October 6, 2022

Archives for June 2020

Safely opening PDFs received by e-mail (or fax?!)

Many election administrators in U.S. states and counties need to receive and open PDF files from voters. Some of these administrators receive these PDFs as e-mail attachments. These may be filled-out voter registration forms, or even voted ballots from UOCAVA (overseas and military) voters. We all know that malware can lurk in e-mail attachments; how can those election officials protect themselves from being hacked?

Internet return of voted ballots is inherently insecure; that’s a separate issue and I’ll discuss it below. For now, how can one safely open a PDF attachment?

I discussed this question with Dan Guido, cybersecurity consultant and CEO of trailofbits.com. The safe way to view a PDF is inside the Chrome or Firefox browser. Printing a PDF directly from Chrome (or Firefox) to your printer is reasonably safe. The unsafe way to view a PDF is with your favorite PDF-viewer app such as Adobe Reader.

The reason is simple: Google (for Chrome) and Mozilla (for Firefox) have put enormous effort into making their PDF viewers safe, putting them inside a “sandbox” that the hackers can’t get out of — and they’ve largely succeeded.

The PDF file format has hundreds of obscure features and complex functionality that are not needed for simple documents. Chrome and Firefox don’t bother to understand the obscure features: they concentrate on getting the common features displayed safely. On the other hand, Adobe Reader does handle all the features of PDF; that’s a much larger thing to get perfectly right, and (perhaps) security is not Adobe’s highest priority.

Sometimes that means that Chrome or Firefox don’t render your document properly; but this is unlikely to be a problem for simple documents such as voter-registration forms or optical-scan ballots.

In some ways that’s a bit disappointing. I like Adobe Reader’s navigation and document-viewing facilities much more than I like the browser’s built-in PDF display. But I should be careful to use Adobe tools only for documents whose provenance I know, or that have been otherwise vetted.

If you do save your PDF to a file, and are tempted to open it later: again, you can use Chrome or Firefox to open it. (See also: PDF.js) If you want to open it in a full-featured (but less secure) tool, first use a PDF “triage tool” such as PDFid, which will scan the file and tell you if anything looks suspicious.

Is it safe to use Fax?

Many jurisdictions still permit (or require) forms and ballots to be sent to them by Fax. Is that safe?

Once upon a time, a “fax machine” was connected to a “land line” that went through the “phone network.” How safe that was in 1985 is no longer relevant today, when nobody has a “fax machine” and the “phone network” is the Internet.

Most voters, and many election administrators, use on-line fax services such as HelloFax. The voter logs in and upload a PDF file; the fax service converts it to a fax-format bitstream and sends it into the part of the Internet called “the phone system”; the receiver logs in (perhaps to a different on-line fax service) and downloads a PDF file that has been converted from the bitstream.

This has so many points of insecurity: the sender’s online-fax service company may be more or less vulnerable to hackers (or insiders); the receiver’s online-fax service, ditto; and the fax-format bitstream is transmitted unencrypted, unauthenticated across the phone network.

In contrast, e-mail can be a lot more secure than that. If you use a major e-mail provider (such as gmail, Microsoft, fastmail) that knows what it’s doing; and if the recipient also uses a reputable e-mail provider, then: your e-mail is uploaded encrypted (and authenticated) to an SMTP server, which goes encrypted (and authenticated) to another SMTP server, which is downloaded encrypted (and authenticated) to the recipient’s mail reader. The vast majority of Internet e-mail traffic is protected this way.

So e-mail your stuff, don’t fax it.

Is e-mail secure? Can we vote that way?

If e-mail is so much more secure than it was 30 years ago, can we safely vote by e-mail?

Unfortunately, no. Even if Internet messages (by e-mail or other protocols) are safe in transmission, the biggest security lapses are in the server computers and especially in the client’s (voter’s) computers. Hackers who can penetrate the security of those systems can change votes before they’re sent, or after they’re received (but before they’re counted).

Furthermore, e-mail is sent from the voter’s computer to the SMTP server (at Google, or Microsoft, or fastmail…) where it is unencrypted and reencrypted for sending to the receiver’s SMTP server (at Microsoft, or fastmail, or Google, …). It’s like, you mail your absentee ballot to your landlord, who takes it out of its envelope, puts it in a fresh envelope, and mails it to an election official. Even if we trust our landlord (and I expect Google, Microsoft, and fastmail are doing a good job), should we need to trust this intermediary? The citizenry elect their government; we don’t entrust this process to a few big tech companies.

And finally, 6% of email (that’s either outbound or inbound from gmail.com) is still unencrypted–that is, insecure. Six percent may not seem like a lot, but it’s millions of users.

Is e-mail voter-registration secure enough?

Internet return of voted ballots, which is not securable by any known technology. But voter-registration can reasonably be done by e-mail: the voter sends in a form, perhaps a scan-to-PDF of their printed and signed registration form. The reason this can work, when it can’t work for voted ballots, is the ability to audit the individual transaction: after a few days, the voter can check the status of their registration with the election official, or the election official can contact the voter to check up. So even if there’s hacking in the client or server computer, it can be detected and corrected. With ballots, we have the secret ballot: nobody is supposed to learn how you voted. Without the ability to check and correct later, “did my ballot get counted for the person I voted for?”, internet voting is insecurable.

NJ agrees No Internet voting in July, vague about November

A formal settlement agreement has been submitted to the NJ Superior Court regarding online ballot access in the 2020 elections.

On May 4, 2020,  New Jersey’s Division of Elections was caught trying to adopt vote-by-Internet on the stealth, even though the law forbids it.  That is, not only is Internet voting inherently insecurable, there’s a 2010 Court Order still in effect that says, “computers utilized for election-related duties shall at no time be connected to the Internet.”  That’s based on the New Jersey Superior Court’s finding that “As long as computers, dedicated to handling election matters, are connected to the Internet, the safety and security of our voting systems are in jeopardy,” in the case of Gusciora v. Corzine.

Penny Venetis, attorney for the Gusciora plaintiffs, filed a motion (in early May) with the Court, to make the State abandon its plans for online voting, on the basis that receiving ballots e-mailed or uploaded on the Internet clearly violates this order.  The Court ordered the parties to reach a settlement by June 8, or report their separate positions.

The State’s initial position was that they would use Democracy Live’s “OmniBallot” online voting system, that permits the voter to choose (1) ballot download (for printing and marking at home), (2) ballot download and mark-on-home-computer (for the voter to print and physically mail), or (3) ballot upload through Democracy Live’s portal.   Democracy Live’s voting system is insecure in all sorts of unsurprising and surprising ways.  Even so, the State proposed to use this for disabled voters, overseas and military voters, and, basically, any voter who wanted to use it.   Doing so would leave New Jersey’s 2020 election extremely insecure.

Plaintiffs’ position was that (1) ballot download has several security problems and should therefore be limited to voters who absolutely need it, specifically, voters with disabilities and military/overseas voters;  (2) computerized ballot marking has even more security problems and should be limited to voters with disabilities that prevent them from hand-marking a paper ballot; (3) no votes should be transmitted over the internet; and (4) if the State is outsourcing ballot-delivery services to private companies, then those companies should not snarf and resell all sorts of personal information about voters and their browser-fingerprints.

The parties did reach a compromise settlement; in mid-June they agreed:

  1. An “electronic ballot access or delivery system” may be used only for public health purposes during the July 2020 primary and November 2020 general election, only for voters with disabilities and military/overseas voters.
  2. Unvoted ballots may be electronically delivered to those voters.
  3. Voters with disabilities may print the unvoted ballot for hand marking and return by U.S. mail or other nonelectronic means; the military or overseas voters may print the ballot for hand marking and then return it by the means specified for them in New Jersey law (N.J.S.A. 19:59).
  4. A voter with a disability who is unable to mark a ballot by hand may be given the choice to use accessible technology to indicate vote selections on the computer, then print and mail (or otherwise physically return) the paper ballot.
  5. Voters’ ballot selections (votes) are never to be transmitted over the internet.  No personal voter information (or information about the voter’s computer or browser) may be gathered, analyzed, or sold.
  6. The State will follow these rules (and write them into vendor contracts) for the July primary.  If the State contemplates using any system in November that does not satisfy these criteria, the State must notify the Plaintiffs no later than August 21st — and if they do so, the schedule is laid out for Plaintiffs and the State to file briefs in whatever lawsuit might ensue.

Although the State didn’t tell us until much later, on May 28th they put out a Request for Bids for a system satisfying our criteria; by June 7th they had already selected a vendor (Voting Works) whose product looks a lot more respectful, compared to Democracy Live, of basic election security principles and voters’ privacy (based on the bid document that Voting Works sent to the State, and on an interview with an executive at Voting Works).

Even so, during the settlement negotiations in early June the State vigorously resisted admitting that Internet voting is not permitted by New Jersey law.  That’s even though: New Jersey statutes clearly enumerate what kinds of voting systems are permissible, and Internet voting is not among them; the statutes clearly lay out the certification requirements for voting systems, and Internet voting is not certified; and the Court Order pretty clearly says that voting systems are not to be connected to the Internet.

Based on the compromise agreement, at least this time the State can’t covertly adopt Internet voting. If the State notifies Prof. Venetis on August 21 that they’re planning to use some sort of on-line voting system that does not satisfy the criteria enumerated above, then she will seek a court order to prevent any internet-based system from being used. Based on the language of the court’s 2010 order “computers utilized for election-related duties shall at no time be connected to the Internet” and the court’s 2010 opinion (quoted in the first paragraph above), the State will have an uphill battle defending an internet-based voting system.

Democracy Live internet voting: unsurprisingly insecure, and surprisingly insecure

The OmniBallot internet voting system from Democracy Live finds surprising new ways to be insecure, in addition to the usual (severe, fatal) insecurities common to all internet voting systems.

There’s a very clear scientific consensus that “the Internet should not be used for the return of marked ballots” because “no known technology guarantees the secrecy, security, and verifiability of a marked ballot transmitted over the Internet.” That’s from the National Academies 2018 consensus study report, consistent with May 2020 recommendations from the U.S. EAC/NIST/FBI/CISA.

So it is no surprise that this internet voting system (Washington D.C., 2010) is insecure , and this one (Estonia 2014) is insecure, and that internet voting system is insecure (Australia 2015) , and this one (Sctyl, Switzerland 2019), and that one (Voatz, West Virginia 2020)

A new report by Michael Specter (MIT) and Alex Halderman (U. of Michigan) demonstrates that the OmniBallot internet voting system from Democracy Live is fatally insecure. That by itself is not surprising, as “no known technology” could make it secure. What’s surprising is all the unexpected insecurities that Democracy Live crammed into OmniBallot–and the way that Democracy Live skims so much of the voter’s private information.

OmniBallot has three modes of use:  (1) internet download of unvoted absentee ballots to print at home and mark by hand; (2) using the voter’s home computer to mark ballot selections, for printing ballots at home to be mailed back; and (3) “online voting,” which is the internet return of voted ballots as PDF files.  

OmniBallot’s online voting feature (internet return of voted ballots as PDF files) “uses a simplistic approach” and “as a result, votes returned online can be altered, potentially without detection, by a wide range of parties,” including either insiders or hackers. Not surprising: this is the standard insecurity of online voting systems: hackers can steal votes (in a “scalable” way, according to the EAC/NIST/FBI/CISA report).

Surprise! Insiders at any of four private companies (Democracy Live, Google, Amazon, Cloudflare), or any hackers who manage to hack into these companies, can steal votes. That’s because Democracy Live doesn’t run its own servers–it uses all of these services in building its own product. Well, in hindsight, not so surprising–this is the way modern internet services work.

OmniBallot has a mode of use in which the voter uses her home computer to mark a ballot, then print that ballot as an optical-scan absentee ballot to be mailed in. In this mode it appears that the voter’s ballot selections (votes) are not being sent over the internet. Surprise! Even in this mode of use, the OmniBallot system “send[s] the voter’s identity and ballot selections to Democracy Live” (and Amazon). 

Not a surprise: Even when OmniBallot is used only for downloading unvoted absentee ballots to print at home and mark by hand, “there are important security and privacy risks …  including the risk that ballots could be … subtly manipulated in ways that cause them to be counted incorrectly.” It’s well understood that a hacker could alter the PDF file to rearrange where the fill-in-the-ovals are, so an optical-scanner would count a vote for Smith as a vote for Jones. I’ll discuss this further in the comments below.

And finally, Surprise! “In all modes of operation, Democracy Live receives a wealth of sensitive personally identifiable information: voters’ names, addresses, dates of birth, physical locations, party affiliations, and partial social security numbers. When ballots are marked or returned online, the company also receives voters’ ballot selections, and it collects a browser fingerprint during online voting. This information would be highly valuable for political purposes or for election interference, as it could be used to target ads or disinformation campaigns based on the voter’s fine-grained preferences. Nevertheless, OmniBallot has no posted privacy policy, and it is unclear whether there are any effective legal limitations on the company’s use of the data.

This is shocking: it’s bad enough that companies like Cambridge Analytica gathered huge amounts of personal information on individual voters for the purposes of microtargeting disinformation–they took that data from people who made the mistake of signing up for Facebook. But the citizen who just wants to exercise their right to vote–for the State to force that voter to surrender personally identifying data to a private company with no apparent restrictions on its use–goes beyond even the Facebook scandal. No state should participate in such a scheme.