Posted by Bob Jonkman on 22nd February 2013

E-voting: No privacy?
Jeremy Epstein writes that US president Obama has announced a non-partisan commission to improve the voting experience in America. He concludes:
My greatest fear is that the commission will blindly recommend internet voting as a cure-all. As readers of my postings on this blog know, internet voting has yet to show promise as a secure solution to voting, and it risks threatening everyone’s vote.
I think that about nails that coffin shut…
Jeremy and I may be having some effect. He wrote to me Bob, one more follow-up. Today [6 February 2013] the Edmonton City Council voted not to proceed with internet voting, to my great surprise. See: Edmonton council defeats proposal for Internet voting this fall. Whether they read your blog post or mine and were influenced by it, I won’t even guess 🙂
There are further comments on Jeremy Epstein’s blog post.
Deirdre voting on Automark by joebeone is used under a CC BY 2.0 license.
Tags: commission, e-voting, Freedom to Tinker, Internet voting, Jeremy Epstein, Obama, secure, solution, threat, US President, voting
Posted in E-Voting | Comments Off on E-voting, Redux
Posted by Bob Jonkman on 5th February 2013

Jeremy Epstein
With both the
City of Waterloo (warning: 88 kByte PDF document) and the
City of Cambridge (warning:
4,000 kByte PDF document) considering Internet voting for 2014, I wrote that
E-voting is Considered Harmful. Although I discussed only the integrity of Internet voting, not the many security issues of voting online, the Cities should consider that some of the largest sites on the Internet have not been able to protect themselves against malicious intrusion.
Jeremy Epstein from the technology blog Freedom to Tinker provided expert testimony to a Virginia state Senate Committee Hearing on a bill to allow military voters to cast their votes via the Internet, and has written an article comparing Hacking newspapers vs. hacking elections:
The past few days have revealed that the New York Times, Wall Street Journal, and Washington Post have all been hacked by Chinese government-affiliated organizations, for the purpose of spying on reporters. The Washington Post says that the attacks were detected over a year ago, and had been going on for at least a year before that. Commercial security products like anti-virus did not detect the malware, which isn’t surprising to anyone who is familiar with signature-based schemes. The attacks on major newspapers were significant enough that Krebs on Security quotes Gunnar Petersen saying it would be “more surprising would be a major newspaper outlet that wasn’t hacked by the Chinese”. (This in turn reminded me of the Nixon enemies list, where being omitted from the list was a sign that one was unimportant, and “Newsman Daniel Schorr and [actor] Paul Newman stated, separately, that inclusion on the list was their greatest accomplishment.”.)
So what does this have to do with voting? The NY Times story appeared on Jan 30. On Jan 29, I testified to the Virginia Senate Committee on Privileges and Elections hearing in opposition to SB 830 and 874. These two bills would require the Virginia State Board of Elections to allow military voters to cast their votes via the Internet. (The Patron (sponsor) of 874 said that it was not internet voting, but rather returning the ballot via electronic format, which is to say by email or web site. I fail to see the a meaningful difference between that an internet voting.)
In my testimony, I explained that internet voting is harder than almost any other kind of activity on the internet including banking – and that the only reason we can do banking and other activity online is because of cross-checks and the willingness to accept a level of fraud that’s not possible with voting.
In response to my testimony, representatives of the State Board of Elections were asked by the senators whether they were confident that the system was secure. The SBE representative assured the senators that the system was secure. Unfortunately I was not permitted to respond to that assertion, and the SBE wasn’t challenged why they believe that they can provide the necessary protection.
I continue to be amazed that elected officials can read constant articles about hacking, and yet readily accept the assurances that there will be no problems with internet voting. If the SBE is so good at stopping attacks, perhaps they should supplement their paltry budget by providing security for banks, Federal government agencies like DOD, and the nation’s leading newspapers!
In reply to my request for permission to republish his article, Jeremy Epstein wrote:
[…] There’s been a number of ill-considered internet voting experiments in Canada, unfortunately. Probably the worst was in Edmonton AB, where there was a “mock election” to select a favorite jelly bean color. Based on that experiment, which disallowed any effort to break the system, the city concluded that the system was secure. I don’t understand how they came to that conclusion – or even to the much simpler conclusion that the apparent winner of the jelly bean contest was actually the selection of the majority of the voters. The only conclusion that I could reasonably draw is that people like internet voting – which we already knew. What we don’t know is how it can be done securely, and that experiment did nothing to further our understanding.
Updated 5 February 2013 to clarify that Jeremy Epstein testified at the Virginia state senate hearing, not a federal one.
Hacking newspapers vs. hacking elections by Jeremy Epstein from the Freedom to Tinker blog is republished with permission of the author.
Tags: attack, banking, Brian Krebs, Chinese government, e-voting, election, electronic ballot, fraud, hacking, Internet voting, Jeremy Epstein, Krebs on Security, malware, military voters, New York Times, newspaper, reporters, security, spying, Virginia Senate Committee on Privileges and Elections, Wall Street Journal, Washington Post
Posted in E-Voting | Comments Off on E-voting: Hacking newspapers vs. hacking elections