that each one of these individuals is honest and unbiased.  We all remember Ken Blackwell and Katherine Harris.  We note that Government finances are under the control of individuals in every state, county and town, yet that does not guarantee the money is all accounted for.] [PS:  Those officials do not, in general, count the ballots.  It is left to pollworkers and the vast majority of ballots are not counted by people but by machines that those people do not fully understand or control.]
Fourth, provision should be made for election observers to be present during the casting of ballots, as well as being present during tabulation of the ballots. These duties are carried out by hundreds of
thousands of our fellow Americans at polling sites across the country. Thank them when you see them this Nov. 8.
[I am one of them and appreciate thanks.  Here in Connecticut no observers are allowed – yet with machine counting there is not much to observers and when votes are counted by hand, observers are allowed to watch from quite a distance.]
Working in places like Bosnia, Iraq and Afghanistan, I have seen men and women put their lives on the line to organize and participate in elections. They did it because they believed democracy offered them a way forward. They saw it as a flawed system, but one with more hope than the one from which they emerged.
[Many of them would be happy to be here.  But the question is, do we have a flawed system and hope for improvement or unjustified blind faith?]
Those who denigrate our democracy with groundless claims not
only insult the thousands of officials and hundreds of thousands of poll workers who make the system work, they risk undermining the faith that millions across the globe have placed in democracy as the best system to advance equality of opportunity and protect the rights of the individual and the dignity of all.
[When one disagrees with our foreign policy, one is accused of insulting the troops and veterans. Here questioning our election system is diffused as insulting pollworkers.  If one is to have faith in Democracy, it must be fully realized and open to improvement and questioning.]
By any measure, America’s electoral system is a wonder to behold, for on this Election Day, one of the most diverse populations on the planet will show the world—once again—that free people can govern themselves.
[Apparently not as Obama said four years ago “We can fix this.”]
Scott Bates of Stonington is an adjunct senior fellow at the Pell Center for International Relations and Public Policy at Salve Regina University in Newport, R.I., the former Secretary of the Commonwealth of Virginia and has worked on U.S.-funded democracy assistance missions in over a dozen countries.
[Yes Virginia, which until recently used widely viewed as the most notorious voting system system in use, the WinVote. <read>.  The WinVote probably did happen after Bate’s service as Secretary of State in the mid 90’s <bio>]

Secret Ballot and Constitution under assault in Connecticut by AP and Secretary of the State’s Office

One AP story, two different versions in the Connecticut Post and the Hartford Courant.

As we said in our comment on the Connecticut Post article:

Connecticut has this other thing called the Constitution. It is even available at the Secretary’s website. It says: “The right of secret voting shall be preserved.”, which would likely be interpreted as not taking a picture of your ballot such that you could prove how it was voted. Otherwise votes could easily be bought, sold or intimidated. http://www.ct.gov/sots/cwp/view.asp?q=392288

One AP story, two different versions in the Connecticut Post and the Hartford Courant:

CTPost: Ballot selfies: A look at where they are allowed or not  <read>

CONNECTICUT: No law bans ballot selfies, according to Patrick Gallahue, a spokesman for Secretary of State Denise Merrill. But election moderators have discretion to prohibit activity “that threatens the orderly process of voting or the privacy of another voter’s ballot.”

Courant: If you elect to take ‘ballot selfie,’ check state law first <read>

Virginia Attorney General Mark Herring issued a formal opinion last month that nothing in Virginia law prohibits voters from taking pictures of themselves, fellow voters or their ballot within the polling place.
Ballot selfies are also legal in Connecticut.

As we said in our comment on the Connecticut Post article:

Connecticut has this other thing called the Constitution. It is even available at the Secretary’s website. It says: “The right of secret voting shall be preserved.”, which would likely be interpreted as not taking a picture of your ballot such that you could prove how it was voted. Otherwise votes could easily be bought, sold or intimidated. http://www.ct.gov/sots/cwp/view.asp?q=392288

Could the election be hacked? Checking a “Fact Checker”

USAToday article: Could the U.S. election be hacked?  <read>

We add some annotations:  [Bottom-line there is a conspiracy in plan view.  A thinly disguised attempt to assure us that elections are not vulnerable and that any attempt to say otherwise is an attack on every pollworker.]

USAToday article: Could the U.S. election be hacked?  <read>

We add some annotations:  [Bottom-line there is a conspiracy in plan view.  A thinly disguised attempt to assure us that elections are not vulnerable and that any attempt to say otherwise is an attack on every pollworker.]

Fact-checking the presidential debate: Fibs and fiction [Actually the have left that to us.]

Factcheck.org’s Lori Robertson takes a look at the claims made during the second presidential debate between Hillary Clinton and Donald Trump. Find out where fact-checkers found that candidates stretched the truth.

SAN FRANCISCO — The impact of Russian hacking on the upcoming presidential election was a topic in Sunday night’s debate, raising the question: Is the U.S. election hackable? Experts say at the national level, no. But there could be individual incidents that undermine faith in the system. [We disagree.  Election systems are very vulnerable based on the California Top To Bottom Review and the Ohio EVEREST report. Nobody should be considered an expert who ignores those reports. Actually so called “experts” denying the risks are thinly disguised attempts to create blind faith in the system.]

There’s almost no danger the U.S. presidential election could be affected by hackers. It’s simply too decentralized and for the most part too offline to be threatened, according to the head of the FBI and several security experts. [Decentralization means it would indeed be a challenge to hack every polling place and central count location in the country, yet that is a strawman argument, it is not necessary.  Only hacking a few jurisdictions in a small number of swing states is all it would take. See Ohio 2004 and Florida 2000. Offline is a good practice, yet that is insufficient for two reasons:  First, insiders can do all manner of hacks with our without connectivity. Motivated governments can and do find ways to hack systems without connectivity, see STUXNET.]

“National elections are conducted at the local level by local officials on equipment that they obtained locally,” so there’s no single point of vulnerability to tampering here, said Pamela Smith, president of Verified Voting, a non-partisan, non-profit organization that advocates for elections accuracy. [Most voting equipment is obtained from two our three vendors nationwide. Most officials have blind trust in their entire staffs, that is a formula allowing one or several individuals to hack a jurisdiction. Security of election equipment and voted ballots varies.  In many jurisdictions and whole states, such as Connecticut and New Jersey, machine and ballot security is very weak.]

In testimony before the House Judiciary Committee last month, FBI Director James Comey said that while concern has been rightly focused on the integrity of state voter registration systems, the actual voting process remains “very, very hard to hack into because it is so clunky and dispersed.’’ [We should be concerned with voter registration systems.  We should equally be concerned with voting systems and the systems which are used to total results for polling places, central count, jurisdiction accounting, and statewide accounting.]

“It is Mary and Fred putting a machine under the basketball hoop at the gym,’’ Comey said. “These things are not connected to the Internet.’’ [This is an attempt to say we are challenging the integrity of each  of the Mary and Fred’s who work in elections.  [Actually it is quite a leap to believe that each every pollworker and elected official is of high integrity.  Some have gone to jail for their activities. As a class we see no reason to agree that election officials that legislators, mayors, governors, and other public officials.  In Connecticut we have seen many punished for violating the public trust.]

Nevertheless, Comey said federal authorities have been counseling state officials to secure their systems, especially voter registration databases, as hackers have continued to “scan’’ the systems for vulnerabilities.

High stakes rhetoric

In Sunday’s debate, Democratic presidential candidate Hillary Clinton noted U.S. intelligence officials have blamed Russia for hacking Democratic officials accounts.

“We have never in the history of our country been in a situation where an adversary, a foreign power, is working so hard to influence the outcome of the election,” she said, and alluded to her Republican opponent Donald Trump’s praise of Russian president Vladimir Putin. [Many claim that the U.S. hacked a recent Ukraine and several over the years in South America.  Russia has been charged with hacking an election in Georgia. Some of these claims have stronger verification than U.S. claims without transparent evidence that any of these hacks were acts of the Russian Government. Not so long ago the U.S. was blaming hacks on China.  It seems we have a new enemy of choice.  Brought out also to charge that Trump, Clinton, Stein, and Sanders are somehow linked to Russia and Communism.] 

Trump replied that he knew “nothing about the inner workings of Russia,” and didn’t address electoral issues.

However on the campaign trail he has said multiple times that he fears the election will be stolen. In August in Columbus, Ohio he said “I’m afraid the election’s going to be rigged. I have to be honest.”

His website features a page where supporters can sign up to be election observers, to “Help Me Stop Crooked Hillary From Rigging This Election!”

Hacking dangers [We are not the only ones concerned:]

Experts say some local systems may be vulnerable to hacking. In some jurisdictions, local rules allow the transfer of election results using WiFi rather than putting the information on a thumb drive that’s physically taken to the central tally site. Others simply use outdated machines, said Kim Alexander of the California Voter Foundation, a non-profit, non-partisan organization that promotes the responsible use of technology in elections.

“They’re in a position where they need to buy something new, but governments don’t want to spend the money on it,” she said.

Depending on the voting machine, all it might take would be one disgruntled election official plugging in a thumb drive containing malware to falsify vote tallies, said Mike Baker, founder of Mosaic451, a computer security company that focuses on infrastructure protection, including for some state and federal election networks.

So far, 33 states and 11 county or local election agencies have approached the Department of Homeland Security for cybersecurity risk and vulnerability assessments, Secretary Jeh Johnson said in a statement Monday.

But time is a factor and he encouraged election agencies to ask for help now.

“There are only 29 days until election day, and it can take up to two weeks from the time we receive authorization to run the scans and identify vulnerabilities. It can then take at least an additional week for state and local election officials to mitigate any vulnerabilities on systems that we may find,” he said.

DHS may increase protections for voting systems to thwart hackers

The good news is that in the upcoming election, close to 80% of voters nationwide are in areas that will either use either paper ballots or voting machines with paper backups, both of which are considered much more secure than online only systems, said Smith.

Y2K or Pearl Harbor

The biggest question in the mind of voting security expert Joseph Kiniry is whether the 2016 election will be Y2K or Pearl Harbor.

The Y2K or millennium bug arose because programs represented the four-digit year with only the final two digits, which made 2000 indistinguishable from 1900. There were predictions of widespread computer failures and possibly catastrophic meltdowns of the world’s digital infrastructure.

Hundreds of millions of dollars and thousands of hours of work dealt with the problem and on January 1, 2000 the world woke to nothing more than a hangover, to the relief of many.

“I hope this is Y2K all over again,” said Kiniry, chief scientist at Free & Fair, a public-benefit corporation that works on creating technologies to keep elections free and fair.

But he and others worry that there’s a chance, though a small one, that it could be Pearl Harbor instead.

[Unlike Y2K, we are being warned, yet there is little action to significantly improve voting equipment, procedures, and security.  Maybe Y2K was a one-off where a very technical problem was described to the public, government, and business and after fifteen or so years of warnings, finally there was action in time to largely avoid the actual risks. As a Y2K programmer, I still hear complaints that we all ripped-off the system because nothing significant happened on Jan 1, 2000.  Many took the wrong lesson from that successful project/challenge.]

“Imagine lines wrapping around the block at every polling place in American on election day because the databases were compromised. Or results far different from previous elections and then two weeks after everyone thinks they know the outcome of the election, we find evidence of hacking in the machines,” he said.

66.5 million people watched Sunday’s Trump-Clinton debate
Voter confidence key

While election officials worry about such possibilities, they’re loath to discuss them publicly. If voters lose confidence in the system and don’t turn out to vote in the first place, it would be a greater threat to the integrity of the election system than hackers, they believe. [Don’t let the voters know what the risks really are, but privately worry, ignore, and cover-up.]

“It’s a tough position for us to be in. We don’t want to scare voters away,” said Alexander.

The fear is that proof of even one example of vote manipulation could be amplified through social media to threaten the electorate’s trust in the entire system.

That trust is a bedrock of American democracy and if it’s lost, “that puts us in a whole different category of countries that don’t have free and fair elections,” said Melinda Jackson, chair of the political science department at San Jose State University. [I would love to see a survey of what percentage of voters and non-votes have that blind trust given the thinly disguised attempt to deny risks.]

It might not even take that, she said.

“Already we see candidates sowing the seeds of distrust by saying the election might be rigged,” she said, citing Trump’s multiple statements to that effect.

In an absolute worst case scenario, were either Trump or some other group to question the legitimacy of the elections “we might see violence, we might see protests, we might see rioting, things that we see in other countries but not here,” said Jackson. [We have plenty of protests here. Just not so much over elections and no so much covered by the media.  See Standing Rock Dakota Pipeline and see where the violence comes from.]

While that’s an unlikely Doomsday scenario, she said, “it’s not impossible.”

Contributing: Kevin Johnson in Washington D.C.

Elizabeth Weise covers technology and cybersecurity for USA TODAY. Follow her at @eweise.

Ballots Still Broken: Doug Jones on Today’s Voting Machines

Broken Ballots co-author, Doug Jones interview on the vulnerabilities of today’s voting machines, the newer models available, risks of Election Management Systems, and Internet voting: Douglas Jones on Today’s Voting Machines  <read>

Fortunately, Connecticut has avoided the problem of corruption of the EMS by using a separate system from programming elections and using a manual reporting system to accumulate the results at the end of the night.  That does not mean our systems are safe from errors, hacking, and fraud.

Broken Ballots co-author, Doug Jones interview on the vulnerabilities of today’s voting machines, the newer models available, risks of Election Management Systems, and Internet voting: Douglas Jones on Today’s Voting Machines <read>

Fortunately, Connecticut has avoided the problem of corruption of the EMS by using a separate system from programming elections and using a manual reporting system to accumulate the results at the end of the night.  That does not mean our systems are safe from errors, hacking, and fraud.  We need audits that subject every ballot to the potential for audit selection, along with audits of the entire system including the accuracy of the results reporting and totaling.

In my opinion, the benefits of the currently available systems are not enough to justify replacing our current optical scanners.  In the next few years we will need to replace them.  Odds are a that in five to ten years there will be much better systems available at much lower cost.  Worth the wait.

We have also wisely avoided the risks of Internet voting.

Dr. Harri Hursti addresses the potential for Russian election attacks

Dr. Harri Hursti is a respected international expert on electronic security, especially electronic voting.  In a recent interview he addressed  the risks and chances of correctly attributing the source of attacks, specifically focusing on Russia.

What do you think of the news that a member of Congress says there is “no doubt” that Russia is behind recent attacks on state election systems

The article makes several dangerous assumptions about the security of elections and election systems. Representative Adam Schiff said he doubted (Russians) could falsify a vote tally in a way that effects the election outcome. He also said outdated election systems makes this unlikely, but really, it just makes it easier. The voting machines were designed at a time when security wasn’t considered, included, or part of the specifications at all.

Dr. Harri Hursti is a respected international expert on electronic security, especially electronic voting.  CTVotersCount readers may recall his role in the film Hacking Democracy demonstrating the “Hursti Hack” of Connecticut’s voting machines, the AccuVote-OS scanners.

In a recent interview he addressed  the risks and chances of correctly attributing the source of attacks, specifically focusing on Russia <read>

What do you think of the news that a member of Congress says there is “no doubt” that Russia is behind recent attacks on state election systems

The article makes several dangerous assumptions about the security of elections and election systems. Representative Adam Schiff said he doubted (Russians) could falsify a vote tally in a way that effects the election outcome. He also said outdated election systems makes this unlikely, but really, it just makes it easier. The voting machines were designed at a time when security wasn’t considered, included, or part of the specifications at all.

These outdated computers are extremely slow. They don’t have the extra horsepower to do decent security on top of the job they were designed for…

So there’s no proof of voter registration tampering?

As in voting machines, the registration machine don’t have the capability of logging an alteration, and they are trivially altered themselves. It’s meaningless to claim there’s no evidence, since the systems don’t have the capability to report when they’re altered…

How can the US be so sure it’s Russia?

It can’t. It is very hard to find from where a network attack is coming from. It is equally easy to make certain that investigators will find “the trail” which is pointing to the wrong direction. Therefore under the assumption that you’re dealing with a skillful attacker, any trail found is a red flag for the fact there are so many ways to make it virtually impossible to find the trail. Any conclusive looking trail “found” should be considered suspect. Unless it’s a false trail, you can only say we suspect them, and until you get to the real people to the level of the actual perpetrators true identities, you can’t make a conclusion as to “where” they come from…

Given your Cold War background, does this feel familiar?

The Cold War was all about ideology, and therefore a large concept was something that we today call hybrid warfare. In that game the actual technological attacks are equally important as the psychological influencing of the general population with misinformation and misdirection. So this is all very familiar.

Also, something we in the Western world don’t understand is how deeply patriotic Russians are. Individual Russians, and self-organized groups, are willing to go to great lengths on their own, with their own initiative, if they believe that what they do will benefit Mother Russia, and/or in hope and believe that their actions once known will be rewarded.

Given your Cold War background, does this feel familiar?

The Cold War was all about ideology, and therefore a large concept was something that we today call hybrid warfare. In that game the actual technological attacks are equally important as the psychological influencing of the general population with misinformation and misdirection. So this is all very familiar.

Also, something we in the Western world don’t understand is how deeply patriotic Russians are. Individual Russians, and self-organized groups, are willing to go to great lengths on their own, with their own initiative, if they believe that what they do will benefit Mother Russia, and/or in hope and believe that their actions once known will be rewarded…

I would suggest reading the complete article.  Dr. Hursti provide ans international prospective we do not fully comprehend.

A Meeting, A Hearing, and Lots of Nonsense

In the last two weeks there was a meeting of the Election Assistance Commission (EAC) and a hearing of the House Science and Technology Committee on “Cyber and Voting Machine Attacks”.  In total there were seven “experts” giving their opinions along with many of the committee members giving theirs. For the most part, solid facts and reason were missing.  The general plan seemed to be officials going overboard in reassuring the public.

In the last two weeks there was a meeting of the Election Assistance Commission (EAC) and a hearing of the House Science and Technology Committee on “Cyber and Voting Machine Attacks”.  In total there were seven “experts” giving their opinions along with many of the committee members giving theirs. For the most part, solid facts and reason were missing.  The general plan seemed to be officials going overboard in reassuring the public.

One speaker was featured in both meetings, the Louisiana Secretary of State.  He claimed, perhaps half joking, that it would take so many conspirators to rig an election that they would be better off just voting for their candidate — that got a lot of laughs, apparently at the expense of those who think our elections are vulnerable.  He also claimed that hacking was hard to do since it takes programming skills.  Actually programming skills are quite widely known and there are several ways to hack elections that do not require programming skills.

Another was the Secretary of State of West Virginia.  She is widely known as a strong proponent of Internet voting. Readers may recall that she came to Connecticut to tout a pilot of Internet voting that was wisely not continued by the West Virginia Legislature. She also declined to describe new voting security measures she has taken, lest they become known.  The EAC Committee seemed to agree with that failed theory, known as Security Through Obscurity.

Ironically, that same Secretary of State from West Virginia was given an award at the meeting by the EAC, partially for her strides in security.

Overall there was too much focus on cyber risks, from foreign powers, and from Russia.  In the Committee meeting it was accepted that Russia hacked the DNC, although to our knowledge has not been proven.

There were two highlights.

  • The statement and comments by Dan Wallach from Rice University, the only true expert on election security present in either meeting.
  • The opening remarks  by the Science and Technology Chair. He made a very clear statement of the importance of fair elections to democracy.

<Dan Wallach’s prepared remarks>

<Video of the EAC Meeting>

<Video of the Science and Technology Committee Meeting>
Lest some accuse me of being alarmist, let me reiterate and add to my position recently expressed in a letter to the Hartford Courant:

The truth is that there is no more or less risk to elections this year than in the recent past. The bad news is that the risks of election skullduggery are significant and do not come only from one adversary.

The risks come from foreign adversaries, domestic interests, partisans, independent hackers, and election insiders including vendors.  Elections can be compromised without access to the Internet, without coding, and without altering computers. Political insiders, especially, have the motives and opportunities.

In any one election race the risks are low to moderate, yet the stakes are high.  The closer the vote, the less certain the peoples’ votes were reflected in the declared winner.  It is too late to do much before November, yet we should not rest once the election is over and decided.  The time for deliberate action is in the months and year or two after a presidential election.

Security Against Election Hacking

From Freedom to Tinker, Andrew Appel: Security against Election Hacking – Part 1: Software Independence <read>

We have heard a lot lately about the vulnerabilities of our elections to hacking.  Both cyberhacking and unsophisticated insider attacks. Andrew Appel describes some common sense approaches to detect and deter error and fraud in our elections, covering three major vulnerabilities:

  • Incorrect or unavailable poolbooks.
  • Voting machines
  • Accumulation of results across polling places and jurisdictions

From Freedom to Tinker, Andrew Appel: Security against Election Hacking – Part 1: Software Independence <read>

We have heard a lot lately about the vulnerabilities of our elections to hacking.  Both cyberhacking and unsophisticated insider attacks. Andrew Appel describes some common sense approaches to detect and deter error and fraud in our elections, covering three major vulnerabilities:

  • Incorrect or unavailable poolbooks.
  • Voting machines
  • Accumulation of results across polling places and jurisdictions

Any of these computers could be hacked.  What defenses do we have?  Could we seal off the internet so the Russians can’t hack us?  Clearly not; and anyway, maybe the hacker isn’t the Russians—what if it’s someone in your opponent’s political party?  What if it’s a rogue election administrator?

The best defenses are ways to audit the election and count the votes outside of, independent of the hackable computers…

So the good news is: our election system has many checks and balances so we don’t have to trust the hackable computers to tell us who won.  The biggest weaknesses are DRE paperless touchscreen voting machines used in a few states, which are completely unacceptable; and possible problems with electronic pollbooks.

In this article I’ve discussed paper trails: pollbooks, paper ballots, and per-precinct result printouts.  Election officials must work hard to assure the security of the paper trail: chain of custody of ballot boxes once the polls close, for example.  And they must use the paper trails to audit the election, to protect against hacked computers (and other kinds of fraud, bugs, and accidental mistakes).  Many states have laws requiring (for example) random audits of paper ballots; more states need such laws, and in all states the spirit of the laws must be followed as well as the letter.

Read the full, brief article to understand the details of Appel’s recommendations.

In addition to paying attention to all these recommendations, Connecticut needs to attend to improving our existing post-election audit transparency, the security of ballots, and consider adding formal measures along these lines for check off lists and results reporting.

 

 

Letter: Focus on Russia Takes Heat Off Multitude of Election Vulnerabilities

My letter, published in the Courant today:

Many Election Security Risks

The Sept. 6 article “U.S. Fears Russia Hack” [Page 1] provides an inflammatory view of the risks to U.S. elections. Focusing on one potential risk from our current enemy of choice takes the attention off the multitude of risks…
We can do much better in the long run, if the actual risks are not forgotten after November.

A few days ago a Washington Post article, repeated in the Hartford Courant, focused on election risks from our current enemy of choice, Russia <read>.  Here is my letter, published in the Courant today:

Many Election Security Risks

The Sept. 6 article “U.S. Fears Russia Hack” [Page 1] provides an inflammatory view of the risks to U.S. elections. Focusing on one potential risk from our current enemy of choice takes the attention off the multitude of risks.

The truth is that there is no more or less risk to elections this year than in the recent past. The bad news is that the risks of election skullduggery are significant and do not come only from one adversary. A report from the Institute for Critical Infrastructure technology says it all: “Hacking Elections is Easy!” The report discusses how our election infrastructure, from voting machines to registration and reporting systems, are all at risk.

In Connecticut, like most states, a disruption in our centralized voter registration system on Election Day or its compromise before voter lists are printed, would disrupt an election. In many municipalities, voted ballots are easily accessible to multiple single individuals, “protected” only by all but useless tamper-evident seals. Partisans run our elections from top to bottom. Most are of high integrity, yet there is high motivation for manipulation.

We can do much better in the long run, if the actual risks are not forgotten after November.

Highly Recommended: Hacking Elections Is Easy!

From the Institute for Critical Infrastructure Technology: Hacking Elections Is Easy <read>. It is the most layperson accessible comprehensive overview of the problems we face protecting our elections that I have seen in a long time.  It is 23 pages yet very readable.  The main points are:

  • We face multiple risks our elections:  Registration systems, voting systems, reporting systems, and ballot security.
  • We face risks from multiple actors: Nations with interests in manipulating our elections, corporations, U.S. Government agencies, sophisticated hackers, and insiders at all levels.
  • For the unsophisticated, Hacking Is Easy.  There are simple insider attacks, simple cyber attacks, and kits on the Internet to compromise results or simply disrupt elections.
  • Most election officials are of high integrity.  Yet, blind trust in all officials, machines, and that hacking is difficult is perhaps our greatest risk.

Just a couple excerpts from the Introduction:

To hack an election, the adversary does not need to exploit a national network of election technology. By focusing on the machines in swing regions of swing states, an election can be hacked without drawing considerable notice. Voter machines, technically, are so riddled with vulnerabilities that even an upstart script kiddie could wreak havoc on a regional election, a hacktivist group could easily exploit a state election, an APT could effortlessly exploit a national election and any corrupt element with nothing more than the ability to describe the desired outcome could order layers of exploits on any of the multitude of deep web forums and marketplaces. Yes, hacking elections is easy…

From the Institute for Critical Infrastructure Technology: Hacking Elections Is Easy <read>. It is the most layperson accessible comprehensive overview of the problems we face protecting our elections that I have seen in a long time.  It is 23 pages yet very readable.  The main points are:

  • We face multiple risks our elections:  Registration systems, voting systems, reporting systems, and ballot security.
  • We face risks from multiple actors: Nations with interests in manipulating our elections, corporations, U.S. Government agencies, sophisticated hackers, and insiders at all levels.
  • For the unsophisticated, Hacking Is Easy.  There are simple insider attacks, simple cyber attacks, and kits on the Internet to compromise results or simply disrupt elections.
  • Most election officials are of high integrity.  Yet, blind trust in all officials, machines, and that hacking is difficult is perhaps our greatest risk.

Just a couple excerpts from the Introduction:

To hack an election, the adversary does not need to exploit a national network of election technology. By focusing on the machines in swing regions of swing states, an election can be hacked without drawing considerable notice. Voter machines, technically, are so riddled with vulnerabilities that even an upstart script kiddie could wreak havoc on a regional election, a hacktivist group could easily exploit a state election, an APT could effortlessly exploit a national election and any corrupt element with nothing more than the ability to describe the desired outcome could order layers of exploits on any of the multitude of deep web forums and marketplaces. Yes, hacking elections is easy…

Manufacturers and voting officials have constructed an illusion of security based on the semblance of complexity when, in reality, voting machines are neither secure or complex. In general, these stripped down computers utilizing outdated operating systems possess virtually every conceivable vulnerability that a device can have…

Attackers’ ability to exploit vulnerabilities in the systems that support the American democratic process is not exclusive to election machines. Catastrophically disrupting the campaign of just about any political candidate can be done with little more than a DDoS attack on fundraising links and web properties, spam widgets on social media platforms, an insider threat who delivers a malicious payload on a USB drive or unsuspectingly by clicking a link in a spear phishing email, and a ransom ware variant to encrypt important donor lists to further cripple fundraising. A pseudo tech savvy adversary could create a network of spoofed sites to confuse voters and this is just the beginning. By combining attack vectors and layering attacks, an adversary can manipulate the democratic process by inciting chaos, imbuing suspicion, or altering results.

an eighteen year-old high school student could compromise a crucial county election in a pivotal swing state with equipment purchased for less than $100, potentially altering the distribution of the state’s electoral votes and thereby influencing the results of the Presidential election…

An unskilled threat actor may begin a campaign by sending phishing emails or using free script
kiddie tools to remotely attack undefended local networks to compromise email and exfiltrate
internal documents that reveal the types of systems used in an election as well as their storage
conditions.