Can Voters Detect Malicious Manipulation of Ballot Marking Devices?
Matthew Bernhard, Allison McDonald, Henry Meng, Jensen Hwa,
Nakul Bajaj, Kevin Chang, and J. Alex Halderman
What’s a ballot marking device (BMD)?
2
Where are BMDs used?
3
Source: Verified Voting
States using BMDs in 2020
BMD Security Assumptions
4
Select
Review
Scan
Audit
BMD Security Assumptions
Attacking the Scanner
5
BMD Security Assumptions
Attacking the Scanner
6
Post-election audit will catch malicious scanner!
BMD Security Assumptions
Attacking the BMD
7
BMD Security Assumptions
Attacking the BMD
8
Post-election audit will confirm wrong result!
BMD Security Assumptions
Attacking the BMD
9
Voter inspection will catch malicious BMD/printer!
BMD Security Assumptions
Attacking the BMD
10
Voter inspection will catch malicious BMD/printer?
BMDs in Context
Stark speculated that voters are likely not to check their ballots on their own [1], and prior work about other types of voting equipment supports this [2,3].
Prior work on users’ response to warnings in other settings like phishing [4] and certificate warnings [5] suggest that if voters do not check their BMD ballots, well-designed warnings may help.
11
[1] Stark, P. B. "There is no reliable way to detect hacked ballot-marking devices, 2019." (1908).
[2] Acemyan, Claudia Ziegler, Philip Kortum, and David Payne. "Do voters really fail to detect changes to their ballots? An investigation of ballot type on voter error detection." In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 57, no. 1, pp. 1405-1409. Sage CA: Los Angeles, CA: SAGE Publications, 2013.
[3] Selker, Ted, Elizabeth Rosenzweig, and Anna Pandolfo. "A methodology for testing voting systems." Journal of usability studies 2, no. 1 (2006): 7-21.
[4] Egelman, Serge, Lorrie Faith Cranor, and Jason Hong. "You've been warned: an empirical study of the effectiveness of web browser phishing warnings." In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1065-1074. 2008.
[5] Akhawe, Devdatta, and Adrienne Porter Felt. "Alice in warningland: A large-scale field study of browser security warning effectiveness." In Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13), pp. 257-272. 2013.
Research Questions
Q1: | Can voters detect errors introduced to the paper ballot? |
Q2: | Are there interventions that can improve the rate at which people detect? |
Other research questions
13
Study Design
Worked with AADL to setup mock polling place environment
14
Study Design
Built custom BMD out of older voting machines
15
Study Design
Used truncated version of Ann Arbor 2018 midterm ballot
16
Study Design
On every ballot, one of the participants’ choices was printed incorrectly in a randomly selected race
17
E.g., Participant vote for Candidate Alice is printed as vote for Candidate Bob
Study Design
Ran battery of 9 experiments to evaluate what impacts detection:
18
Study Design
Ran battery of 9 experiments to evaluate what impacts detection:
19
Ballot Style
Study Design
Ran battery of 9 experiments to evaluate what impacts detection:
20
Deselection
Study Design
Ran battery of 9 experiments to evaluate what impacts detection:
21
3
2
1
Poll worker Instruction
Study Design
Ran battery of 9 experiments to evaluate what impacts detection:
22
Slate + Instruction
Study Design
Ran battery of 9 experiments to evaluate what impacts detection:
23
Signage
Participant Demographics
Recruited 241 participants from in and around Ann Arbor
24
Study Design
Observed whether participants reviewed their ballots and reported discrepancies
25
Quantitative Results:
Non-intervention experiments
26
Intervention | Number of participants | Observed Reviewing | Reported Problem |
Regular Ballots | 31 | 42% | 7% |
Summary Ballots | 31 | 32% | 7% |
Deselection | 29 | 45% | 7% |
Subtotal/Mean | 91 | 40% | 7% |
Ballot Style
Deselection
Quantitative Results:
Ineffective intervention experiments
27
Intervention | Number of participants | Observed Reviewing | Reported Problem |
Signage | 30 | 13% | 7% |
Poll-worker at check-in: “Please remember to check your ballot carefully...” | 30 | 47% | 7% |
Baseline | 91 | 40% | 7% |
1
Poll worker
Instruction
Signage
Quantitative Results:
Effective Script experiments
28
Intervention | Number of participants | Observed Reviewing | Reported Problem |
Poll-worker at scanner: “Please keep in mind that the paper ballot is the official record of your vote.” | 25 | 92% | 16% |
Poll-worker at scanner: “Have you carefully reviewed each selection on your printed ballot?” | 31 | 39% | 13% |
Baseline | 91 | 40% | 7% |
3
2
1
Poll worker
Instruction
Quantitative Results:
Effective Slate experiments
29
Slate +
Instruction
Intervention | Number of participants | Observed Reviewing | Reported Problem |
Slate + Poll-worker at scanner: “...the paper ballot is the official record...” | 13 | 100% | 39% |
Slate + Poll-worker at scanner: “Have you carefully reviewed...?” | 21 | 95% | 86% |
Baseline | 91 | 40% | 7% |
Other Findings
30
[1] Kortum, Philip, Michael D. Byrne, and Julie Whitmore. "Voter Verification of BMD Ballots Is a Two-Part Question: Can They? Mostly, They Can. Do They? Mostly, They Don't." arXiv preprint arXiv:2003.04997 (2020).
[2] Akhawe, Devdatta, and Adrienne Porter Felt. "Alice in warningland: A large-scale field study of browser security warning effectiveness." In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13), pp. 257-272. 2013.
Research Questions
31
Limitations
32
Limitations
“I noticed that there was a [Republican] selected and I'd almost never vote a republican”
33
Limitations
34
[1] Kortum, Philip, Michael D. Byrne, and Julie Whitmore. "Voter Verification of BMD Ballots Is a Two-Part Question: Can They? Mostly, They Can. Do They? Mostly, They Don't." arXiv preprint arXiv:2003.04997 (2020).
Takeaways
35
Can Voters Detect Malicious Manipulation of Ballot Marking Devices?
BMDs in Context
Voter-verified paper is a human-in-the-loop setting, where users need to understand and act on risk, i.e. that the BMD may print the wrong thing
Cranor lays out five means of communicating risk in a system [1], however only warnings apply in an election context.
Because voters are novices, warnings need to be contextual and provide an obvious recourse [2].
37
[1] Cranor, Lorrie F. "A framework for reasoning about the human in the loop." (2008).
[2] Bravo-Lillo, Cristian, Lorrie Faith Cranor, Julie Downs, and Saranga Komanduri. "Bridging the gap in computer security warnings: A mental model approach." IEEE Security & Privacy 9, no. 2 (2010): 18-26.
Experiments Summaries
38
Intervention | Specific Conditions | Number of participants | Observed Reviewing | Reported Problem |
None | Ballot styles, deselection | 91 | 40% | 7% |
Ineffective Interventions | Signage, “paper ballots is official record…” before voting | 60 | 30% | 7% |
Asked to review after voting | “Paper ballot is official record,” “did you carefully review…” | 56 | 63% | 14% |
Asked to review after with slate | Two script variants above with random slate of candidates | 34 | 97% | 62% |