http://www.wijvertrouwenstemcomputersniet.nl/images/c/ce/ES3B_EVT07.pdf 

 

Gonggrijp, Rop, and Willem-Jan Hengeveld.

 

Studying the Nedap/Groenendaal ES3B Voting Computer: A Computer Security Perspective.

 

Presented August 6, 2007 at the USENIX/ACCURATE Electronic Voting Technology Workshop, Boston, USA. (Marketed as Liberty DRE in the U.S.)  Accessed December 11, 2007.

 

Ninety percent of the votes in The Netherlands are cast on the Nedap/Groenendaal ES3B voting computer.  With very minor modifications, the same computer is also being used in parts of Germany and France. 

The Nedap ES3B electronic voting computer is a touch screen system that only records votes in memory.  The system requires ultimate trust, since it produces an election outcome that cannot be independently verified.   

Anyone with brief access to the device at any time before an election can gain complete and virtually undetectable control over election results. 

Radio emanations from an unmodified Nedap can be received at several meters distance and be used to tell who votes what. 

The over-all security design relies almost solely on the near-universally deprecated concept of ‘security by obscurity.’  Since the problems we found stem from the very design, we see no quick fixes that could make this device sufficiently secure.  

We conclude that the Nedap ES3B is unsuitable for use in elections, that the Dutch regulatory framework surrounding electronic voting insufficiently addresses security, and we pose that not enough thought has been given to the trust relationships and verifiability issues inherent in DRE class voting systems. 

Given the fact that technical specifications and source code to most electronic voting systems are not publicly available, we see grave danger to our democracy by the use of secret voting technology. 

Password stored in the code and quickly found, allowing attacks to read and modify election results.   

Software code could be inserted, and in response to Nedap’s challenge, this team programmed the machine to play chess. (Emphasis added. ~RA)

Software could be manipulated to steal a certain percentage of votes, for a given party.  In this way, elections could be predetermined without knowing candidate names. 

Parallel testing is ineffective, and only tests for outside threats  - not insider attacks. The Brennan Center (2006) reached the same conclusion: 

Even under the best of circumstances, Parallel Testing is an imperfect security measure. The testing creates an ‘arms race’ between the testers and the attacker, but the race is one in which the testers can never be certain that they have prevailed. 

In the case of voting systems, the only meaningful security against insider attacks is to have a voting mechanism of which all the details are published and that a substantial portion of the general public is capable of comprehending in-depth. 

By adding extra security measures against the over-emphasized threat posed by outsiders, one can actually increase the risk posed by insiders.

For example, today’s mobile phones often combine a processor, execution memory and tamper-resistant key storage to make sure only the manufacturer (who has the cryptographic signing keys) can update the software. These mechanisms can sometimes still be circumvented, but at least they offer a layer of security that is completely absent in the Nedap ES3B.  But by adding ‘security’ in this way, the device could also resist any attempts to independent inspectors to see what code it is actually running.