This Fall, a chain of events has completely changed the e-voting battleground in the Netherlands. The series of events has been a bit complicated, and even the Dutch media had trouble understanding it. Main players are the people of the campaign wijvertrouwenstemcomputersniet.nl (wedonttrustvotingcomputers.nl). They managed to get hold of a couple of Nedap voting machines and took them apart. They made the results of their analysis public on October 4, with the general elections scheduled for November 22. Main problems were the easy replacement of the program chips, and the tempest issue. Also, they found problems with the security of the storage facilities of the machines. The full report can be found on their website.
The tempest attack was particularly successful because there is a special character in the full name of one of the parties. This requires the display to switch to a different mode with a different frequency. The minister responded to the findings of the campaign people by having all the chips replaced with non-reprogrammable ones (not really a solution, but the public bought it), seals on all the machines, and having the intelligence service look into the tempest problem.
The fix for the special character problem was easy (don't use special characters). With that implemented, the signal emitted from the Nedaps was fairly limited. However, the intelligence service also looked into a different type of voting machine, a touch-screen based system produced by the former state press SDU. They found that the tempest issue was much worse there, and someone outside the polling station might be able to reconstruct the whole screen from the signal.
The minister then decertified this type three weeks before the elections, not because it did not meet the requirements (as far as I am aware, there is not much in the requirements about security, and certainly not specific issues such as tempest), but because it would endanger the order on election day. This affected about 10% of the voter population. Some districts got spare Nedaps, but others had to use paper ballots, especially because one of the older Nedap types was decertified later. Apparently, Nedap has been aware of the tempest issue because of discussions in Germany.
There was some discussion about whether eavesdropping on election day was such a realistic scenario that it would justify the decertification. In any case, the campaign was very happy to have a major event that backed their concerns, even though the focus had shifted from verifiability to confidentiality. And the minister was happy to have created an image of a decisive government.
(One of the other things the campaign achieved is the change of the term "voting machine" into "voting computer", which I think is very significant in public perception issues.)
One of the other concessions of the minister was the initiation of a commission of independent experts, who would look into the future of e-voting after the elections. I have not had a confirmation that this commission has been formed by now. The elections for the provinces are in March, and it is in any case not very likely that substantial change can be implemented before that date.
In most districts in the Netherlands, voting is done electronically. Thus far, this means that in the voting stations, a voting machine is used instead of paper ballots. Current investigations should lead to a decision on online voting, in which the voter does not need to travel to the voting station at all. This page provides an overview over the most important aspects of the use of electronic voting devices in elections in the Netherlands. The important issues are presented point by point. Also, legislation about electronic voting is covered.
By Wolter Pieters, Security of Systems group, Radboud University Nijmegen
Last update December 20, 2006
The Netherlands have been ahead in electronic voting for some time. Since the late nineties, voting machines are used extensively during elections. At the time, remarkably little attention has been given to security and verification possibilities. The main issues were related to the operability of the machines, especially by elderly people. How the votes were counted and how the result was calculated did not seem to be of any interest to anyone.
Since 1997, an extensive list of requirements exists that voting machines have to meet. Demands on the verifiability of the calculations, however, largely remain unspecified. The possibility of recount is not mentioned in the concerning document. Moreover, criteria for result calculation software have not been assessed at all. In 1999, local authorities were reported to have used self-written software for this purpose.
Voting machines in the Netherlands have to be approved by an evaluation institute. Although multiple institutes could be designated, only TNO has been involved in this procedure thus far. Only TNO gets the source code of the software running on the machines, and the evaluation reports are not public either. This means that it is impossible for Dutch citizens to monitor the election process.
The most widely used voting machines are produced by the company Nedap. The only verification possibility that these machines offer is the comparison of the votes per candidate to the votes per party, and to the total number of votes cast. This check, however, is based on votes that have already been processed by the machine. No print is made of the individual votes for recount purposes. Thus, the "original" choice of the voter is not available anymore.
Due to the secrecy of the source code and the evaluation reports, and the lack of a paper audit trail for recount purposes, criticism in the Netherlands towards the obscurity of the election procedure when using voting machines has raised. Attempts to retrieve the source code via the "Wet Openbaarheid van Bestuur" (law on public nature of government) failed, because the source code is intellectual property of the producer. But, now that Ireland wants to use Nedap voting machines as well, and much discussion has taken place there, Dutch politicians start asking questions about the safety and verifiability of such machines. Maybe this will lead to some fundamental changes in the near future.
A hoogheemraadschap or waterschap is a regional goverment body for water management. Its officials are elected via ordinary mail, but the voter participation for these elections is typically fairly low. An experiment with election via the internet has been conducted in the regions Rijnland and Dommel in 2004, with potentially 1 million voters participating.
The system used is called RIES, and was developed by Rijnland in cooperation with the company Mullpon. By clever use of hash functions, the system is simple as well as reasonably secure. Whereas the hashes of all possible votes are public, it is impossible to deduce valid votes from them without the required voter key. Of course, the relation between voter and voter key should not be stored anywhere, but the same holds for bank access codes. Procedures that achieve this therefore already exist.
First of all, a reference table is published before the elections, including (anonymously) for each voter the hashes of all possible votes, linking those to the candidates. It is possible to compare the number of voters in this table with the number of registered voters.
After the elections a document with all received votes is published. This allows for two important verifications: a voter can verify his/her own vote, including the correspondence to the chosen candidate, and anyone can do an independent calculation of the result of the elections, based on this document and the reference table published before the elections. If your vote has been registered wrongly, or not at all, you can detect it. And if the result is incorrect given the received votes, you can detect it as well.
The ministry of internal affairs has organised an experiment with "remote voting" (via web and telephone) for the election of the European Parliament on 10 june 2004. Participation was intended for expatriats, who had the option to vote by mail before. It is typically used by 20-30 thousand people, of the about 600.000 potential participants. The website that has been used is www.internetstembureau.nl.
The remote voting project is described in "Definitierapport kiezen op afstand". The main lines of the system are as follows. Voters register by ordinary "snail" mail, and choose their own accesscode as password. In return they receive a votecode as "login", together with a list of candidates, each with his/her own candidatecode. There were 1000 different lists in the experiment.
The system is being built by LogicaCMG, but the ministery owns the source code. Hence it has been made public, as is intended.
The responsible minister, De Graaf, reports in his letter to parliament of 8 oct. 2003 that the system has been discussed in a meeting on 25 aug. 2003 with external experts, coming from academia (including Bart Jacobs) and industry, see the their findings in an attachement to this letter (at the end). They urged the ministry to: be more open, separate concerns, pay more attention to fraud from within, perform more tests and evaluations (by independent parties), and improve logging.
The same letter to parliament also contains a risk analysis.
During the European elections in 2004, the Dutch government initiated an experiment in online voting. Citizens who stayed abroad at election day could cast their vote via Internet or phone. The system was designed by Logica CMG. However, the government demanded the transfer of the intellectual property rights of the source code with the system. This made it possible to publish the source code after the elections.
The source code zip file, published on the website www.ososs.nl, contains all Java classes written specifically for the online voting system. Classes that are part of general Logica CMG technology are not open source. This means that it is only possible to inspect the (partial) source, not to compile and run it. It can be argued that this is a serious limitation to an open source system. However, the main goal of the government (transparency) is not that much affected by the impossibility to run the system. After all, one does not want to include the source code of the operating system of the server either.
Another issue is how to guarantee that the published source corresponds to the program that was running on the server at election day. A suggestion by our group was to calculate a hash (unique fingerprint) of the source code before the elections, and publish this with the source after the elections. This enables citizens to verify that the code has not been changed after the elections. However, it turns out that some parts of the source code have been changed for publication purposes (like key lengths, fixed keys, etc.). So even if a hash would have been published, verification would be impossible.
Of course, even if the source has not been modified since the elections, this does not prove that the compiled code run on the server corresponds to the source. So, the compiled code needs to be included in the hash, and someone will have to verify that this hash was indeed calculated on the server, on which the associated compiled code was actually running at election day.
Questions that should be asked with regard to this experiment include:
These principles establish voting as part of the democratic process in a representative democracy. In case electronic voting is introduced, these principles should be maintained.
"Let's see how my vote is counted"
© Automatisering Gids 2003
Disadvantages:
Disadvantages:
This section contains relevant events in the history of legislation on electronic voting in the Netherlands. The available material has been obtained via the Internet. The amount of data about the period before 1995 is therefore limited.
The full requirements specification, consisting of 14 sections, can be found as an appendix to the "Regeling voorwaarden en goedkeuring stemmachines". We quote and translate the items from section 8: Reliability and security of the voting machine.
Note that the possibility of recount is not mentioned at all. Furthermore, most of the requirements above concern correctness under normal circumstances, and not especially security against possible election fraud.
Source: www.overheid.nl