{"id":2499,"date":"2006-03-03T18:51:26","date_gmt":"2006-03-03T22:51:26","guid":{"rendered":"http:\/\/www.test.bradblog.com\/?p=2499"},"modified":"2006-03-03T18:51:26","modified_gmt":"2006-03-03T22:51:26","slug":"florida-issues-technical-advisory-for-security-enhancements-on-all-voting-systems-in-state","status":"publish","type":"post","link":"https:\/\/bradblog.com\/?p=2499","title":{"rendered":"Florida Issues &#8216;Technical Advisory&#8217; for &#8216;Security Enhancements&#8217; on &#8216;All Voting Systems&#8217; in State!"},"content":{"rendered":"<p><a href=\"https:\/\/bradblog.com\/archives\/00002497.htm\"><img decoding=\"async\" src=\"https:\/\/BradBlog.com\/Images\/Siren.gif\" hspace=\"6\" vspace=\"3\" border=\"0\" align=\"left\"><\/a><a href=\"https:\/\/bradblog.com\/archives\/00002497.htm\"><img decoding=\"async\" src=\"https:\/\/BradBlog.com\/Images\/DieboldAd_PleaseStandBy.jpg\" hspace=\"6\" vspace=\"3\" border=\"0\" align=\"right\"><\/a>Picking up in the tradition of California&#8217;s Sec. of State Bruce McPherson, who seems to have a fondness for <a href=\"https:\/\/bradblog.com\/archives\/00002439.htm\">Friday night releases<\/a> of important information which he hopes nobody will notice, Florida&#8217;s Division of Elections Director, Dawn K. Roberts, issued a &#8220;Technical Advisory&#8221; memorandum  calling for &#8220;enhancements to voting system security procedures that each supervisor of elections must address immediately.&#8221; The memo was issued late this evening at the end of the work week.<\/p>\n<p>Roberts&#8217; memo (<i>posted in full below<\/i>) would be the first official acknowledgment, to our awareness, by the state of Florida of the security concerns raised by the recent <a href=\"https:\/\/bradblog.com\/archives\/00002156.htm\">Leon County, FL &#8220;hack test&#8221;<\/a> conducted by Election Supervisor Ion Sancho.  That now-infamous test &#8212; in which computer security professional Harri Hursti had managed to access and change information on the Diebold optical-scan voting machine memory cards &#8212; resulted in the results of the test election being completely flipped, without a trace being left behind.<\/p>\n<p>In her &#8220;Technical Advisory&#8221;, Roberts fails to mention that &#8220;hack test&#8221; or the equipment it occurred on &#8212; or even Diebold themselves &#8212; by name. Rather, the alert alludes to McPherson&#8217;s recent &#8212; and stunning &#8212; &#8220;conditional re-certification&#8221; of Diebold voting equipment in the state, in light of confirmation of the newly discovered &#8220;interpreted code&#8221; used by the machines. That type of software source code is specifically banned by the federal Help America Vote Act guidelines. During his re-certification of Diebold &#8212; after the company&#8217;s equipment had previously been de-certified in the state for use of illegal software patches, and subsequently found to have <a href=\"https:\/\/bradblog.com\/archives\/00001658.htm\">failed atleast 20% of the time<\/a> in a massive test held last summer &#8212; McPherson mandated specific security procedures to be used with Diebold equipment in the state of California.<\/p>\n<p>&#8220;This technical advisory therefore applies to all voting systems deployed in Florida,&#8221; writes Roberts in the memo issued this evening&#8230;<\/p>\n<p><!--more--><\/p>\n<p>While Roberts&#8217; advisory falls short of McPherson&#8217;s ostensible <i>mandates<\/i>, she issues &#8220;Recommendations and Guidelines&#8221; that she hopes Election Supervisors around the state might consider implementing. Her suggested &#8220;enhanced security safeguards,&#8221; are similar to McPherson&#8217;s conditions for improved &#8220;chain-of-custody&#8221; for the memory cards used both in Diebold&#8217;s touch-screen and optical scan voting systems.<\/p>\n<p>Her warning to state elections officials reads &#8220;The Florida Division of Elections believes that potential system vulnerabilities identified [by McPherson&#8217;s independently commissioned analysis] can be addressed through enhanced security safeguards.&#8221;  As <a href=\"http:\/\/www.BradBlog.com\">The BRAD BLOG<\/a> was recently informed by Sancho, Florida has failed to conduct its <i>own<\/i> security analysis of the problem as revealed by Sancho&#8217;s test in the state&#8217;s capital of Tallahassee last December.<\/p>\n<p>McPherson&#8217;s analysis, confirming at least 16 different security flaws and bugs in both Diebold&#8217;s touch-screen and optical-scan voting systems is <a href=\"http:\/\/www.votetrustusa.org\/pdfs\/California_Folder\/DieboldReport.pdf\">here [PDF]<\/a>.<\/p>\n<p>Roberts&#8217; guidelines to thwart hypothetical &#8220;threat model[s] that consists of a &#8216;knowledge based&#8217; attack&#8221; such as one from an election division insider, attempt to highten security by recommending that &#8220;two or more individuals&#8221; are to be present at all times &#8220;whenever a transfer of custody&#8221; of election media, such as memory cards, takes place.<\/p>\n<p>The &#8220;minimum criteria&#8221; guidelines recommend that Supervisors of Election &#8220;have in place a recovery plan that is to be followed should there be any indication of a security breach in the accountability and chain of custody procedures.&#8221; Roberts offers no such advise for any such &#8220;recovery plan.&#8221;<\/p>\n<p>As well, it&#8217;s pointed out several times in the document, that &#8220;any indication of a security breach must be confirmed by more than one individual.&#8221; Apparently a single whistleblower won&#8217;t do, if we understand those passages correctly.<\/p>\n<p>In a related bit of news, we were recently told by Sancho, during an on-air interview we conducted with him last Tuesday on <a href=\"http:\/\/www.TheYoungTurks.com\">The Young Turks<\/a> radio program, that Florida state election law disallows the manual hand recounting, or auditing, of machine-counted ballots.<\/p>\n<p>In the case of the Leon County hack, we learned, the actual paper ballots used in the mock election &#8212; had they been examined by hand &#8212; would have revealed the <i>correct<\/i> election results instead of the flipped results as reported by Diebold&#8217;s optical scan counter.<\/p>\n<p>However, since Florida law specifically disallows ballots which have already been counted by machine to be hand-counted or even audited, the <i>true<\/i> election results would never have been known. Even in the case of a recount &#8212; which would not have occurred in the case of the mock election test, since the flipped results were nowhere near close enough to have triggered a mandatory recount &#8212; such ballots could only be rescanned by the machines which has miscounted them in the first place.<\/p>\n<p>That point of Florida law was also confirmed to us, during another radio interview on Thursday, by Duvall County Election Supervisor, Jerry Holland who is, nonetheless &#8212; and unlike Sancho &#8212; a supporter of the Diebold optical-scan voting machines.<\/p>\n<p><b>UPDATE:<\/b> <a href=\"http:\/\/www.theledger.com\/apps\/pbcs.dll\/article?AID=\/20060303\/APN\/603031138\">AP picks up the story<\/a> (hat tip to John Gideon) and adds that Sancho has been sent &#8220;a letter threatening legal action&#8221; by the State Division of Elections. A fine thanks for helping the state discover that their elections could be stolen by a single malicious individual. Ah, Florida&#8230;<\/p>\n<p><b>UPDATE 2:<\/b> BBV <a href=\"http:\/\/www.bbvforums.org\/forums\/messages\/1954\/19494.html\">has more on this<\/a>, including the threat letter to Sancho who is ready to fight. &#8220;We will be talking to our lawyers over the weekend,&#8221; Sancho said. &#8220;Somebody is going to pay for it.&#8221;<\/p>\n<p><i>The complete &#8220;Technical Advisory&#8221; memorandum issued late this evening by Florida&#8217;s Division of Elections Director, Dawn K. Roberts, follows in full&#8230;<\/i> [a WORD version may be downloaed <a href=\"https:\/\/BradBlog.com\/Docs\/Florida_TechnicalAdvisory3-3-06.doc\">here<\/a>]\n<div class=\"document\">\n<div class=Section1>\n<div style='mso-element:para-border-div;border-top:solid windowtext 3.0pt; border-left:none;border-bottom:solid windowtext 1.0pt;border-right:none; mso-border-top-alt:solid windowtext 3.0pt;mso-border-bottom-alt:solid windowtext .75pt; padding:15.0pt 0in 15.0pt 0in'>\n<p class=DocumentLabel><a name=\"OLE_LINK1\"><b>Memorandum<\/b><\/a><span style='font-size:12.0pt;mso-bidi-font-size:10.0pt;font-family:\"CG Times \\(W1\\)\"; text-transform:none;font-weight:normal'><o:p><\/o:p><\/span><\/p>\n<\/div>\n<p class=MsoNormal style='text-align:justify'><span style='font-size: 11.0pt; mso-bidi-font-size: 12.0pt; font-family: Arial; mso-bidi-font-family: Times New Roman; mso-bookmark: OLE_LINK1'>TO:<span style='mso-tab-count:2'>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>Supervisors of Elections<\/p>\n<p>FROM<span style='mso-tab-count:1'> <\/span>:<span style='mso-tab-count:1'>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>Dawn K. Roberts, Director<\/p>\n<p>DATE:<span style='mso-tab-count:2'>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><st1:date Month=\"3\" Day=\"3\" Year=\"2006\" w:st=\"on\">March 3, 2006<\/span><\/p>\n<div style='mso-element:para-border-div;border:none;border-bottom:solid windowtext 1.5pt; padding:0in 0in 1.0pt 0in'>\n<p class=MsoNormal style='margin-left:1.0in;text-align:justify;text-indent: -1.0in;border:none;mso-border-bottom-alt:solid windowtext 1.5pt;padding:0in; mso-padding-alt:0in 0in 1.0pt 0in'><span style='font-size:11.0pt;mso-bidi-font-size:12.0pt;font-family:Arial;mso-bidi-font-family: \"Times New Roman\"'>SUBJECT:<span style='mso-tab-count:1'>\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>Technical Advisory<u><o:p><\/o:p><\/u><\/span><\/p>\n<\/div>\n<p class=MsoNormal style='mso-outline-level:1'><span style='mso-bookmark:OLE_LINK1'><b style='mso-bidi-font-weight:normal'>Purpose:<o:p><\/o:p><\/b><\/span><\/p>\n<p class=MsoNormal style='text-align:justify'><span style='mso-bookmark:OLE_LINK1'>This advisory concerns enhancements to voting system security procedures that each supervisor of elections must address immediately.<span style='mso-spacerun:yes'>\u00a0 <\/span>Provided within this technical advisory are guidelines that clarify the requirements for meeting the minimum security standards of 1S-2.015 (5)(g), (k) and (n).<\/span><\/p>\n<p class=MsoNormal style='mso-outline-level:1'><span style='mso-bookmark:OLE_LINK1'><b style='mso-bidi-font-weight:normal'>Background and Scope:<o:p><\/o:p><\/b><\/span><\/p>\n<p class=MsoNormal style='text-align:justify'><span style='mso-bookmark:OLE_LINK1'><st1:place w:st=\"on\"><st1:State w:st=\"on\">Florida<\/st1:State><\/st1:place>&#8216;s voting systems standards and certification program are recognized as the most stringent in the nation.<span style='mso-spacerun:yes'>\u00a0 <\/span>Supplementing this rigorous certification process are the detailed security procedures that each county supervisor of elections must establish and follow.<span style='mso-spacerun:yes'>\u00a0 <\/span>Indeed, the success of a certified voting system is largely dependant upon the security employed.<\/span><\/p>\n<p class=MsoNormal style='text-align:justify'><span style='mso-bookmark:OLE_LINK1'>As a matter of practice, <st1:place w:st=\"on\"><st1:State w:st=\"on\">Florida<\/st1:State><\/st1:place>&#8216;s voting systems standards and certification program are reviewed by the Division&#8217;s Bureau of Voting Systems Certification on a continuous basis.<span style='mso-spacerun:yes'>\u00a0 <\/span>The Bureau recognizes that as technology evolves so must our security procedures surrounding the operations of our voting systems. As we identify new procedures and guidelines that are necessary, it is paramount that <st1:place w:st=\"on\"><st1:PlaceType w:st=\"on\">county<\/st1:PlaceType>  <st1:PlaceName w:st=\"on\">Supervisors<\/st1:PlaceName><\/st1:place> amend their security procedures. <\/span><\/p>\n<p class=MsoNormal style='text-align:justify'><span style='mso-bookmark:OLE_LINK1'>In addition to the Division&#8217;s ongoing internal examination of security procedures, we have recently reviewed the State of <st1:place w:st=\"on\"><st1:State w:st=\"on\">California<\/st1:State><\/st1:place>&#8216;s Voting Systems Technology Assessment Advisory Board&#8217;s (VSTAAB) Security Analysis of the Diebold AccuBasic Interpreter and Ciber Laboratory&#8217;s Source Code Review and Functional Testing reports.<span style='mso-spacerun:yes'>\u00a0<\/span>The Florida Division of Elections believes that potential system vulnerabilities identified in these reports can be addressed through enhanced security safeguards.<span style='mso-spacerun:yes'>\u00a0 <\/span>In general, these recommendations are applicable to all types of election media including compact flashes, PCMCIA cards, memory packs, PEBs, and paper ballots.<span style='mso-spacerun:yes'>\u00a0 <\/span><b style='mso-bidi-font-weight:normal'>This technical advisory therefore applies to all voting systems deployed in <st1:place w:st=\"on\"><st1:State w:st=\"on\">Florida<\/st1:State><\/st1:place>.<o:p><\/o:p><\/b><\/span><\/p>\n<p class=MsoNormal style='text-align:justify'><span style='mso-bookmark:OLE_LINK1'>Note that the use of the word &#8220;procedure&#8221; within the context of this technical advisory means a macroscopic description of a process that defines the duties, responsibilities, and activities of an individual or a group of individuals.<span style='mso-spacerun:yes'>\u00a0 <\/span>While explicit step-by-step task specific work instructions necessary for implementation are not required to be included in your revised security procedures when submitted to the Division of Elections for approval, such instructions must be incorporated into your county&#8217;s overall security plan to ensure the highest level of system protection.<\/span><\/p>\n<p class=MsoNormal style='mso-outline-level:1'><span style='mso-bookmark:OLE_LINK1'><b style='mso-bidi-font-weight:normal'><u>Recommendations and Guidelines<o:p><\/o:p><\/u><\/b><\/span><\/p>\n<p class=MsoNormal style='mso-outline-level:1'><span style='mso-bookmark:OLE_LINK1'><b style='mso-bidi-font-weight:normal'>Pre-election Steps for Voting Systems:<br \/> <\/b><i style='mso-bidi-font-style: normal'>Threat model and mitigating strategy:<o:p><\/o:p><\/i><\/span><\/p>\n<p class=MsoNormal style='text-align:justify'><span style='mso-bookmark:OLE_LINK1'>When developing a security procedure, one should determine the key elements within a system and develop threat models against those elements.<span style='mso-spacerun:yes'>\u00a0 <\/span>For example, consider a threat model that consists of a &#8220;knowledge based&#8221; attack focused on a scanner memory card or any other type of election media.<span style='mso-spacerun:yes'>\u00a0<\/span>This &#8220;knowledge based&#8221; attack assumes that the security perimeter surrounding this media can be breached to allow unfettered access or that an internal party utilizes their position of responsibility to gain such access to the media.<span style='mso-spacerun:yes'>\u00a0 <\/span>The mitigating strategy to defend against such an intrusion includes one or more security layers focused on election media accountability and chain of custody.<span style='mso-spacerun:yes'>\u00a0 <\/span>Therefore, the following guidelines serve as the minimum criteria for evaluating compliance to this security procedure element as it relates to electronic media.&nbsp;<\/o:p><\/span><\/p>\n<p class=MsoNormal style='margin-left:.75in;text-align:justify;text-indent: -.5in;mso-list:l7 level1 lfo1;tab-stops:list .75in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>1)<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>Regardless of electronic media type (memory packs, compact flash cards, PC Cards [aka PCMCIA cards], PEBs, voter card encoders, supervisor cards, and key cards), all such media shall be permanently identified with a unique identification (e.g., serial number).<\/span><\/p>\n<p class=MsoNormal style='margin-left:1.0in;text-align:justify;text-indent: -.25in;mso-list:l7 level2 lfo1;tab-stops:list 1.0in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>a.<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>The supervisor of elections shall create and maintain an inventory of all electronic media.<\/span><\/p>\n<p class=MsoNormal style='margin-left:1.0in;text-align:justify;text-indent: -.25in;mso-list:l7 level2 lfo1;tab-stops:list 1.0in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>b.<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>The supervisor of elections shall create a process and maintain a procedure for tracking the custody of electronic media from their storage location, through election coding, through the election process, to their final post-election disposition and return to storage.<span style='mso-spacerun:yes'>\u00a0 <\/span>This electronic media must be given the same level of attention that one would give to official ballots.<\/span><\/p>\n<p class=MsoNormal style='margin-left:1.0in;text-align:justify;text-indent: -.25in;mso-list:l7 level2 lfo1;tab-stops:list 1.0in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>c.<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>The chain of custody must utilize two or more individuals to perform a check and verification check whenever a transfer of custody takes place.<\/span><\/p>\n<p class=MsoNormal style='margin-left:.75in;text-align:justify;text-indent: -.5in;mso-list:l7 level1 lfo1;tab-stops:list .75in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>2)<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>The supervisor of elections shall create and maintain a secured location for storing the electronic media when not in use, for coding an election, for creating the election media, for transferring and installing the election media into the voting device, and for storing these devices once the election parameters are loaded. <\/span><\/p>\n<p class=MsoNormal style='margin-left:1.0in;text-align:justify;text-indent: -.25in;mso-list:l7 level2 lfo1;tab-stops:list 1.0in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>a.<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>No election media shall be left unattended or in an unsecured location once it has been coded for an election.<\/span><\/p>\n<p class=MsoNormal style='margin-left:1.5in;text-align:justify;text-indent: -1.5in;mso-text-indent-alt:-9.0pt;mso-list:l7 level3 lfo1;tab-stops:list 1.5in'><span style='mso-bookmark:OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'><span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span>i.<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>Where applicable, coded election media must be immediately loaded into the relevant voting device, logged, and made secure or must be placed in a secured and controlled environment and inventoried.<\/span><\/p>\n<p class=MsoNormal style='margin-left:1.0in;text-align:justify;text-indent: -.25in;mso-list:l7 level2 lfo1;tab-stops:list 1.0in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>b.<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>For each election, the supervisor of elections shall seal each election media in its relevant voting device or container utilizing one or more uniquely identified tamper-resistant or tamper-evident seals.<\/span><\/p>\n<p class=MsoNormal style='margin-left:1.5in;text-align:justify;text-indent: -1.5in;mso-text-indent-alt:-9.0pt;mso-list:l7 level3 lfo1;tab-stops:list 1.5in'><span style='mso-bookmark:OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'><span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span>i.<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>A combined master identification of the voting device, the election media, and the seal(s) must be created and maintained.<\/span><\/p>\n<p class=MsoNormal style='margin-left:1.5in;text-align:justify;text-indent: -1.5in;mso-text-indent-alt:-9.0pt;mso-list:l7 level3 lfo1;tab-stops:list 1.5in'><span style='mso-bookmark:OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'><span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span>ii.<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>For election media that are device independent (e.g., PEBs, voter card encoders) these devices should be stored in a secured, sealed container and must also be identified on a master log.<\/span><\/p>\n<p class=MsoNormal style='margin-left:1.0in;text-align:justify;text-indent: -.25in;mso-list:l7 level2 lfo1;tab-stops:list 1.0in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>c.<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>The supervisor of elections shall create a process and maintain a procedure for tracking the custody of these voting devices once these devices are loaded with an election definition.<span style='mso-spacerun:yes'>\u00a0 <\/span>These voting devices must be given the same level of attention that one would give to official ballots.<\/span><\/p>\n<p class=MsoNormal style='margin-left:1.0in;text-align:justify;text-indent: -.25in;mso-list:l7 level2 lfo1;tab-stops:list 1.0in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>d.<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>The chain of custody must utilize two or more individuals to perform a check and verification check whenever a transfer of custody takes place.<\/span><\/p>\n<p class=MsoNormal style='margin-left:.75in;text-align:justify;text-indent: -.5in;mso-list:l7 level1 lfo1;tab-stops:list .75in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>3)<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>The supervisor of elections shall have in place a recovery plan that is to be followed should there be any indication of a security breach in the accountability and chain of custody procedures.<span style='mso-spacerun:yes'>\u00a0 <\/span>Any indication of a security breach must be confirmed by more than one individual.<\/span><\/p>\n<p class=MsoNormal style='margin-left:.75in;text-align:justify;text-indent: -.5in;mso-list:l7 level1 lfo1;tab-stops:list .75in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>4)<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>The supervisor of elections shall have a training plan for relevant election officials, staff, and temporary workers that address these security procedures and the relevant work instructions.<\/span><\/p>\n<p class=MsoNormal style='mso-outline-level:1'><span style='mso-bookmark:OLE_LINK1'><b style='mso-bidi-font-weight:normal'>Transport of Ballots and\/or Election Materials:<br \/> <\/b><i style='mso-bidi-font-style: normal'>Threat model and Mitigation Strategy:<o:p><\/o:p><\/i><\/span><\/p>\n<p class=MsoNormal style='text-align:justify'><span style='mso-bookmark:OLE_LINK1'>Consider a threat where a malicious entity wishes to gain access to a memory card or any type of election media.<span style='mso-spacerun:yes'>\u00a0 <\/span>This could occur at any time prior to opening the polls and with the election media in any state (i.e., pre-election, set for election, or post-election.)<span style='mso-spacerun:yes'>\u00a0 <\/span>The mitigating strategy to defend against such an invasion includes one or more security layers that again focus on accountability and chain of custody.<span style='mso-spacerun:yes'>\u00a0 <\/span>Therefore, the following guidelines serve as the minimum criteria for evaluating compliance to this security procedure element.<\/span><\/p>\n<p class=MsoNormal style='margin-left:.75in;text-align:justify;text-indent: -.5in;mso-list:l5 level1 lfo7;tab-stops:list .75in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>1)<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>The supervisor of elections shall create and maintain a secured location for storing and transporting voting devices once the election parameters are loaded.<span style='mso-spacerun:yes'>\u00a0 <\/span>This shall include procedures that are to be used at locations outside the direct control of the supervisor of elections, such as overnight storage at a polling location.<\/span><\/p>\n<p class=MsoNormal style='margin-left:1.0in;text-align:justify;text-indent: -.25in;mso-list:l3 level1 lfo8;tab-stops:list 1.0in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>a.<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>For each election, the supervisor of elections shall create and maintain an inventory of these items for each storage location.<span style='mso-spacerun:yes'>\u00a0 <\/span>These voting devices must be given the same level of attention that one would give to official ballots.<\/span><\/p>\n<p class=MsoNormal style='margin-left:1.0in;text-align:justify;text-indent: -.25in;mso-list:l3 level1 lfo8;tab-stops:list 1.0in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>b.<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>The chain of custody must utilize two or more individuals to perform a check and verification check whenever a transfer of custody takes place or where the voting devices have been left unattended for any length of time.<span style='mso-spacerun:yes'>\u00a0 <\/span>Particular attention must be given to the integrity of the tamper-resistant or tamper-evident seals.<\/span><\/p>\n<p class=MsoNormal style='margin-left:.75in;text-align:justify;text-indent: -.5in;mso-list:l5 level1 lfo7;tab-stops:list .75in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>2)<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>The supervisor of elections shall have in place a recovery plan that is to be followed should there be any indication of a security breach in the accountability and chain of custody procedures.<span style='mso-spacerun:yes'>\u00a0 <\/span>The plan must also address inadvertent damage to any seals or accountability\/chain of custody documentation errors.<span style='mso-spacerun:yes'>\u00a0 <\/span>These plans must be developed in a manner that enhances public confidence in the security and integrity of the election.<span style='mso-spacerun:yes'>\u00a0 <\/span>Any indication of a security breach, documentation errors, or seal damage must be confirmed by more than one individual.<\/span><\/p>\n<p class=MsoNormal style='margin-left:.75in;text-align:justify;text-indent: -.5in;mso-list:l5 level1 lfo7;tab-stops:list .75in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>3)<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>The supervisor of elections shall have a training plan for relevant election officials, staff, and temporary workers that address these security procedures and the relevant work instructions.<\/span><\/p>\n<p class=MsoNormal style='mso-outline-level:1'><span style='mso-bookmark:OLE_LINK1'><b style='mso-bidi-font-weight:normal'>Election Access to Voting Systems:<br \/> <\/b><i style='mso-bidi-font-style: normal'>Threat model and Mitigation Strategy:<o:p><\/o:p><\/i><\/span><\/p>\n<p class=MsoNormal style='text-align:justify'><span style='mso-bookmark:OLE_LINK1'>Consider a threat model to optical scanners, DRE touchscreens, central count scanners, and the election management system; the success of which relies on a known vulnerability in an election department&#8217;s security protocols.<span style='mso-spacerun:yes'>\u00a0 <\/span>Under this condition, perimeter security may be compromised where access to the voting system relies on default passwords and encryption keys or where such items are not changed frequently.<span style='mso-spacerun:yes'>\u00a0 <\/span>The obvious mitigating strategy to defend against such an intrusion includes immediately changing the default passwords and encryption keys and to develop a plan and process for changing the access control built on some time-based or event-based characteristic.<span style='mso-spacerun:yes'>\u00a0 <\/span>Therefore, the following guidelines serve as the minimum criteria for evaluating compliance to this security procedure element.<\/span><\/p>\n<p class=MsoNormal style='margin-left:.75in;text-align:justify;text-indent: -.5in;mso-list:l6 level1 lfo3;tab-stops:list .75in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>1)<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>The supervisor of elections shall have a procedure that ensures that default or vendor supplied passwords, encryption keys, etc. have been changed.<\/span><\/p>\n<p class=MsoNormal style='margin-left:1.0in;text-align:justify;text-indent: -.25in;mso-list:l6 level2 lfo3;tab-stops:list 1.0in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>a.<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>The supervisor of elections must maintain these access control keys\/passwords in a secured and controlled environment.<span style='mso-spacerun:yes'>\u00a0 <\/span>Who has access to these items must be delineated in the relevant position descriptions.<\/span><\/p>\n<p class=MsoNormal style='margin-left:1.0in;text-align:justify;text-indent: -.25in;mso-list:l6 level2 lfo3;tab-stops:list 1.0in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>b.<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>Changes to the encryption keys and passwords are at the discretion of the supervisor of elections, but it is advisable that this discretionary authority should not be delegated.<span style='mso-spacerun:yes'>\u00a0 <\/span>However, the individual(s) that implement the change must have this &#8220;authorization to change&#8221; responsibility delineated within their position description(s).<span style='mso-spacerun:yes'>\u00a0 <\/span><i style='mso-bidi-font-style:normal'>(Note the distinction relative to describing who can authorize a change, who implements a change, and who has access but cannot change the passwords and encryption keys.)<\/i><\/span><\/p>\n<p class=MsoNormal style='margin-left:1.0in;text-align:justify;text-indent: -.25in;mso-list:l6 level2 lfo3;tab-stops:list 1.0in'><span style='mso-bookmark: OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>c.<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>Where appropriate, the degree of access should be defined within each relevant position description and maintained at that level within the election management system and\/or equipment.<span style='mso-spacerun:yes'>\u00a0 <\/span>This applies where a voting system can limit an individual&#8217;s access to certain menus, software modules, etc.<\/span><\/p>\n<p class=MsoNormal style='margin-left:.75in;text-indent:-.5in;mso-list:l6 level1 lfo3; tab-stops:list .75in'><span style='mso-bookmark:OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>2)<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>Access to any device, election media, or election management system that requires the use of an encryption key must be witnessed by one or more individuals authorized to use such information.<\/span><\/p>\n<p class=MsoNormal style='margin-left:1.0in;text-indent:-.25in;mso-list:l8 level1 lfo11; tab-stops:list 1.0in'><span style='mso-bookmark:OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>a.<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>An access log should be developed and utilized.<\/span><\/p>\n<p class=MsoNormal style='margin-left:.75in;text-indent:-.5in;mso-list:l6 level1 lfo3; tab-stops:list .75in'><span style='mso-bookmark:OLE_LINK1'><![if !supportLists]><span style='mso-list:Ignore'>3)<span style='font:7.0pt \"Times New Roman\"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><![endif]>The supervisor of elections shall have a training plan for relevant election officials, staff, and temporary workers that address these security procedures and the relevant work instructions.<\/span><\/p>\n<p class=MsoNormal><span style='mso-bookmark:OLE_LINK1'>Specific Authority: 101.015 F.S.<br \/> Rule: 1S-2.015 (5)(g),<span style='mso-spacerun:yes'>\u00a0 <\/span>1S-2.015 (5)(k), and 1S-2.015 (5)(n)<\/span><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Picking up in the tradition of California&#8217;s Sec. of State Bruce McPherson, who seems to have a fondness for Friday night releases of important information which he hopes nobody will notice, Florida&#8217;s Division of Elections Director, Dawn K. Roberts, issued a &#8220;Technical Advisory&#8221; memorandum calling for &#8220;enhancements to voting system security procedures that each supervisor [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":""},"categories":[1],"tags":[],"coauthors":[],"class_list":["post-2499","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"_links":{"self":[{"href":"https:\/\/bradblog.com\/index.php?rest_route=\/wp\/v2\/posts\/2499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bradblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bradblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bradblog.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/bradblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2499"}],"version-history":[{"count":0,"href":"https:\/\/bradblog.com\/index.php?rest_route=\/wp\/v2\/posts\/2499\/revisions"}],"wp:attachment":[{"href":"https:\/\/bradblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bradblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bradblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2499"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/bradblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcoauthors&post=2499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}