Feeds

Fraud potential found in e-voting systems

Closed source invites backend shenanigans

  • alert
  • submit to reddit

The next step in data security

If ever there were an application where open-source software should be mandated by law, electronic voting has got to be it. The benefits of a simple user interface for a populace confounded by the intellectual demands of punch cards are obvious.

A well-designed and transparent touch-screen ballot system with proper cryptographic protections and a robust auditing mechanism would go a long way to avoiding recount debacles like the one in Florida that made the 2000 elections so intriguing. Unfortunately, the systems that state and local governments have been throwing taxpayers' money at are closed, poorly protected against fraud, and lacking in adequate auditing features.

Such is the conclusion of a group of university researchers who got their hands on some of Diebold's e-balloting software. A recent study by Tadayoshi Kohno, Adam Stubblefield and Aviel Rubin of Johns Hopkins University and Dan Wallach of Rice University finds that the Diebold system lacks basic fraud prevention features.

The team examined unencrypted source code from the Diebold AccuVote-TS voting terminal which was recently posted on the Web, apparently leaked inadvertently by the company in an unprotected FTP directory. The terminal software runs on Microsoft Windows.

Among the more glaring security and data-integrity weaknesses is a re-programmable smart-card used by voters which the team says could be modified with ease and allow voters to cast multiple ballots without detection. The cards are meant to be cancelled automatically as soon as a voter casts his ballot, but the system is easy circumvent with card programmer available for about $100, the researchers say.

"A voter can also perform actions that normally require administrative privileges, including viewing partial results and terminating the election early. Similar undesirable modifications could be made by malevolent poll workers (or even maintenance staff) with access to the voting terminals before the start of an election," the paper says.

"Furthermore, the protocols used when the voting terminals communicate with their home base, both to fetch election configuration information and to report final election results, do not use cryptographic techniques to authenticate the remote end of the connection nor do they check the integrity of the data in transit. Given that these voting terminals could communicate over insecure phone lines or even wireless Internet connections, even unsophisticated attackers can perform untraceable man-in-the-middle attacks."

Election results can easily be skewed by voters and poll workers through smart-card tampering and access to administrative functions in the privacy of the voting booth; ballot choices can be altered by poll workers and supervisors; and, perhaps most worrisome, unauthorized machines running the Diebold software can easily authenticate themselves to the election authority. Finally, tampering is often impossible to detect due to inadequate audit-mechanism security, and re-counts are therefore suspect when tampering occurs.

Because the smart cards communicate with the ballot terminal without encryption, reprogramming one is trivial. A dishonest voter "could program a smartcard to ignore the voting terminal's deactivation command. Such an adversary could use one card to vote multiple times."

For its part Diebold says that its software is rigorously tested and certified by an outside reviewer. But beyond that the company has not been willing to make its source code available for independent review on the usual concerns over having to put money better spent on lobbyists and lavish executive remuneration packages towards defending its patents and copyrights.

However, if exclusively open-source (though not free) software were mandated by federal law, no company would be able to hide pilfered code in competing products and the problem of copyright and patent infringement could be neatly circumvented. ®

Related Stories

Computer ballot outfit perverts Senate race, theorist says
Black Box Voting Author replies

Choosing a cloud hosting partner with confidence

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.