E-Voting and Forensics: Prying Open the Black Box
نویسندگان
چکیده
Over the past six years, the nation has moved rapidly from punch cards and levers to electronic voting systems. These new systems have occasionally presented election officials with puzzling technical irregularities. The national experience has included unexpected and unexplained incidents in each phase of the election process: preparations, balloting, tabulation, and reporting results. Quick technical or managerial assessment can often identify the cause of the problem, leading to a simple and effective solution. But other times, the cause and scope of anomalies cannot be determined. In this paper, we describe the application of a model of forensics to the types of technical incidents that arise in computer-based voting technologies. We describe the elements of e-voting that current forensic techniques can address, as well as the need for a more structured analysis, and how this can be achieved given modifications to the design of e-voting systems. We also demonstrate how some concrete forensic techniques can be utilized today by election officials and their agents, to understand voting system events and indicators. We conclude by reviewing best practices for structuring a formal forensics team, and suggest legal steps and contractual provisions to undergird the team’s authority and work.
منابع مشابه
Staas Clouds Using the Open Cloud Forensics Model
The rapid adoption of cloud computing to meet storage and computation needs has changed the way computing services and resources are used. However, because of the black-box nature and multi-tenant usage models of clouds, existing digital forensics science cannot cope with current state-of-the-art cloud architectures. Because of the fundamental characteristics of such clouds, many assumptions of...
متن کاملPrying the Lid from the Black Box: Plotting Evaluation Strategy for Welfare Employment and Training Programs
To date, most evaluations of welfare-related employment and training (WRET) programs have focused on the difference between outcomes in a single site for people who receive the program's "treatment" and those in a control group who do not. This paper argues that progress in determining what makes programs effective requires greater emphasis on planning for synthesis of results from multiple sit...
متن کاملFECloud: A Trustworthy Forensics-Enabled Cloud Architecture
The rapid migration from traditional computing and storage model to the cloud model creates the necessity of supporting reliable forensics in the cloud. However, today’s cloud computing architectures often lack support for forensic investigations because many of the assumptions that are taken for granted in traditional digital forensics do not apply to clouds. Hence, the existing digital forens...
متن کاملSecurity Aspects of Electronic Voting Systems
An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information. There are two types of e-voting: on-line, e.g. via Internet, and offline, by using a voting machine or an electronic polling booth. Security is the main challenge of e-voting. This is the reason why designing a secure e-voting system is very im...
متن کاملHow to fit cryptographic e-voting into smart cards
The complexity of voting procedures make it challenging to design a secure electronic voting system. In many proposals, the security of the system relies mainly on a black box voting machine. Meanwhile, the most advanced proposals base their security arguments on (complicated) cryptographic protocols, e.g. blind signatures or homomorphic schemes. Canard and Traoré proposed cryptographic primiti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009