The Issue Of Internet Polling

Similar documents
Key Considerations for Implementing Bodies and Oversight Actors

Good morning. I am Don Norris, Professor of Public Policy and Director of the

Statement on Security & Auditability

The usage of electronic voting is spreading because of the potential benefits of anonymity,

2018 Municipal Election. Policies & Procedures. Internet & Telephone Voting

Ballot Reconciliation Procedure Guide

Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana)

Pennsylvania Needs Resilient, Evidence-Based Elections

City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013

Linda Feinberg during the Gusciora v. Christie case in 2006 and During the past decade I

Allegheny Chapter. VotePA-Allegheny Report on Irregularities in the May 16 th Primary Election. Revision 1.1 of June 5 th, 2006

c. References herein to the singular includes the plural and vice versa; and

GAO ELECTIONS. States, Territories, and the District Are Taking a Range of Important Steps to Manage Their Varied Voting System Environments

A paramount concern in elections is how to regularly ensure that the vote count is accurate.

11th Annual Patent Law Institute

IC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes

METASPLOIT CAPTURE THE FLAG CONTEST OFFICIAL RULES

Green Freight Asia Privacy Policy

Mistakes, Malfunctions & Manipulation The Risks of Electronic Election Miscounts

L9. Electronic Voting

WEBSITE TERMS OF USE AGREEMENT

AFFIDAVIT OF POORVI L. VORA. 1. My name is Poorvi L. Vora. I am a Professor of Computer Science at The George

E- Voting System [2016]

Fragomen Privacy Notice

Running head: ROCK THE BLOCKCHAIN 1. Rock the Blockchain: Next Generation Voting. Nikolas Roby, Patrick Gill, Michael Williams

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.

MOBILE / COMPUTER APPLICATION END-USER LICENCE AGREEMENT

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

Areeq Chowdhury: Yeah, could you speak a little bit louder? I just didn't hear the last part of that question.

Michael Morisi Comp 116: Web Security

BYTELINE STUDIO TERMS AND CONDITIONS TEMPLATE

Official Rules and Regulations Multi Millionaire Social Contest Ontario Lottery and Gaming Corporation May 3 June 4, 2018

LEGAL NOTICE. Company Name: PIKOLINOS USA, CORP. Company Registration Number: P U.S. Employer Identification Number (EIN):

National Intelligence, 2017 at iii; Securing Elections from Foreign Interference, Brennan Center for Justice, June 29, 2017 at 4.

Verity Touch with Controller

Estonian National Electoral Committee. E-Voting System. General Overview

Modeling Voting Machines

Citizen engagement and compliance with the legal, technical and operational measures in ivoting

6. Voting for the Program will be available for five (5) weeks from Monday 13 June 2016.

The Parties to the contract are komro GmbH (hereinafter referred to as komro ), Am Innreit 2, Rosenheim, and the respective User.

Key Considerations for Oversight Actors

Voting Protocol. Bekir Arslan November 15, 2008

Illinois Wesleyan University Student Senate Code of Elections Revised: August 28, 2018

Michigan Election Reform Alliance P.O. Box Ypsilanti, MI

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

The California Voter s Choice Act: Managing Transformational Change with Voting System Technology

Panel: Norms, standards and good practices aimed at securing elections

ACCEPTABLE USE POLICY. 1. General Notice

When Equal Is Not Always Fair: Senate Malapportionment and its Effect on Enacting Legislation

Global Conditions (applies to all components):

THIS AGREEMENT is dated the day of 2012 (the Effective Date )

16 March Purpose & Introduction

IMPLEMENTATION OF SECURE PLATFORM FOR E- VOTING SYSTEM

COURAGEOUS LEADERSHIP Instilling Voter Confidence in Election Infrastructure

Assumption of TOBT Responsibility and Usage Agreement HAM CSA

Case Study. MegaMatcher Accelerator

SOFTWARE LICENCE. In this agreement the following expressions shall have the following meanings:

ISi DATABASES INTERNET LICENSE AGREEMENT

The Security of Elections. can be done on a computer screen. As the result of this, there s been a push to add voting to the

Admissibility of Social Media Evidence in Illinois

TERMS OF AND CONDITIONS OF THE APPLICATION

MATT BLAZE UNIVERSITY OF PENNSYLVANIA 1

2018 General Election FAQs

BY SIGNING UP AND BY USING BANNERBIT SERVICES, YOU AGREE TO ALL TERMS AND CONDITIONS SET FORTH BELOW (HEREINAFTER: THE "TERMS AND CONDITIONS").

closer look at Rights & remedies

YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, DO NOT CLICK ON THE BUY NOW->>

STATE OF NEW JERSEY. SENATE, No th LEGISLATURE

One View Watchlists Implementation Guide Release 9.2

PREVENTING THE SEXUAL EXPLOITATION OF CHILDREN. Action for Children and Youth Aotearoa Incorporated

LAB-on-line License Terms and Service Agreement

UOB BUSINESS APPLICATION TERMS AND CONDITIONS

Remote Deposit Capture Application End User License Agreement

GUEST WIFI NETWORK. Terms and Conditions and Acceptable Use Protocol

Electronic Voting Machine Information Sheet

IMPORTANT PLEASE READ CAREFULLY PORTFOLIO END USER AGREEMENT

Application Terms of Use

AFRICAN DECLARATION. on Internet Rights and Freedoms. africaninternetrights.org

TERMS OF USE COPYRIGHT, TRADEMARK AND OTHER INTELLECTUAL PROPERTY RIGHTS

GEORGE MASON UNIVERSITY AGENDA FOR THE FACULTY SENATE MEETING FEBRUARY 7, 2018 Robinson Hall B113, 3:00 4:15 p.m.

The SmartMusic Share Your Story Contest OFFICIAL RULES

Evidence. Admissibility of Social Media Evidence in Illinois

CRS Report for Congress

Vacation STAY Service Terms

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

WGEM Midwest Paints & Home Center New Year, New Kitchen Giveaway Official Rules

Confidence -- What it is and How to achieve it

GRADUATE STUDENT ASSOCIATION STATE UNIVERSITY OF NEW YORK AT BUFFALO

WESTMAN COMMUNICATIONS GROUP #WCGDREAMJOB CONTEST (the Contest ) OFFICIAL RULES AND REGULATIONS ( Contest Rules ) March 2, 2015 to March 17, 2015

ELECTRONIC ARTS SOFTWARE END USER LICENSE AGREEMENT FOR ORIGIN APPLICATION AND RELATED SERVICES

Brill and Crovitz Announce Launch of NewsGuard to Fight Fake News

Fort Wayne CW Big TV for the Big Show Giveaway Official Rules

SOFTWARE LICENSE AGREEMENT. Thank you for selecting the Software offered by Zumasys. Please read this Agreement carefully.

1. Username and password: 2. Privacy: 3. Code of conduct: 4. Availability and Access: 5. Amendments:

Website Disclaimer. All Fired up Heating Ltd

Terms of Use Coach Me

TU/e REGULATIONS FOR COMPUTER AND NETWORK USE 2012

Alice Update: Recent Developments in Patent Subject Matter Eligibility

Election Night Results Guide

LEGAL TERMS OF USE. Ownership of Terms of Use

TERMS OF SERVICE AGREEMENT

Transcription:

Volume 2 Issue 1 Article 4 2012 The Issue Of Nick A. Nichols Illinois Wesleyan University, nnichols@iwu.edu Recommended Citation Nichols, Nick A. (2012) "The Issue Of," The Intellectual Standard: Vol. 2: Iss. 1, Article 4. Available at: http://digitalcommons.iwu.edu/tis/vol2/iss1/4 This Article is brought to you for free and open access by The Ames Library, the Andrew W. Mellon Center for Curricular and Faculty Development, the Office of the Provost and the Office of the President. It has been accepted for inclusion in Digital Commons @ IWU by the faculty at Illinois Wesleyan University. For more information, please contact digitalcommons@iwu.edu. Copyright is owned by the author of this document.

Illinois Wesleyan University From the SelectedWorks of The Intellectual Standard October 2012 The Issue Of Contact Author Start Your Own SelectedWorks Notify Me of New Work crted Wo & 1P. Available at: http://works.bepress.com/theintellectualstandard/23

The Issue Of Nick Nichols Surveys, polls, and focus groups are common phenomena in our daily lives. We live in a world where big data is big business. Large decisions hinge on the accuracy and predicative power of these numbers. Therefore, it should not be surprising that there is a market for the malicious manipu- 1ation of data. Extreme care must be taken in the collection, checking, and processing of data to prevent decisions from being made on incorrect assumptions. In order to demonstrate the full potential and possible impact of these attacks, I shall provide the following example: John Doe is a member of the United States Senate. In recent years, the political pressure to make a preemptive strike against a potential nuclear threat has grown exponentially. In some of the more extreme cases, several senators have begun asking for support to make a motion to the President for military intervention. Eventually, Senator Doe is asked to sign a petition for their cause. Senator Doe decides that he must take the concerns, priorities, and beliefs of the voters in his state into account before he can make a decision as their representative. In order to accurately and quickly gather the opinions and concerns of his constituents, John opens a polling section on his website which is advertised across his entire state. The poll asks for each participant to express their beliefs about the effectiveness of potential solutions, the immediate threat posed, and ultimately, whether or not he should endorse military action. Historically, Senator Doe's state has opposed similar legislation and government involvement in foreign affairs; however, in this particular case, the voters have voted in favor of a preemptive military strike.1 In order to do his job, John must sign the petition. However, if he does not take the proper precautions, he could be making his decision based on malicious behavior instead of the seemingly new political paradigm in his state. Understandably, this is an extreme case of the problem posed. There would be many other considerations in real-life deliberations, but Assuming that the number of responses was high enough to be an accurate portrayal of the voting population. Vol. 2- Iss. 1-2013 15

data like this carries considerable weight. Many politicians have similar polls on their websites for less pressing matters and make legislative decisions based on that data. Maintaining the integrity of that information is of the utmost importance. While security for Internet applications is an ever-distant goal, we do have tools to help us filter out bad data and limit our susceptibility to such attacks. To begin, we need to establish a clear standard and goal by which a fair and open Internet poll can be considered successful. That goal is to collect the opinions of a specific population2 in a way that each person's opinion is considered equally3 while maintaining a high degree of accessibility. Many checks and methodologies exist to assist in solving the wide array of concerns and vulnerabilities present. This paper will primarily focus on "flooding" attacks, where single users respond many times in order to promote a single response, or set of responses.4 Any fair poll should give equal weight to each response, and ensuring this is a trivial matter; however, making sure equal weight is given to each person is a different matter. If a person responds to a poll multiple times, and each vote is counted fairly, then their voice is made louder. Ma- 1icious software that continuously votes in polls like these is fairly common. Within seconds, thousands of illegitimate responses can flood the system. How can the real data be sorted out? In these instances we need to be careful about how we remove data. We need a method that doesn't rely upon our preconception of how popular the response is. If we used a methodology like this, then we would be led to assume that any surprising outcomes were the result of malicious voting. More information is needed to increase the probability that we find illegitimate votes without throwing out any of the legitimate votes. Since these systems typically vote as fast as they can for a predetermined number of votes or time, it would be a reasonable first step to store a timestamp with each vote. Now if a large number of votes for the same option appear within a narrow time span, we have a clue that a block of 2 This should be a well defined population; i.e. the voting populace of Texas, the students of a specific class, or the visitors of a specific website. 3 This means that the votes shouldn't be weighted by status, repetitive voting is disallowed, etc. 4 By repeatedly voting for the same responses, the chosen option becomes a clear outlier, regardless of how unpopular the option may actually be. Vol. 2- Iss. 1-2013 16

data is probably the result of a flood. This method does have a drawback: it doesn't scale very well. If a website is trying to collect the opinions of every person who comes across it, similar to CNN.com, then their large amount of traffic could easily account for behavior like this. The method also begins to fail if the attacker tunes down the speed of the flood and allows for a vote or two to interrupt a few of theirs. Some of these programs are also trained to select different responses with each vote, while still making their intended selection a clear statistical outlier. Clearly, we need a better detection strategy. Instead of focusing on the votes themselves, it can be helpful to think about identifying the voter. A poll in which only account holding members are allowed to vote is an obvious choice. Then we can link the username to the vote. After voting once, a user cannot vote again, and with reasonable security measures we can prevent fake accounts from being quickly set up. With this option more information about the voter is available. Naturally, anonymity is a major concern. Further, requiring an account will be a deterrent to a large number of voters, which may skew polling data. A less intrusive requirement is to store the IP address of the source of the vote. If we collect this alone, we have a means of identifying a computer without storing any intrusive information. Thus, votes that have matching IP addresses can be discarded; however, not every machine has a globally unique IP address. The number of devices connected to the Internet is far greater than the number of addresses. In order to continue adding devices without breaking the underlying structure that the Internet operates upon, Network Address Translation (NAT) and the Dynamic Host Configuration Protocol (DHCP) were created. These two technologies allow a single address to be shared by multiple devices in the case of NAT, or a set of addresses to be leased out as needed with DHCP. So we cannot assume that each address directly corresponds to a unique individual, but this does help us narrow our search window. Now the attacker would have to vote at a reduced speed, spread the results across several categories, and occasionally swap IP addresses5 to completely avoid suspicion. The added complexity will dampen the impact 5 Proxy services and Tor allow users to do this for anonymity's sake. Vol. 2- Iss. 1-2013 17

significantly, considering that each step requires a more complex program and consumes more time. Naturally storing more information makes things more expensive on our end. It would be nice if the information could be stored on a computer after it had been used to vote. This common practice is accomplished with cookies, a datum that servers give to browsers for communicative purposes. If we check for cookies before any voting occurs, and make sure we distribute them after voting we can deny users that try to vote again. As with the other approaches, this has flaws as well. Cookies can be silently denied by browsers, and can also be deleted by users. There is no way to ensure that the data stored outside of our computer has not been tampered with or removed.6 Lastly, we can add a captcha to our site. Captchas are tests that are more easily solved by humans than computers. The most common example of this is extracting a word or two from a blurred, unclear, chaotic background. The human brain is able to recognize the patterns fairly well and see the real text. Since computer vision is still a budding area, they will typically fail these tests. Again, this method only works with some probability, and research into artificial intelligence reduces the effectiveness of such solutions. No one of these methods is an absolute solution. Each gives us another screen to filter the data, but bad information can still get through. They are intended to reduce the potential impact of an attack by making the process more complex. These hurdles make it far more difficult and time consuming for a human to manually vote multiple times, and also vastly increase the complexity and time required to build an autonomous voter. With this information in hand, it should now be clear why extra caution should be used in conjunction with an online poll. Simple attacks like these are one of many concerns associated with digital voting, and far more complex attacks are also quite common. Voting software, built by the Federal Government, to tally absentee ballots electronically were made public to security analysts for a test election. Researchers at the University 6 Technically speaking, through the use of a rootkit or another exploit, the cookie could be forcefully and secretly stored; however, this method is illegal and unethical. Vol. 2- Iss. 1-2013 18

of Michigan were able to crack the system in a matter of hours, and pushed Futurama's Bender to a winning position. During this attack, they were also able to remove their digital footprint from the server.7 Significant checks need to be added to make polls as reliable as possible, and plenty of real world examples demonstrate the absence of such systems. More research into this problem and the defense mechanisms associated with it is needed. The content creators of the Internet should use their due diligence when selecting and implementing any sort of software on their websites, especially when critical decisions are made based on the data that they collect. Researchers, planning committees, corporations, and politicians are currently using insecure polls and the data they collect every day. The data that can be gathered is powerful, and the ability to control it is even more impressive. 7 Slashtot.org, "Voting System Test Hack Elects Futurama's Bender To School Board:' March 2, 2012. Vol. 2- Iss. 1-2013 19