Attacking Paper-Based E2E Voting Systems

Total Page:16

File Type:pdf, Size:1020Kb

Attacking Paper-Based E2E Voting Systems Attacking Paper-Based E2E Voting Systems John Kelsey1, Andrew Regenscheid1, Tal Moran2, and David Chaum3 1 National Institute of Standards and Technology fjohn.kelsey, [email protected] 2 Weizfmann Institute of Science [email protected] 3 [email protected] Abstract. In this paper, we develop methods for constructing vote­ buying/coercion attacks on end-to-end voting systems, and describe vote­ buying/coercion attacks on three proposed end-to-end voting systems: Punchscan, Prˆet-`a-voter , and ThreeBallot. We also demonstrate a dif­ ferent attack on Punchscan, which could permit corrupt election officials to change votes without detection in some cases. Additionally, we con­ sider some generic attacks on end-to-end voting systems. 1 Introduction Voting systems in widespread use today have a number of known vulnerabilities [1–3]. Many of these vulnerabilities can be mitigated by following certain proce­ dures; the integrity of the election is then dependent on a combination of correct behavior by software, hardware, and election officials. The best of these systems provide security assurance based on the honesty and correct behavior of a small set of election officials and other observers. Com­ monly, each political party or candidate provides a certain number of observers. These individuals are expected to notice and report fraud that would deprive their party or candidate of votes. Election officials are also expected to notice and report fraud. In general, an outsider attempting to decide whether to trust a reported election outcome must rely on the premise that correct procedures were followed by observers and election officials. A new kind of voting system has been proposed in recent years [4–9], in which the voter interacts with the voting system to get a receipt. This receipt can then be checked against a set of receipts published by the voting system. These published receipts can be used to produce or verify the reported count for the voting system, but must not be useful for selling votes (for example, by proving how each voter voted). This class of voting system has been called end to end, or E2E, to reflect the idea that each voter can check, to some high degree of confidence, that his vote was correctly cast, and also that his vote was correctly included in the final count. Other means must be used to ensure that the whole election result is correct- for example, by ensuring that only authorized people were permitted to vote, and that no additional votes were inserted into the count. These systems build on older work on cryptographic voting systems [10–12], which typically relied on the assumption that a voter would have access to some trusted computing devices. In this paper, we consider the security of a number of proposed E2E voting systems against attacks to tamper with election results and to permit the buying or coercion of votes. An important idea in this paper is that most E2E systems can be meaning­ fully divided into: 1. A front-end, which describes the voter’s direct interaction with the voting system to cast a vote and receive a receipt, and 2. A back-end, which describes the voting system’s public statements (such as receipts posted to a bulletin board and the claimed vote totals), and the mechanisms used to prove to voters and other observers that the reported election results are consistent with the public statements. Our attacks focus exclusively on the front-end, the voting systems’ inter­ actions with the voters. In general, our attacks provide ways in which corrupt election officials or voters can subvert the real-world implementation of the front- ends of these voting systems, to get very different properties from the voting systems than were expected. 1.1 Attacking Voting Systems In general, someone attacking a voting system wants to affect the outcome of the election. The stakes in such an attack can be quite high, involving control of enormous government resources. These stakes can be inferred by the amount of money spent on lobbying and campaigning, both reported publicly in the United States [13, 14]. Election results can be changed by altering recorded votes or reported totals, and also by finding a way to learn what each voter chose, so that voters can be bribed or coerced into voting in some desired way. It can also be done by disrupting the orderly operation of an election, which may simply delay an un­ desirable (to the attacker) result, or may force an election to be rerun, possibly changing its result. Violations of voter privacy and disruption of elections may be of some interest to attackers even when the election result cannot be altered, but the impact of these attacks is much smaller. 1.2 Previous Work Several end-to-end cryptographic voting protocols have been developed. This paper analyzes Punchscan [6, 7], Prˆet-`a-voter [15] and ThreeBallot [8, 16], which are described in Section 2. Researchers have begun to perform security analyses of these schemes, and some weaknesses have been discovered. A coercion attack against ThreeBallot, dubbed the ThreePattern attack [8], involves a coercer telling voters to mark their three ballots according to a particular pattern, then checking that that those patterns appear on the bulletin board. Strauss [17, 18] notes several vul­ nerabilities in ThreeBallot, including the Reconstruction attack. Here, for suf­ ficiently long ballots, an attacker is able to look at one receipt and determine which other two ballots on the bulletin board belong to the same multiballot. A well known issue with these systems is that it is easy to force a voter to vote for a random candidate by instructing them to return with a receipt showing a vote for the first ballot choice. A formal study of the three voting schemes by Clark, Essex and Adams [19] concludes that while ThreeBallot receipts provide some clues for how voters voted, Prˆet-`a-voter and Punchscan receipts do not contain any information that would help an attacker. Nonetheless, Moran and Naor [20] developed a coercion attack against Punchscan that relied on the voter’s choice of receipt. The Punchscan voting procedure was modified for the VoComp competition [21] to prevent this and related attacks by requiring voters to choose the receipt sheet prior to viewing the ballot. 1.3 Our Results Briefly, our results can be summarized as follows: Punchscan and Pr^et-`a-voter { We provide a misprinting attack which can alter election results by mislead­ ing many voters into believing they have a receipt committing to a different vote than is actually cast. This can be mitigated with a special audit of the printed ballots, but that auditing requires trusting small numbers of election observers, rather than all voters, with the integrity of the election. { We provide a mechanism for using scratch-off cards, cellphones, or other techniques to reliably buy or coerce votes. Pr^et-`a-voter { We report a previously-known but unpublished sleight-of-hand attack to allow vote buying. Threebal lot { We provide a mechanism to provide voters a financial incentive to vote in some desired way, when the three ballots are filled-in in a random way by some voting machine. { We provide a technique for buying votes when the ballots are filled out manually, using a variant of chain voting. All End to End Systems { We report a couple of known broad categories of attack on E2E systems we did not find referenced in the literature. { We provide a framework for vote-buying and coercion attacks. While our attacks are specific to particular E2E systems, the general ideas behind them can be broadly applied. One goal of this paper is to get these ideas into widespread circulation, so that systems we have not considered here may also be subjected to the same analysis. 2 Background 2.1 E2E Voting Systems Election systems in current use rely on procedures to provide integrity and bal­ lot secrecy. Typically, voters must trust election administrators to follow these procedures. Secure elections using traditional voting systems are possible when tight controls are in place, such as maintaining the chain of custody of ballots, but it is nearly impossible for voters to gain assurance that such controls are followed. End-to-end (E2E) cryptographic voting schemes aim to provide voters with a means of verifying that elections are honest, without needing to trust election officials or that the chain of custody of ballots is maintained. End-to-end refers to the voter’s ability to verify the election from vote casting to vote counting. Most schemes operate by encoding voters’ choices a special way which can be read by election officials. The encoded ballot is posted on a public bulletin board and each voter is given a voting receipt. The unique feature of E2E voting schemes is that this receipt can be used to verify the encoded ballot on the bulletin board but does not show how the voter voted. Additionally, E2E voting schemes provide voters with a means to ensure cast ballots are counted correctly. In nearly all cases this done by having the voting scheme prove that each encrypted vote on the bulletin board is correctly decrypted, allowing anyone to verify the final vote tallies by recounting the decrypted ballots. Front-End vs. Back-End E2E voting schemes involve a combination of activ­ ities performed by voters, election administrators and auditors. We refer to the part of the voting system that the voter interacts with the system as the front- end. This typically includes the ballot, receipt and bulletin board. Voters interact with the front-end to gain assurance the voting system is functioning honestly, often relying on auditors or tools to verify some parts of the voting protocol for them.
Recommended publications
  • Black Box Voting Ballot Tampering in the 21St Century
    This free internet version is available at www.BlackBoxVoting.org Black Box Voting — © 2004 Bev Harris Rights reserved to Talion Publishing/ Black Box Voting ISBN 1-890916-90-0. You can purchase copies of this book at www.Amazon.com. Black Box Voting Ballot Tampering in the 21st Century By Bev Harris Talion Publishing / Black Box Voting This free internet version is available at www.BlackBoxVoting.org Contents © 2004 by Bev Harris ISBN 1-890916-90-0 Jan. 2004 All rights reserved. No part of this book may be reproduced in any form whatsoever except as provided for by U.S. copyright law. For information on this book and the investigation into the voting machine industry, please go to: www.blackboxvoting.org Black Box Voting 330 SW 43rd St PMB K-547 • Renton, WA • 98055 Fax: 425-228-3965 • [email protected] • Tel. 425-228-7131 This free internet version is available at www.BlackBoxVoting.org Black Box Voting © 2004 Bev Harris • ISBN 1-890916-90-0 Dedication First of all, thank you Lord. I dedicate this work to my husband, Sonny, my rock and my mentor, who tolerated being ignored and bored and galled by this thing every day for a year, and without fail, stood fast with affection and support and encouragement. He must be nuts. And to my father, who fought and took a hit in Germany, who lived through Hitler and saw first-hand what can happen when a country gets suckered out of democracy. And to my sweet mother, whose an- cestors hosted a stop on the Underground Railroad, who gets that disapproving look on her face when people don’t do the right thing.
    [Show full text]
  • Randomocracy
    Randomocracy A Citizen’s Guide to Electoral Reform in British Columbia Why the B.C. Citizens Assembly recommends the single transferable-vote system Jack MacDonald An Ipsos-Reid poll taken in February 2005 revealed that half of British Columbians had never heard of the upcoming referendum on electoral reform to take place on May 17, 2005, in conjunction with the provincial election. Randomocracy Of the half who had heard of it—and the even smaller percentage who said they had a good understanding of the B.C. Citizens Assembly’s recommendation to change to a single transferable-vote system (STV)—more than 66% said they intend to vote yes to STV. Randomocracy describes the process and explains the thinking that led to the Citizens Assembly’s recommendation that the voting system in British Columbia should be changed from first-past-the-post to a single transferable-vote system. Jack MacDonald was one of the 161 members of the B.C. Citizens Assembly on Electoral Reform. ISBN 0-9737829-0-0 NON-FICTION $8 CAN FCG Publications www.bcelectoralreform.ca RANDOMOCRACY A Citizen’s Guide to Electoral Reform in British Columbia Jack MacDonald FCG Publications Victoria, British Columbia, Canada Copyright © 2005 by Jack MacDonald All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by an information storage and retrieval system, now known or to be invented, without permission in writing from the publisher. First published in 2005 by FCG Publications FCG Publications 2010 Runnymede Ave Victoria, British Columbia Canada V8S 2V6 E-mail: [email protected] Includes bibliographical references.
    [Show full text]
  • PDF of Law As Amended to 14/12/2010
    REPUBLIC OF LITHUANIA LAW ON REFERENDUM 4 June 2002 No IX-929 (As last amended on 14 December 2010 — No XI-1229) Vilnius The Seimas of the Republic of Lithuania, relying upon the legally established, open, just, harmonious, civic society and principles of a law - based State and the Constitution: the provisions of Article 2 that “the State of Lithuania shall be created by the People. Sovereignty shall belong to the Nation”; the provision of Article 3 that “no one may limit or restrict the sovereignty of the Nation and make claims to the sovereign powers belonging to the entire Nation”; the provision of Article 4 that “the Nation shall execute its supreme sovereign power either directly or through its democratically elected representatives”; and the provision of Article 9 that “the most significant issues concerning the life of the State and the Nation shall be decided by referendum”, passes this Law. CHAPTER I GENERAL PROVISIONS Article 1. Purpose of the Law This Law shall establish the procedure of implementing the right of the citizens of Lithuania to a referendum, the type of referendum and initiation, announcement, organising and conducting thereof. 2. The citizens of the Republic of Lithuania (hereinafter - citizens) or the Seimas of the Republic of Lithuania (hereinafter - Seimas) shall decide the importance of the proposed issue in the life of the State and the People in accordance with the Constitution of the Republic of Lithuania and this Law. Article 2. General Principles of Referendum 1. Taking part in the referendum shall be free and based upon the democratic principles of the right of elections: universal, equal and direct suffrage and secret ballot.
    [Show full text]
  • § 163-182.2. Initial Counting of Official Ballots. (A) the Initial Counting Of
    § 163-182.2. Initial counting of official ballots. (a) The initial counting of official ballots shall be conducted according to the following principles: (1) Vote counting at the precinct shall occur immediately after the polls close and shall be continuous until completed. (2) Vote counting at the precinct shall be conducted with the participation of precinct officials of all political parties then present. Vote counting at the county board of elections shall be conducted in the presence or under the supervision of board members of all political parties then present. (3) Any member of the public wishing to witness the vote count at any level shall be allowed to do so. No witness shall interfere with the orderly counting of the official ballots. Witnesses shall not participate in the official counting of official ballots. (4) Provisional official ballots shall be counted by the county board of elections before the canvass. If the county board finds that an individual voting a provisional official ballot is not eligible to vote in one or more ballot items on the official ballot, the board shall not count the official ballot in those ballot items, but shall count the official ballot in any ballot items for which the individual is eligible to vote. Eligibility shall be determined by whether the voter is registered in the county as provided in G.S. 163-82.1 and whether the voter is qualified by residency to vote in the election district as provided in G.S. 163-55 and G.S. 163-57. If a voter was properly registered to vote in the election by the county board, no mistake of an election official in giving the voter a ballot or in failing to comply with G.S.
    [Show full text]
  • IC 3-11.5-5 Chapter 5. Counting of Absentee Ballots Cast on Paper Ballots
    IC 3-11.5-5 Chapter 5. Counting of Absentee Ballots Cast on Paper Ballots IC 3-11.5-5-1 Applicability of chapter; counties of application Sec. 1. (a) This chapter applies in a county only if the county election board adopts a resolution making this chapter applicable in the county. (b) A copy of a resolution adopted under this section shall be filed with the election division. (c) A county election board may not adopt a resolution under this section less than: (1) sixty (60) days before an election is to be conducted; or (2) fourteen (14) days after an election has been conducted. (d) A resolution adopted under this section takes effect immediately and may only be rescinded by the unanimous vote of the entire membership of the county election board. As added by P.L.3-1993, SEC.176 and P.L.19-1993, SEC.2. Amended by P.L.2-1996, SEC.202; P.L.3-1997, SEC.335. IC 3-11.5-5-2 Applicability of chapter; paper ballot cast votes Sec. 2. This chapter applies to the counting of absentee ballots cast on paper ballots. As added by P.L.3-1993, SEC.176 and P.L.19-1993, SEC.2. IC 3-11.5-5-3 Time for counting ballots Sec. 3. (a) Except as provided in subsection (b), immediately after: (1) the couriers have returned the certificate from a precinct under IC 3-11.5-4-9; and (2) the absentee ballot counters or the county election board have made the findings required under IC 3-11-10 and IC 3-11.5-4 for the absentee ballots cast by voters of the precinct and deposited the accepted absentee ballots in the envelope required under IC 3-11.5-4-12; the absentee ballot counters shall, in a central counting location designated by the county election board, count the absentee ballot votes for each candidate for each office and on each public question in the precinct.
    [Show full text]
  • Voting Equipment and Procedures on Trial
    From quill to touch screen: A US history of ballot-casting 1770s Balloting replaces a show of Voting hands or voice votes. Voters write out names of their candidates in longhand, and give their ballots to an election judge. 1850s Political parties disperse Equipment preprinted lists of candidates, enabling the illiterate to vote. The ballot becomes a long strip of paper, like a railroad ticket. 1869 Thomas Edison receives a patent for his invention of the and voting machine, intended for counting congressional votes. 1888 Massachusetts prints a ballot, at public expense, listing names of all candidates nominated Procedures and their party affiliation. Most states adopt this landmark improvement within eight years. 1892 A lever-operated voting machine is first used at a Lockport, N.Y., town meeting. on Trial Similar machines are still in use today. 1964 A punch-card ballot is introduced in two counties in Georgia. Almost 4 in 10 voters used punch cards in the 1996 presidential election. 1990s Michigan is the first to switch to' optical scanning, used for decades in standardized testing. One-quarter of voters used the technology in the 1996 election. 2000 A storm erupts over Florida's punch-card ballots and Palm Beach County's "butterfly ballot" in the presidential election. 2002 New federal law authorizes $3.9 billion over three years to help states upgrade voting technologies and phase out punch cards and lever machines. Georgia is the first state to use DRE touch-screen technology exclusively. Sources: Federal Elections Commission; "Elections A to Z," CQ, 2003; International Encyclopedia of Elections, CQ Press, 2000; League of Women Voters.
    [Show full text]
  • Voting System Failures: a Database Solution
    B R E N N A N CENTER FOR JUSTICE voting system failures: a database solution Lawrence Norden Brennan Center for Justice at New York University School of Law about the brennan center for justice The Brennan Center for Justice at New York University School of Law is a non-partisan public policy and law institute that focuses on fundamental issues of democracy and justice. Our work ranges from voting rights to campaign finance reform, from racial justice in criminal law to presidential power in the fight against terrorism. A singular institution – part think tank, part public interest law firm, part advocacy group – the Brennan Center combines scholarship, legislative and legal advocacy, and communication to win meaningful, measurable change in the public sector. about the brennan center’s voting rights and elections project The Brennan Center promotes policies that protect rights, equal electoral access, and increased political participation on the national, state and local levels. The Voting Rights and Elections Project works to expend the franchise, to make it as simple as possible for every eligible American to vote, and to ensure that every vote cast is accurately recorded and counted. The Center’s staff provides top-flight legal and policy assistance on a broad range of election administration issues, including voter registration systems, voting technology, voter identification, statewide voter registration list maintenance, and provisional ballots. The Help America Vote Act in 2002 required states to replace antiquated voting machines with new electronic voting systems, but jurisdictions had little guidance on how to evaluate new voting technology. The Center convened four panels of experts, who conducted the first comprehensive analyses of electronic voting systems.
    [Show full text]
  • The Precedent-Based Voting Paradox
    THE PRECEDENT-BASED VOTING PARADOX ∗ DAVID S. COHEN INTRODUCTION ............................................................................................... 184 I. MULTIPLE-ISSUE VOTING PARADOXES ............................................... 188 A. Eastern Enterprises v. Apfel: A Voting Paradox with Two Separate Main Issues ................................................................... 188 B. Kassel v. Consolidated Freightways Corp.: A Voting Paradox with One Main Issue and Two Sub-Issues .................... 191 C. Modeling Multiple-Issue Voting Paradoxes ................................ 194 1. The Social Choice Model ...................................................... 195 2. Other Models ......................................................................... 203 II. PRECEDENT-BASED VOTING PARADOXES ........................................... 205 A. Hein v. Freedom from Religion Foundation, Inc.: The Precedent-Based Voting Paradox ............................................... 206 B. Modeling Precedent-Based Voting Paradoxes ............................ 211 III. THE IMPLICATIONS OF PRECEDENT-BASED VOTING PARADOXES ....... 219 A. More Common than Previously Understood ............................... 219 B. Issue or Outcome Voting ............................................................. 222 C. Judicial Outcome Manipulation .................................................. 224 D. Strategic Litigation Planning for Attorneys ................................ 227 CONCLUSION ..................................................................................................
    [Show full text]
  • The Absentee Ballot Process: Does Your Vote Count?
    2006-2007 ORANGE COUNTY GRAND JURY THE ABSENTEE BALLOT PROCESS: DOES YOUR VOTE COUNT? SUMMARY This Country’s founding fathers considered voting rights so important that four out of the 27 Amendments in the Constitution, almost 15 percent, are devoted to ensuring that it shall not be denied or abridged; but even they could never have imagined the changes that the next 218 years would bring. Today, voting has become far more complex. Elections are numerous (in Orange County there have been ten elections in the last 12 months) and ballots come with many pages (three in the last election) that are printed in five different languages. Additionally, the public discharges their duty in a myriad of ways that include the use of electronic machines in traditional polling places on Election Day, voting early at a limited number of designated locations, and by mailing their ballots. According to the Orange County Registrar of Voters (ROV) staff, “Every vote matters; where he or she votes is the voter’s choice.” But the preferred method of voting is shifting and there is an increasing number of Registered Voters (RVs) who choose to vote by Absentee Ballot (AB). The trend is a six to ten percent growth in Permanent Absentee Voter (PAV) applications at each election, and all ROV preparation must take place within statutory deadlines. Preparing the paper ABs for counting must be done by hand, which is labor intensive and time consuming. The ROV must register voters, supply Absentee Voter (AV) applications, verify the returned AV applications, supply mailed and other paper ABs, receive and verify returned ABs, tally the verified ABs, and sometimes recount the ABs when called upon to do so during a contested election.
    [Show full text]
  • Electronic Voting and Electronic Counting of Votes
    Attachment E ELECTRONIC VOTING AND ELECTRONIC COUNTING OF VOTES A STATUS REPORT by Colin Barry Electoral Commissioner Victorian Electoral Commission Paul Dacey Assistant Commissioner Elections & Enrolment Australian Electoral Commission Tim Pickering Assistant Commissioner Information Technology Australian Electoral Commission Debra Byrne Deputy Electoral Commissioner Victorian Electoral Commission Electronic Voting and Electronic Counting of Votes –A Status Report CONTENTS Background Page 1 What is electronic voting? Page 2 The USA electoral system Page 2 Voting systems in Australia Page 3 Observations of the USA electronic voting systems Page 3 Possible options for electronic voting in Australia Page 11 Possible next steps Page 16 Summary Page 19 4 ELECTRONIC VOTING AND ELECTRONIC COUNTING OF VOTES: A STATUS REPORT Background Over the last few years there have been a number of election commentators who have suggested that Australian electoral organisations should introduce electronic voting at Federal, State and Local Government elections. The general observation is made that as we do more of our business using a number of electronic mediums (from eftpos to electronic banking, ATMs, and purchases over the Internet), it should not be too difficult for us to vote using electronic equipment rather than turning up at a polling place on election day and vote using paper and pencils. It is further claimed that, if electronic voting was used, election results would be known much earlier than is presently the case. The assertion has also been made that electronic voting would be cheaper than the present arrangements. Commentators and proponents of electronic voting often cite the United States as an example where electronic voting has been in place for years.
    [Show full text]
  • An E-Voting System That Ensures Voter Confidentiality and Candidate Privacy
    Enhanced Name and Vote Separated E‐voting System: An E‐voting System That Ensures Voter Confidentiality and Candidate Privacy __________________________________________ ©2014 Wiley. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. Citation: Haijun Pan, Edwin S.H. Hou, and Nirwan Ansari, “Enhanced Name and Vote Separated E‐voting System: An E‐voting System That Ensures Voter Confidentiality and Candidate Privacy,” Wiley Security and Communication Networks, DOI: 10.1002/sec.944, vol. 7, no. 12, pp. 2335– 2344, Dec. 2014. URL: http://onlinelibrary.wiley.com/doi/10.1002/sec.944/abstract E-NOTE: An E-voting System That Ensures Voter Confidentiality and Candidate Privacy Haijun Pan, Edwin Hou, and Nirwan Ansari Abstract—In this paper, we propose an improved E-voting system based on our previous work (Name and vOte separaTed E-voting system, NOTE). The proposed E-voting system, referred to as Enhanced NOTE (E-NOTE), is enhanced with a new protocol design and a watchdog hardware device to ensure voter confidentiality and voting accuracy.
    [Show full text]
  • General Elections and Referendum Law
    General Elections and Referendum Law THE GENERAL ELECTIONS AND REFERENDUM LAW NO. ( ) 2001 OF THE REPUBLIC OF YEMEN Part One Operational Definitions & Voting Rights Section One Definition of Terms Article (1): This Law shall be called the General Elections & Referendum Law. Article (2): For the purpose of this Law, the following words and expressions shall have the following meanings unless the context dictates otherwise: (a) Republic: The Republic of Yemen; (b) Citizen: Every Yemeni national (male or female); (c) Voter: Every citizen entitled to vote in any general elections and/or referendum in accordance with the Constitution and the provisions of this Law; (d) Voting domicile: The usual place of residence of a person or the place where this person has his/her main business or the place of residence of his/her family even if the said person does not live in such a place; (e) General elections: The direct means for people to exercise their right to elect the President of the Republic and to designate their representatives in Parliament and/or Local Councils through direct and free elections and by means of secret balloting; (f) Supreme Committee: The Elections and Referendum Supreme Committee; (g) Supreme Committee’s General Secretariat: The Administrative, Financial & Technical Apparatus of the Supreme Committee; (h) Branch Offices of the General Secretariat: All administrative units formed by the Supreme Committee in the Capital City Municipality and at the centers of other Governorates to undertake administrative tasks and responsibilities in accordance with the provisions of this Law and its Executive Order; (i) Voter Registers’ Committees: The Main Committee and the Branch Committees in charge of establishing the registers featuring the names and particulars of voters.
    [Show full text]