...Literature All computer scientists who have done work in or are interested in electronic voting seem to agree that online voting does not meet the requirements for public elections and that the current widely-deployed voting systems need improvement. Voting on the Internet has disadvantages based on the areas of secrecy and protection against coercion and/or vote selling. It's such a truly bad idea that there seems to be no credible academic effort to deploy it at all. The Kenyan General elections of 2007 brought national attention to problems with current methods of casting and counting votes in public elections. Most people believe that the current system should be changed; there is much disagreement on how such changes should be made.c really can't trust any code which we did not create ourselves. Therefore, they tend to be extremely suspicious of proprietary voting machines and their makers who insist that we should “just trust [them].” Neumann gives a list of suggestions for "generic voting criteria" which suggests that a voting system should be so hard to tamper with and so resistant to failure that no commercial system is likely to ever meet the requirements, and developing a suitable custom system would be extremely difficult and prohibitively expensive. A voting machine must produce human-readable hardcopy paper results, which can be verified by the voter before the vote is cast, and manually recounted later if necessary. David Chaum presents a very interesting...
Words: 1779 - Pages: 8
...Both letters suggest whether or not electronic voting machines should be used. The author of "Everyone Should Be Able to Vote" says that it would be easier if people used electronic voting machines. But, the author of "Electronic Voting Is a Bad Idea" says that the machine can be hacked and people dont like using electronic voting machines. I personally agree with the auther of "Electonic Voting Is a Bad Idea" because in paragragh 1, sentence 5 it says, "In 2007, it was found that malicious software can transfer EVM votes for one candidate to another without the voter noticing." If the machines can be tampered with than its not a smart decision to vote with the EVM. Another reason i agree with this author is because it says that states need...
Words: 254 - Pages: 2
...Enter the Age of Internet Voting Voting has changed drastically since the beginning of humanity. Some of these changes have been for the better, and others have been fraudulent. The first form of voting originated in Ancient Athens where Greeks would use small balls to vote. A white ball would be cast in favor of a candidate or a topic and a black ball would be cast to vote against someone or something. This is where the term black balled came from (Glenco). Then a couple thousand or so years later came paper ballots, lever machines, punch cards, optical scans, and touch screens. The three most well known ways of voting are by optical scanners, punch cards, and touch screens. In which touch-screens are the most dominant in America Today. There have been major incidents with all of these machines that have caused doubt about whether the results are truly accurate or a miscalculation. The best way to solve this problem is to no longer use any by optical scanners, punch cards, or touch screens and make voting possible online. Internet voting seems like the most logical answer to the current problems faced by these machines and punch cards. It is also possible to have internet voting while ensuring that the votes are accurate. New voting technologies tend to emerge out of crises of confidence as seen prominently in the 2000 presidential election. We only rarely change systems and in response to a public anxiety that electoral results can no longer be trusted. There have...
Words: 3212 - Pages: 13
...Electronic Voting Literature Review Computer scientists who have done work in, or are interested in, electronic voting all seem to agree on two things: * Internet voting does not meet the requirements for public elections * Currently widely-deployed voting systems need improvement Voting on the Internet using every day PC's offers only weak security, but its main disadvantages are in the areas of anonymity and protection against coercion and/or vote selling. It's such a truly bad idea that there seems to be no credible academic effort to deploy it at all. The Presidential elections of 2000 brought national attention to problems with current American methods of casting and counting votes in public elections. Most people believe that the current system should be changed; there is much disagreement on how such changes should be made. The MIT/Caltech researchers [1] “see a promising future for electronic voting, despite its problems today” (under a few conditions). They advocate using the methods currently in use which result in the lowest average numbers of “uncounted, unmarked, and spoiled ballots,” like in-precinct optical scanning. Their report even proposes a framework for new voting system with a decentralized, modular design. Other researchers have done work in electronic voting; while they may not explicitly mention voting from remote poll sites, their work is nonetheless relevant to any effort at designing or implementing a remote poll site voting system...
Words: 4590 - Pages: 19
...Electronic Voting for Global Vote for Rights by Children International – Tabaco is joining at the World Children’s Prize. It is an education program for all children. Their goal is to become more humane world, where children’s rights are respected by all. And there will be a new way of voting and to make voting process faster and easier. More than 2000 youth ages 12 – 18 yrs. Old are going to vote, first they will have their registration of the participant, next followed by voting process by Electronic Voting, in this way we are going to minimize and lessen the step by step process of voting. Objective of the Study: In this proposal I would like to make the voting process easier, also all the youth can vote in a specific date, minimize the time and lessen the step by step process. First the youths need to register to know how many youth participate in the activity. Next they are going to have their line for the voting. There are 11 computers available to use in voting. The facilitators are going to assist and help to become the voting process is organize, after they vote facilitator put an indelible ink to their fingertip so recognize whose already voted. And lastly the voter can go home. Specific Objective: * To have a new process of voting by means of electronic voting. * To help the staff and facilitator to make the voting process easier and faster. * To open the mind and give the youth an idea to the new way of voting by means of electronic voting. Scope...
Words: 1220 - Pages: 5
...Electronic Voting System TADAYOSHI KOHNO∗ A DAM S TUBBLEFIELD† DAN S. WALLACH§ February 27, 2004 AVIEL D. RUBIN‡ Abstract With significant U.S. federal funds now available to replace outdated punch-card and mechanical voting systems, municipalities and states throughout the U.S. are adopting paperless electronic voting systems from a number of different vendors. We present a security analysis of the source code to one such machine used in a significant share of the market. Our analysis shows that this voting system is far below even the most minimal security standards applicable in other contexts. We identify several problems including unauthorized privilege escalation, incorrect use of cryptography, vulnerabilities to network threats, and poor software development processes. We show that voters, without any insider privileges, can cast unlimited votes without being detected by any mechanisms within the voting terminal software. Furthermore, we show that even the most serious of our outsider attacks could have been discovered and executed without access to the source code. In the face of such attacks, the usual worries about insider threats are not the only concerns; outsiders can do the damage. That said, we demonstrate that the insider threat is also quite considerable, showing that not only can an insider, such as a poll worker, modify the votes, but that insiders can also violate voter privacy and match votes with the voters who cast them. We conclude that this voting system...
Words: 12856 - Pages: 52
...provided the databases we used. We appreciate the great information gathering effort carried out by this organization. We are equally indebted to a hard working collaborator who, because of institutional reasons, must remain anonymous. We thank Andrés Velasco as well for his useful comments. The opinions expressed in this report and the errors we may have incurred are our responsibility and do not compromise either Súmate, or the universities to which we belong. 1 Abstract This study analyzes diverse hypotheses of electronic fraud in the Recall Referendum celebrated in Venezuela on August 15, 2004. We define fraud as the difference between the elector’s intent, and the official vote tally. Our null hypothesis is that there was no fraud, and we attempt to search for evidence that will allow us to reject this hypothesis. We reject the hypothesis that fraud was committed by applying numerical maximums to machines in some precincts. Equally, we discard any hypothesis that implies altering some machines and not others, at each electoral precinct, because the variation patterns between machines at each precinct are normal. However, the statistical evidence is compatible with the occurrence of fraud that has affected every machine in a single precinct, but differentially more in some precincts than others. We find that the deviation pattern between precincts, based on the relationship between the signatures from the November 2003 Reafirmazo, and the YES votes on August 15, is positive...
Words: 6758 - Pages: 28
...more than ever, technology is changing on how we vote. Voting schemes have evolved from counting hands on early days to systems that includes papers, punch cards, mechanical levers and optical machines. Electronic voting systems provide some characteristic different from the traditional voting technique. As an effect of vast change in modern technology, several techniques in voting arises in order to solve various drawbacks like time consuming and large volume of paper works can be consumed. So the solutions are televoting, android phone voting and web voting. Televoting was also known as voting via SMS text messages. Mobile phone connects through GSM (Global System for Mobile Communications) in which it searches for cells in the immediate vicinity. Televoting uses a format in which the public viewer follows and replies error whenever they send an invalid format. Like in a real television shows, televoting was a very common method that opens the public to vote its favorite contestant to remain and not to be evicted. The outcome will be decided by the number of votes in which a contestant garners. On the other hand, android phone voting and web voting has this similarity. Both use an internet in order to gain access and make vote counts. In web voting, it uses a browser to view the page and users just simply browse, follow some steps and vote, and if successful, the vote is counted. The most common method before a user can vote is by user’s registration and/or webpage itself checks...
Words: 3624 - Pages: 15
...power interruption last Feb. 20, which delayed voting at the Conservatory of Music, Education High School and UST High School, Tabon said the new polling scheme was “implemented well.” “The loss of electricity supply caused a slight delay in voting in some colleges. But it did not affect the voters’ turnout because the election proceeded after the power supply returned,” said Abadenzio Rexzy Tabon, chairman of the Central Commission on Elections (Comelec). Overall, voter turnout did not improve. In last year’s elections, 22,515 Thomasians voted. This year, 22,229 students cast their votes, more than half of roughly 40,000 students in the University. Preparations Tabon said a University-wide automated election was first proposed during the summer planning of Central Comelec officials. Thereafter, the Central Comelec met with officials of college-level Comelec units to discuss the plan. The College of Nursing and the Faculty of Civil Law were the first to have automated elections two years ago. Lack of resources hampered previous efforts to automate the polls. In previous elections, student leaders preferred to stay in school overnight, guard the counting of ballots, and wait for the proclamation of winning candidates. However, Tabon said it was “time to create a new tradition in the University” and ensure honest and quick elections. The Educational Technology Center provided technical support by hosting the software used...
Words: 2746 - Pages: 11
...c) Party should Ban tickets to candidates having a criminal background India is the largest democracy of the world and our public is politically aware of its rights. Election time always generates hectic activity in the society initiated by the political leaders to businessmen to film stars all trying to win votes. As G.B Shaw had said " Democracy is a social order aiming at the greatest available welfare for the population and not for a class". But it is also said that Politics is the last refuge of' Scoundrels. Public Awareness ; India is the largest, working democracy in the world, which in its constitution has incorporated from every best constitution, of the world. The thing, which goes against India, is Population, Illiteracy and Poverty, which is being easily, exploited by the mafia as they find safe refuge. So Election Commission has to play an important role. The general public should be very well aware of the Candidate's past record, his and the party's agenda. People should have good knowledge about how to use the ballot paper and should be aware of the symbols of all political parties. The election commission should make adequate steps to make authenticated Voter's I-Card and put the names of eligible people in the Voter's list. They should ensure that all members of the family must give their valuable votes. Seniors must ensure the names of all members who have attained 18 years of age in the electron polls. In rural areas where the electronic machine is not accessible...
Words: 668 - Pages: 3
...Automated Election System Does automation = clean elections? Possible Problems: Preliminary Results Technical Briefing What is the AES? l “A system using appropriate technology which has been demonstrated in the voting, counting, consolidating, canvassing, and transmission of election result, and other electoral process” process” Public perception of the AES It would lead to clean elections l Cheating would be impossible in an automated election l AES System l Election Management System (EMS) Configuration of precinct data l Election Mark– Up Language (EML) Mark– l l Precinct– Precinct–Count Optical Scan (PCOS) System l Precinct Machine BOC Computer l Consolidation / Canvassing System (CCS) l PCOS Machine SMARTMATIC AUTOMATED ELECTION SYSTEM (SAES 1800) SAES 1800 lPrecinct Count Optical Scan / Optical Mark Reader (OMR) • Detects the absence or presence of a mark in predefined positions on a form SAES 1800 Components RF Key Thermal Printer •2-1/4 inch roll paper •Rated to last 5 years Digital Scanner •4-bit mono – color scanner •16 shades of gray Processor And Memory Not Specified Compact Flash (CF) Card Input / Output Ports •CF Card Reader •UTP Ethernet Port •Disabled USB •RJ – 11 Modem Port Ballot Box Cast and Return •Buttons Disabled Display • Touch screen, mono-color display •Quarter VGA in size, 320x240 pixels Ballot Boxes with Transparent Panels Compartments the Ballot Box in Transparent Panels ...
Words: 2670 - Pages: 11
...Sun Star Davao By Ivy C. Tejano Thursday, August 1, 2013 THOUSANDS more registrants trooped to the Commission on Elections (Comelec) office at Magsaysay Park during Wednesday's final day of registration for the barangay and Sangguniang Kabataan (SK) elections. While many of them made it, many failed to make it on time and blamed Comelec for its snail-paced processing. Still, others were hoping Comelec will extend the registration period. Analiza Mantimo, 15, of Tamugan Calinan, said it will be disappointing if ever she would not be registered. Mantino added that she had been at the Comelec office twice, but still she has not been accommodated. "Dili namo masabtan ang sistema nila diri. Bisan ako na mag pa transfer ra, wa gani ka sulod didto unya katulo na ni nako na adlaw diri (I can’t understand their system here. I just need to file for transfer of registration and yet I never made it into their office even on my third day of lining up)," said Marites Premitiba, 44, of Dumoy, Talomo District. "Sa kadaghan sa mga registrants kulang lang jud ang 10-day registration. Dagsa kayo ang mga mag pa rehistro unya pulo lang ka adlaw ilang gitagana para didto sa mga wala pa ka rehistro. Kulang ra pud kaayo ang adlaw (With the number of registrants, the ten-day registration is not enough. There were mobs every day. Ten days is not enough)," said May Ann Ambos, 15, of Tamugan Calinan. Exhausted registrants were still seen at the long lines Wednesday as they waited for several hours...
Words: 2219 - Pages: 9
...Rothschild offers three general ones: 1. the level of the election (national/local etc.); 2. the closeness of the race; and 3. the volatility of the issues or candidates. There is some more recent work examining voter recall of political messages. Faber and Storey (1984), note voter responses to different messages and presentations (see, for example, Thorson et al., 1991), in particular negative ones (Faber et al., 1993; Garramone, 1984; Tinkham and Weaver-Lariscy, 1994). These studies used subjects in experimental groups rather than actual electoral or opinion poll data. More recently Ansolabehere and Iyengar (1995) have substantially added to the literature on negative advertising through the use of a very rounded and full quantitative and qualitative study which shows that a highly focused negative campaign can increase the turnout of those potential supporters predisposed to abstain by something in the order of approximately 29 per cent, thus maximising your supporters’ vote. Weaver-Lariscy and Tinkham (1987) investigated how Congressional election candidates evaluated different media and proposed six levels of response to political advertising. Apart from Caywood and Preston (1989) and Laczniak and Caywood’s (1987) work with others cited above, a number of authors have considered the ethical issues involved (Kaid, 1991; Tinkham and Weaver-Lariscy, 1994). Rothschild (1978) raises the public policy issues involved in political advertising and this theme is taken up...
Words: 1401 - Pages: 6
...Harris Professor Bey English 102 13 March 2016 Voter Identification: Disenfranchises African Americans Ever since Section 4b of the Voting Rights Act of 1965 was struck down, disenfranchisement of African Americans has been underway. Politicians are starting to put in place laws that require everyone who wants to vote to obtain a photo identification to show at voting sites in order to prohibit voter fraudulence. Picture this, an African American family, who are members of the poor sector, who do not own a car, and barely survives. Imagine the parents of this family who have jobs that barely allow them to feed their families and pay the bills on time. Now imagine the irritation those parents feel when they aren’t able to pay for a voter identification to vote in elections so they can make the attempt to make their lives better. Then on top of that most of the DMV offices are never close by African American neighborhoods. These families do not have the proper funds to pay someone for gas to take them to a DMV, buy two voter identification cards, pay the bills, and feed the children on limited funds. Voter identification laws are said to prevent voter fraud so that elections are fair; instead they hurt the African American population, and corruption still continues. Instead of trying to allow poor African Americans the equal chance to vote as those who can afford it, politicians who approve of voter identification laws are making it quite impossible for African Americans to...
Words: 2051 - Pages: 9
...Applying MESE processes to Improve Online E-Voting Prototype System with Paillier Threshold Cryptosystem Web Services Version 1.00 A project submitted to the Faculty of Graduate School, University of Colorado at Colorado Springs in Partial Fulfillment of the Requirements for the Degree of Master of Engineering in Software Engineering Department of Computer Science Prepared by Hakan Evecek CS701 Dr. Chow Spring 2007 This project for the Masters of Engineering in Software Engineer degree by Hakan Evecek has been approved for the Department of Computer Science By _______________________________________________________ Dr. C. Edward Chow, Chair _______________________________________________________ Dr. Richard Weiner _______________________________________________________ Dr. Xiaobo Zhou Date Table of Contents Online E-Voting System Project Documentation 4 Abstract 6 1. Introduction 7 2. E-Voting System Related Literature 9 2.1. Public Key Cryptography 9 2.2. Homomorphic Encryption 10 2.3. Zero Knowledge Proofs 10 2.4. Threshold Cryptography 10 2.5. Cryptographic Voting Protocol 11 2.6. Issues in secure e-voting system 12 2.7. Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) 13 2.8. Chinese Remainder Theorem (CRT) 14 3. Online E-Voting System Project Description 17 3.1. Paillier Threshold...
Words: 7163 - Pages: 29