Thursday, March 23, 2017

Russian Hacking

Background

Many controversies have surrounded the past US presidential election between Donald Trump and Hillary Clinton, which resulted of Donald Trump being the new president of the United States. One main controversy was focused on the Russian interventions to help US candidate, Donald Trump win the US election.

A Timeline: Russia and President Trump (added by Dr. Suzie)
(This link is missing the graphic, but the timeline is below that).  It starts:

Secret CIA assessment

The CIA concluded that Russian operations, which included the exposure of thousands of hacked emails from the Democratic National Committee, were executed to hurt the election performance of Clinton. Trump continues to dismiss the CIA claims.

Also, during the 2016 election, the FBI issued warning to state election officials to be on the lookout for intrusions into their election systems and to take steps to upgrade security measures across the voting process, including voter registration, voter rolls and election-related websites. They issued this flash warning because they detected successful and attempted cyberattacks from Russia. Victims including Arizona, Illinois and both the Democratic and Republican parties. Because of these actions, something needs to be done before the next election.



How do we fix it?

Adida recommends a voting system that experts call end-to-end verification - encrypting the votes with STAR-Vote (Secure, Transparent, Auditable, and Reliable). This method uses a cryptographic system with real and physical voting machines and ballots. Thus, the installment of STAR-Vote would allow the public to verify the vote themselves creating a mousetrap and sharing it with everyone else, according to a county clerk in Texas.

How it works
  • Registered voters input their vote on a touchscreen machine. 
  • The machine prints their ballot with their choices with a receipt
  • Voters feed their printed ballot into a ballot box with a scanner 
  • The ballot box reads a barcode on the ballot and confirms to the network that the vote has been cast 
Back end
The input machine encrypts the results, shares the encrypted vote data with all the other voting machines at the polling place, and enters it into a database of all the encrypted votes that will be published online at the end of the election day. After the votes are published, anyone can use a tracking number on their receipt to look up their vote online and confirm that it was registered. The machine can also be challenged to test it and make sure that the vote was counted for the candidate that the voter chose. Once it has been decrypted, the vote doesn’t count anymore and must be redone.

3 comments:

  1. Encryption of votes sounds like a great idea that can help smooth out the process of votes and make it easier to count when tallying up the results. Voiding decrypted votes anytime before the official count definitely prevents voter suppression methods used by malicious parties. The encryption also keeps voter identity anonymous which i believe makes voting a more fulfilling process that allows citizens to confide in the system and vote more often. Awesome presentation!

    ReplyDelete
  2. Very relative topic. It is crazy that the most important and secret information in our country is getting easily exposed at will. There needs to be safer practices and more security for people that are dealing with such sensitive information.

    ReplyDelete
  3. I'm not sure why developed countries such as the US haven't yet implemented a system to make the overall election safer. The actual system utilized by the US is very similar than in my country, Brazil, and there are a lot of suspicions around the possibility of someone changing the poll results to their own benefits. This is a matter of national security, and should be addressed quickly.

    ReplyDelete