Slide 1

Slide 1 text

Questions to ask about Internet Voting Richard Akerman June 2016

Slide 2

Slide 2 text

The County Election, 1846 2 https://commons.wikimedia.org/wiki/File:The_County_Election,_Bingham,_1846.jpg Public domain

Slide 3

Slide 3 text

Voting • Has been designed • Design can be examined in terms of risk • Design can be examined in terms of entire system 3

Slide 4

Slide 4 text

Does the design limit voter coercion? 4

Slide 5

Slide 5 text

Low Medium High Zero 5

Slide 6

Slide 6 text

Coercion Risk Analysis • Voting takes place in a public area (with observers) • Marking the ballot takes place in private, alone • Once the ballot is in the ballot box, it is “detached” from the identity of the voter – no one including the voter can prove how they voted 6

Slide 7

Slide 7 text

7 Can the voting process be understood and examined?

Slide 8

Slide 8 text

Public Understanding • “all essential steps of an election are subject to the possibility of public scrutiny unless other constitutional interests justify an exception” • The Constitutionality of Electronic Voting in Germany 8 https://commons.wikimedia.org/wiki/File:Ibm_pc_5150.jpg by Ruben de Rijcke CC BY-SA

Slide 9

Slide 9 text

Some numbers • 1995 - 50.58% to 49.42% • 2016 - 50.3% to 49.7% • List of close election results 9

Slide 10

Slide 10 text

10 Is the entire system secure?

Slide 11

Slide 11 text

11 Copyright © 2014 Richard Akerman https://www.flickr.com/photos/rakerman/14551345714/ Licensed in the Creative Commons CC-BY

Slide 12

Slide 12 text

12 https://commons.wikimedia.org/wiki/File:Walls_of_Constantinople.JPG CC BY-SA

Slide 13

Slide 13 text

13 https://commons.wikimedia.org/wiki/File:Dardanelles_Gun_Turkish_Bronze_15c.png Public domain

Slide 14

Slide 14 text

In the digital world • Copyable expertise • Scale • Distance – which means you may be facing other nations • Detectability 14 Computers can lie

Slide 15

Slide 15 text

PhotoShop 15 Copyright © 2014 Richard Akerman https://www.flickr.com/photos/rakerman/6346831291/ Licensed in the Creative Commons CC-BY

Slide 16

Slide 16 text

Volkswagen 16 In a world where more and more objects are run by software, we need to have better ways to catch such cheaters. As the Volkswagen case demonstrates, a smart object can lie and cheat. It can tell when it’s being tested, and it can beat the test. New York Times – Volkswagen and the Era of Cheating Software by Zaynep Tufekci, September 23, 2015 https://commons.wikimedia.org/wiki/File:VW_Golf_TDI_Clean_Diesel_WAS_2010_8983.JPG by Mariordo Mario Roberto Duran Ortiz CC BY-SA

Slide 17

Slide 17 text

High risk • “We believe that online voting, especially online voting in large scale, introduces great risk into the election system by threatening voters’ expectations of confidentiality, accountability and security of their votes and provides an avenue for malicious actors to manipulate the voting results.” – Washington Post, May 2016 • Neil Jenkins, Senior Advisor for Cybersecurity Capabilities and Strategy at the US Department of Homeland Security 17

Slide 18

Slide 18 text

Recommendations from computer scientists 18 • To protect the accuracy and impartiality of the electoral process, US ACM makes the following recommendations: – All voting systems -- particularly computer-based electronic voting systems -- embody careful engineering, strong safeguards, and rigorous testing in both their design and operation; and, – Voting systems should also enable each voter to inspect a physical (e.g., paper) record to verify that his or her vote has been accurately cast and to serve as an independent check on the result produced and stored by the system. Making those records permanent (i.e., not based solely in computer memory) provides a means by which an accurate recount may be conducted.

Slide 19

Slide 19 text

Impossible? Or just infeasible? • “Given that sufficiently secure Internet voting systems do not yet exist, they would need to be built. Of course, some systems, like a stone bridge to the moon, are impossible to build. Others, like a stone bridge to Hawaii, are ... exorbitantly expensive.” – Aug. 2015 • Utah - iVote Advisory Committee, Final Report 19

Slide 20

Slide 20 text

Questions • Does the design limit voter coercion? • Can the voting process be understood and examined? • Is the entire system secure? 20

Slide 21

Slide 21 text

Richard Akerman papervotecanada@gmail.com @papervote http://blog.papervotecanada.ca/ Disclaimer: Personal opinions only. Copyright © 2016 Richard Akerman, licensed in the Creative Commons, CC BY-SA 2.0 Canada

Slide 22

Slide 22 text

Annex Videos • Tom Scott (8 minutes) • Andrew Appel (21 minutes) Reports • BC Independent Panel on Internet Voting • Assessment of Electronic Voting Options – Australian Parliament • Independent Report on E-voting in Estonia 22