Recurring |
one_organization, multiple_organization |
(a) The software failure incident related to Estonia's internet voting system has happened again within the same organization. The article mentions that the Estonian government has been developing its e-voting system since 2002 and has been using it for various elections since 2005. Despite the security vulnerabilities and flaws discovered by independent researchers, Estonia still intends to use the e-voting system for its European elections in May [26586].
(b) The software failure incident related to the security vulnerabilities in Estonia's e-voting system could have serious ramifications for other countries looking to adopt a similar system, including Lithuania, Finland, and possibly the UK. The incident serves as a warning to other countries considering implementing online voting systems similar to Estonia's, highlighting the potential risks and security concerns associated with such systems [26586]. |
Phase (Design/Operation) |
design, operation |
(a) The software failure incident related to the design phase is evident in the case of Estonia's internet voting system. Independent researchers discovered security vulnerabilities in the system, such as election officials downloading key software over insecure internet connections, typing PINs and passwords in view of cameras, and preparing election software on insecure PCs [26586]. These design flaws introduced by the system development and procedures to operate the system contributed to the potential for faked votes or totals in the elections.
(b) The software failure incident related to the operation phase is highlighted by the researchers' demonstration of how they could create fake votes and infect servers to alter vote counts using Estonia's e-voting software [26586]. This indicates that the operation or misuse of the system could lead to significant security breaches and manipulation of election results. |
Boundary (Internal/External) |
within_system, outside_system |
(a) within_system: The software failure incident related to Estonia's internet voting system was primarily due to contributing factors that originated from within the system. Independent researchers discovered security vulnerabilities within the e-voting system, such as election officials downloading key software over insecure connections, typing PINs and passwords in view of cameras, and preparing election software on insecure PCs [26586]. The researchers were able to replicate the Estonian system using its published software and demonstrated weaknesses in the security safeguards of the system, including taking over voters' PCs to cast fake votes and hacking into vote-counting servers to alter the final count [26586].
(b) outside_system: The software failure incident also highlighted the potential external threats that could exploit the vulnerabilities within the system. The researchers warned that attacks could be carried out by nation states or well-funded candidates who might hire criminal hackers to compromise elections by altering votes [26586]. Additionally, the researchers demonstrated how malware could be run on a server to create a faked total for e-votes using Estonia's e-voting software, indicating the external threat of malicious software impacting the system [26586]. |
Nature (Human/Non-human) |
non-human_actions, human_actions |
(a) The software failure incident occurring due to non-human actions:
The software failure incident in Estonia's internet voting system was primarily due to security vulnerabilities in the system that could lead to faked votes or totals. Independent researchers discovered flaws in the system, such as insecure internet connections used to download key software, election officials typing PINs and passwords in view of cameras, and preparing election software on insecure PCs [26586].
(b) The software failure incident occurring due to human actions:
Human actions also played a significant role in the software failure incident. Election officials were observed engaging in insecure practices like downloading key software over insecure internet connections, typing PINs and passwords in view of cameras, and preparing election software on insecure PCs. Additionally, the Estonian government had been developing its e-voting system since 2002 and used it for various elections despite the identified security vulnerabilities [26586]. |
Dimension (Hardware/Software) |
software |
(a) The software failure incident related to hardware:
The software failure incident in Estonia's internet voting system was not directly attributed to hardware issues. The vulnerabilities and security flaws were primarily due to insecure practices such as election officials downloading key software over insecure internet connections, typing PINs and passwords in view of cameras, and preparing election software on insecure PCs [26586].
(b) The software failure incident related to software:
The software failure incident in Estonia's internet voting system was primarily due to security vulnerabilities and flaws in the software itself. Independent researchers discovered weaknesses in the e-voting system's security safeguards, which were insufficient to protect against attacks such as taking over voters' PCs to cast fake votes and hacking into vote-counting servers to alter the final count [26586]. The incident highlighted the risks associated with e-voting systems and the potential for malicious actors to exploit software vulnerabilities for electoral manipulation. |
Objective (Malicious/Non-malicious) |
malicious |
(a) The software failure incident related to the Estonian e-voting system was malicious in nature. Independent researchers discovered security vulnerabilities in the system that could potentially lead to faked votes or totals. They warned that these vulnerabilities could be exploited by nation states or well-funded individuals with criminal hackers to compromise elections [26586]. The researchers demonstrated how they could create fake votes and infect servers to alter vote counts, highlighting the malicious intent behind the identified flaws in the system [26586]. |
Intent (Poor/Accidental Decisions) |
poor_decisions |
(a) The intent of the software failure incident was related to poor_decisions. Independent researchers discovered security vulnerabilities in Estonia's internet voting system, including election officials downloading key software over insecure connections, typing PINs and passwords in view of cameras, and preparing election software on insecure PCs [26586]. The researchers warned that these actions could compromise the security of the entire system, making it vulnerable to attacks by nation states or well-funded individuals seeking to alter the vote [26586]. The Estonian government had been developing its e-voting system since 2002 and used it for various elections, but the researchers found that the security safeguards in place were insufficient to protect against the attacks they conducted [26586]. The Estonian National Electoral Committee responded to the findings by stating that the researchers did not provide technical details on the alleged vulnerabilities in their system, indicating a lack of transparency and communication regarding the security flaws [26586]. |
Capability (Incompetence/Accidental) |
development_incompetence |
(a) The software failure incident in the Estonian e-voting system can be attributed to development incompetence. Independent researchers discovered security vulnerabilities in the system, including election officials downloading key software over insecure connections, typing PINs and passwords in view of cameras, and preparing election software on insecure PCs [26586]. The researchers, including Harri Hursti and a team from the University of Michigan, replicated the Estonian system using its published software and found that the security safeguards were insufficient to protect against attacks, such as taking over voters' PCs to cast fake votes and hacking into vote-counting servers to alter the final count [26586].
(b) The software failure incident can also be considered accidental as the Estonian National Electoral Committee claimed that the researchers did not provide technical details on the alleged vulnerabilities in their system [26586]. The committee stated that the researchers did not share the full results of their work and only gave preliminary answers to the findings, indicating a lack of communication and possibly accidental oversight in sharing critical information about the vulnerabilities discovered in the e-voting system. |
Duration |
temporary |
The software failure incident related to Estonia's internet voting system can be considered as a temporary failure. The incident was due to security vulnerabilities in the system that could lead to faked votes or totals [26586]. The flaws were discovered by independent researchers who observed election officials downloading key software over insecure internet connections, typing PINs and passwords in view of cameras, and preparing election software on insecure PCs. The researchers demonstrated weaknesses in the system used in the 2013 elections, showing that the security safeguards were insufficient to protect against the attacks they tried, such as taking over voters' PCs to cast fake votes and hacking into the vote-counting servers to alter the final count [26586]. The Estonian National Electoral Committee stated that the researchers did not provide technical details on the alleged vulnerabilities in their system, and they believed that it was not feasible to effectively conduct the described attacks to alter the results of the voting [26586]. |
Behaviour |
value, other |
(a) crash: The software failure incident in the article is not related to a crash where the system loses state and does not perform any of its intended functions.
(b) omission: The software failure incident in the article is not related to an omission where the system omits to perform its intended functions at an instance(s).
(c) timing: The software failure incident in the article is not related to timing issues where the system performs its intended functions correctly, but too late or too early.
(d) value: The software failure incident in the article is related to the system performing its intended functions incorrectly. The incident involves security vulnerabilities in Estonia's internet voting system that could lead to faked votes or totals [26586].
(e) byzantine: The software failure incident in the article is not related to a byzantine failure where the system behaves erroneously with inconsistent responses and interactions.
(f) other: The software failure incident in the article involves security vulnerabilities in the e-voting system, potentially allowing for fake votes and manipulation of vote counts, as demonstrated by security researchers [26586]. |