Chapter 08-Talion
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Electoral Systems, Direct Recording Electronic Voting Machines
Abstract This article explores the assemblage of voting: electoral systems, Direct Recording Electronic voting machines (DREs), ballots and ballot booths, and the central role of secrecy. Its aim is to argue that the contemporary political subjectivity of deliberation is intimately tied up with this assem- blage. Based on ethnographic research, this article shows how controversies around DREs can reveal the ways in which the very possibility for delibera- tion is tied to the structure and implementation of these machines. It argues for a new approach to deliberation that includes debate, participation and co-construction of the technical systems whereby we vote, as well as those where we express opinions. Towards an Anthropology of Deliberation Christopher M. Kelty 1 October 2008 1University of California, Los Angeles, Department of Information Studies and the Center for Society and Genetics) introduction A political scientist, a cognitive scientist, and a computer scientist walk into a room. What sounds like the beginning of a bad joke|something about the anxiety of requiring the word \science" in the job title|was actually a class that I participated in, in the Fall of 2006, called \Election Systems, Technologies and Administration" (see Fig 1). The class combined approaches from cognitive science, political science and computer science{but it wasn't necessarily an attempt to combine them into a coherent approach. Rather voting and elections were subjected to an array of approaches, as the course description made clear: \how individuals interact with technology," \how technologies are engineered to be secure and accurate" and \how the social aspects of voting fulfill democratic goals for elections." These approaches covered human factors engineering, human- computer interaction and cognitive models of information processing, com- puter security research, election outcomes analysis, voting behavior and so on. -
Black Box Voting Ballot Tampering in the 21St Century
This free internet version is available at www.BlackBoxVoting.org Black Box Voting — © 2004 Bev Harris Rights reserved to Talion Publishing/ Black Box Voting ISBN 1-890916-90-0. You can purchase copies of this book at www.Amazon.com. Black Box Voting Ballot Tampering in the 21st Century By Bev Harris Talion Publishing / Black Box Voting This free internet version is available at www.BlackBoxVoting.org Contents © 2004 by Bev Harris ISBN 1-890916-90-0 Jan. 2004 All rights reserved. No part of this book may be reproduced in any form whatsoever except as provided for by U.S. copyright law. For information on this book and the investigation into the voting machine industry, please go to: www.blackboxvoting.org Black Box Voting 330 SW 43rd St PMB K-547 • Renton, WA • 98055 Fax: 425-228-3965 • [email protected] • Tel. 425-228-7131 This free internet version is available at www.BlackBoxVoting.org Black Box Voting © 2004 Bev Harris • ISBN 1-890916-90-0 Dedication First of all, thank you Lord. I dedicate this work to my husband, Sonny, my rock and my mentor, who tolerated being ignored and bored and galled by this thing every day for a year, and without fail, stood fast with affection and support and encouragement. He must be nuts. And to my father, who fought and took a hit in Germany, who lived through Hitler and saw first-hand what can happen when a country gets suckered out of democracy. And to my sweet mother, whose an- cestors hosted a stop on the Underground Railroad, who gets that disapproving look on her face when people don’t do the right thing. -
How Electronic Voting Companies' Proprietary Code Ruins Elections Andrew Massey
Hastings Communications and Entertainment Law Journal Volume 27 | Number 1 Article 6 1-1-2004 But We Have to Protect Our Source: How Electronic Voting Companies' Proprietary Code Ruins Elections Andrew Massey Follow this and additional works at: https://repository.uchastings.edu/ hastings_comm_ent_law_journal Part of the Communications Law Commons, Entertainment, Arts, and Sports Law Commons, and the Intellectual Property Law Commons Recommended Citation Andrew Massey, But We Have to Protect Our Source: How Electronic Voting Companies' Proprietary Code Ruins Elections, 27 Hastings Comm. & Ent. L.J. 233 (2004). Available at: https://repository.uchastings.edu/hastings_comm_ent_law_journal/vol27/iss1/6 This Note is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in Hastings Communications and Entertainment Law Journal by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact [email protected]. "But we have to protect our source!": How Electronic Voting Companies' Proprietary Code Ruins Elections by ANDREW MASSEY* I. Introduction .................................................................................. 234 II. Voting Systems and Open Source Code .................................... 236 A . V oting System s ............................................................................. 236 B . O pen Source C ode ....................................................................... 238 III. Proprietary -
Black Box Voting Report
330 SW 43rd St Suite K PMB-547 Renton WA 98055 425-793-1030 – [email protected] http://www.blackboxvoting.org The Black Box Report SECURITY ALERT: July 4, 2005 Critical Security Issues with Diebold Optical Scan Design Prepared by: Harri Hursti [email protected] Special thanks to Kalle Kaukonen for pre-publication review On behalf of Black Box Voting, Inc. A nonprofit, nonpartisan, 501c(3) consumer protection group for elections Executive Summary The findings of this study indicate that the architecture of the Diebold Precinct-Based Optical Scan 1.94w voting system inherently supports the alteration of its basic functionality, and thus the alteration of the produced results each time an election is prepared. The fundamental design of the Diebold Precinct-Based Optical Scan 1.94w system (AV OS) includes the optical scan machine, with an embedded system containing firmware, and the removable media (memory card), which should contain only the ballot box, the ballot design and the race definitions, but also contains a living thing – an executable program which acts on the vote data. Changing this executable program on the memory card can change the way the optical scan machine functions and the way the votes are reported. The system won’t work without this program on the memory card. Whereas we would expect to see vote data in a sealed, passive environment, this system places votes into an open active environment. With this architecture, every time an election is conducted it is necessary to reinstall part of the functionality into the Optical Scan system via memory card, making it possible to introduce program functions (either authorized or unauthorized), either wholesale or in a targeted manner, with no way to verify that the certified or even standard functionality is maintained from one voting machine to the next. -
Election Reform 20002006
ElElectiectionon ReformReform What’sWhat’s Changed, What Hasn’t and Why 2000–2006 53134_TextX 2/1/06 8:53 AM Page 1 Table of Contents Introduction . 3 Executive Summary . 5 Voting Systems . 9 Map: Voter-Verified Paper Audit Trails, 2006 . 12 Voter ID . 13 Map: State Voter Verification Requirements, 2000 . 16 Map: State Voter Verification Requirements, 2006 . 17 Statewide Registration Databases . 19 Map: Statewide Voter Registration Databases, 2000 . 22 Map: Statewide Voter Registration Databases, 2006 . 23 Chart: Statewide Voter Registration Database Contracts/Developers . 24 Legislation . 25 Litigation . 27 Map: Absentee Voting By Mail, 2000. 28 Map: Absentee Voting By Mail, 2006. 29 Map: Pre-Election Day In-Person Voting, 2000 . 30 Map: Pre-Election Day In-Person Voting, 2006 . 31 Provisional Voting . 32 Map: Provisional Balloting, 2000 . 34 Map: Provisional Balloting, 2006 . 35 Map: HAVA Fund Distribution . 36 Election Reform in the States . 39 Endnotes. 73 Methodology . 81 Table of Contents 1 ELECTION REFORM SINCE NOVEMBER 2000 53134_Text 1/28/06 2:47 AM Page 2 53134_Text 1/28/06 2:47 AM Page 3 am pleased to present the fourth edition of And watching it all, the electorate – better-informed electionline.org’s What’s Changed, What Hasn’t about the specifics of the electoral process than any and Why – our annual report detailing the state time in our history – continues to monitor develop- Iof election reform nationwide. ments and ask how, if at all, such changes will affect them. As 2006 begins, the standard title of the report is espe- cially apt. The Help America Vote Act of 2002 (HAVA) This is a fascinating time for followers of election imposed a number of key deadlines that finally arrived reform – and we hope this latest report will assist you January 1; as a result, the existence (or lack thereof) in understanding What’s Changed, What Hasn’t and of electoral changes – and the reasons why – are no Why. -
Firmware Manipulations on an Optical Scan Voting Terminal
Taking Total Control of Voting Systems: Firmware Manipulations on an Optical Scan Voting Terminal Seda Davtyan Sotiris Kentros Aggelos Kiayias Laurent Michel Nicolas Nicolaou Alexander Russell Andrew See Narasimha Shashidhar Alexander A. Shvartsman Voting Technology Research Center and Computer Science and Engineering Department University of Connecticut, Storrs, CT 06269, USA fseda,skentros,aggelos,ldm,nicolas,acr,andysee,karpoor,[email protected] ABSTRACT chines by presenting a detailed case study focusing on the The firmware of an electronic voting machine is typically AccuVote Optical Scan Terminal (AV-OS) that is widely treated as a \trusted" component of the system. Conse- used in the US elections. Our investigation demonstrates quently, it is misconstrued to be vulnerable only to an insider the possibility of an array of firmware manipulation attacks attack by someone with an in-depth knowledge of the sys- against the AV-OS that are characterized by their low cost tem and access to the source code. This case study focuses (<$300) and the fact that they were developed without on the Diebold/Premier AccuVote Optical Scan voting ter- any access to hardware specifications or the source code of minal (AV-OS) that is widely used in the USA elections. We any software running in this system. By virtue of being a present three low level manipulations of the above voting ter- firmware modification, our attacks are totally immune to minal's firmware resulting in divergence from its prescribed cryptographic integrity checks or any other type of auditing operation: (i) the first bestows the terminal with a powerful procedure (aside from an auditing procedure that inspects memory card dumping functionality, (ii) the second enables the firmware itself, which is a type of audit whose impor- the terminal to leak the ballot details through its serial port tance is strongly underscored by our work). -
Voters' Evaluations of Electronic Voting Systems
American Politics Research Volume 36 Number 4 July 2008 580-611 © 2008 Sage Publications Voters’ Evaluations of 10.1177/1532673X08316667 http://apr.sagepub.com hosted at Electronic Voting Systems http://online.sagepub.com Results From a Usability Field Study Paul S. Herrnson University of Maryland Richard G. Niemi University of Rochester Michael J. Hanmer University of Maryland Peter L. Francia East Carolina University Benjamin B. Bederson University of Maryland Frederick G. Conrad University of Michigan, University of Maryland Michael W. Traugott University of Michigan Electronic voting systems were developed, in part, to make voting easier and to boost voters’ confidence in the election process. Using three new approaches to studying electronic voting systems—focusing on a large-scale field study of the usability of a representative set of systems—we demonstrate that voters view these systems favorably but that design differences have a substantial impact on voters’ satisfaction with the voting process and on the need to request help. Factors associated with the digital divide played only a small role with respect to overall satisfaction but they were strongly associated with feeling the need for help. Results suggest numerous possible improvements in electronic voting systems as well as the need for continued analysis that assesses specific char- acteristics of both optical scan and direct recording electronic systems. Keywords: election reform; voting technology; public opinion; usability; voting machines olitical scientists’ interest in voting systems and ballots may seem rela- Ptively recent but research on these topics goes back to the beginning of the profession and includes a long line of work on ballot content (Allen, 580 Downloaded from apr.sagepub.com by guest on December 9, 2015 Herrnson et al. -
Computational Aspects of Voting: a Literature Survey Fatima Talib
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by RIT Scholar Works Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 2007 Computational aspects of voting: a literature survey Fatima Talib Follow this and additional works at: http://scholarworks.rit.edu/theses Recommended Citation Talib, Fatima, "Computational aspects of voting: a literature survey" (2007). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by the Thesis/Dissertation Collections at RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Fatima Al-Raisi May 16th, 2007 Abstract Preference aggregation is a topic of study in different fields such as philosophy, mathematics, economics and political science. Recently, computational aspects of preference aggregation have gained especial attention and “computational politics” has emerged as a marked line of research in computer science with a clear concentration on voting protocols. The field of voting systems, rooted in social choice the- ory, has expanded notably in both depth and breadth in the last few decades. A significant amount of this growth comes from studies con- cerning the computational aspects of voting systems. This thesis comprehensively reviews the work on voting systems (from a computing perspective) by listing, classifying and comparing the re- sults obtained by different researchers in the field. This survey covers a wide range of new and historical results yet provides a profound commentary on related work as individual studies and in relation to other related work and to the field in general. -
Security Evaluation of ES&S Voting Machines and Election
Security Evaluation of ES&S Voting Machines and Election Management System Adam Aviv Pavol Cernˇ y´ Sandy Clark Eric Cronin Gaurav Shah Micah Sherr Matt Blaze faviv,cernyp,saender,ecronin,gauravsh,msherr,[email protected] Department of Computer and Information Science University of Pennsylvania Abstract EVEREST was the first major study of ES&S voting sys- tems, despite the system’s popularity (ES&S claims to be This paper summarizes a security analysis of the DRE the world’s largest e-voting systems vendor [1], support- and optical scan voting systems manufactured by Election ing more than 67 million voter registrations with 97,000 Systems and Software (ES&S), as used in Ohio (and many touchscreen voting machines installed in 20 states and other jurisdictions inside and outside the US). We found 30,000 optical ballot readers present in 43 states [4]), and numerous exploitable vulnerabilities in nearly every com- only the second comprehensive study that examined all ponent of the ES&S system. These vulnerabilities enable components – from backend registration systems to fron- attacks that could alter or forge precinct results, install tend ballot casting – of any electronic voting system. In a corrupt firmware, and erase audit records. Our analysis ten week period, our seven-member team was tasked with focused on architectural issues in which the interactions analyzing the nearly 670,000 lines of source code that between various software and hardware modules leads to comprise the ES&S system, encompassing twelve pro- systemic vulnerabilities that do not appear to be easily gramming languages and five hardware platforms1. -
Electronic Voting
Electronic Voting Ronald L. Rivest Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, MA 02139 [email protected] 1 Introduction Over the years, with varying degrees of success, inventors have repeatedly tried to adapt the latest technology to the cause of improved voting. For example, on June 1, 1869 Thomas A. Edison received U.S. Patent 90,646 for an \Electric Vote-Recorder" intended for use in Congress. It was never adopted because it was allegedly \too fast" for the members of Congress. Yet it is clear that we have not reached perfection in voting technology, as evidenced by Florida's “butterfly ballots" and \dimpled chads." Stimulated by Florida's election problems, the California Institute of Tech- nology and MIT have begun a joint study of voting technologies [5], with the dual objectives of analyzing technologies currently in use and suggesting im- provements. This study, funded by the Carnegie Foundation, complements the Carter/Ford commision [6], which is focusing on political rather than technolog- ical issues. Electronic voting will be studied. Among people considering electronic voting systems for the first time, the following two questions seem to be the most common: Could I get a receipt telling me how I voted? Could the U.S. Presidential elections be held on the Internet? The first question is perhaps most easily answered (in the negative), by point- ing out that receipts would enable vote-buying and voter coercion: party X would pay $20 to every voter that could show a receipt of having voted for party X's candidate. Designated-verifier receipts, however, where the voter is the only designated verifier—that is, the only one who can authenticate the receipt as valid|would provide an interesting alternative approach to receipts that avoids the vote-buying and coercion problem. -
Voting System Failures: a Database Solution
B R E N N A N CENTER FOR JUSTICE voting system failures: a database solution Lawrence Norden Brennan Center for Justice at New York University School of Law about the brennan center for justice The Brennan Center for Justice at New York University School of Law is a non-partisan public policy and law institute that focuses on fundamental issues of democracy and justice. Our work ranges from voting rights to campaign finance reform, from racial justice in criminal law to presidential power in the fight against terrorism. A singular institution – part think tank, part public interest law firm, part advocacy group – the Brennan Center combines scholarship, legislative and legal advocacy, and communication to win meaningful, measurable change in the public sector. about the brennan center’s voting rights and elections project The Brennan Center promotes policies that protect rights, equal electoral access, and increased political participation on the national, state and local levels. The Voting Rights and Elections Project works to expend the franchise, to make it as simple as possible for every eligible American to vote, and to ensure that every vote cast is accurately recorded and counted. The Center’s staff provides top-flight legal and policy assistance on a broad range of election administration issues, including voter registration systems, voting technology, voter identification, statewide voter registration list maintenance, and provisional ballots. The Help America Vote Act in 2002 required states to replace antiquated voting machines with new electronic voting systems, but jurisdictions had little guidance on how to evaluate new voting technology. The Center convened four panels of experts, who conducted the first comprehensive analyses of electronic voting systems. -
Thresholds Quantifying Proportionality Criteria for Election Methods
THRESHOLDS QUANTIFYING PROPORTIONALITY CRITERIA FOR ELECTION METHODS SVANTE JANSON Abstract. We define several different thresholds for election methods by considering different scenarios, corresponding to different proportion- ality criteria that have been proposed by various authors. In particular, we reformulate the criteria known as DPC, PSC, JR, PJR, EJR in our setting. We consider multi-winner election methods of different types, using ballots with unordered lists of candidates or ordered lists, and for comparison also methods using only party lists. The thresholds are cal- culated for many different election methods. The considered methods include classical ones such as BV, SNTV and STV (with some results going back to e.g. Droop and Dodgson in the 19th century); we also study in detail several perhaps lesser known methods by Phragm´en and Thiele. There are also many cases left as open problems. Contents 1. Introduction 2 2. Notations and general definitions 5 2.1. Some notation 5 2.2. Proportionality thresholds 7 3. General properties 11 4. Party ballots 13 4.1. Unordered and ordered ballots 17 5. Unordered ballots: Block Vote, SNTV, Limited Vote, . 17 6. JR, PJR, EJR 24 7. Phragm´en’s and Thiele’s unordered methods 30 arXiv:1810.06377v1 [cs.GT] 12 Oct 2018 7.1. The party list case 30 7.2. Phragm´en’s method 30 7.3. Thiele’s optimization method 32 7.4. Thiele’s addition method 33 7.5. Thiele’s elimination method 41 7.6. Thiele’s optimization method with general weights 42 7.7. Thiele’s addition method with general weights 45 8.