D.C. Web voting flaw could have led to compromised ballots
Flaw in Digital Vote by Mail system let ballots be accessed, modified, replaced
Computerworld - A major security flaw in D.C.'s new Digital Vote by Mail system allowed researchers to access, modify and completely replace marked ballots in the system.
The flaw was discovered by security researchers at the University of Michigan during public tests of the system last week, a discovery that prompted election officials in the District of Columbia to scale back their use of a Web application for overseas voters in next month's elections.
The ability to change ballots was one among several issues discovered during the tests, which are scheduled to go on until the end of this week.
According to Alex Halderman, an assistant professor of computer science at the University of Michigan, the flaw allowed the researchers to access the database username and password and the public key used to encrypt ballots. In addition, researchers found they could install a backdoor on the server for viewing and recording votes and the names of those who cast them, Halderman said in a blog post yesterday.
To show they had complete control of the system, the researchers even tweaked the application so that voters would be greeted with the University of Michigan fight song when they landed on the vote confirmation page.
Halderman described the vulnerability as a shell injection flaw in the ballot upload function. "If this particular problem had not existed, I'm confident that we would have found another way to attack the system," he wrote.
D.C.'s new Digital Vote by Mail system is designed to let military personnel and U.S. civilians who are overseas to receive and cast ballots over the Web using a previously provided PIN to authenticate themselves.
The system is designed to let voters print out a ballot from the Web, fill it out and send it back to their precincts via postal mail. It also allows overseas voters to send a copy of their marked ballot back via e-mail or fax.
A third option would have allowed them to use the Web application to digitally mark the ballot before sending it back in encrypted fashion to election officials in their precincts via the Web.
Following the discovery of the security flaws, officials at D.C.'s Board of Elections and Ethics announced this week that they will not allow voters to use Digital Vote by Mail to send back ballots. While voters can still download ballots via the application, they will need to choose one of the other options to send it back.
Paul Stenbjorn, director of information service for the board, today said that the decision means the most controversial portion of the system will not be used in upcoming elections. Given that election day -- Nov. 2 -- is now less than four weeks away, the board has decided not to allow digital ballot return.
"We have redeployed the public testing, but it is only for the non-controversial half, where voters can download blank ballots," he said. Stenbjorn went on to say that the public testing is being done precisely to uncover the kinds of issues discovered by the researchers.
The system will be available for more testing after this year's elections to weed out all issues and correct them, he said. "Hopefully they can tell us not only what is wrong but help" fix the problems, he said.
D.C.'s Digital Vote by Mail system is one of many that are being implemented around the country in response to the Military and Overseas Voter Empowerment (MOVE) Act of 2009. It is the first, though, to be based entirely on open-source technology.
Digital Vote by Mail is based on software from the Open Source Digital Voting Foundation, a group developing voting systems based on open-source technology. It's written using the Ruby on Rails framework and runs on an Apache Web server and MYSQL database, according to Halderman.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Government IT in Computerworld's Government IT Topic Center.
This state transportation department uses computer science students from a local university as programming interns, and everyone is happy with the arrangement -- until one intern learns how to bring down the mainframe.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Path Selection Infographic
- Path Selection Infographic
- Hyperconvergence Infographic
- A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era
- From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs
- If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity... All Government IT White Papers
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the...
- Endpoint Data Management: Protecting the Perimeter of the Internet of Things Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and...
- How to Protect Enterprise Data Yet Enable Secure Access for End Users Learn how BYOD, Big Data and the use of rogue applications and devices is putting corporate data at risk, best practices from IT...
- All Government IT Webcasts