Feeds

Fraud potential found in e-voting systems

Closed source invites backend shenanigans

  • alert
  • submit to reddit

3 Big data security analytics techniques

If ever there were an application where open-source software should be mandated by law, electronic voting has got to be it. The benefits of a simple user interface for a populace confounded by the intellectual demands of punch cards are obvious.

A well-designed and transparent touch-screen ballot system with proper cryptographic protections and a robust auditing mechanism would go a long way to avoiding recount debacles like the one in Florida that made the 2000 elections so intriguing. Unfortunately, the systems that state and local governments have been throwing taxpayers' money at are closed, poorly protected against fraud, and lacking in adequate auditing features.

Such is the conclusion of a group of university researchers who got their hands on some of Diebold's e-balloting software. A recent study by Tadayoshi Kohno, Adam Stubblefield and Aviel Rubin of Johns Hopkins University and Dan Wallach of Rice University finds that the Diebold system lacks basic fraud prevention features.

The team examined unencrypted source code from the Diebold AccuVote-TS voting terminal which was recently posted on the Web, apparently leaked inadvertently by the company in an unprotected FTP directory. The terminal software runs on Microsoft Windows.

Among the more glaring security and data-integrity weaknesses is a re-programmable smart-card used by voters which the team says could be modified with ease and allow voters to cast multiple ballots without detection. The cards are meant to be cancelled automatically as soon as a voter casts his ballot, but the system is easy circumvent with card programmer available for about $100, the researchers say.

"A voter can also perform actions that normally require administrative privileges, including viewing partial results and terminating the election early. Similar undesirable modifications could be made by malevolent poll workers (or even maintenance staff) with access to the voting terminals before the start of an election," the paper says.

"Furthermore, the protocols used when the voting terminals communicate with their home base, both to fetch election configuration information and to report final election results, do not use cryptographic techniques to authenticate the remote end of the connection nor do they check the integrity of the data in transit. Given that these voting terminals could communicate over insecure phone lines or even wireless Internet connections, even unsophisticated attackers can perform untraceable man-in-the-middle attacks."

Election results can easily be skewed by voters and poll workers through smart-card tampering and access to administrative functions in the privacy of the voting booth; ballot choices can be altered by poll workers and supervisors; and, perhaps most worrisome, unauthorized machines running the Diebold software can easily authenticate themselves to the election authority. Finally, tampering is often impossible to detect due to inadequate audit-mechanism security, and re-counts are therefore suspect when tampering occurs.

Because the smart cards communicate with the ballot terminal without encryption, reprogramming one is trivial. A dishonest voter "could program a smartcard to ignore the voting terminal's deactivation command. Such an adversary could use one card to vote multiple times."

For its part Diebold says that its software is rigorously tested and certified by an outside reviewer. But beyond that the company has not been willing to make its source code available for independent review on the usual concerns over having to put money better spent on lobbyists and lavish executive remuneration packages towards defending its patents and copyrights.

However, if exclusively open-source (though not free) software were mandated by federal law, no company would be able to hide pilfered code in competing products and the problem of copyright and patent infringement could be neatly circumvented. ®

Related Stories

Computer ballot outfit perverts Senate race, theorist says
Black Box Voting Author replies

High performance access to file storage

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.