Tech

Elections Alberta traces voter database leak to Republican Party using canary trap

A security technique involving unique bogus entries allowed regulators to identify the source of a breach before issuing a court order to shut down the offending website.

Author
Owen Mercer
Markets and Finance Editor
Published
Draft
Source: Ars Technica · original
Canadian election databases use "canary traps"—and they work
Officials confirm data lineage after separatist group publishes electoral records

Elections Alberta has confirmed that a leak of its electoral database originated from the Republican Party of Alberta, a conclusion reached through the use of a security method known as a canary trap. The province's election officials had previously distributed a copy of the voter list to the Republican Party containing unique, bogus entries designed to trace any subsequent disclosures.

When the separatist group The Centurion Project published an online database of voters, the same specific fake entries appeared verbatim in the released data. This match provided definitive proof that the information used by The Centurion Project was derived from the copy held by the Republican Party. The mechanism relies on inserting identifiable alterations into a dataset so that if those changes surface in a leak, the source recipient is immediately identified.

Following the confirmation of the breach, Elections Alberta obtained a court order last week to shut down The Centurion Project's website. The separatist group has since complied with the legal directive, taking down its online tool. In the wake of the court order, both the Republican Party of Alberta and The Centurion Project have publicly pledged to respect the law and adhere to their respective obligations.

The Republican Party of Alberta had been granted legal access to the electoral list under strict restrictions that prohibit sharing the data with third parties. Despite these constraints, The Centurion Project utilised the list to power its voter database. While the specific method by which the data passed from the Republican Party to the separatist group remains unclear, the canary trap enabled regulators to pinpoint the lineage of the leak without further speculation.

The concept of the canary trap is not new to the realm of national security or corporate protection. It has been employed by major technology firms such as Tesla and Apple, as well as in the film industry to prevent script leaks. The technique traces its literary roots to Tom Clancy's 1980s novel Patriot Games, where the protagonist describes using unique permutations to identify leakers.

Modern implementations of this strategy often utilise advanced technology to generate unique variations of documents or data entries. While early versions relied on thesaurus programs to shuffle synonyms, contemporary applications increasingly leverage artificial intelligence to create false documents that are plausible yet distinct. Regardless of the sophistication of the tool, the fundamental principle remains a simple and effective way to identify the source of a breach.

Continue reading

More from Tech

Read next: Spirit Airlines Ceases Operations Amidst Bankruptcy and Geopolitical Fuel Crisis
Read next: Unofficial Notepad++ macOS Port Disavowed by Creator Over Trademark Use
Read next: Elon Musk Revocable Trust settles SEC Twitter lawsuit with $1.5 million penalty