Voting Over the DISN-CAC Analysis Feasibility Evaluation

Voting Over the DISN-CAC Analysis Feasibility Evaluation

UNCLASSIFIED Voting Over the DISN-CAC Analysis Feasibility Evaluation Submitted To: October 5, 2012 Prepared by: Dreifus Associates Ltd, Inc. VOTING OVER THE DISN-CAC ANALYSIS UNCLASSIFIED Table of Contents Executive Summary ........................................................................................................ 6 1. Objectives ............................................................................................................... 10 2. Defense Networks Background .............................................................................. 11 Information Assurance (IA) ........................................................................................ 12 NIPRNet ..................................................................................................................... 14 NIPRNet Environment ................................................................................................ 15 Usage ..................................................................................................................... 16 Security ................................................................................................................... 17 Public Key Infrastructure (PKI) ............................................................................... 18 Internal Applications ............................................................................................... 19 3. Electronic Voting Systems Background .................................................................. 21 High-Level Conceptual Internet Based Voting System Architecture .......................... 21 Specification and Standards ...................................................................................... 23 Security ...................................................................................................................... 24 PKI in Voting Systems ............................................................................................... 26 4. Common Access Card Background ........................................................................ 28 National Strategy for Trusted Identities in Cyberspace .............................................. 30 User Vetting ............................................................................................................... 31 Architecture ................................................................................................................ 34 Usage ........................................................................................................................ 36 Applications ................................................................................................................ 37 Security ...................................................................................................................... 39 Middleware ................................................................................................................. 39 VOTING OVER THE DISN-CAC ANALYSIS UNCLASSIFIED Data Elements ........................................................................................................... 41 External .................................................................................................................. 41 Card Bar Code Information ..................................................................................... 42 Internal .................................................................................................................... 42 Privacy Considerations .............................................................................................. 43 5. Client Configurations .............................................................................................. 44 6. Feasibility Evaluation .............................................................................................. 56 7. Risks and Mitigations .............................................................................................. 75 8. Conclusions and Recommendations ...................................................................... 77 Recommended Additional Research .......................................................................... 80 Appendix A – Abbreviations and Acronyms .................................................................. 81 Appendix B – Common Access Card ........................................................................... 83 Appendix C – LPS Light Weight Portable Security ........................................................ 86 Appendix D – DoD PKI External Interoperability Landscape ......................................... 88 Appendix E – Source References ................................................................................. 89 Appendix F – Source Organizations .............................................................................. 98 VOTING OVER THE DISN-CAC ANALYSIS UNCLASSIFIED Tables Table 1: DISA Networks ................................................................................................ 11 Table 2: Sample of DoDI, DISA and NIST Guidelines for NIPRNet .............................. 14 Table 3: IPv4 Private IP Ranges ................................................................................... 15 Table 4: Specifications and Standards .......................................................................... 24 Table 5: Data Security Standards ................................................................................. 24 Table 6: CAC and Smart Card Related Specifications and Standards .......................... 29 Table 7: Assurance Levels ............................................................................................ 32 Table 8: PIV Data Objects Access Control Rules .......................................................... 35 Table 9: CAC Certificate Containers ............................................................................. 36 Table 10: Network Distinctions ...................................................................................... 59 Table 11: Network Considerations ................................................................................ 61 Table 12: Authentication Considerations ....................................................................... 66 Table 13: Voting Client Considerations ......................................................................... 69 Table 14: Electronic Voting System Considerations ...................................................... 72 Table 15: Framework Risk Summary ............................................................................ 76 Table 16: Abbreviations and Acronyms ......................................................................... 82 Table 17: CAC Data Elements ...................................................................................... 85 VOTING OVER THE DISN-CAC ANALYSIS UNCLASSIFIED Figures Figure 1: High Level Conceptual Voting System ........................................................... 22 Figure 2: CAC External Data Elements ......................................................................... 41 Figure 3: UEFI Interface Position in the BIOS Start up chain ........................................ 48 Figure 4: Deploying Secure Host Images ...................................................................... 55 Figure 5: Pre-Decisional Baseline Conceptual Voting Framework ................................ 57 Figure 6: Illustrative Network Enclave with Voting Client(s) .......................................... 67 Figure 7: Voting Location Servers ................................................................................. 70 Figure 8: CAC Data Architecture ................................................................................... 83 Figure 9: LPS Operating System Environment .............................................................. 86 Figure 10: DoD PKI External Interoperability Landscape .............................................. 88 VOTING OVER THE DISN-CAC ANALYSIS UNCLASSIFIED Executive Summary This report documents a review and evaluation of the feasibility of applying the Defense Information System Networks (DISN), specifically the Non-Classified Internet Protocol Router Network (NIPRNet), as a conduit to support Uniformed and Overseas Citizens Absentee Voting (UOCAVA) voters in the voting process, coupled with the Defense Department’s primary form of identification, the Common Access Card (CAC), as an available, standardized means of asserting reliable identification of potential voters. In addition, an understanding is developed of considerations for protecting the privacy of personal identifiable information, and providing accountability, reliability and transparency. The initial sections of the report detail the research and analysis performed on each of the key components; the NIPRNet, the CAC, Electronic Voting Systems and the remote voting client. The data elements and internal data structures of the CAC, including the underlying authoritative identity framework (that includes the vetting of CAC recipients), are evaluated for suitability and fit in asserting identity authentication for the purposes of enabling Local Election Officials (LEOs) to perform vetting and adjudication decisions regarding an individual’s eligibility to vote. Comparability to analogous applications that apply the CAC and other digital electronic-based security architectures for the delivery of high-reliability services was also evaluated. Based upon a review of each

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    98 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us