Anti-coal protestors rated top threat to Australian e-voting

Al Qaeda ranked below tree-huggers in secret threat report

Website security in corporate America

AusCERT Sarong-clad anti-coal hippies have been marked as a chief threat to online voting at the election scheduled to take place in 2015 in the Australian state of New South Wales (NSW).

The protestors are identified as a threat in a report penned by CSC for the NSW government. The Reg has seen a copy of the report, which suggests developers feared protesting farmers and fire fighters could launch an attack against New South Wales' iVote online ballot system in objection to various coal mining projects across the state.

"Anti-coal lobby groups could lead to the targeting of the SGE (state government election) in 2015," the document read.

The document also outlines scenarios in which protestors could launch denial of service attacks, knocking out the ability for 250,000 remote and blind users to vote online.

The protesters were one of a dozen threat actors who could target e-voting in Australia. The report compiled by security vendor CSC also separately named Pyongyang and Beijing -backed hackers along with terror groups Al Qaeda and Al Islamiah as albeit unlikely threats, .

More likely however was that a cunning sysadmin at iVote developer Scytl would have planted a backdoor in the platform.

iVote collected 46,864 votes in the 2011 NSW state election by remote and disabled voters over phone and internet. It is expected to tally a quarter of a million ballots in the upcoming election.

NSW Electoral Commission chief information officer Ian Brightwell predicted the system would account for no more than 20 percent of total votes by 2024.

"Over the next five to 10 years I'd be say it will account for somewhere between 10 and 20 percent of votes," Brightwell told El Reg.

"If you have a major electoral fraud and you're collecting say five percent of votes electronically, you're (the attackers) going to have to skew the results enormously to influence the outcome.

"It's going to be a bit obvious."

Brightwell said iVote should never become the main method of voting in the state because this would increase the chance of detecting online ballot stuffing since scammers would need to pump a huge amount of forged votes to influence elections.

But the CIO was confident in the security of iVote. The platform had been subject to rigorous red-vs-blue 'wargame' penetration tests and threat analysis and was comparatively less risky than conventional paper voting, Brightwell said.

While the borked Western Australia September state election served to illustrate the fallibility of paper voting, Brightwell was unshaken by vulnerabilities found this week in Estonia's electronic voting platform which accounted for up to a quarter of votes cast in the last election. A band of anti- e-voting academics found in lab tests that attackers could to stuff ballots by hacking the platform and voter machines.

The platform contained process and architectural checks and balances to decrease the risk of voter fraud which can be viewed in the iVote AusCERT slide deck (PDF). ®

Youtube Video

Darren Pauli travelled to AusCERT as a guest of Dell.

Internet Security Threat Report 2014

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Bono: Apple will sort out monetising music where the labels failed
Remastered so hard it would be difficult or impossible to master it again
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story


Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.