Voting Village - See something, say something
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 374 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/50766 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | |
Genre |
00:00
Vulnerability (computing)Video gameGoodness of fitComputer animation
00:38
Hacker (term)Virtual machineVotingInformation securityInternet service providerDigital signalVapor pressureWhiteboardExpert systemComputer programVulnerability (computing)DigitizingPhysical systemFundamental theorem of algebraSpherical capE-bookVotingNumberRight angleSpeech synthesisAdditionHacker (term)Mechanism designVirtual machineData structureNeighbourhood (graph theory)WordGroup actionGoodness of fitTranslation (relic)Arithmetic meanLatin squareBuildingComputer animation
03:05
Vulnerability (computing)Information securityVulnerability (computing)Physical systemObject (grammar)Information securitySoftwareCycle (graph theory)Speech synthesisForm (programming)Product (business)NeuroinformatikFunctional (mathematics)View (database)Flow separationHacker (term)Arithmetic meanVirtual machineValidity (statistics)VotingSoftware bugMechanism designDecision theoryClosed setInsertion lossBuildingComputerGroup actionState of matterMultiplication signComputer animation
06:17
System programming19 (number)Open setMetropolitan area networkMechanism designPrincipal idealGraph coloringVirtual machinePhysical systemKey (cryptography)Shared memorySoftware testingObservational studyGoodness of fitComputer animation
07:27
Mechanism designVotingPhysical systemSoftware frameworkSelf-organizationInformation securitySoftware testingSource codeBulletin board systemValidity (statistics)Insertion lossReading (process)Source codeSelf-organizationInformation securitySoftware testingPhysical systemProcess (computing)Commitment schemeCybersexSoftware frameworkBulletin board systemVotingVulnerability (computing)Extreme programmingShape (magazine)Arithmetic meanGoodness of fit
08:48
Computer forensicsCybersexVulnerability (computing)Computer programComputer networkChi-squared distributionResultantInformation securityComputer programmingOperator (mathematics)Stack (abstract data type)Online helpHacker (term)PentagonVulnerability (computing)Physical systemComputer animation
09:23
ImplementationKeyboard shortcutCybersexGroup actionOperator (mathematics)Direction (geometry)Physical systemVulnerability (computing)Keyboard shortcutHacker (term)Crash (computing)Computer animation
09:52
System administratorElectronic program guideVulnerability (computing)Traffic reportingElectronic program guideVulnerability (computing)Traffic reportingSystem administratorPhysical systemComputer programmingAxiom of choiceMobile WebInformation securityCybersexComputer animation
10:31
Hacker (term)Message passingShared memoryLattice (order)Physical systemCivil engineeringNumberSelf-organizationInformation securityMechanism designOrder (biology)Internet service provideroutputLimit (category theory)Group actionVulnerability (computing)Traffic reportingInformationArithmetic meanOpen setCollaborationismComputer animation
11:51
Physical systemInformation securityHacker (term)VotingVulnerability (computing)Software testingRight angleDecision theoryComputerAreaOpen setOrder (biology)Multiplication signGroup actionComputer animation
Transcript: English(auto-generated)
00:05
Good morning, good afternoon, good evening, everybody. It is a civic duty that if you see something, you say something. That is the underlying principle behind vulnerability disclosure,
00:22
which I will talk about today. Give me a second here as I turn on my slide deck.
00:58
As I said, I'm here to talk about vulnerability
01:01
disclosure for digital systems in vital use by society, such as voting machines. Vulnerability disclosure is the neighborhood watch of cybersecurity. If you see something, say something. When we surface the bad news to everyone, we can take corrective action.
01:22
Vulnerability disclosure is the bad news that turns into good news. Weaknesses you don't know of, you cannot fix. When you know of them, you fix them and turn them into good news. There are two critical legal aspects of vulnerability disclosure. Number one, the right for anyone to look for vulnerabilities in systems.
01:43
And number two, the right to share the findings, not just with the owner of the system, but with the public. My name is Martin Mikkos, I'm the CEO of HackerOne, representing three quarters of a million ethical hackers all over the world.
02:06
We're here today to talk about voting and voting machines. And if you look at the word vote and the Latin translation of it, it is the decision-making atom of nations and societies
02:22
and has been so for thousands of years. We have built our countries and our nations based on voting systems. It is a fundamental piece of democracy. And throughout history, we've made good use of the latest innovations, such as paper, to build mechanisms and systems for voting.
02:43
But tragically today, we have a world with digital capabilities beyond our wildest dreams. Yet, we have been unable to construct reliable and trustworthy digital voting systems. What's wrong here? How could we allow this to happen?
03:02
And what is the fix? There's a logical conclusion that has been missing. If you believe in democracy with one person, one vote, and if you do believe in the freedom of speech, which the US does by means of its first amendment,
03:22
there's just one logical conclusion for voting machines and voting technology. You must believe in vulnerability disclosure, meaning the practice of inviting external unbiased people to test the security and validity of the system. If you don't believe in this form of external
03:41
and public scrutiny, you are not believing in democracy or freedom of speech. Let us think about how computer systems come to be. Somebody designs a system, the design is approved, product is developed and built, and it is tested.
04:02
To make something truly secure and worthy of the trust of everyone, we must design security in from the start. Security must be there from the get-go. If you bolt it afterwards as an afterthought, it will never work. It must be there, security must be there
04:21
from the first blueprint. Then secondly, once the system is ostensibly ready for public use, you must turn around and let it undergo external unbiased and unlimited vetting. Now an inside, outside-in view is needed. Journalists don't see their own typos.
04:43
Bookkeepers can't see their accounting mistakes. So we need proofreaders and we need auditors. These people have come in with a fresh objective mind and no bias of ownership. They spot the flaws quickly and the flaws can be fixed. It's the same with software.
05:01
We must subject software to external scrutiny by people who we do not personally know. Ethical hackers, white hats, security researchers, they come by many names, but it is the same thing. They are masters of detecting flaws in systems built by others. Hackers are the best mechanisms for finding vulnerabilities
05:20
so they can be fixed. In essence, hacking is the immune system of the intimate. They are a vaccine. They can think like an adversary, but they act in your benefit. Too often however, the simple principle of security designed from the inside out
05:40
and tested from the outside in is not used. We have voting machine bugs that have been known for several election cycles and are still there unfixed out there in the wild, ready to be exploited by people who do not believe in democracy. We must fix the simple but fatal problem.
06:00
Governments should mandate vulnerability disclosure for every manufacturer and vendor of technology used for voting or any other vital societal function. It's that easy and it's difficult, but yet it's easy and we should make that decision. The principles I'm talking about here are not new.
06:22
Over a hundred years ago, there was a Dutch scientist by the name of Kerkhoffs who postulated that when you are building a system intended to be safe and secure and maybe protect secrecy, the mechanism of the machine need not be kept secret. On the contrary, if you make the blueprint open
06:40
for anybody to test and study and vet, you have a better chance of making a secure system than if you don't. It's only the keys that need to be secret, but not the mechanism of the system. This is an important principle of openness of design that leads to better security. Much later, a man called Shannon wrote a corollary
07:03
of Kerkhoffs' principle. He said, you must assume that your enemy will learn how your system was built. Share the design with everybody and in that way you share it also with the good people who will help fix it, who will help improve it. And by the way, there are many, many more good people
07:21
than bad people in the world, maybe at the ratio of a thousand to one. So to repeat and summarize, if we have a commitment to govern our nation so that every person has one vote, it logically follows that we must let each such person conduct their own validation of the system,
07:43
the system of voting being used. It's a very simple principle and it is very powerful. Public scrutiny makes every system better. The only reason to object to this principle would be extreme greed or disdain for democracy.
08:03
If we look at what's going on in society at large, it's in much better shape. The National Institute of Science and Technology has long published the cybersecurity framework with very good advice and recommendations for larger organizations.
08:20
And they define what vulnerability disclosure means. They say, you need to have processes established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources, such as internal testing, security bulletins or security researchers.
08:41
When you follow the cybersecurity framework from NIST, your organization will be in much better shape. The Department of Defense fully embraces this. And they are, the Pentagon by definition have some of the most sensitive, secure, secretive, vital systems in the world.
09:02
And they have realized that to be fully secure, they need the help of the outside world, of hackers who they don't even individually know, but to help them report vulnerabilities so that the DOD can fix it. They've been running a vulnerability disclosure program for over four years by now with amazing results,
09:21
fantastic results. The Department of Homeland Security, DHS, finds vulnerability disclosure so important that they are preparing a binding operational directive about it. Under this DOD, civilian federal agencies will be required to invite good hackers to hack them.
09:42
It's the only logical thing to do in a democracy and it will improve the cybersecurity of all systems and increase trust among citizens. And hot from the press, just in the last few days, the CISA agency within DHS delivered a terrific guide
10:01
for election administrators. The guide is called, Guide to Vulnerability Reporting for America's Election Administrators. And they say in their foreword that election administrators should know that the cybersecurity research community can help ensure these systems are safe so that the choices of the voting public
10:21
can be clearly heard. This guide offers a step-by-step guide for election administrators who seek to establish a successful vulnerability disclosure program. Looking more broadly and into the future, I see three principles that will enable us to establish a true digital civilization,
10:42
one that actually works, a society that is well-governed by digital mechanisms and which citizens can trust. First, it will be seen as negligence to ignore the useful input from external security researchers. Yes, negligence, meaning you would be stupid
11:00
not to listen to the amazing advice and input and vulnerability reports that you can get from the outside. Number two, cybersecurity will be a collaborative effort with organizations pooling their defense to provide formidable obstacles to the adversaries. And we have learned over thousands of years
11:21
that whenever we face an asymmetric threat, the best defense is pool defense. So we must do it. Thirdly, the only way for any organization to achieve trust by customers, consumers, or citizens is through transparency, openness.
11:40
By sharing vulnerability information and cybersecurity policies and practices publicly and with each other, trust will grow. In summary, we have a system here for vulnerability disclosure where if you see something, you say something. It has been rejected and avoided by many vendors,
12:04
but it is the only practical thing to do in order to increase the security of any computer system. Two legal rights are important here, the rights for the hackers, the ethical hackers to do the testing and the right for them to disclose their findings. We know what to do.
12:21
We should have done it a long time ago. We're tragically delayed. We just have to make the decision and start going. We must listen to hackers. We must work together collaboratively on the defenses and we must build openness into the area of cybersecurity, sharing what we are finding, sharing the vulnerabilities and our fixes
12:41
because that is the only way to build trust with our citizens and with our constituent groups. And when we do that, we will truly build a society that can function well in the digital world. Thank you for listening to me today.