Skip to main content

Microsoft’s ElectionGuard a Trojan Horse for a military-industrial takeover of US elections

“The fact that we are handing over the keys of American democracy to the military-industrial complex — it’s like giving the keys to the henhouse to a fox and saying, ‘here come in and take whatever you want.’ It’s obviously dangerous.” — Investigative journalist Yasha Levine

by Whitney Webb 

Part 5 - ElectionGuard isn’t immune to manipulation

Microsoft’s press release announcing ElectionGuard highlights its claim that its system would make elections more verifiable, secure, and auditable; be open source-based; and improve the voting experience. While all of these things sound nice enough, there is reason to believe — based on the description given by Microsoft — that some of these claims are dubious and misleading. Unfortunately, for now, analysis of ElectionGuard is restricted to Microsoft’s description of the software as it is not yet available for public examination. The ElectionGuard software kit is expected to be released later this year on the GitHub platform.

The first aspect of the “verifiable” claim relates to a voter tracking system, where each voter is given a unique tracking ID which allows them “to follow an encrypted version of the vote through the entire election process via a web portal provided by election authorities.” Voters can choose the option of confirming “that their trackers and encrypted votes accurately reflect their selections.

Yet Microsoft notes that “once a vote is cast, neither the tracker nor any data provided through the web portal can be used to reveal the contents of the vote,” meaning that while a person can track whether their vote was counted, they cannot verify whether the content of the vote (i.e., who they voted for) is counted correctly or not. Microsoft goes on to note that only “after the election is complete” will the tracker page allow the content of the vote to be seen.

The second “verifiability” component of ElectionGuardis an open specification – or a road map – which allows anyone to write an election verifier.” Microsoft then notes that this open specification would mean that “voters, candidates, news media and any observers can run verifiers of their own or downloaded from sources of their choosing to confirm tabulations are as reported.

Microsoft describes these two features as constituting “end-to-end verifiability” (E2E-V), which Free & Fair describes as “cryptographic technology that enables voters to vote in a normal fashion in a polling place and have evidence that the election is trustworthy.

Another focus of ElectionGuard is security, for which the system employs “homomorphic encryption, which enables mathematical procedures – like counting – to be done with fully encrypted data” and this allows individually encrypted votes to be “combined to form an encrypted tabulation of all votes which can then be decrypted to produce an election tally that protects voter privacy.”  Notably, homomorphic encryption is the only ElectionGuard security measure named in the press release.

Election forensics analyst Jonathan Simon, author of CODE RED: Computerized Elections and the War on American Democracy, was not fully persuaded by the E2E-V claim. “Pardon my skepticism,” Simon told MintPress, “but I’ve read Microsoft’s ‘good news’ ElectionGuard flyer and it reminds me very much of the flyers and PR material long served up by the vendors and programmers of the current voting equipment — the very computers that IT experts discovered could be hacked by outsiders and programmed to add, delete, and shift votes by insiders.

Simon continued:

"Right now, for example, they’re hawking expensive and completely unnecessary ballot-marking devices (BMDs) that turn your votes into a barcode, a code that no voter can read or verify. Very slick but yet another level of non-transparency, another step away from public, observable vote-counting, and another vector for fraud."

"I’ve spent the last 17 years examining vote-count patterns and drawing attention to a parade of egregious red flags indicative of computerized vote-count manipulation. It has been a system designed for concealment and about as non-transparent as a process can be. It would be great if more advanced technology would bring transparency at last, as Microsoft seems to promise."

"But what I see so far is even more complexity — encryption that, whether open source or not, requires the most rarefied experts to penetrate or understand. And just a short step to full-on internet voting — even more convenient and about as secure as, say, Facebook."

"Pending a demonstration showing with perfect layperson-accessible clarity how a third-party entity can verify aggregate vote-counts without having to take on faith some step in the pipeline (individual verification that ‘your’ vote was ‘counted’ is a useless bell-and-whistle), it still feels like the same old ‘trust us’ game. I’m willing to be persuaded but the historical context here is very cautionary.

Simon’s concerns reflect some controversial aspects of the ElectionGuard approach. While encryption would ostensibly protect votes from tampering and thus elections results, it is important to point out that homomorphic encryption is a malleable form of encryption.

According to Brilliant.org:

"A malleable crypto-system is one in which anyone can intercept a cipher text, transform it into another cipher text, and then decrypt that into a plain text that makes sense. Malleability is generally considered undesirable in a crypto-system. Imagine you’re trying to send the message ‘I love you’ to your friend using encryption. You encrypt it and send it off. But, it is intercepted by a hacker on the way. All they see is some cipher text, but they can change that cipher text to something that will decrypt to ‘I hate you’ when your friend tries to decrypt it. That is why malleability is not usually wanted.

If that’s the case, then what stops a “hacker” or another third party — say a U.S. government agency like the NSA or a political operative with access to the electoral cyber-pipeline — from changing a person’s vote from Democrat to Republican or vice versa, or altering the encrypted tabulation of all votes?

While homomorphic encryption seems a reasonable choice in one sense, for allowing votes to be tallied without decrypting, there is an added layer of concern given Microsoft’s past, particularly Microsoft’s history of actually working with U.S. government agencies to bypass encryption. 

Indeed, documents leaked by Edward Snowden revealed that Microsoft actually helped the National Security Agency bypass its own encryption so the agency could decrypt messages sent via certain Microsoft platforms including Outlook.com Web chat, Hotmail email service, and Skype. In addition, in 2009, a senior NSA official testified before Congress that Microsoft and the NSA worked together to create its Windows 7 operating system, leading some to worry that Microsoft had built a “backdoor” into the operating system to aid government surveillance activities. Now that Microsoft’s ties to the U.S. military and intelligence community are deeper than ever, it begs the question whether Microsoft’s covert cooperation with government agencies to the detriment of consumers is also a factor guiding its role in creating and promoting ElectionGuard.

Furthermore, with Microsoft’s president having vowed to hand over all its technologies to the U.S. military, one wonders if this type of encryption and methodology was not chosen on purpose, especially given the fact that the NSA is quite accomplished at breaking much more secure types of encryption even without help from Microsoft.

Another of Microsoft’s talking points used to promote ElectionGuard is the fact that it will be open source, meaning the program’s code will be publicly available, a move apparently aimed at assuaging concerns that ElectionGuard’s code could contain hidden manipulations or vulnerabilities.

However, investigative journalist Yasha Levine likened Microsoft’s promotion of ElectionGuard’s still unreleased open source code to a “PR move.” Levine told MintPress:

"Open source inevitably has bugs and vulnerabilities that are there accidentally because all code has vulnerabilities. This is true for open source and closed source systems. Open source just means that people can look at it, but then that code has to be run through a compiler that actually runs an executable program. So there you already have a degree of abstraction and separation from the open source code. But even if the executable code and the source code are the same, there are bugs which can be exploited."

"So, what open source does is give a veneer of openness that leads one to think that thousands of people have probably vetted the code and flagged any bugs in it. But, actually very few people have the time and the ability to look at this code. So this idea that open source code is more transparent isn’t really true because few people are looking at it.

Levine went on to note that there are many examples of open source systems — including widely used open source systems — having major vulnerabilities that go undetected for years. One of the best examples, in Levine’s opinion, is the “Heartbleed” bug, which was a security vulnerability in the open source OpenSSL software, a system that allows for the basic encryption of web traffic by encrypting “http” connections. The Heartbleed allowed hackers access to the memory of data servers for an estimated half a million websites and went undetected for years, despite the fact that OpenSSL is an open source system.

Levine also underscored the fact that both American and foreign intelligence agencies “more than any other person or group” are involved in seeking out such vulnerabilities and exploits, which they keep hidden from the public in order to give themselves an advantage in cyberwarfare. Some of the CIA’s lists of such exploits or vulnerabilities were revealed in the WikiLeaks Vault 7 release.

Source, links:


[1] [2] [3] [4] [6] [7]



Comments

Popular posts from this blog

WikiLeaks reveals that literally every router in America has been compromised

The latest Wikileaks Vault7 release reveals details of the CIA’s alleged Cherry Blossom project, a scheme that uses wireless devices to access users’ internet activity. globinfo freexchange As cyber security expert John McAfee told to RT and Natasha Sweatte: Virtually, every router that's in use in the American home are accessible to hackers, to the CIA, that they can take over the control of the router, they can monitor all of the traffic, and worse, they can download malware into any device that is connected to that router. I personally, never connect to any Wi-Fi system, I use the LTE on my phone. That's the only way that I can be secure because every router in America has been compromised. We've been warning about it for years, nobody pays attention until something like WikiLeaks comes up and says 'look, this is what's happening'. And it is devastating in terms of the impact on American privacy because once the router...

Confirmed: Alex Jones' popularity rises after Infowars banning from social media

globinfo freexchange We wouldn't expect to be confirmed so fast on this. A few days ago in the article IT and social media supergiants have just made Alex Jones a hero in the eyes of the ultra-conservative audience , we wrote that Alex Jones' wet dream has just become reality thanks to the combined move by Facebook, Apple, YouTube and Spotify to ban Infowars. These private IT and social media companies couldn't give a better gift to him right now. At a time where Infowars was going through a saturated period according to the best scenario, the corporate giants actually saved it with that stupid(?) strategy. Suddenly, a corporate branch of the liberal establishment gave real value to Alex Jones' awful performance, pretending to be the 'anti-establishment' hero - just like Donald Trump - and made him a real hero in the eyes of the ultra-conservative audience that has been brainwashed by his absurd conspiracy theories. Only a couple of days later...

Stephen Hawking confirms: The problem is Capitalism, not robots!

globinfo freexchange According to world famous physicist Stephen Hawking, the rising use of automated machines may mean the end of human rights – not just jobs. But he’s not talking about robots with artificial intelligence taking over the world, he’s talking about the current capitalist political system and its major players. On Reddit, Hawking said that the economic gap between the rich and the poor will continue to grow as more jobs are automated by machines, and the owners of said machines hoard them to create more wealth for themselves. The insatiable thirst for capitalist accumulation bestowed upon humans by years of lies and terrible economic policy has affected technology in such a way that one of its major goals has become to replace human jobs. If we do not take this warning seriously, we may face unfathomable corporate domination. If we let the same people who buy and sell our political system and resources maintain control of automated technology, the...

CIA had an agent at a newspaper in every world capital at least since 1977

Joel Whitney is a co-founder of the magazine Guernica, a magazine of global arts and politics, and has written for many publications, including the New York Times and Wall Street Journal. His book Finks: How the C.I.A. Tricked the World's Best Writers describes how the CIA contributed funds to numerous respected magazines during the Cold War, including the Paris Review, to subtly promote anti-communist views. In their conversation, Whitney tells Robert Scheer about the ties the CIA’s Congress for Cultural Freedom had with literary magazines. He talks about the CIA's attempt during the Cold War to have at least one agent in every major news organization in order to get stories killed if they were too critical or get them to run if they were favorable to the agency. And they discuss the overstatement of the immediate risks and dangers of communist regimes during the Cold War, which, initially, led many people to support the Vietnam War. globinfo freexchange...

Confirmed: US imperialists wanted to drag Russia into a war with Ukraine since at least 2019

globinfo freexchange   As we wrote in our previous article, after almost eight years, the US imperialists and the NATO criminals got what they wanted. They finally managed to drag Russia into a war with Ukraine.     We now have indisputable evidence for that, through a document by the top US think tank, RAND Corporation. In the preface of a 2019 report under the title Extending Russia, Competing from Advantageous Ground we read: [emphasis added]                            The purpose of the project was to examine a range of possible means to extend Russia. By this, we mean nonviolent measures that could stress Russia’s military or economy or the regime’s political standing at home and abroad. The steps we posit would not have either defense or deterrence as their prime purpose, although they might contribute to both. Rather, these steps ar...

How normal human behavior became a false mental disorder epidemic

globinfo freexchange In the early nineties, an epidemic of mental disorder was sweeping America and Britain. It had been uncovered by a new system for identifying disorders. Psychiatry had been attacked for relying on the personal and fallible judgement of psychiatrists. But instead, a new objective method based on checklists had been invented. These listed only the objective symptoms, and deliberately did not enquire into why the individuals felt an anxiety. In the late 80s, nationwide surveys had revealed an incredible picture: more than 50% of Americans suffered from mental disorders. But at the very same, the drug companies had announced that they had created a new type of drug, called an SSRI, which they claimed, targeted the circuits inside the brain that were causing these malfunctions. The SSRIs were marketed under names like "Prozac". What they did was alter the amounts of serotonin that flowed across the circuit connections within the brain, and they...

American youth are turning on Israel, left and right

The Grayzone   The Grayzone 's Max Blumenthal on the total collapse of support for Israel among young American progressives, and the crisis Israel faces for the first time among conservative youth. 

GAME OVER, Trump: Putin, China & BRICS Just CRUSHED US Dollar

Danny Haiphong   Donald Trump's war on BRICS is backfiring as the Russia & China-led Global South moves to dump the US dollar and build a new order independent of its dictates. Journalist and geopolitical analyst Ben Norton breaks it all down.    Related: Trump's tariffs: A unique opportunity for BRICS and the Global South to fully escape from dollar tyranny

Signals of an unsustainable future coming from Davos

Hyper-automation impact on unemployment rise - further shrinking of the middle class - creation of a working elite - substitution of saturated Western consumers with other emerging consumer tanks globinfo freexchange The general conclusions from the report The Future of Jobs , of the 2016 World Economic Forum, leave little room for optimistic thoughts about the future. They reflect what already most of us have realized: that the combination of the current socio-economic model with the rapid hyper-automation of production, lead to further imbalance and inequality in favor of the very few. As Stephen Hawking mentioned recently: “ If machines produce everything we need, the outcome will depend on how things are distributed. Everyone can enjoy a life of luxurious leisure if the machine-produced wealth is shared, or most people can end up miserably poor if the machine-owners successfully lobby against wealth redistribution. So far, the trend seems to be toward the seco...

Varoufakis: IT technologies will overthrow Capitalism

globinfo freexchange The former Greek Minister of Finance, Yanis Varoufakis, ended his recent speech on the Future of Capitalism, at the New School, New York, with some interesting remarks. As he said: The world we live in, is increasingly rudderless, in a constant slow burning recession, while at the very same time, the increasing concentration in the IT sector is creating the new technologies that will do that which the Left has failed to do: overthrow Capitalism. It is really very simple. The moment machines pass the Turing test properly, and you pick up the phone and you do not know whether the person you are talking to is a human being or a machine ˙ the moment we are going to have 3D printers operating as public utilities - you can send any blueprint to it and it can print from one pin to a motorcycle, or to a car - the moment that this happens, we have not just a process of Schumpeterian creative destruction, but we have a process where economies of sc...