Electronic voting – safe or not?

Slides:



Advertisements
Similar presentations
Electronic Voting Systems
Advertisements

(Remote) e-voting in the Netherlands Leontine Loeber Constitutional Affairs and Legislation Susanne Caarls Public Sector Innovation and Information Policy.
Making Sure Every Vote Counts in the Digital Era: The Need for Standards Mandating Voter-Verified Paper Ballots Sarah Rovito 2007 WISE Intern August 3,
Online Voting Presented By: George Oham George Olajide
Good or Bad?.  One of the closest contests in US history  Florida was the pivotal state  Neither Democrat Al Gore nor Republican George W. Bush had.
ICT IN THE ELECTORAL PROCESS: LESSONS LEARNED Susanne Caarls International Electoral Affairs Symposium May 2012.
Internet Voting Technology and policy issues. Selective History of Voting (US) early 1800’s: public oral voting at County Hall 1800’s: free-form, non-secret.
VVPAT BY KRISTEN DUARTE & JESSICA HAWKINS. WHAT IS VVPAT? An add-on to electronic voting machines that allows voters to get a printed version of their.
By Varun Jain. Introduction  Florida 2000 election fiasco, drew conclusion that paper ballots couldn’t be counted  Computerized voting system, DRE (Direct.
Observation of e-enabled elections Jonathan Stonestreet Council of Europe Workshop Oslo, March 2010.
Ronald L. Rivest MIT Laboratory for Computer Science
Internet Voting Technology and policy issues David Wagner UC Berkeley.
Internet Voting David Jefferson Compaq Systems Research Center 130 Lytton Ave. Palo Alto, CA 94301
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Electronic Voting Linh Nguyen. Electronic Voting  Voting Technologies  The Florida 2000 Election  Direct Recording Electronic Devices (DREs)‏ - Diebold.
Internet Voting. What is Internet Voting? Internet voting is: an election process whereby people can cast their votes over the Internet, most likely through.
TESTING THE SECRUITY OF ELECTRONIC VOTING SYSTEM Presented By: NIPUN NANDA
Ballot Processing Systems February, 2005 Submission to OASIS EML TC and True Vote Maryland by David RR Webber.
Author: Michał Rajkowski Tutor: prof. dr hab. inż. Zbigniew Kotulski.
Data and Applications Security Secure Electronic Voting Machines Lecture #30 Dr. Bhavani Thuraisingham The University of Texas at Dallas April 23, 2008.
Central Electoral Commission of The Republic of Lithuania THE LITHUANIAN CONCEPT OF VOTING VIA INTERNET FOR ELECTIONS AND REFERENDA Approved by the Seimas.
An Internet Voting System Manager Yonghua Li Kansas State University October 19, 2001 MSE Project - Phase I.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Demystifying the Independent Test Authority (ITA)
October 22, 2008 CSC 682 Security Analysis of the Diebold AccuVote – TS Voting Machine Feldman, Halderman and Felten Presented by: Ryan Lehan.
12/9-10/2009 TGDC Meeting Vote-by-Phone David Flater / Sharon Laskowski National Institute of Standards and Technology
Staying Safe Online Keep your Information Secure.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
25 October Elections and Voting. Punch Card Machine Punch cards stacked here Punched here.
E-Voting Dissent Sara Wilson, Katie Noto, John Massie, Will Sutherland, Molly Cooper.
Making Data Count Manchester 3/11/08. Health and the 5 Outcomes Enjoying and Achieving Healthy and Safe Economic Wellbeing and Positive Contribution.
Electronic Voting Ronald L. Rivest MIT Laboratory for Computer Science.
California Secretary of State Voting Systems Testing Summit November 28 & 29, 2005, Sacramento, California Remarks by Kim Alexander, President, California.
SEMINAR TOPIC ON GLOBAL WIRELESS E-VOTING
Audit Trail
Nathanael Paul CRyptography Applications Bistro February 3, 2004.
Online voting: a legal perspective
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Panel One Why Audit? Mary Batcher Ernst & Young and Chair of ASA Working Group on Elections.
S. A. Shonola & M. S. Joy Security Framework for Mobile Learning Environments.
Influence of Social Media & Technology By Gregory Samuels.
William H. Bowers – Ethics for the Information Age Chapter 6.5 – Online Voting.
Internet Voting Ashok CS 395T. What is “E-voting” Thomas Edison received US patent number 90,646 for an electrographic vote recorder in Specific.
E-voting Bringing the voting process to the technology age.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
WHAT CONSTITUTES A VOTE? Annual Training for County Election Officials
The Administration of Elections Extent of Federal control Elections need to be free, honest, and accurate Most election law in the U.S. is State Law.
VVPAT Building Confidence in U.S. Elections. WHAT IS VVPAT ? Voter-verifiable paper audit trail Requires the voting system to print a paper ballot containing.
Evaluation of an E-Voting Device based on a Common Criteria Protection Profile Roland Vogt, DFKI GmbH Dr. Sönke Maseberg, datenschutz nord GmbH 8th ICCC,
Computer and Network Security Brendan Duncombe Bahein Maung.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
7 th Grade Civics Miss Smith *pgs  Must be ___ years old by a set ____ before the next ________  Voter _________ protects your vote  No one.
E-Government, E-Voting, and the Future Jordan Weiler.
Information Systems Design and Development Security Precautions Computing Science.
What is electronic voting An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily.
Secure, verifiable online voting 29 th June 2016.
E-Voting Application using Internal Vtoken Bowo Prasetyo Isolated e-Voting System in a Precinct Secured with Vote Sealing and Paper Audit Trail December.
Securing Information Systems
Chapter 40 Internet Security.
Internet Voting Resources and Reports
EVoting 23 October 2006.
E-voting …and why it’s good..
CDF for Voting Systems: Human Factors Issues
Ronald L. Rivest MIT Laboratory for Computer Science
ELECTRONIC VOTING SYSTEMS André Martins Hugo António Miguel Cordeiro
Securing Information Systems
Teaching Computing to GCSE
Malware March 26, 2018.
Encryption and Hacking
The Italian Academic Community’s Electronic Voting System
Presentation transcript:

Electronic voting – safe or not? Kaspar Tilk

Electronic voting E-Voting (physical machines) Remote e-Voting or I-voting(Internet voting)

Percentage of votes cast using i-voting 1.9% - Local Elections 2005 5.5% - Parliamentary Elections 2007 14.7% - European Parliament Elections 2009 15.8% - Local Elections 2009 24,3% - Parliamentary Elections 2011 31,4% - European Parliament Elections 2014 30,5% - Parliamentary Elections 2015

Voting machine for e-voting Defining ballots Casting and counting votes Reporting election results Producing audit trail information

Drawbacks of voting machines Poorly programmed Vulnerable to malicious code Self-spreading malware Weak encryption – same key for all Cannot check if vote is recorded Patching one flaw could produce another

Examples of problems 4438 of votes lost by North Carolina’s electronic voting machines 232 unconfirmed votes in Finland 197 votes erased from database due to a security flaw in California Graduate students from the University of Michigan hacked into the online voting systems

Remote e-voting or Internet voting Database could be attacked from all over the world Malware in voters device Trojans in central servers Physical access to servers

Examples of problems in Estonia

Secure or not? Never too secure As secure as possible No voting machine = no problem?