Anti-coal protestors rated top threat to Australian e-voting

Al Qaeda ranked below tree-huggers in secret threat report

Internet Security Threat Report 2014

AusCERT Sarong-clad anti-coal hippies have been marked as a chief threat to online voting at the election scheduled to take place in 2015 in the Australian state of New South Wales (NSW).

The protestors are identified as a threat in a report penned by CSC for the NSW government. The Reg has seen a copy of the report, which suggests developers feared protesting farmers and fire fighters could launch an attack against New South Wales' iVote online ballot system in objection to various coal mining projects across the state.

"Anti-coal lobby groups could lead to the targeting of the SGE (state government election) in 2015," the document read.

The document also outlines scenarios in which protestors could launch denial of service attacks, knocking out the ability for 250,000 remote and blind users to vote online.

The protesters were one of a dozen threat actors who could target e-voting in Australia. The report compiled by security vendor CSC also separately named Pyongyang and Beijing -backed hackers along with terror groups Al Qaeda and Al Islamiah as albeit unlikely threats, .

More likely however was that a cunning sysadmin at iVote developer Scytl would have planted a backdoor in the platform.

iVote collected 46,864 votes in the 2011 NSW state election by remote and disabled voters over phone and internet. It is expected to tally a quarter of a million ballots in the upcoming election.

NSW Electoral Commission chief information officer Ian Brightwell predicted the system would account for no more than 20 percent of total votes by 2024.

"Over the next five to 10 years I'd be say it will account for somewhere between 10 and 20 percent of votes," Brightwell told El Reg.

"If you have a major electoral fraud and you're collecting say five percent of votes electronically, you're (the attackers) going to have to skew the results enormously to influence the outcome.

"It's going to be a bit obvious."

Brightwell said iVote should never become the main method of voting in the state because this would increase the chance of detecting online ballot stuffing since scammers would need to pump a huge amount of forged votes to influence elections.

But the CIO was confident in the security of iVote. The platform had been subject to rigorous red-vs-blue 'wargame' penetration tests and threat analysis and was comparatively less risky than conventional paper voting, Brightwell said.

While the borked Western Australia September state election served to illustrate the fallibility of paper voting, Brightwell was unshaken by vulnerabilities found this week in Estonia's electronic voting platform which accounted for up to a quarter of votes cast in the last election. A band of anti- e-voting academics found in lab tests that attackers could to stuff ballots by hacking the platform and voter machines.

The platform contained process and architectural checks and balances to decrease the risk of voter fraud which can be viewed in the iVote AusCERT slide deck (PDF). ®

Youtube Video

Darren Pauli travelled to AusCERT as a guest of Dell.

Secure remote control for conventional and virtual desktops

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
prev story


Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.