Internet Voting Technology and policy issues. Selective History of Voting (US) early 1800’s: public oral voting at County Hall 1800’s: free-form, non-secret.

Slides:



Advertisements
Similar presentations
Electronic Voting Ian Brown (with some slides from Matt Bishop, UC Davis)
Advertisements

ELECTRONIC VOTING (HK) FEBRUARY 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Electronic Voting: The Technology of Democracy Michael I. Shamos, Ph.D., J.D.
Good or Bad?.  One of the closest contests in US history  Florida was the pivotal state  Neither Democrat Al Gore nor Republican George W. Bush had.
Elections Chapter 7 Section 2.
October 7, 2010 Who decides who runs for political office Would you ever run for office? What are different ways you can participate in politics?
Administration of Absentee Ballot Programs Barry C. Burden (University of Wisconsin) Brian J. Gaines (University of Illinois)
Electrons Chapter 7 Section 2.
Breaking Trust On The Internet
Pretty Good Voting (PGV) Christian Bell, Jason Duell, Amir Kamil Computer Security CS 261 Fall 2004.
Internet Voting Technology and policy issues David Wagner UC Berkeley.
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Web server security Dr Jim Briggs WEBP security1.
Voting Naked: A Feasible Election System or Just a Recurring Nightmare Presented by: Danita McRae Daniel Bramell.
17-803/ Electronic Voting Session 10: Internet Voting
Internet Voting. What is Internet Voting? Internet voting is: an election process whereby people can cast their votes over the Internet, most likely through.
Chapter 10.1 Who Can Vote?.
Chapter 10 Section 1: p  Early America: most voters were white, adult males who owned property ◦ White adult males who could not afford property,
Guide to the Voting Action Planner Voting is the way we elect government officials, pass laws and decide on issues…
Voting and You A presentation of the National Youth Leadership Network.
Ballot Processing Systems February, 2005 Submission to OASIS EML TC and True Vote Maryland by David RR Webber.
Internet Voting: Weighing the Pros and Cons By: Forest Marie “The Case for Internet Voting” By: Joe Mohen and Julia Glidden “Gauging the Risks of Internet.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Objectives Analyze how the administration of elections in the United States helps make democracy work. Define the role of local precincts and polling places.
Requirements for Electronic and Internet Voting Systems in Public Elections David Jefferson Compaq Systems Research Center Palo Alto, CA
Election Administration. Ensuring legitimacy of the government Legitimacy: acceptance of the right of public officials to hold office and to promulgate.
Chapter 7: The Electoral Process Section 2
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
UOCAVA Report Overview and Status July 2008 Andrew Regenscheid Computer Security Division National Institute of Standards and Technology.
Elections Americans vote at extreme levels –Elections are held almost everyday besides Sundays and holidays –500,000 office holders are elected in the.
Digital Democracy: A look at Voting Machines Presented by Justin Dugger April 2003.
Polling Places -Polling Places -precinct based -Usually in schools, town halls, public places -open early and close late 7-7 or 8-8.
Nathanael Paul CRyptography Applications Bistro February 3, 2004.
Objectives Analyze how the administration of elections in the United States helps make democracy work. Define the role of local precincts and polling places.
The Electoral Process Chapter 7.
Online voting: a legal perspective
CHAPTER 7 Elections How does the administration of elections in the United States make democracy work? What role do precincts and polling places play in.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Internet Voting Ashok CS 395T. What is “E-voting” Thomas Edison received US patent number 90,646 for an electrographic vote recorder in Specific.
E-voting Bringing the voting process to the technology age.
Chapter 10 Section 3. Voter Qualification  Each state determines qualifications for registering to vote and voting  States must follow certain guidelines.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Computer Security By Duncan Hall.
The Administration of Elections Extent of Federal control Elections need to be free, honest, and accurate Most election law in the U.S. is State Law.
Secure Remote Electronic Voting CSE-681 Fall 2006 David Foster and Laura Stapleton Laura StapletonLaura Stapleton.
7 th Grade Civics Miss Smith *pgs  Must be 18 years old by a set date before the next election  Voter registration protects your vote  No.
WHO CAN VOTE?. VOTING RIGHTS DENIED Voting in America has changed dramatically since the birth of our nation. Initially, many groups were denied that.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Polling Places -Polling Places -precinct based -Usually in schools, town halls, public places -open early and close late.
Unit 5: Ante Up Types of Elections.
Voting and Elections in the United States (Ch. 6 and 7)
Chapter 7: Elections.
EVoting 23 October 2006.
How do Elections Work? Section 2 (pages ).
E-voting …and why it’s good..
Division of Elections Florida Department of State
Electronic voting – safe or not?
NAVY TRANSITION PROGRAM
Voting Assistance Element 49.
Who can Vote? And Types of Elections
Voting Assistance Element pg.208.
Chapter 7: The Electoral Process Section 2
Chapter 7: The Electoral Process Section 2
Chapter 7: The Electoral Process Section 2
Voting Assistance Element 49 P. 217.
7th Grade Civics Miss Smith *pgs
Chapter 7: The Electoral Process Section 2
Qualifications and Procedures for Voting
Voting Assistance Element 49 P. 217.
Presentation transcript:

Internet Voting Technology and policy issues

Selective History of Voting (US) early 1800’s: public oral voting at County Hall 1800’s: free-form, non-secret paper ballots 1884: widespread vote fraud 1888: adoption of Australian secret ballot 1930’s: lever machines widely adopted 1960’s: punchcard voting developed 2000: hanging chads: Florida voting snafu 2002: Help America Vote Act

Attacks on the Secret Ballot Registration fraud: Register in multiple jurisdictions Graveyard voting Voter fraud: Vote multiple times (ballot box stuffing) Impersonation Insider fraud: Throw ballot boxes into the bay Stuff ballot box after polls close Sleight of hand Voter intimidation “Run out of ballots” Tallying attacks: Malicious talliers might calculate wrong results Give talliers bogus tools Registration fraud: Register in multiple jurisdictions Graveyard voting Voter fraud: Vote multiple times (ballot box stuffing) Impersonation Insider fraud: Throw ballot boxes into the bay Stuff ballot box after polls close Sleight of hand Voter intimidation “Run out of ballots” Tallying attacks: Malicious talliers might calculate wrong results Give talliers bogus tools

How Secure is the Secret Ballot? It’s easy to forge a few fraudulent votes But: It’s very hard to forge a lot of fraudulent votes… Summary: Australian secret ballot is quite robust; a well-designed security system.

History of Internet Voting 2000: 36,000 Arizona citizens vote in Democratic primary over the Internet; 85 military personnel vote in November elections over the Internet 2000: California studies Internet voting; task force recommends against it 2000: NSF panel warns of security risks in Internet voting 2004: SERVE will accept votes over the Internet

The SERVE Project A DoD project for overseas voters Register & vote from abroad Vote over the Internet, using your computer

Who is eligible for SERVE? Overseas & military voters from participating jurisdictions (7 states, 51 counties)

The SERVE Architecture Internet Citizen HTTPS UVS Control Data Ballot Definitions Voted Ballots (Encrypted) LEO Processes Voter Registration Ballot Definition Ballot Decryption Ballot Tabulation Voter History Web Server HTTPS, SFTP SERVEUSA.gov * * * Firewall ** Identification & Authentication Process SERVE server infrastructure Election officials UVS Laptop Ballot Definition Voting Engine Ballot Reconciliation Voter Registration I & A Process ** Voter Status Check Overseas voters Encrypted Voted Ballots Ballot Def. Data UVS Control Data

Security Risks in SERVE (1) Software flaws: Unintentional bugs might enable remote attacks Malicious code might contain a backdoor COTS software might be insecure or backdoored Insider attacks: Votes cast could be modified or deleted Election officials could learn how you voted, or count your votes incorrectly Sys-admins, developers could bypass security

Security Risks in SERVE (2) Attacks on the client: Worms, viruses Remote attacks Malicious websites, ActiveX Denial of service attacks: DDoS might render servers unreachable Targeted disenfranchisement Website spoofing: Voters might be re- directed to the wrong site (DNS hijacking, ) Spoofed site might observe or change votes Automated vote swapping and vote buying

Summary How do you know that your vote was counted? How much security is enough? How much security is too much ? You won the election, but I won the count. -- Somoza

Arguments Internet voting is a danger to democracy No voting system will ever be perfectly secure; why worry? Absentee vote-by-mail is already insecure; why should Internet voting be held to a higher standard? 30% of our military today can’t vote; a little insecurity is worth it if it fixes the problem The threat of extraterritorial election fraud is new, and requires new laws

Sources