Risk-Limiting Audits and Evidence-Based Elections Joint - - PowerPoint PPT Presentation

risk limiting audits and evidence based elections
SMART_READER_LITE
LIVE PREVIEW

Risk-Limiting Audits and Evidence-Based Elections Joint - - PowerPoint PPT Presentation

Risk-Limiting Audits and Evidence-Based Elections Joint Berkeley/Davis Statistics Colloquium Sheltered in Place Philip B. Stark 21 April 2020 University of California, Berkeley 1 Many collaborators including (most recently) Andrew Appel, Josh


slide-1
SLIDE 1

Risk-Limiting Audits and Evidence-Based Elections

Joint Berkeley/Davis Statistics Colloquium Sheltered in Place

Philip B. Stark 21 April 2020

University of California, Berkeley 1

slide-2
SLIDE 2

Many collaborators including (most recently) Andrew Appel, Josh Benaloh, Matt Bernhard, Michelle Blom, Andrew Conway, Rich DeMillo, Steve Evans, Amanda Glazer, Alex Halderman, Mark Lindeman, Kellie Ottoboni, Ron Rivest, Peter Ryan, Jake Spertus, Peter Stuckey, Vanessa Teague, Poorvi Vora

2

slide-3
SLIDE 3

https://www.youtube.com/embed/cruh2p_Wh_4

3

slide-4
SLIDE 4

4

slide-5
SLIDE 5

5

slide-6
SLIDE 6

Arguments that US elections can’t be hacked:

  • Physical security
  • Not connected to the Internet
  • Tested before election day
  • Too decentralized

6

slide-7
SLIDE 7

Arguments that US elections can’t be hacked:

  • Physical security
  • "sleepovers," unattended equipment in warehouses, school gyms, ...
  • locks use minibar keys
  • bad/no seal protocols, easily defeated seals
  • no routine scrutiny of custody logs, 2-person custody rules, ...
  • Not connected to the Internet
  • Tested before election day
  • Too decentralized

7

slide-8
SLIDE 8

Arguments that US elections can’t be hacked:

  • Physical security
  • Not connected to the Internet
  • remote desktop software
  • wifi, bluetooth, cellular modems, ... https://tinyurl.com/r8cseun
  • removable media used to configure equipment & transport results
  • Zip drives
  • USB drives. Stuxnet, anyone?
  • parts from foreign manufacturers, including China; Chinese pop songs in flash
  • Tested before election day
  • Too decentralized

8

slide-9
SLIDE 9

9

slide-10
SLIDE 10

10

slide-11
SLIDE 11

11

slide-12
SLIDE 12

12

slide-13
SLIDE 13

13

slide-14
SLIDE 14

14

slide-15
SLIDE 15

15

slide-16
SLIDE 16

Arguments that US elections can’t be hacked:

  • Physical security
  • Not connected to the Internet
  • Tested before election day
  • Dieselgate, anyone?
  • Northampton, PA
  • Los Angeles, CA VSAP
  • Too decentralized

16

slide-17
SLIDE 17

17

slide-18
SLIDE 18

18

slide-19
SLIDE 19

19

slide-20
SLIDE 20

20

slide-21
SLIDE 21

Arguments that US elections can’t be hacked:

  • Physical security
  • Not connected to the Internet
  • Tested before election day
  • Too decentralized
  • market concentrated: few vendors/models in use
  • vendors & EAC have been hacked
  • demonstration viruses that propagate across voting equipment
  • “mom & pop” contractors program thousands of machines, no IT security
  • changing presidential race requires changing votes in only a few counties
  • small number of contractors for election reporting
  • many weak links

21

slide-22
SLIDE 22

Security properties of paper

  • tangible/accountable
  • tamper evident
  • human readable
  • large alteration/substitution attacks generally require many accomplices

22

slide-23
SLIDE 23

Security properties of paper

  • tangible/accountable
  • tamper evident
  • human readable
  • large alteration/substitution attacks generally require many accomplices

Not all paper is trustworthy: How paper is marked, curated, tabulated, & audited are crucial.

22

slide-24
SLIDE 24

23

slide-25
SLIDE 25

24

slide-26
SLIDE 26

25

slide-27
SLIDE 27

Did the reported winner really win?

  • Procedure-based vs. evidence-based elections
  • sterile scalpel v. patient’s condition

26

slide-28
SLIDE 28

Did the reported winner really win?

  • Procedure-based vs. evidence-based elections
  • sterile scalpel v. patient’s condition
  • Any way of counting votes can make mistakes
  • Every electronic system is vulnerable to bugs, configuration errors, & hacking
  • Did error/bugs/hacking cause losing candidate(s) to appear to win?

26

slide-29
SLIDE 29

Evidence-Based Elections (Stark & Wagner, 2012)

Election officials should provide convincing public evidence that reported outcomes are correct.

27

slide-30
SLIDE 30

Evidence-Based Elections (Stark & Wagner, 2012)

Election officials should provide convincing public evidence that reported outcomes are correct. Absent such evidence, there should be a new election.

27

slide-31
SLIDE 31

Risk-Limiting Audits (RLAs, Stark, 2008)

  • If there’s a trustworthy voter-verified paper trail, can check whether

reported winner really won.

  • If you accept a controlled “risk” of not correcting the reported outcome if it is

wrong, typically don’t need to look at many ballots if outcome is right.

28

slide-32
SLIDE 32

A risk-limiting audit has a known minimum chance of correcting the reported

  • utcome if the reported outcome is wrong (& doesn’t alter correct outcomes).

29

slide-33
SLIDE 33

A risk-limiting audit has a known minimum chance of correcting the reported

  • utcome if the reported outcome is wrong (& doesn’t alter correct outcomes).

Risk limit: largest possible chance of not correcting reported outcome, if reported

  • utcome is wrong.

29

slide-34
SLIDE 34

A risk-limiting audit has a known minimum chance of correcting the reported

  • utcome if the reported outcome is wrong (& doesn’t alter correct outcomes).

Risk limit: largest possible chance of not correcting reported outcome, if reported

  • utcome is wrong.

Wrong means accurate handcount of trustworthy paper would find different winner(s).

29

slide-35
SLIDE 35

A risk-limiting audit has a known minimum chance of correcting the reported

  • utcome if the reported outcome is wrong (& doesn’t alter correct outcomes).

Risk limit: largest possible chance of not correcting reported outcome, if reported

  • utcome is wrong.

Wrong means accurate handcount of trustworthy paper would find different winner(s). Establishing whether paper trail is trustworthy involves other processes, generically, compliance audits

29

slide-36
SLIDE 36

RLA pseudo-algorithm

while (!(full handcount) && !(strong evidence outcome is correct)) { examine more ballots }

30

slide-37
SLIDE 37

RLA pseudo-algorithm

while (!(full handcount) && !(strong evidence outcome is correct)) { examine more ballots } if (full handcount) { handcount result is final }

30

slide-38
SLIDE 38

31

slide-39
SLIDE 39

Risk-Limiting Audits

  • Endorsed by NASEM, PCEA, ASA, LWV, CC, VV, . . .

32

slide-40
SLIDE 40

Role of math/stat

  • Get evidence about the population of cast ballots from a random sample.
  • Guarantee a large chance of correcting wrong outcomes; minimize work if the
  • utcome is correct.
  • When can you stop inspecting ballots?
  • When there’s strong evidence that a full hand count is pointless

33

slide-41
SLIDE 41
  • Null hypothesis: reported outcome is wrong.
  • Significance level (Type I error rate) is “risk”
  • Frame the hypothesis quantitatively: necessary and sufficient conditions

34

slide-42
SLIDE 42

SHANGRLA: Sets of Half-Average Nulls Generate Risk-Limiting Audits

bi is ith ballot card, N cards in all. 1candidate(bi) ≡

  • 1,

ballot i has a mark for candidate 0,

  • therwise.

AAlice,Bob(bi) ≡ 1Alice(bi) − 1Bob(bi) + 1 2 ≥ 0. mark for Alice but not Bob, AAlice,Bob(bi) = 1. mark for Bob but not Alice, AAlice,Bob(bi) = 0. marks for both (overvote) or neither (undervote) or doesn’t contain contest, AAlice,Bob(bi) = 1/2.

35

slide-43
SLIDE 43

¯ Ab

Alice,Bob ≡ 1

N

N

  • i=1

AAlice,Bob(bi). Mean of a finite nonnegative list of N numbers. Alice won iff ¯ Ab

Alice,Bob > 1/2. 36

slide-44
SLIDE 44

Plurality & Approval Voting

K ≥ 1 winners, C > K candidates in all. Candidates {wk}K

k=1 are reported winners.

Candidates {ℓj}C−K

j=1

reported losers.

37

slide-45
SLIDE 45

Plurality & Approval Voting

K ≥ 1 winners, C > K candidates in all. Candidates {wk}K

k=1 are reported winners.

Candidates {ℓj}C−K

j=1

reported losers. Outcome correct iff ¯ Ab

wk,ℓj > 1/2,

for all 1 ≤ k ≤ K, 1 ≤ j ≤ C − K K(C − K) inequalities.

37

slide-46
SLIDE 46

Plurality & Approval Voting

K ≥ 1 winners, C > K candidates in all. Candidates {wk}K

k=1 are reported winners.

Candidates {ℓj}C−K

j=1

reported losers. Outcome correct iff ¯ Ab

wk,ℓj > 1/2,

for all 1 ≤ k ≤ K, 1 ≤ j ≤ C − K K(C − K) inequalities. Same approach works for D’Hondt & other proportional representation schemes. (Stark & Teague 2015)

37

slide-47
SLIDE 47

Super-majority

f ∈ (1/2, 1]. Alice won iff (votes for Alice) > f × ((valid votes for Alice) + (valid votes for everyone else)) Set A(bi) ≡

      

1 2f ,

bi has a mark for Alice and no one else 0, bi has a mark for exactly one candidate, not Alice

1 2,

  • therwise.

Alice won iff ¯ Ab > 1/2.

38

slide-48
SLIDE 48

Borda count, STAR-Voting, & other additive weighted schemes

Winner is the candidate who gets most “points” in total. sAlice(bi): Alice’s score on ballot i. scand(bi): another candidate’s score on ballot i. s+: upper bound on the score any candidate can get on a ballot. Alice beat the other candidate iff Alice’s total score is bigger than theirs: AAlice,c(bi) ≡ sAlice(bi) − sc(bi) + s+ 2s+ . Alice won iff ¯ Ab

Alice,c > 1/2 for every other candidate c. 39

slide-49
SLIDE 49

Ranked-Choice Voting, Instant-Runoff Voting (RCV/IRV)

2 types of assertions together give sufficient (not necessary) conditions (Blom et

  • al. 2018):
  • 1. Candidate i has more first-place ranks than candidate j has total mentions.
  • 2. After a set of candidates E have been eliminated from consideration, candidate i is

ranked higher than candidate j on more ballots than vice versa. Both can be written ¯ Ab > 1/2. Finite set of such assertions implies reported outcome is right. More than one set suffices; can optimize expected workload.

40

slide-50
SLIDE 50

Auditing assertions

Test complementary null hypothesis ¯ Ab ≤ 1/2 sequentially.

  • Audit until either all complementary null hypotheses about a contest are rejected at

significance level α or until all ballots have been tabulated by hand.

  • Yields a RLA of the contest in question at risk limit α.
  • No multiplicity adjustment needed.

41

slide-51
SLIDE 51

Martingales and sequential methods

Sequential testing originated w/ Wald (1945; military secret before). Key object: martingale. Sequence of rvs {Zj} s.t.

  • E|Zj| < ∞
  • E(Zj+1|Z1, . . . , Zj) = Zj

42

slide-52
SLIDE 52

Kolmogorov’s inequality

If {Zj} is a nonnegative martingale, then for any p > 0 and all J ∈ {1, . . . , N}, Pr

  • max

1≤j≤J Zj(t) > 1/p

  • ≤ p E|ZJ|.

Markov’s inequality applied to optionally stopped martingales.

43

slide-53
SLIDE 53

Wald’s SPRT

For j = 1, 2, . . ., let Pj0 be the probability of X1, . . . , Xj under H0; Pj1 be the probability

  • f X1, . . . , Xj under H1.

Zj = Pj1 Pj0 , j = 1, 2, . . . is a nonnegative martingale if H0 is true. 1/Zj is a valid P-value for H0 at step j.

44

slide-54
SLIDE 54

Ballot-polling audits

Sample sequentially w/o replacement from a finite population of N non-negative items, {x1, . . . , xN}, with xj ≥ 0, ∀j. Total is N¯ x ≥ 0. Value of the jth item drawn is Xj. If ¯ x = t, EX1 = t, so E(X1/t) = 1. Given X1, . . . , Xn, the total of the remaining N − n items is Nt − n

j=1 Xj, so the mean

  • f the remaining items is

Nt − n

j=1 Xj

N − n = t − 1

N

n

j=1 Xj

1 − n/N .

45

slide-55
SLIDE 55

Define Y1(t) ≡

  

X1/t, Nt > 0, 1, Nt = 0, and for 1 ≤ n ≤ N − 1, Yn+1(t) ≡

    

Xn+1

1− n

N

t− 1

N

n

j=1 Xj ,

n

j=1 Xj < Nt,

1,

n

j=1 Xj ≥ Nt.

Then E(Yn+1(t)|Y1, . . . Yn) = 1.

46

slide-56
SLIDE 56

Let Zn(t) ≡ n

j=1 Yj(t).

E|Zk| ≤ maxj xj < ∞ and E (Zn+1(t)|Z1(t), . . . Zn(t)) = E (Yn+1(t)Zn(t)|Z1(t), . . . Zn(t)) = Zn(t). Thus (Z1(t), Z2(t), . . . , ZN(t)) is a non-negative closed martingale. Thus a P-value for the hypothesis ¯ x = t for data X1, . . . XJ is (max1≤j≤J Zj(t))−1 ∧ 1.

47

slide-57
SLIDE 57

Many other martingales

Kaplan’s martingale (KMART) Let Sj ≡ j

k=1 Xk, ˜

Sj ≡ Sj/N, and ˜ j ≡ 1 − (j − 1)/N. Define Yn ≡

1

n

  • j=1
  • γ
  • Xj

˜ j t − ˜ Sj−1 − 1

  • + 1
  • dγ.

Polynomial in γ of degree at most n, with constant term 1. Under the null, (Yj)N

j=1 is a non-negative closed martingale with expected value 1. 48

slide-58
SLIDE 58

Ballot-comparison audits

Use cast vote records (CVRs): system’s interpretation of each ballot. Like checking an expense report. bi is ith ballot, ci is cast-vote record for ith ballot. A an assorter.

  • verstatement error for ith ballot is

ωi ≡ A(ci) − A(bi) ≤ A(ci) ≤ u, where u is an upper bound on the value A assigns to any ballot card or CVR.

49

slide-59
SLIDE 59

v ≡ 2¯ Ac − 1, reported assorter margin. B(bi, c) ≡ (1 − ωi/u)/(2 − v/u) > 0, i = 1, . . . , N. B assigns non-negative numbers to ballots. Reported outcome correct iff ¯ B > 1/2.

50

slide-60
SLIDE 60

Stratified sampling

Cast ballots are partitioned into S ≥ 2 strata. Stratum s contains Ns cast ballots. Let ¯ Ab

s denote the mean of the assorter applied to just the ballot cards in stratum s.

Then ¯ Ab = 1 N

S

  • s=1

Ns ¯ Ab

s = S

  • s=1

Ns N ¯ Ab

s .

Can reject the hypothesis ¯ Ab ≤ 1/2 if we can reject the hypothesis

  • s∈S

Ns

N ¯ Ab

s ≤ βs

  • for all (βs)S

s=1 s.t. S s=1 βs ≤ 1/2.

Union-Intersection Test

51

slide-61
SLIDE 61

Fisher’s Combining Function

{Ps(βs)}S

s=1 are independent random variables.

If

s∈S

  • Ns

N ¯

Ab

s ≤ βs

  • , distribution of

−2

S

  • s=1

ln Ps(βs) is dominated by chi-square distribution with 2S degrees of freedom. Low-dimensional optimization problem to maximize P-value over (βs)S

s=1. 52

slide-62
SLIDE 62

Sample design

  • individual ballots?
  • clusters of ballots?
  • stratify? (logistics, equipment capabilities, . . . )
  • sampling probabilities?
  • with replacement? without replacement? Bernoulli?
  • fully sequential? batch-oriented?

53

slide-63
SLIDE 63

54

slide-64
SLIDE 64

Bayesian election audits

Limit the upset probability, the posterior probability that the reported outcome is wrong, given the sample, for a particular prior distribution on outcomes

55

slide-65
SLIDE 65

Bayesian election audits

Limit the upset probability, the posterior probability that the reported outcome is wrong, given the sample, for a particular prior distribution on outcomes Typically use Dirichlet-multinomial prior. “Non-partisan” priors invariant under permutations of the candidate names.

55

slide-66
SLIDE 66

56

slide-67
SLIDE 67

Bayes/Frequentist duality

Risk of an audit for a set of cast votes and a reported outcome:

  • probability of not correcting outcome if reported outcome is wrong for that set of

votes

  • 0 if reported outcome is correct for that set of votes

57

slide-68
SLIDE 68

Bayes/Frequentist duality

Risk of an audit for a set of cast votes and a reported outcome:

  • probability of not correcting outcome if reported outcome is wrong for that set of

votes

  • 0 if reported outcome is correct for that set of votes
  • RLAs control maximum risk.
  • Bayesian audits (Rivest & Shen) control weighted average of the risk. The prior

determines the weights in the average.

  • For 2-candidate plurality contest w/ no invalid votes, least-favorable prior has point

mass 1/2 at tie, remaining 1/2 mass arbitrary over winning outcomes (Vora, 2018).

57

slide-69
SLIDE 69

Wrinkles

  • ~20% of U.S. voters don’t vote on paper
  • ballot-marking devices make the paper trail hackable
  • inadequate rules for chain of custody, ballot accounting, . . .
  • transparent high-quality randomness
  • public ceremony of die rolls, published crypto-quality PRNG
  • missing ballots; imperfect manifests
  • “Manifest Phantoms to Evil Zombies”
  • ability to produce CVRs linked to ballots
  • redacted CVRs
  • preserving privacy while ensuring the public can confirm audit didn’t stop too soon

58

slide-70
SLIDE 70

Open-source software

  • auditTools
  • ballotPollTools
  • SUITE
  • SHANGRLA
  • Arlo

59

slide-71
SLIDE 71

Evidence-Based Elections: 3 C’s

  • Voters CREATE complete, durable, verified audit trail.

60

slide-72
SLIDE 72

Evidence-Based Elections: 3 C’s

  • Voters CREATE complete, durable, verified audit trail.
  • LEO CARES FOR the audit trail adequately to ensure it remains complete and

accurate.

60

slide-73
SLIDE 73

Evidence-Based Elections: 3 C’s

  • Voters CREATE complete, durable, verified audit trail.
  • LEO CARES FOR the audit trail adequately to ensure it remains complete and

accurate.

  • Verifiable audit CHECKS reported results against the paper

60

slide-74
SLIDE 74
  • 255 state-level pres. races, 1992–2012, 10% risk limit
  • BPA expected to examine fewer than 308 ballots for half.

61

slide-75
SLIDE 75
  • 255 state-level pres. races, 1992–2012, 10% risk limit
  • BPA expected to examine fewer than 308 ballots for half.
  • 2016 presidential election, 5% risk limit
  • BPA expected to examine ~700k ballots nationally (<0.5%)

61

slide-76
SLIDE 76

Risk-Limiting Audits

  • ~60 pilot audits in AK, CA, CO, GA, IN, MI, MT, NJ, OH, OR, PA, RI, WA, WY,

VA, DK.

  • CA counties: Alameda, El Dorado, Humboldt, Inyo, Madera, Marin, Merced,

Monterey, Napa, Orange, San Francisco, San Luis Obispo, Santa Cruz, Stanislaus, Ventura, Yolo.

  • Routine statewide in CO since 2017. AK did statewide audit in 2020; WY auditing

today.

  • Laws in CA, CO, RI, VA, WA

62

slide-77
SLIDE 77

63

slide-78
SLIDE 78

Voting and COVID-19

64

slide-79
SLIDE 79

65

slide-80
SLIDE 80
  • In-person voting involves congregating & touching common objects (esp. BMDs &

DREs, but also pens, doorknobs), but S. Korea did great job recently

66

slide-81
SLIDE 81

67

slide-82
SLIDE 82
  • Online voting does not require contact, but
  • No way to secure online voting
  • Demonstration hacks by Halderman et al.

68

slide-83
SLIDE 83

69

slide-84
SLIDE 84

70

slide-85
SLIDE 85

71

slide-86
SLIDE 86
  • VBM does not require congregating . . .
  • Klobuchar & Wyden introduced bill requiring everyone to get VBM ballot . . .
  • Serious logistical and security problems:
  • printing & mailing: 3rd parties need more equipment
  • ballots lost in the mail in either direction
  • USPS might be dead
  • potential for DOS attacks
  • ballot harvesting, coercion, vote-selling
  • authentication, signature verification (if any)
  • weaponized to disenfranchise minority voters, e.g., GA
  • need to inform voters of (non) receipt, notify them of problems & allow time to “cure”

72

slide-87
SLIDE 87

73

slide-88
SLIDE 88

74

slide-89
SLIDE 89

75

slide-90
SLIDE 90

76

slide-91
SLIDE 91

Recommendations for November 2020

  • expand vote by mail and early voting
  • reduce use of DREs & BMDs (not secure; vector for coronavirus)
  • secure/monitored kiosks to pick up blank ballots (BOD?) & cast voted ballots
  • ballot tracking; provide adequate notice & opportunity to cure defects
  • increase transparency: public video monitoring, etc.
  • rigorous ballot accounting & compliance audits including eligibility
  • risk-limiting audits for statewide contests

77

slide-92
SLIDE 92

Recommendations for Statistics instruction

  • finite sample exact/conservative nonparametric inference
  • sampling designs
  • sequential tests
  • martingale methods
  • methods for combining P-values, including Fisher’s method
  • testing by maximizing P-values over nuisance parameters
  • pseudo-random number generation

78

slide-93
SLIDE 93

79