Jump to content
IndiaDivine.org

Ballot Boxing

Rate this topic


Guest guest

Recommended Posts

http://www.jewishtimes.com/2435.stm

 

 

 

Ballot Boxing

 

Joel N. Shurkin

 

OCTOBER 29, 2004

Dr. Rubin

 

Last month, U.S. Sen. Barbara A. Mikulski decided to try one of

Maryland's new voting machines in Takoma Park. It was a brand-new

Diebold AccuVote-TS. The state of Maryland has just spent $55 million

for the ATM-like electronic voting devices to be used in the upcoming

presidential election.

 

The AccuVote, acting just as a demonstration, offered two choices:

" yes " and " no. " Sen. Mikulski pressed " no. " The machine registered " yes. "

 

The cackling sound you heard was Avi Rubin, technical director of the

Information Security Institute at Johns Hopkins. But, as Dr. Rubin

will openly confess, it really wasn't funny.

 

One-third of voters in the November election will be using electronic

voting machines, simple-minded computers that record and report votes.

Dr. Rubin and many computer scientists see nothing less than a threat

to American democracy in these machines. They are easy to tamper with,

he believes, and that makes it possible to rig elections. Indeed,

there already are conspiracy theories flying around the Internet of a

conservative plot to steal the presidential election. (A number of

Conservative groups are equally unhappy about the instruments.) In

many cases they are set up to prevent recounts in case of disputes.

 

Plots to the contrary, after what happened in Florida in 2000 — and

what is happening in Florida now — attention must be paid.

 

It was Dr. Rubin who first raised serious security issues with the

electronic voting machines and who has taken the brunt of attacks from

the voting machine industry. He instantly rose from an obscure Jewish

computer scientist to a media star, and he's having a wonderful time.

 

" After my study broke, the public relations office had television

crews lined up outside my office and for a five-week stretch, I was on

national television every week, " he said.

 

He is still quoted regularly in the national media on the debate over

the machines as the election nears, and this spring he reached the

apogee of contemporary culture, a brief appearance as a " Zen moment "

on the " Daily Show with Jon Stewart " on cable. He was scheduled for

" 60 Minutes " this week.

 

Someone recognized him at the swimming pool at the Owings Mills Jewish

Community Center as the guy on television, and even his plumber

announced himself impressed.

 

How much effect his efforts have had in curbing the use of the

electronic devices or in modifying how they are used is not clear.

Several states, confronted with challenges to the integrity of their

elections, have backed away from using them, several have changed the

voting method to make them more secure and others — most particularly

Maryland — became defensive and refused to budge.

 

" His study had an enormous effect, " said Barbara Simons, former

president of the Association of Computing Machines (ACM), the computer

scientists' professional organization. " Of course it didn't prevent

Maryland from buying the stupid machines. "

 

" What we're fighting about is democracy. If we lose confidence that

our votes will be accurately counted, that's it, " she said.

 

The voting machines are technically known as Direct Recording

Electronic voting machines or DREs.

 

Dr. Rubin's adventure began last year almost by accident. Bev Harris,

a writer in Renton, Wash., was researching a book on electronic voting

in January 2003. While " googling " for background, she stumbled on a

Web site that turned out to be an electronic archive of a company

bought by Diebold Inc. The site was huge, containing hundreds of

unprotected company files that could be downloaded by anyone who

wanted them. One file hinted that Diebold had put code that was

uncertified for elections in DREs headed for a Georgia election, which

is illegal, so she downloaded it to see. The download took 40 hours

and filled seven CDs.

 

She posted what she found on a Web site in New Zealand (geographic

distance means nothing to these people) and someone told her that one

file looked suspiciously like Diebold's source code, the programming

that lies at the heart of the DREs.

 

Posting unprotected source codes for a commercial product on the Web

is rare and considered unspeakably stupid in the computer world, so,

word spread quickly, and a computer scientist at Stanford University

told Dr. Rubin. Dr. Rubin, in turn called in Adam Stubblefield, a

doctoral student at Hopkins, and Tadayoshi Kohno, a summer graduate

student, telling them they needed to drop everything and come see what

was on his computer. What they were looking at, they concluded, was a

program compiled in 2000 and its April 2002 update, apparently posted

so programmers could work on it. It was nothing less than the

programming that made the voting machines voting machines.

 

The students pored over 49,609 lines of " code, " computer language

commands that look like hieroglyphics to anyone not trained as a

programmer. One line blew them away. It means nothing to laymen, but

it was enough to make Dr. Rubin's hair stand on end.

 

#define DESKEY ((des_key* " F2654hd4 " .

 

All commercial programs have provisions to be encrypted, protected by

secret code so that no one could read or change the contents without

the encryption key. That is particularly true of programs that require

transmission by telephone or wireless networks. The line that

staggered the Hopkins team told them first, that the method used to

encrypt the Diebold machines was a method called Digital Encryption

Standard (DES), a code that was broken in 1997 and is no longer used

by anyone to secure programs. F2654hd4 was the key to the encryption.

 

The programmers had done the equivalent of putting the family jewels

in a safe, putting up a blinking neon sign reading " Jewels in Here! "

and taping the lock's combination to the safe door. Moreover, because

the key was in the source code, all Diebold machines responded to the

same key. Unlock one, you can unlock them all.

 

That was only one of the problems Dr. Rubin's team found. The computer

language used to write the program, C++, is never recommended for

secure programs because hackers can — and do — attack it easily. There

are other programming languages far more secure that the Diebold

programmers ignored, perhaps because they didn't know them well.

 

Additionally, all large computer programs, which can sometimes run

into the hundreds of thousands of lines, are written by teams and

therefore are extensively annotated. One programmer or a team puts in

an instruction and then adds a note explaining why it was done that

way. Other programmers can add comments or base what they do on the

reasoning in the comments. Or, they can use the annotations to hunt

for bugs when the program misbehaves.

 

Dr. Rubin said that when he worked for IBM one summer, there were

three pages of notes for every line of code, and no line was added

until committees of reviewers approved. Whole pages of the Diebold

source code were without annotations or signs of review, something you

don't see on professionally written programs, he said. Some of the

annotations that existed even warned that the code contained unfixed

bugs. Clearly, Dr. Rubin thought, Diebold was not using the top of the

class at M.I.T. to write programs for its voting machines.

Dr. Rubin

 

The code is so badly written, Dr. Rubin shows sections to audiences at

computer science conferences to get laughs.

 

Moreover, the Diebold program was written for computers using Windows,

Microsoft's relatively unstable and notoriously insecure operating

system, the target of choice for hackers everywhere. (Almost all the

staff of Hopkins' security institute uses Apple Macintoshes, which are

virus-free and far more difficult to tinker with.)

 

Oh, there is more. The method chosen by Diebold for voting required

the voting officials to check the registration of each voter and then

hand them a " smartcard, " a credit card-like piece of plastic

containing digital information that essentially turns the machine on.

The machine reads the card and if the information is correct, permits

the voter to cast his or her ballot.

 

The smartcards chosen for the Diebold DREs were not encrypted and

could be forged by a 15-year-old in his bedroom at an equipment cost

of about three weeks' allowance, Dr. Rubin said. Anyone with a phony

card could vote more than once.

 

Dr. Rubin, the Hopkins students and a colleague from Rice University

posted their findings on the Internet (later in an engineering

journal) and then Dr. Rubin, who is not shy, called John Schwartz of

The New York Times, at which point, all hell broke loose.

 

The reaction of the voting machine industry — especially Diebold, one

of four voting machine manufacturers — was furious. The first comment,

besides attacking Dr. Rubin and company, was to deny there were

problems. When other studies showed the same things, the defense

switched to admitting there were problems but they had been fixed.

Diebold says the programming in the machines it sells now — including

those to be used in Maryland — is not the same programming the Hopkins

study looked at. Since the programming also is proprietary and Diebold

won't show any new versions to anyone, the claims must go unverified,

which is a whole other problem.

 

Dr. Rubin does not believe the machines are fixable. Diebold says the

smartcards now are encrypted.

 

" The problems were at different levels. Some are fixable, like they

used broken encryption, but you can fix that — put in good encryption.

But there was a very bad software engineering process that went into

the machines. It was clear looking at the code. If you have a software

package that is as bad, the answer is not to try to plug the holes and

fix it because every time you do that, you introduce new bugs. I don't

think you should try to evolve 45,000 lines of broken code into a

system that's secure. You need to start over with a more talented and

experienced team.

 

" I joked with my wife about wearing a bulletproof vest, " Dr. Rubin

said. " We lost them a lot of business and put their industry in turmoil. "

 

Nonetheless, whatever is in those machines is what you will use in the

November election and so will voters in 38 states.

 

He was not planning on such a public life.

 

He was born in Kansas where his parents, both academics, were graduate

students. In something of a reversal of roles, his father became an

English professor (specialty: English Jews in English literature) and

his mother is a mechanical engineer, the type of person who writes

computer programs in FORTRAN to create recipes for dinner.

 

In 1970, they made aliyah..

 

The Rubins taught in Israeli universities for six years, Then Israel

was inundated with refugees from the Soviet Union and the universities

thought they were in more need than former Americans, so the Rubins

lost tenure. They moved back to the United States in 1976. The family

moved to Alabama where Dr. Rubin was in the first graduating class at

the Birmingham Jewish day school. Dr. Rubin and his three siblings and

parents (who now teach at Vanderbilt) often speak Hebrew when they are

together.

 

He got his Ph.D. in computer science from the University of Michigan.

 

" When I got my Ph.D., my adviser said, you have a Ph.D., you're a

computer scientist. Don't be too narrow. Now I've managed to become

synonymous not only with computer security but a tiny little subfield

of it, " he said.

 

What he also got involved with was a battle between bureaucrats,

including those who staked their careers on buying DREs, and

academics. Both sides accuse the other of not knowing what they are

talking about. Most of his colleagues in computer science, he said,

support his position. Dr. Simons, now a co-chair of ACM's public

policy committee, agreed.

 

Other computer security specialists, including the National Security

Agency, testified in support of the Hopkins study.

 

Legislators, concerned with what the Hopkins study showed, asked the

Department of Legislative Services to review the state's purchase of

the Diebold machines and held hearings. First, they hired a firm

called SAIC to study the situation, and then hired RABA Technologies,

a Maryland consulting company to review both studies. SAIC said Dr.

Rubin was correct in his assessment but didn't completely understand

the Maryland voting system. RABA supported the Hopkins study in most

of its accusations and found even more problems.

 

RABA's Michael A. Wertheimer and a team of company hackers broke into

the Board of Elections computer, changed the results of a mock

election and then backed out without leaving a trace.

 

" We did it in under five minutes, " he told " The Daily Show. "

 

Then there is what happens when the results are uploaded from the DREs

to the state's computer.

 

" You're more secure buying a book from Amazon, " he concluded.

Dr. Rubin

 

He also found that the Maryland election officials had not upgraded

Windows with security patches from Microsoft and were, in fact, 15

upgrades behind. Every time they tried to load a patch, Windows crashed.

 

Mr. Wertheimer finally suggested the machines be wrapped in

tamper-resistant tape around the machines, something Linda Lamone, the

state's election administrator, says can't be done in time and would

look awful.

 

More important to Dr. Rubin, " RABA found the Hopkins report to be a

thorough, independent review of the AccuVote source code and should be

credited with raising valid issues that have resulted in considerable

improvements, " concluded RABA.

 

But the state hasn't done enough improvements to suit Dr. Rubin and

his allies.

 

There are 150 million registered voters in America and a third will be

using voting machines despite the fact the machines have never been

tested in a mass scale. Anecdotally, there are reasons for concern.

 

New Mexico, a leader in electronic voting, went to Al Gore in 2000 by

366 votes. In one county, 678 out of 2,300 votes cast went uncounted.

The voting machines lost them.

 

Remember the hanging chads in Florida? They weren't the only problem

the state has had with elections. Some areas used electronic machines,

including Miami-Dade County. A study by the American Civil Liberties

Union reported that in the Democratic gubernatorial primary in 2002, 8

percent of the votes cast in 31 Miami-Dade precincts was lost.

 

California bought the machines, decertified them and changed its mind.

It is suing Diebold and once threatened criminal charges on grounds

that the company made false claims about the machines. Ohio, one of

the election's swing states, is only one of several that have pulled

the plug on DREs, as has Missouri. The revelation that Diebold made

political contributions to the Republican Party didn't make critics

any happier, although Diebold's competitors are Democratic contributors.

 

Critics have been stunned by the reaction of Maryland officials,

especially Ms.Lamone, the state's administrator, who apparently is now

fighting for her job. Officials have defended the machines with a

passion that sometimes even exceeded the manufacturer's defense,

claiming all the problems have been fixed. Ms. Lamone went to court to

defend against a suit brought by a voter group to force the state to

change its system and she won.

 

" Maryland is acting as though they are the ones selling the machines

instead of buying them, " Dr. Rubin said. " I think there is some face

saving and some embarrassment. If you spend $55 million and someone

says it was a bonehead purchase you might get defensive. Some jobs are

on the line about this, I believe. "

 

Del. Jon Cardin (D-11th) defends the state's decision. He is a member

of the House Ways and Means Committee and participated in a summer

investigation of the voting process in Maryland. He said that of the

more than 100 suggestions made to improve the machines and the voting

process " almost every single one was complied with by the State Board

of Elections. " Part of the problem with sorting through the issues is

clear differences of opinion among the experts.

 

Mr. Cardin says that the rate of error in paper balloting is 7-9

percent, while the error rate with computers is minuscule. (A joint

study by the California Institute of Technology and the Massachusetts

Institute of Technology disagrees. Paper has the lowest error rate,

the study said. Electronic machines were no better than punch cards.

Mr. Cardin says he has not seen the study.)

 

Mr. Cardin also said breaking into the machines and changing votes

would be very difficult and require great computer skills and

technical knowledge and is hence very unlikely.

 

" I am [more] concerned that there is a contingent of people that have

lost confidence in the voting system, not in the integrity of voting, "

he said.

 

There is a process that can mitigate some of the danger: a paper

" trail. " The DREs would be attached to printers and whenever a vote

was cast, the printer would reproduce the vote on paper. The voter

could then certify that, unlike the machine Sen. Mikulski played with,

the DRE got it right. Also, if there were a need for a recount, there

would be a paper record of the votes. By comparing numbers, it would

even be possible to detect multiple votes or ballot stuffing.

 

Several states have implemented paper trails, and Nevada successfully

held an election this summer with paper backup that everyone,

including Dr. Rubin, thinks went well. " A paper trail keeps them

honest — if [the paper ballots] are counted, " Dr. Rubin said.

 

Nevada, however, wasn't using Diebold DREs and Diebold's machines

aren't designed for use with printers. Printers also cost money,

another reason for resistance by state officials.

 

Florida election officials (all Republicans), on the other hand, have

barred paper trails and ruled against manual recounts in case a result

is contested, a decision that was thrown out by a state court on Sept.

27. If the officials appeal and win, we would never know the true

winner of another close Florida election.

 

" If we have an election that is really close like we did in 2000 and

there are places in which the vote is disputed that were fully

electronic, we won't have hanging chads to recount, " Dr. Rubin said.

 

Another state without paper trails, of course, is Maryland, partly

because it is using Diebold's devices, and partly because of the

stubborn insistence by Ms. Lamone's office that paper trails are

unnecessary.

 

Sen. Mikulski, meanwhile, has signed onto a bill in Congress that

would make paper backup mandatory but not until 2006. Meanwhile, in

many places where results could be very close, it may not be possible

to do recounts and we may never know the outcome of the races. The

ACM's Dr. Simons thinks the upcoming election may wind up in court

again, and this time because of electronic voting. If there is

cheating, it may go undetected, she said.

Dr. Rubin

 

Dr. Rubin is keeping himself busy at Hopkins and as an expert witness

in computer security matters, a very lucrative trade. He also has a

raucous family at home with three young kids, including 2-year-old

twins. His eldest goes to Krieger Schechter Day School and Dr. Rubin

is on the school's computer technology advisory committee. The family

belongs to Chizuk Amuno.

 

Journalists and voting advocacy groups still regularly consult him

 

Dr. Rubin points out that there actually is an almost foolproof voting

method, hard to corrupt and capable of producing completely accurate

counts: paper.

 

Paper can be used in two ways, he said. One is simply having people

mark the ballots, put them in boxes for recounting later, the way it

was done in the 18th century and as far as anyone knows, still the

most exact way of running an election. Cheap too.

 

Another possibility, if people insist on 21st-century technology,

would be to take the paper ballots, put them in optical scanners and

let the scanners accumulate the votes. That might be faster than

manual counting, is very accurate, and if there are problems, election

officials can always go back and recount the paper ballots.

 

Stung a bit by the criticism that he — an academic — knew nothing

about voting procedures, Dr. Rubin volunteered to be an election judge

in Baltimore County in the spring. His experience is that well-run

voting places are of great help in protecting the integrity of the

vote. He no longer worries about the smartcard problem in efficient

polling places. With nine judges and five machines, it would have been

easy to spot someone fooling around in the booth.

 

One flaw he found worse than he expected is the use in the Diebold

plan of a " zero " machine, one of the DREs that would accumulate all

the votes in the other computers for counting. " There is no need to

attack all the machines, " he said. All a hacker had to do was attack

that one DRE, especially since that machine is the one that phones in

results, making it vulnerable in multiple ways.

 

He still doesn't think DREs are a good thing, even with a paper trail.

The only machines he prefers would be simple devices that act as

intermediaries between the voter and a printer. He is not worried

about people hacking the network between the voting machines and the

state computer.

 

" The biggest concern I have is that someone would rig the machines, "

Dr. Rubin said. " This would be somebody at the manufacturer or

somebody with physical access to the machines who could change the

software. Traditional Internet-based hacking is not the issue. "

 

If jurisdictions use paper trails to DREs, the same manufacturer

should not make both the DREs and the printers, he said. That would

reduce the chances of a conspiracy or at least broaden the conspiracy

and make it more difficult to operate and easier to detect. He admits,

however, that when he was a primary voting judge the people using the

Diebold DREs loved them.

 

" They raved about them to us judges. The most common comment was 'that

was so easy.' I can see why people take so much offense at the notion

that the machines are completely insecure... I was curious that voters

did not seem to question how their votes were recorded.

 

" I continue to believe that the Diebold voting machines represent a

huge threat to our democracy. I fundamentally believe that we have

thrown our trust in the outcome of our elections in the hands of a few

companies who are in a position to control the final outcomes of our

elections.

 

" The more e-voting is viewed as successful, the more it will be

adopted, " he said, " and the greater the risk when someone decides to

actually exploit the weaknesses in these systems.

 

" I am not against technology. I drive a car, get on airplanes and ride

elevators. However, if the code in any of these was as bad as

Diebold's software, I wouldn't. I think that the real difference is

the adversary model. If there were trillions of dollars worth of

incentives for people to rig elevators so that they crashed, I would

be advocating for only using stairs. "

 

 

To read more, pick up a copy of the Jewish Times at one of our

newsstand locations.

Link to comment
Share on other sites

Join the conversation

You are posting as a guest. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...