FYI
Lee
Aussies Do It Right: E-Voting
By Kim Zetter
Story location: http://www.wired.com/news/ebiz/0,1272,61045,00.html
02:00 AM Nov. 03, 2003 PT
While critics in the United States grow more concerned each day about the
insecurity of electronic voting machines, Australians designed a system two
years ago that addressed and eased most of those concerns: They chose to
make the software running their system completely open to public scrutiny.
Although a private Australian company designed the system, it was based on
specifications set by independent election officials, who posted the code on
the Internet for all to see and evaluate. What's more, it was accomplished
from concept to product in six months. It went through a trial run in a
state election in 2001.
Critics say the development process is a model for how electronic voting
machines should be made in the United States.
Called eVACS, or Electronic Voting and Counting System, the system was
created by a company called Software Improvements to run on Linux, an
open-source operating system available on the Internet.
Election officials in the Australian Capital Territory, one of eight states
and territories in the country, turned to electronic voting for the same
reason the United States did – a close election in 1998 exposed errors in
the state's hand-counting system. Two candidates were separated by only
three or four votes, said Phillip Green, electoral commissioner for the
territory. After recounting, officials discovered that out of 80,000
ballots, they had made about 100 mistakes. They decided to investigate other
voting methods.
In 1999, the Australian Capital Territory Electoral Commission put out a
public call for e-vote proposals to see if an electronic option was viable.
Over 15 proposals came in, but only one offered an open-source solution. Two
companies proposed the plan in partnership after extensive consultation with
academics at Australian National University. But one of the companies later
dropped out of the project, leaving Software Improvements to build the
system.
Green said that going the open-source route was an obvious choice.
"We'd been watching what had happened in America (in 2000), and we were wary
of using proprietary software that no one was allowed to see," he said. "We
were very keen for the whole process to be transparent so that everyone –
particularly the political parties and the candidates, but also the world at
large – could be satisfied that the software was actually doing what it was
meant to be doing."
It took another year for changes in Australian law to allow electronic
voting to go forward. Then in April 2001, Software Improvements contracted
to build the system for the state's October election.
Software Improvement's Matt Quinn, the lead engineer on the product, said
the commission called all the shots.
"They, as the customer, dictated requirements including security and
functionality, (and they) were involved at every step of the development
process, from requirements to testing," Quinn said. "They proofed every
document we produced."
The commission posted drafts as well as the finished software code on the
Internet for the public to review.
The reaction was very positive.
"The fact that the source code had been published really deflected
criticism," Quinn said.
A few people wrote in to report bugs, including an academic at the
Australian National University who found the most serious problem.
"It wasn't a functional or a security issue but was a mistake nonetheless,
and one that we were glad to have flagged for us," said Quinn.
In addition to the public review, the commission hired an independent
verification and validation company to audit the code, "specifically to
prevent us, as a developer, from having any election-subverting code in
there," Quinn said.
"We were concerned that it wouldn't be secure enough," said Green, the
electoral commissioner. The audit was performed specifically to search for
security weaknesses in the system, but Green says the researchers found
none.
The state tested 80 machines in the election, distributed among eight
polling places throughout Canberra (the country's capital). A comparative
manual count after the election showed that the system operated accurately.
The plan is to use the 80 machines again next year, but Quinn said the
difficulty in deploying the system nationwide is that it would have to be
adapted for use over larger geographic areas.
The machines are not what Quinn would call high-tech. The voting terminal
consists of a PC and offers ballots in 12 languages, including Serbian and
Farsi. The system includes English audio for vision-impaired and illiterate
voters.
The voter swipes a bar code over a reader that resets the machine for a new
vote and calls up a ballot. Once a selection is made and reviewed, the voter
swipes the bar code again to cast the vote. The bar code doesn't identify
the voter; it simply authorizes the voter to cast one ballot.
The terminals link to a server in each polling place through a secure
local-area network so no votes are transmitted over the Internet or phone
lines.
Quinn said the server writes two copies of the votes onto separate discs
that are digitally signed and delivered independently to a central counting
place. The digital signature is a 128-bit unique identifier generated from
the voting data. If the data were changed in transit, the identifier would
change too, raising red flags that something went wrong.
The machine does not include a voter-verifiable receipt, something critics
of U.S. systems want added to machines and voting machine makers have
resisted.
A voter-verifiable receipt is a printout from the machine, allowing the
voter to check the vote before depositing the receipt into a secure ballot
box at the polling station. It can be used as a paper audit trail in case of
a recount.
Green said the commission rejected the printout feature to keep expenses
down. The system cost $125,000 to develop and implement. The printouts would
have increased that cost significantly, primarily to pay for personnel to
manage and secure the receipts and make sure voters didn't walk off with
them.
Quinn, however, thinks all e-voting systems should offer a receipt. "There's
no reason voters should trust a system that doesn't have it, and they
shouldn't be asked to," he said.
"Why on earth should (voters) have to trust me – someone with a vested
interest in the project's success?" he said. "A voter-verified audit trail
is the only way to 'prove' the system's integrity to the vast majority of
electors, who after all, own the democracy."
As for the costs of securing and storing such receipts, Quinn said, "Did
anyone ever say that democracy was meant to be cheap?"
Quinn also believes that voting systems must use open-source software.
"The keystone of democracy is information," he said. "You have a big problem
when people don't have enough information to make up their minds or, even
worse, they have misleading information and make up their minds in a way
that would be contrary to what they would decide if they had the full story.
"Any transparency you can add to that process is going to enhance the
democracy and, conversely, any information you remove from that process is
going to undermine your democracy."
The issues of voter-verifiable receipts and secret voting systems could be
resolved in the United States by a bill introduced to the House of
Representatives last May by Rep. Rush Holt (D-New Jersey). The bill would
force voting-machine makers nationwide to provide receipts and make the
source code for voting machines open to the public. The bill has 50
co-sponsors so far, all of them Democrats.
"If a voting system precludes any notion of a meaningful recount, is cloaked
in secrecy and controlled by individuals with conflicts of interest, why
would anyone buy it?," Quinn said. "At the very least give citizens the
right to choose whether they want to use paper ballots … thus allowing
each elector to be personally satisfied as to the integrity of the process
in which they are participating."
Quinn, who was working in Chicago for Motorola during the 2000 presidential
election, says he is "gob smacked" by what he sees happening among U.S.
electronic voting machine makers, whom he says have too much control over
the democratic process.
It has been widely reported that Ohio-based Diebold Election Systems, one of
the biggest U.S. voting-machine makers, purposely disabled some of the
security features in its software. According to reports the move left a
backdoor in the system through which someone could enter and manipulate
data. In addition, Walden O'Dell, Diebold Election System's chief executive,
is a leading fundraiser for the Republican Party. He stated recently that he
was "committed to helping Ohio deliver its electoral votes to the president
next year.''
"The only possible motive I can see for disabling some of the security
mechanisms and features in their system is to be able to rig elections,"
Quinn said. "It is, at best, bad programming; at worst, the system has been
designed to rig an election."
"I can't imagine what it must be like to be an American in the midst of this
and watching what's going on," Quinn added. "Democracy is for the voters,
not for the companies making the machines…. I would really like to think
that when it finally seeps in to the collective American psyche that their
sacred Democracy has been so blatantly abused, they will get mad."
But he says that the security of voting systems in the U.S. shouldn't
concern Americans alone.
"After all, we've all got a stake in who's in the White House these days.
I'm actually prone to think that the rest of the world should get a vote in
your elections since, quite frankly, the U.S. policy affects the rest of the
world so heavily."
document.onLoad=write_script(randnum)