Internet Voting a menace to society? Jan Meijer.

Slides:



Advertisements
Similar presentations
Trusting the Vote Ben Adida - Cryptography and Information Security Group MIT Computer Science and Artificial.
Advertisements

Research & Development Workshop on e-Voting and e-Government in the UK - February 27, 2006 Votinbox - a voting system based on smart cards Sébastien Canard.
Hoogheemraadschap van Rijnland 23 June 2006 Improving transparency, accountability and responsiveness RIES: Rijnland Internet Election System The Netherlands.
1 Henrik Nore, Project Manager E-vote2011project Norway COE workshop observation - Oslo
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
2014 General Elections Presentation – 22/04/14. Timeline April Polling Station identification complete Correct Voter Details Setup Office in Suva Identify.
ETen E-Poll ID – Strasbourg COE meeting November, 2006 Slide 1 E-TEN E-POLL Project Electronic Polling System for Remote Operation Strasbourg.
Internet Voting Technology and policy issues. Selective History of Voting (US) early 1800’s: public oral voting at County Hall 1800’s: free-form, non-secret.
Election SO WHAT! SO WHAT? Democracy builds Inclusion and equality Citizen, Government responsibility,, culture, HRC, Opportunity, Participate,
Self-Enforcing E-Voting (SEEV) Feng Hao Newcastle University, UK CryptoForma’13, Egham.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Information Security Overview BA483 – May 15 th, 2006 Presented By Kris Rosenberg, CISSP, MCSE, CCNA CTO Oregon State University College of Business.
Network Security Overview Tales from the trenches.
Internet Voting Technology and policy issues David Wagner UC Berkeley.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Lecture 6 Networked Application Security IT 202—Internet Applications Based on notes developed by Morgan Benton.
Voting Naked: A Feasible Election System or Just a Recurring Nightmare Presented by: Danita McRae Daniel Bramell.
Chapter 8 Web Security.
Chapter 10.1 Who Can Vote?.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Ballot Processing Systems February, 2005 Submission to OASIS EML TC and True Vote Maryland by David RR Webber.
Desktop in the Clouds Using Virtualization to Extend Client Outreach and Protect Data.
Internet voting in Estonia Epp Maaten Councillor of the Elections Department Chancellery of the Riigikogu.
An Internet Voting System Manager Yonghua Li Kansas State University October 19, 2001 MSE Project - Phase I.
Wireless and Security CSCI 5857: Encoding and Encryption.
Fayoum University Faculty of Engineering Electrical Engineering Department E-voting system Using Smart Card Under the supervision Of: Dr. Magdy Amer.
1 The Evolution of Internet Voting By Ka Ling Cheung.
Masked Ballot Voting for Receipt-Free Online Elections Sam Heinith, David Humphrey, and Maggie Watkins.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Active Server Pages and Application Service Providers Architecture for 2000 and beyond Krishen Kota Denali Technologies
December 2008Prof. Reuven Aviv, SSL1 Web Security with SSL Network Security Prof. Reuven Aviv King Mongkut’s University of Technology Faculty of information.
Georgia Electronic Voting System Testing and Security Voting Systems Testing Summit November 29, 2005.
1 The report on the scope of e-voting in elections Marianne Riise, senior adviser Strasbourg 23 and 24 November 2006 The Ministry of Local Government and.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Online voting: a legal perspective
Gary Smith Chair Forsyth County Registrations & Elections Early Voting Wait Time Dashboard Forsyth County Website Project.
Database as a networked server DB at the centre of the network Network Access Map for DB environment Tracking of tools and apps Remove unnecessary network.
The OASIS Election & Voter Services Technical Committee EML Interoperability Demo
William H. Bowers – Ethics for the Information Age Chapter 6.5 – Online Voting.
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
E-voting Bringing the voting process to the technology age.
1 New Algorithms and Protocols: Development and Testing at HPGC Research Lab PATH: measures Bottleneck Bandwidth PATH: measures Bottleneck Bandwidth Testing.
American Government and Organization PS1301 Thursday, 4 November.
A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link. Typically, connected.
Goal 4- Political Parties. Qualifying to Vote Voting is an important right of American citizenship, without it citizens cannot choose who will run their.
1 What will be the Coming Super Worms and Viruses By Alan S H Lam.
10.1 Who Can Vote? Civics and Economics.
Results of the Second Reform Act
EVoting 23 October 2006.
An Introduction to Online Voting/ Surveys
E-voting …and why it’s good..
Planning & System Installation
Texas Secretary of State Elections Division
Texas Secretary of State Elections Division
Providing Secure Storage on the Internet
Who can Vote? And Types of Elections
IS 4506 Server Configuration (HTTP Server)
eVoting System Proposal
Texas Secretary of State Elections Division
The Italian Academic Community’s Electronic Voting System
Designing IIS Security (IIS – Internet Information Service)
IS 4506 Configuring the FTP Service
Election Security Presented by: michelle K. tassinari Director and Legal counsel Elections division Office of the secretary of the commonwealth.
Presentation transcript:

Internet Voting a menace to society? Jan Meijer

POWER

You exercise your right to vote... If you are elligable Anonymous In private, it’s YOUR vote, leave your consultant at home to elect well defined subject(s) According to a well defined process

Water boards & RIES 2003, Water board Rijnland, Rijnland Internet Election System 1.2 million voters 300k for Internet voting Postal + Internet

RIES: The ”Robers” protocol Herman Robers. Electronic elections employing DES smartcards. Master's thesis, Delft University of Technology, December ps. ps Virtual ballot using DES

3 phase system Phase 1: Prepare. –Distribute pseudo Id and voter secret to each voter Phase 2: Voting window Phase 3: Tally

Network paradigm client (voter) server (polling station)network (internet)process stage vote process processingverification vote contact vote materials vote result vote confirmation unsecured secured

Security is a mindset

Know your goal: won the battle..

Know your risks

shit will happen

Know when it’s good enough...

System characteristics Peak performance 2004: 23 voters/s over SSL Holistic approach Compartimentalized security Layered security Sustain multiple component failure BCP, common sense ”Lazy running” Dirt cheap

Not in outer space You scavenge... A network Existing services (DNS, RPS, NTP,...) SURFnet-CERT...

Architecture overview

Our dashboard

It worked… Resource usage Rijnland elections

No peak? vote server 1, 2006vote server 2, 2006 vote server 1, Dommelvote server 1, Rijnland

So, a menace to society? ONLY IF DONE BADLY

Easiest to monitor polling stations (Nigeria, UK, NL?) or 1 station

/me? Voting by the people, for the people: it’s democracy stupid! Internet age opportunity Publicly owned system, open source End commercial incompetence Power to the people! State of our eVoting systems is a professional disgrace!

Still not convinced? etwork_breached/ “Slammer turns Florida election result into worm food” …The county server was breached on the first day of early voting in the 2006 election, which included a now-disputed race for a seat in the US House of Representatives. The attack code was a variant of the infamous Slammer worm that penetrated the county's server, which unbelievably, was missing five years worth of security patches…