His intemperate tone aside, Dan Geer is right about one thing:  most 
academic (and especially cryptographic) papers on voting miss some very 
important threat models.  On the other hand, the threats in the current 
system are not always obvious, especially since they depend in many 
cases on practice, as opposed to law.  Let me give a few examples.

In North Carolina, in the early 1970's at least, it was quite common 
for (probably married) couples to enter the voting booth together.  
They'd cast one vote; the woman would the leave, and the man would cast 
his vote.  I saw this happen many times, despite laws against it.  (For 
the record, this seemed to be most common among older white couples.
Some of the couples, at least, appeared to be old enough that this pattern
might have started when women were first granted the right to vote in 
the U.S. (1920).)

On the other hand, North Carolina absentee ballots at the time had to 
be notarized, which deals with some of the threats.  But I don't know 
how this was carried out in practice.

Paper ballots?  While they don't present as much of a threat to 
privacy, the phrase "ballot-box stuffing" clearly doesn't refer to voting
machines.  The counting process is also subject to many more abuses, 
including injection of phony ballots, and the removal -- by legal means 
or otherwise -- of "wrong" votes.  (For legal means of removing 
ballots, read the fine print in your local election laws, paying 
attention to details such as how a vote has to be indicated, what 
extraneous marks are allowed on a ballot, etc.  Then ask yourself who 
will be better at challenging ballots during the tabulation process:  
operatives from the local political machine, student volunteers for an 
upstart but nevertheless major candidate, or the workers for some 
minor-party candidate who doesn't have enough people to cover all of 
the polling places in the county, let alone the state.)

For that matter, in the time and place where I was involved in such 
things, the local politicos wanted nothing to do with voting machines, 
for completely honest reasons.  They *loved* to look at the patterns of 
votes on the paper ballots, since that gave them information on voter 
preference groupings.  That isn't a threat to individual privacy, but 
it's in the same category as a lot of targeted marketing efforts.

But the easiest way to manipulate an election's results doesn't involve 
vote fraud at all.  Rather, you use and abuse the registration laws, to 
ensure that your supporters are registered and will vote, while your 
opponents' supporters will be discouraged.  This is easiest, of course, 
when your opponents' supporters are members of some marginalized group, 
such as students in a college town (I was on the receiving end of this 
one a few times), blacks, recent immigrants, etc.  Mind you, I'm 
speaking of people who are legally entitled to vote, but might be 
easily intimidated, harassed by a challenge that would, ultimately, be 
dismissed but is a nuisance to fight, etc.

If you asked me what the biggest risk was that is peculiar Internet voting,
I'd point to the security (physical, procedural, and software-related) 
of the central site.  Worms and other malware are probably less of a 
threat than physical coercion at home; however, they scale better.  
(The idea of letting folks vote multiple times, with the last vote 
being the one that counts, is probably a bad idea, partly because it 
requires that accountable votes be kept around the system for longer, 
but also because it would leave traces that a subsequent infection with 
malware could exploit.  Currently, my computer knows nothing of what 
voting precinct I reside in, which means that vote fraud software would 
have a hard time.  Nor are electronic spread patterns conducive to 
election worms, since my correspondents probably don't live in my 
precinct or even my country.  If I can vote more than once, the 
software knows to stick around and wait for me to revote.)

And yes, buggy or malicious central site software isn't unique to 
Internet voting.  But the latter is even more complex, and hence would 
(note: note "could", "would") have more holes.

Bottom line:  understand all of the relevant threats, and pick your 
poison.  No voting scheme is immune.

                --Steve Bellovin



Reply via email to