40
Rethinking Voter Coercion: The Realities Imposed by Technology Josh Benaloh Microsoft Research

Rethinking Voter Coercion - USENIX

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Rethinking Voter Coercion - USENIX

RethinkingVoter

Coercion:The Realities Imposed by Technology

Josh BenalohMicrosoft Research

Page 2: Rethinking Voter Coercion - USENIX

The Australian Ballot

August 13, 2013Josh Benaloh -- Microsoft Research

Page 3: Rethinking Voter Coercion - USENIX

The Australian Ballot

• Inception in 1850s

• Doesn’t just allow private voting … privacy is enforced!

August 13, 2013Josh Benaloh -- Microsoft Research

Page 4: Rethinking Voter Coercion - USENIX

How Relevant is the Australian Ballot?

• Of course, many systems that offer inferior protections against coercion are in common use (e.g. Vote by Mail).

• There are scattered reports of employer coercion.

• Spousal coercion seems to be a real issue.

• Best election practices dictate publicly-monitored in-person voting as the only effective protection against coercion.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 5: Rethinking Voter Coercion - USENIX

Camcorder Glasses

August 13, 2013Josh Benaloh -- Microsoft Research

Page 6: Rethinking Voter Coercion - USENIX

Camcorder Glasses

August 13, 2013Josh Benaloh -- Microsoft Research

Page 7: Rethinking Voter Coercion - USENIX

Camcorder Glasses

• KJB Security DVR260 Camcorder Sunglasses

• 2GB Internal Memory allows 5 hours of Video Recording

• Available from Amazon.com for under $20

August 13, 2013Josh Benaloh -- Microsoft Research

Page 8: Rethinking Voter Coercion - USENIX

Camcorder Glasses

August 13, 2013Josh Benaloh -- Microsoft Research

Page 9: Rethinking Voter Coercion - USENIX

Camcorder Glasses

SPY NET

Stealth Recording

Video Glasses

“Secretly Record

Up to 20 minutes Video”

Available for under $30.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 10: Rethinking Voter Coercion - USENIX

Peaceful Co-existence?

August 13, 2013Josh Benaloh -- Microsoft Research

Page 11: Rethinking Voter Coercion - USENIX

if slide_number == 11then gratuitous_mention = “David Wagner”

Page 12: Rethinking Voter Coercion - USENIX

Simple Coercion

• We go to poll together.

• I give you camcorder glasses.

• You sign in and vote.

• We exit poll together.

• You return glasses to me.

• I review your vote.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 13: Rethinking Voter Coercion - USENIX

if slide_number == 13then gratuitous_mention = “Dan Wallach”

Page 14: Rethinking Voter Coercion - USENIX

Varieties of Coercion

Perhaps a more careful analysis of different forms of coercion will give us some room to breathe.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 15: Rethinking Voter Coercion - USENIX

Coercion versus Vote-Selling

• Is there a difference between involuntarycoercion and voluntary vote-selling?

• Not really, a voter can voluntarily take the same actions.

• If a voter can be coerced, a voter can sell coercion rights.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 16: Rethinking Voter Coercion - USENIX

Local versus Remote Coercion

• Can the same attack be performed remotely?

• Yes.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 17: Rethinking Voter Coercion - USENIX

Remote Coercion

• Find a mirror near the polls.

• Get a gook look at yourself.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 18: Rethinking Voter Coercion - USENIX

Remote Coercion

• Sign in

August 13, 2013Josh Benaloh -- Microsoft Research

Page 19: Rethinking Voter Coercion - USENIX

Remote Coercion

• Vote

August 13, 2013Josh Benaloh -- Microsoft Research

Page 20: Rethinking Voter Coercion - USENIX

Remote Coercion

August 13, 2013Josh Benaloh -- Microsoft Research

• Perhaps even behind a curtain

Page 21: Rethinking Voter Coercion - USENIX

Remote Coercion

• Establish the date

August 13, 2013Josh Benaloh -- Microsoft Research

Page 22: Rethinking Voter Coercion - USENIX

Remote Coercion

• Send the recording

August 13, 2013Josh Benaloh -- Microsoft Research

Page 23: Rethinking Voter Coercion - USENIX

Retail versus Wholesale Coercion

• Are the attacks practical at a large scale?

• Yes.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 24: Rethinking Voter Coercion - USENIX

Scalable Remote Coercion

A coercer …

• need not spend $20 per voter per election

• can spot check videos of voting

• use high-speed playback

August 13, 2013Josh Benaloh -- Microsoft Research

Page 25: Rethinking Voter Coercion - USENIX

Time of Coercion

• Does time of coercion matter?

• Yes, coercion (vote-selling) must be premeditated.

• “Good” election protocols can prevent “after-the-fact” coercion.

• Some protocols can push the boundary time back so that coercion would have to be initiated prior to registration.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 26: Rethinking Voter Coercion - USENIX

Juels, Catalano, & Jakobsson

Remote Voting Protocol

• Legitimate credentials are obtained during a confidential registration phase.

• Voters (optionally) engage in interactive proofs to ensure that the credentials they receive are valid.

• Voters can generate additional illegitimate credentials.

• Any credentials can be used to cast an encrypted vote.

• Verifiable process applied to set of all votes cast produces a tally of legitimate votes only.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 27: Rethinking Voter Coercion - USENIX

Simplified (non-verifiable) JCJ

• A credential is just a random ID number.

• Election officials maintain a (secret) list of validly-issued IDs.

• Each vote is submitted with an ID.

• Only votes with legitimate IDs are counted.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 28: Rethinking Voter Coercion - USENIX

Voter Registration Scenarios

A high-tech tool

A basket of credentials

August 13, 2013Josh Benaloh -- Microsoft Research

Page 29: Rethinking Voter Coercion - USENIX

The Coerced Voter

• Register in person.

• Receive a legitimate credential.

• Upon leaving, pick up “some” additional credentials from a basket of illegitimatecredentials.

• Voters may add any markings they desire.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 30: Rethinking Voter Coercion - USENIX

The Skeptical Voter

• Register in person.

• Upon entering, pick up “some” credentials from a basket of legitimate credentials.

• Select one legitimate credential for permanent use and have the rest recorded by an official.

• All unselected credentials are proven to be legitimate by subsequent publication.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 31: Rethinking Voter Coercion - USENIX

The Skeptical Coerced Voter

• Register in person.

• Upon entering, pick up “some” credentials from a basket of legitimate credentials.

• Select one legitimate credential for permanent use and have the rest recorded by an official.

• Upon leaving, pick up “some” credentials from a basket of illegitimate credentials.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 32: Rethinking Voter Coercion - USENIX

The Typical Voter

• Register in person.

• Receive a legitimate credential.

• Leave.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 33: Rethinking Voter Coercion - USENIX

Effective Mitigation of Early Coercion

• Election registrars can be trained to recognize cameras and enforce rules.

• Devices can be installed to detect unshielded circuits.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 34: Rethinking Voter Coercion - USENIX

Paradigm Trade-Offs

In-person voting

• Coercion must precede voting

• Appear once per election

• Appear election days only

• Transient staffing

• Distributed

In-person registration

• Coercion must precede registration

• Appear once – ever

• Appear any time

• Permanent staffing

• Centralized

August 13, 2013Josh Benaloh -- Microsoft Research

Page 35: Rethinking Voter Coercion - USENIX

Why Vote Remotely?

• There’s little remaining benefit to voting in person.

• It’s easier for a coerced voter to “steal” 5 minutes of Internet access then to surreptitiously vote in person.

• Voter turnout could be enhanced.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 36: Rethinking Voter Coercion - USENIX

Why Not Vote Remotely?

• Malware can compromise privacy and may be able to steal credentials – this is a benefit of smart card credentials over simple IDs.*

• Some voters have poor access to or are uncomfortable with technology.*

*Vote by Mail may be possible here.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 37: Rethinking Voter Coercion - USENIX

An Outrageous Claim

• Monitored in-person voting is no longer the most coercion-resistant voting method.

• Instead, remote voting with JCJ-style credentials offers greater resistance to coercion by time-shifting the period of vulnerability and centralizing the monitoring.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 38: Rethinking Voter Coercion - USENIX

Consequences of Claim

• UOCAVA challenges may have feasible solutions.

• Election protocol design should be re-evaluated.• Extraordinary efforts that mitigate only some

forms of coercion seem ill-advised.

• Many protocols warrant re-design.

August 13, 2013Josh Benaloh -- Microsoft Research

Page 39: Rethinking Voter Coercion - USENIX

Issues and Opportunities

• Voters can voluntarily give their voting rights to proxies.

• Revocation of credentials

• Replacement of lost credentials

• Non-Internet-Based Voting (in person, VbM, etc.)

August 13, 2013Josh Benaloh -- Microsoft Research

Page 40: Rethinking Voter Coercion - USENIX

Questions ???

August 13, 2013Josh Benaloh -- Microsoft Research