Anytime, Anywhere Anyone (AAA) Internet Voting in India

Slides:



Advertisements
Similar presentations
Device Evolution Greg Pelton Chief Technology Officer
Advertisements

Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
ICT IN THE ELECTORAL PROCESS: LESSONS LEARNED Susanne Caarls International Electoral Affairs Symposium May 2012.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Internet Collaboration Tools: VoIP Spencer S. Eccles Health Sciences Library University of Utah Health Sciences Center.
Trust, Safety, & Reliability Part 2 MALICE. Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Local & Wide Area Networks
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Cyber Crimes.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
1 Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘維亞 (P ) 周明哲 (P ) 劉子揚 (N )
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
CHAPTER 2 COMMUNICATION, NETWORKS, AND THE WWW. WHAT IS COMMUNICATIONS? A process in which two or more computers or devices transfer data, instructions,
Computer Tech Class August 20,  Internet was originally started by Department of Defense  Was made as means of communication without central location.
MeDi Access Technology & Innovation Colombia. OUR IDEA : MeDi Access The Problem: the difficulty that people have in order to be able to access properly.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
SEMINAR TOPIC ON GLOBAL WIRELESS E-VOTING
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
Preparing for and Conducting Election Day: John Bennett Greater London Returning Officer Systems and Logistics.
Influence of Social Media & Technology By Gregory Samuels.
CB Students Student Lync Web Apps Microsoft Office OneDrive Anywhere, Anytime, Anyone.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Recession Reversal 5 Marketing Marvels That Will Have You Thriving... While Your Competition Wonders What Happened...
Smart Call By S. Alex Raj S.Mahesh.
Confidential, Copyright and Patent Pending, Ping4 Group, Inc. 1.
Confidential, Copyright and Patent Pending, Ping4 Group, Inc. 1 Investor Summary Investor Summary.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Part 2.  Transmission methods used  Bandwidth:  The speed at which Data can be carried.
বাংলায় শিখুন (Study in Bengali)
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Understanding the role of candidates and the Internet Local E-Democracy Symposium Presentation Understanding the role of Candidates and the Internet By.
Out of Sight, But Not Out of Touch Remote Office, Branch Office IP Telephony Solutions Charles Henderson Director, Product Management EADS TELECOM North.
MSB Network Orientation. Basics Welcome from the MSB Tech Center Tech Center Staff – 13 Permanent – 30+ Students Serve MSB Only – 3200 Users.
E-Commerce Infrastructure. Learning Objectives 1. Understand the major components of EC infrastructure. 2. Understand the importance and scope of security.
Windows Tutorial 5 Protecting Your Computer
Television Has The Greatest Influence On the Ballot Cast In a National Election Which of the following influences your final decision when voting in a.
State Board of Elections Computers
RCS v7 Infection Vectors
Overview 1. Phishing Scams
E-voting …and why it’s good..
Software Applications for end-users
Bulk SMS, Voice Call SMS Campaign For Mission Election
SMS MARKETING.
BY GAWARE S.R. DEPT.OF COMP.SCI
In Local Community Elections, Television Is The Key Influence In Voter’s Final Decision Which of the following influences your final decision when voting.
Current and emerging Technologies
MIT App Inventor By Hans Yip.
Ways to Secure CMS Websites. The most widely used Content Management Systems are Wordpress, Joomla and Drupal as per statistics. The highest CMS platforms.
– Communication Technology in a Changing World
Cyber attacks on Democratic processes
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Current and emerging Technologies
ISNE101 Dr. Ken Cosh Week 13.
Mobile Commerce and Ubiquitous Computing
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
How to keep the bad guys out and your data safe
Internet Engineering Course
The Internet: Encryption & Public Keys
Technology Services at Canisius College
E - Abhiyan.
Security in mobile technologies
Election Security Presented by: michelle K. tassinari Director and Legal counsel Elections division Office of the secretary of the commonwealth.
Presentation transcript:

Anytime, Anywhere Anyone (AAA) Internet Voting in India Raj Reddy Carnegie Mellon University Aug 2, 2016

Long Term Vision Only 65% are able vote today Rest are unable to vote for many reasons Physical Handicap or Age or Lack of Transporation Travel out of station Service Professionals Migrant Workers including Officers on duty Technology can enable over 95% to cast the vote, today Time Independent: ANYTIME Location Independent: ANYWHERE Category Independent: ANYONE Expectation: Near Term: 40% of Voters will own Smart Phones Medium Term: 70% of Voters will own Smart Phones Long Term: 90% of Voters will own Smart Phones

Desired Outcomes Online Voting: Permitted for Any “Registered” Voter with a “Smart Phone” Anytime Voting: Upto 4 weeks ahead of Election Date Anywhere Voting: From anywhere in world Access to Next Gen EVMs for Voters without Smartphones Authentication by Voice Dialog in Local Language Aadhaar Card plus Voice Print Authorization using OTP at the Time of Voting using Personalized ECI App after Authentication and Challenge Questions Audit using Triplicated Data Centers

Emerging Business of Political Hacking and Stealing Elections More Dangerous than Voting Fraud Modern political operation: running attack ads, researching the opposition, and finding ways to suppress a foe’s turnout. Disinformation and Misinformation Manipulate social media to create false waves of enthusiasm and derision, Defacing campaign websites spoof and clone Web pages, and send mass e-mails and texts Digital interception, attack, decryption, and defense Dirty war and psychological operations, black propaganda, rumors “Online and Physical” breakin to steal campaign strategies and Install spyware in opposition offices Breaking into opponents’ donor databases Specialties: develop the best malware. scan systems and software for vulnerabilities. mobile intercept hack smartphones

Requirements for Internet Voting Connectivity: WiFi/Broadband Wireless Computing: Smart Phone Capacity: Speech Based UI Authentication App: Local Language Speech Dialog Authorization App: QA and One Time Password Audit End to End Verified Internet Voting (E2E VIV)

Reliable IT Infrastructure: Data Centers, WiFi and Broadband Wireless in Villages Multi Vendor Data Centers Village Level Access through WiFi Broadband Wireless Access to Smart Phone Speech I/O based User Interface

Action Items Agree on a Multiphase Implementation of E2E-VIV Remote Voting Permitted for Any Registered Voter with a Smart Phone Anytime: Upto 4 weeks ahead of Election Date? Anywhere: From anywhere in world Use of NG-EVMs must always be available Authentication by Voice Dialog in Local Language Target Dates Near Term: 30% of Voters use Internet Medium Term: 60% of Voters use Internet Long Term: 80% of Voters use Internet