Electronic voting in the Netherlands


Summary of events in Fall 2006, posted December 20

This Fall, a chain of events has completely changed the e-voting battleground in the Netherlands. The series of events has been a bit complicated, and even the Dutch media had trouble understanding it. Main players are the people of the campaign wijvertrouwenstemcomputersniet.nl (wedonttrustvotingcomputers.nl). They managed to get hold of a couple of Nedap voting machines and took them apart. They made the results of their analysis public on October 4, with the general elections scheduled for November 22. Main problems were the easy replacement of the program chips, and the tempest issue. Also, they found problems with the security of the storage facilities of the machines. The full report can be found on their website.

The tempest attack was particularly successful because there is a special character in the full name of one of the parties. This requires the display to switch to a different mode with a different frequency. The minister responded to the findings of the campaign people by having all the chips replaced with non-reprogrammable ones (not really a solution, but the public bought it), seals on all the machines, and having the intelligence service look into the tempest problem.

The fix for the special character problem was easy (don't use special characters). With that implemented, the signal emitted from the Nedaps was fairly limited. However, the intelligence service also looked into a different type of voting machine, a touch-screen based system produced by the former state press SDU. They found that the tempest issue was much worse there, and someone outside the polling station might be able to reconstruct the whole screen from the signal.

The minister then decertified this type three weeks before the elections, not because it did not meet the requirements (as far as I am aware, there is not much in the requirements about security, and certainly not specific issues such as tempest), but because it would endanger the order on election day. This affected about 10% of the voter population. Some districts got spare Nedaps, but others had to use paper ballots, especially because one of the older Nedap types was decertified later. Apparently, Nedap has been aware of the tempest issue because of discussions in Germany.

There was some discussion about whether eavesdropping on election day was such a realistic scenario that it would justify the decertification. In any case, the campaign was very happy to have a major event that backed their concerns, even though the focus had shifted from verifiability to confidentiality. And the minister was happy to have created an image of a decisive government.

(One of the other things the campaign achieved is the change of the term "voting machine" into "voting computer", which I think is very significant in public perception issues.)

One of the other concessions of the minister was the initiation of a commission of independent experts, who would look into the future of e-voting after the elections. I have not had a confirmation that this commission has been formed by now. The elections for the provinces are in March, and it is in any case not very likely that substantial change can be implemented before that date.


News

In most districts in the Netherlands, voting is done electronically. Thus far, this means that in the voting stations, a voting machine is used instead of paper ballots. Current investigations should lead to a decision on online voting, in which the voter does not need to travel to the voting station at all. This page provides an overview over the most important aspects of the use of electronic voting devices in elections in the Netherlands. The important issues are presented point by point. Also, legislation about electronic voting is covered.

By Wolter Pieters, Security of Systems group, Radboud University Nijmegen

Last update December 20, 2006



History of voting in the Netherlands

Source: www.parlement.com, an excellent site on Dutch politics (in Dutch, alas)

History of electronic voting in the Netherlands

The Netherlands have been ahead in electronic voting for some time. Since the late nineties, voting machines are used extensively during elections. At the time, remarkably little attention has been given to security and verification possibilities. The main issues were related to the operability of the machines, especially by elderly people. How the votes were counted and how the result was calculated did not seem to be of any interest to anyone.

Since 1997, an extensive list of requirements exists that voting machines have to meet. Demands on the verifiability of the calculations, however, largely remain unspecified. The possibility of recount is not mentioned in the concerning document. Moreover, criteria for result calculation software have not been assessed at all. In 1999, local authorities were reported to have used self-written software for this purpose.

Voting machines in the Netherlands have to be approved by an evaluation institute. Although multiple institutes could be designated, only TNO has been involved in this procedure thus far. Only TNO gets the source code of the software running on the machines, and the evaluation reports are not public either. This means that it is impossible for Dutch citizens to monitor the election process.

The most widely used voting machines are produced by the company Nedap. The only verification possibility that these machines offer is the comparison of the votes per candidate to the votes per party, and to the total number of votes cast. This check, however, is based on votes that have already been processed by the machine. No print is made of the individual votes for recount purposes. Thus, the "original" choice of the voter is not available anymore.

Due to the secrecy of the source code and the evaluation reports, and the lack of a paper audit trail for recount purposes, criticism in the Netherlands towards the obscurity of the election procedure when using voting machines has raised. Attempts to retrieve the source code via the "Wet Openbaarheid van Bestuur" (law on public nature of government) failed, because the source code is intellectual property of the producer. But, now that Ireland wants to use Nedap voting machines as well, and much discussion has taken place there, Dutch politicians start asking questions about the safety and verifiability of such machines. Maybe this will lead to some fundamental changes in the near future.



Remote voting

Currently there are two ongoing initiatives in the Netherlands concerning voting via the web or via phone.

Hoogheemraadschap Rijnland

A hoogheemraadschap or waterschap is a regional goverment body for water management. Its officials are elected via ordinary mail, but the voter participation for these elections is typically fairly low. An experiment with election via the internet has been conducted in the regions Rijnland and Dommel in 2004, with potentially 1 million voters participating.

The system used is called RIES, and was developed by Rijnland in cooperation with the company Mullpon. By clever use of hash functions, the system is simple as well as reasonably secure. Whereas the hashes of all possible votes are public, it is impossible to deduce valid votes from them without the required voter key. Of course, the relation between voter and voter key should not be stored anywhere, but the same holds for bank access codes. Procedures that achieve this therefore already exist.

First of all, a reference table is published before the elections, including (anonymously) for each voter the hashes of all possible votes, linking those to the candidates. It is possible to compare the number of voters in this table with the number of registered voters.

After the elections a document with all received votes is published. This allows for two important verifications: a voter can verify his/her own vote, including the correspondence to the chosen candidate, and anyone can do an independent calculation of the result of the elections, based on this document and the reference table published before the elections. If your vote has been registered wrongly, or not at all, you can detect it. And if the result is incorrect given the received votes, you can detect it as well.

Ministry of Internal Affairs

The ministry of internal affairs has organised an experiment with "remote voting" (via web and telephone) for the election of the European Parliament on 10 june 2004. Participation was intended for expatriats, who had the option to vote by mail before. It is typically used by 20-30 thousand people, of the about 600.000 potential participants. The website that has been used is www.internetstembureau.nl.

The remote voting project is described in "Definitierapport kiezen op afstand". The main lines of the system are as follows. Voters register by ordinary "snail" mail, and choose their own accesscode as password. In return they receive a votecode as "login", together with a list of candidates, each with his/her own candidatecode. There were 1000 different lists in the experiment.

The system is being built by LogicaCMG, but the ministery owns the source code. Hence it has been made public, as is intended.

The responsible minister, De Graaf, reports in his letter to parliament of 8 oct. 2003 that the system has been discussed in a meeting on 25 aug. 2003 with external experts, coming from academia (including Bart Jacobs) and industry, see the their findings in an attachement to this letter (at the end). They urged the ministry to: be more open, separate concerns, pay more attention to fraud from within, perform more tests and evaluations (by independent parties), and improve logging.

The same letter to parliament also contains a risk analysis.

Some considerations

During the European elections in 2004, the Dutch government initiated an experiment in online voting. Citizens who stayed abroad at election day could cast their vote via Internet or phone. The system was designed by Logica CMG. However, the government demanded the transfer of the intellectual property rights of the source code with the system. This made it possible to publish the source code after the elections.

The source code zip file, published on the website www.ososs.nl, contains all Java classes written specifically for the online voting system. Classes that are part of general Logica CMG technology are not open source. This means that it is only possible to inspect the (partial) source, not to compile and run it. It can be argued that this is a serious limitation to an open source system. However, the main goal of the government (transparency) is not that much affected by the impossibility to run the system. After all, one does not want to include the source code of the operating system of the server either.

Another issue is how to guarantee that the published source corresponds to the program that was running on the server at election day. A suggestion by our group was to calculate a hash (unique fingerprint) of the source code before the elections, and publish this with the source after the elections. This enables citizens to verify that the code has not been changed after the elections. However, it turns out that some parts of the source code have been changed for publication purposes (like key lengths, fixed keys, etc.). So even if a hash would have been published, verification would be impossible.

Of course, even if the source has not been modified since the elections, this does not prove that the compiled code run on the server corresponds to the source. So, the compiled code needs to be included in the hash, and someone will have to verify that this hash was indeed calculated on the server, on which the associated compiled code was actually running at election day.

Questions that should be asked with regard to this experiment include:



Basic principles of elections

These principles establish voting as part of the democratic process in a representative democracy. In case electronic voting is introduced, these principles should be maintained.

Possibilities for electronic voting

(source: Report "Stand van zaken automatisering rond verkiezingsproces") cartoon

"Let's see how my vote is counted"

© Automatisering Gids 2003

Advantages voting machines / voting PCs over paper ballots

Disadvantages:

Advantages voting PCs over voting machines

Disadvantages:

Involved parties

Other sources (in Dutch)

History of legislation concerning electronic voting

This section contains relevant events in the history of legislation on electronic voting in the Netherlands. The available material has been obtained via the Internet. The amount of data about the period before 1995 is therefore limited.

Requirements for voting machines

The full requirements specification, consisting of 14 sections, can be found as an appendix to the "Regeling voorwaarden en goedkeuring stemmachines". We quote and translate the items from section 8: Reliability and security of the voting machine.

  1. The vote stored in the vote memory of the voting machine is the vote cast and confirmed by the voter.
  2. A cast vote cannot be lost due to breakdown of the energy supply, failure of one component, the specified environmental conditions, normal use or mistakes in the operation of the voting machine.
  3. The read-in lists of candidates are maintained completely in case of breakdown of the energy supply, the specified environmental conditions, normal use or mistakes in the operation of the voting machine.
  4. The functions of the voting machine are maintained completely in case of breakdown of the energy supply, the specified environmental conditions, normal use or mistakes in the operation of the voting machine.
  5. The storage of the cast votes is made redundant. The vote is stored in such a redundant way in the vote memory, that it can be proved that the failure rate is 1 x 10E-6. If there is a discrepancy in the redundant storage, the machine will report this to the voter and the voting station.
  6. The voting machine is able to avoid or reduce the possibilities for accidental or intended incorrect use as much as is technically feasible in fairness.
  7. The way of vote storage does not enable possibilities to derive the choice of individual voters.
  8. The voting machine has features which help to avoid erroneous actions during repair, maintenance and checks, for example by mechanical features which preclude assembly in wrong positions or in wrong places.
  9. The voting machine may have functions which are not described in the Voting Law, the Voting Decree, or this appendix, as long as they do not impair the required functionality of the voting machine and are related to the voting procedure.

Note that the possibility of recount is not mentioned at all. Furthermore, most of the requirements above concern correctness under normal circumstances, and not especially security against possible election fraud.

Licensed voting machines

Source: www.overheid.nl

Links


Back to the security-in-society overview page.