You are on page 1of 21

www.seminarsonly.

com

E-Voting

SEMINAR REPORT ON E VOTING

Prepared By Dhaval Patel 04IT6006

Guided By Prof. C.R. Mandal

Submitted To: School Of Information Technology, IIT Kharagpur

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting

Purpose Of The Seminar This Seminar has been developed in an attempt to provide an objective introduction to the issues of E-Voting surrounding the introduction of information technologies into the voting process. Voters trust in elections comes from a combination of the Mechanisms and procedures we use to record and tally votes. In this seminar I am going to present the various Electronic voting Method like voting by kiosk, Internet, telephone, punch card, and optical scan ballot, Proms and Cons of all voting types. I have also described how the evolution of various voting machines has been carried out in last 100 eras. There is a discussion on some of the problem found in e-voting machine like Floridas butterfly ballots design problem. As the new problem known to the people, what is a reaction of the people toward this voting process? Like I have discussed some the well-known issues like Voter Verifiable result, Mercuri Method, Ballot Design Issues and etc.. At the end I have illustrated IEEE performance standard for voting machine.

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting Introduction This section is mainly concern of the discussion of the definition of the Voting, Structure of Vote, and Importance of the Voting. The Subsequent Section discuss procedure for E-Voting with the specific need of the Voting Machine. Voting This is what the public does to choose the politician they want to run their area or country. Only those over 18 can vote at present Structure of Votes The structure of votes depends on the type of Elections. More precisely, It depends on the question that is put forward to voters in the election and Possible answers. Type of Election We will distinguish between the following types of election. yes/no voting Voters answer is yes or no. Vote is a one bit: 1 for yes and 0 for no 1-out-of-L voting Voter has L possibilities and he chooses one of them. Vote is a number in the range 1 . . .L K-out-of-L voting Voter selects K different elements from the set of L possibilities. The order of the selected elements is not important. Vote is a K-tuple (v1 vK) K-out-of-L Voter puts into order K different elements ordered voting from the set of L possibilities. Vote is an ordered K-tuple (v1 vK). 1-L-K voting Voter picks out one of the L sets of possibilities, and from the selected set he chooses K elements. Vote is a K+1-tuple (i, a1 aK); a1 aK are elements of the ith set. Structured voting There are n levels of possibilities. Voter moves from the first level to the last one. At the ith level he can select at most ki possibilities from the subset Si of all possibilities in the ith level. Si, ki depend on his choices in the previous levels. Vote is a tuple (v11, , v1k1 , , vi1, , viki , , vnkn), where {vi1, , viki} _ Si. Write-in voting Voter formulates his own answer and writes it down. Vote is a string with specified maximum length.

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting Voting importance Voting is one of the most critical features in our democratic process. By casting a vote we hold previous politicians to account and express our hopes for the future. Of course democracy is more than votes - it's debate, letter writing, campaigning, consultation - but the vote is how every single citizen can wield real and immediate power. In addition to providing for the orderly transfer of power, it also cements the citizens trust and confidence in an organization or government when it operates efficiently. It's incredibly important that everyone can vote without interference, safe in the knowledge that it will be counted. Through the long history of democracy we have learnt that in the pursuit of power some groups are willing to threaten voters to make sure they vote 'the right way'. But if the vote is secret then there is no way for intimidators to know whether someone has voted for them or not - threats become useless. So votes are a vital expression of the people's power, which need to be secret and restricted to only one per citizen. E-Voting

Electronic voting is a term used to describe any of several means of determining people's collective intent electronically. Electronic voting includes voting by kiosk, Internet, telephone, punch card, and optical scan ballot (a.k.a. mark-sense). Voting is done for many reasons and in many situations, ranging from determining the next garden club officers to determining the next leader of a country. Depending on the situation, a voting scheme will be required to meet differing needs depending on the circumstances. One hopes that in this way the voting process becomes faster, cheaper, more convenient, and also more secure. Requirements in E-Voting A voting system should satisfy these requirements:

Eligibility and authentication only registered voters must be admitted. Uniqueness no voter may cast his vote more than once. Accuracy voting systems should record the votes correctly. Verifiability and audit ability it should be possible to verify that all votes have been correctly accounted for in the final tally, and there should be reliable and verifiably authentic election records. Secrecy no one should be able to determine how any individual voted. Non-coerciability voters should not be able to prove to others how they voted; otherwise vote selling and coercion would be facilitated. Minimum skill requirement for voter Minimal requirement of equipment Minimum Time required for vote

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting

Voting Technique The traditional way of voting has been to mark a token (shell, card or piece of paper) in private and then put it into a box or pot. The key points were to make sure that: Each voter could only have one token to vote with. The token could be marked in private. The box could only be accessible to voters. At the end of the election the box would be opened in the presence of observers of all the parties standing for election. If results were in doubt different people could count the tokens again.

How Much information to be collected during the voting? If only the Name of the candidate then it is very easy to count. Consider a case like in USA, large number of issues Americans are asked to vote on at the same time. Thus to ease the counting lever and so new voting technique in using an optical machines are used in elections. 1. Raise Your Hand Or Raise Your Voice Or Put Stick in Box Election has been used to decide various questions for at least 2000 years. In ancient Greece, people voted by putting white or black stone in bucket. Early methods including Shouting out Aye or Nay, raising hands or depositing objects to be counted. 2. Paper Ballot (1858, Australian paper ballot introduced) The first Known use of the paper ballots in an election in the U.S. was in 1629 to select a church pastor. Invented By Australian paper ballot system was considered as a great innovation. Standardized ballots are printed at government expenses, given to voter at polling places, and people are required to vote and return the ballot on the spot. The Australian government comes up with this procedure, which is now the most widely used system in the world. Procedure for voting The paper ballot system employs uniform official ballots of various stock weights on which the names of all candidates and issues are printed. Voters record their choices, in private; by marking the boxes next to the candidate or issue choice they select and drop the voted ballot in a sealed ballot box.

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting Current Usage As of 1996, paper ballots were still used by 1.7% of the registered voters in the United States. They are used as the primary voting system in small communities and rural areas, and quite often for absentee balloting in other jurisdictions Problem with Paper Ballot System It may take a long time to get a hand count under the current system. (Counting Problem) A small portion of the disabled may lose the ability to vote privately. Paper ballot counting and recounting generates endless arguments about whether the X crosses inside the square A Specimen for the Paper Ballot Voting

3. Lever Machine (1892, Mechanical lever voting machines) The first official use of a lever type voting machine, known then as the "Myers Automatic Booth," occurred in Lockport, New York in 1892. Procedure for voting On mechanical lever voting machines, the name of each candidate or ballot issue choice is assigned a particular lever in a rectangular array of

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting levers on the front of the machine. A set of printed strips visible to the voters identifies the lever assignment for each candidate and issue choice. The levers are horizontal in their UN voted positions. The voter enables the machine with a lever that also closes a privacy curtain. The voter pulls down selected levers to indicate choices. When the voter exits the booth by opening the privacy curtain with the handle, the voted levers are automatically returned to their original horizontal position. As each lever returns, it causes a connected counter wheel within the machine to turn one-tenth of a full rotation. The counter wheel, serving as the "ones" position of the numerical count for the associated lever, drives a "tens" counter one-tenth of a rotation for each of its full rotations. The "tens" counter similarly drives a "hundreds" counter. If all mechanical connections are fully operational during the voting period, and the counters are initially set to zero, the position of each counter at the close of the polls indicates the number of votes cast on the lever that drives it. Interlocks in the machine prevent the voter from voting for more choices than permitted. Current Usage Nationally, mechanical lever machines were used by 20.7% of voters in the 1996 Presidential election. Trend is to replace them with computer based Mark sense or Direct Recording Electronic systems. Problem with Lever Machine Lever-handle voting machines are subject to malfunctions that can invalidate hundreds of votes

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting

4. Postal Step Of Postal Voting Ordinary paper ballot is delivered to voters, by post Paper ballot is returned by post for counting Voters need to sign a declaration They have to prove they are authorized to cast the vote posted

Problem How sure we can be that only authorized citizens have cast their votes? 5. Punch Card (1964, Punched card voting (Votomatic)) Invented Herman Hollerith invented a punchcard tabulation machine system for statistical computation Procedure for voting Punch card systems employ a card (or cards) and a small clipboard-sized device for recording votes. Voters punch holes in the cards (with a

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting

supplied punch device) opposite their candidate or ballot issue choice. After voting, the voter may place the ballot in a ballot box, or the ballot may be fed into a computer vote-tabulating device at the precinct. Two common types of punch cards are the "votomatic" card and the "data vote" card. With the votomatic, the locations at which holes may be punched to indicate votes are each assigned numbers. The number of the hole is the only information printed on the card. The list of candidates or ballot issue choices and directions for punching the corresponding holes are printed in a separate booklet. (Todays "votomatic" cards are the direct descendents of the original punchcard developed from a concept introduced by political scientist and former government administrator Dr. Joseph P. Harris) With the datavote, the name of the candidate or description of the issue choice is printed on the ballot next to the location of the hole to be punched. The tabulation may be done either by a computer equipped with a standard punched-card reader or by an electromechanical tabulating machine. Feature Voters with a stylus punch holes in cards to register their votes Mechanical machines counted automatically Punch card election results have been very solid in recounts Ambiguous ballots ("hanging chads") are extremely rare

Problem It is common to notice a few pieces of chad accumulating in areas where Votomatic ballots are being processed, and each of these may represent a vote added to some candidates total by accident Systems have reliability problem Cards can be checked manually Poor user interface the punch card voting device Centralized handling and ballot counting they require Use of secret, proprietary software to do the counting

The problems with punch-card ballots became well known after the state of Floridas 2000 US Presidential Election. Because voters might not completely remove punch-card holes, it can be unclear from a punch card what the voter intended. Unlike permanent markings on paper, punch-card ballots are susceptible to accidental voters have lost faith in them, which makes them unacceptable. After the Florida elections served to destroy voter confidence in punch-card systems, the US government passed a law encouraging states to replace their 9 MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting punch card and mechanical-lever systems. The Help America Vote Act of 2002 (HAVA) allocated US$3.86 billion for election upgrades. According to the HAVA act, US states that accept funds must replace their existing punch card and mechanical-lever voting machines. 6. Optical Scanning (Mark sense)(~1970, Optical mark-sense ballots) Invented In 1937, IBM introduced the Type 805 Test Scoring Machine, sensing graphite pencil marks on paper by their electrical conductivity Procedure of Voting In this system voters record their choices on a ballot card by filling in a circle, rectangle or oval or by completing the arrow. They then either place the ballot in a sealed box, or they feed it into a computer-tabulating device at the precinct. The tabulating device reads the votes using dark mark logic, selecting the darkest mark within a given set as the correct vote. This technology has existed for decades. Feature Problem Error rates from using the wrong type of pencil Misunderstanding the card 7. Phone Provide voting either through a touch-tone system or through SMS text messages on mobile phones. Authentication is achieved through the use of PIN and access codes, which are mailed to voters ahead of the ballot Telephone voting allows people to call different telephone numbers to indicate preference for different options, or a voter might call one number and indicate a preference by pressing buttons in a menu system. Its main drawback is the difficulty in verifying the identity of the voter and in permitting only one vote per person. Its chief advantage is the ease in getting people to participate. Counts are quicker Problems arise recounts of the ballot can still be done by hand

10

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting Problem Poor. Convenient but extremely unlikely to meet basic voting requirements The Fox TV Network used telephone voting to determine the winner of the American Idol television talent contest. In the case of the 2003 Ruben Studdard/Clay Aiken contest, another drawback of telephone voting appeared. Viewers were asked to call a number indicating their preference, but the telephone systems, presumably two identical systems for counting votes, were operating very near capacity for the duration of the voting period. Perhaps as a result, out of 24 million votes cast, Stoddard "won" by only 130,000 votes. 8.Electronic Machine Voting [EMV] (Direct Recording Electronic [DRE]) ~1985, Direct-recording electronic voting (Electro vote 2000) The most recent configuration in the evolution of voting systems are known as direct recording electronic, or DRE. They are an electronic implementation of the old mechanical lever systems. As with the lever machines, there is no ballot; the possible choices are visible to the voter on the front of the machine. The voter directly enters choices into electronic storage with the use of a touch-screen, push buttons, or similar device. An alphabetic keyboard is often provided with the entry device to allow for the possibility of write-in votes. The voters choices are stored in these machines via a memory cartridge, diskette or smart card and added to the choices of all other voters. Consists of a normal computer or more often a specially designed electronic 'kiosk' in the polling booth Use buttons or a touch screen votes are made which are stored in an electronic memory Recounts are not possible In 1996, 7.7% of the registered voters in the United States used some type of direct recording electronic voting system. Advantages DRE voting systems are often favored because they can incorporate assistive technologies for handicapped people, allowing them to vote without involving another person in the process They can also offer immediate feedback on the validity of a particular ballot so that the voter can have an opportunity to correct problems if they are noticed.

11

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting

Challenges DRE have to fulfilled 1. How voter can verify the vote? Mercuri Method The Mercuri Method of electronic voting, described by Rebecca Mercuri, addresses the problem by having the voting machine print a paper ballot or receipt that is verified by the voter before being dropped into a ballot box. Brazil uses the Mercuri Method for elections. The paper is treated as a ballot, it is primary and the electronic records are used for recounts and audits. If the paper is treated as a receipt or audit trail, it would then be used for recounts, if necessary because of legal challenges, or on a random sampling basis to ensure the integrity of the process. David Chaum proposes a solution to the repeatability and verifiability issues that allows the voter to verify that the vote is cast appropriately and that the vote is counted. He proposes a two-layer printout from a DRE voting machine (Chaum, 1988). The layers, when combined, show the human-readable vote. The voter selects one layer to destroy at the poll and takes the other layer as a receipt, and the voter can verify that his particular vote was counted with that receipt, but the actual vote cast is thoroughly encrypted. The chief drawback to Chaum's method is that the cryptographic mathematics involved are not understood by most observers, election officials, legislators, and procurement officials.

12

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting

Source: Safevote Inc.

2. Presentation of Information on Voting Machine Another challenge for DRE systems is a requirement in some areas that the entire ballot be presented to the voter simultaneously, so the voter can "vote for President, then vote for dog catcher, then leave," according to Rebecca Mercuri in a November 14, 2003 presentation. DRE systems in those areas need particularly large screens to accommodate all choices. Problem DREs (direct recording electronic voting machines) are costly. There is no clear reason to trust a DRE vote count. DREs fail to prove that the vote stored in the machine is really what the voter saw and confirmed on the screen. DREs may behave as ideal con machines for voters.

13

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting A DRE has no witness to its acts but itself. Open source software does not guarantee accuracy and reliability bugs, fraud, virus, Trojan horses and faults can still influence

9. Remote Electronic Voting [REV] (Online Voting) ~2000, Internet voting

With Internet voting people cast their ballots online, generally via a web interface, although email voting has occasionally been tried. With web voting the voter navigates to the proper election site using a web browser on an ordinary PC and authenticates him or she to see the appropriate blank ballot form presented onscreen. The voter then fills out the ballot form and, when satisfied, clicks the "cast vote" button to send the completed ballot back to the election server Some corporations routinely use Internet voting to elect officers and Board members and for other proxy elections. However, its use for public elections where the security, privacy, and audit ability standards are much higher, is generally considered prohibitively dangerous because, besides all of the dangers of ordinary electronic voting, there are additional severe security problems inherent in the PC and in the Internet that have no good solutions with current technology The main weakness of the PC architecture is its vulnerability to malicious code, which can be introduced through a hundred different channels to interfere with voting in lots of ways, many of them undetectable. The voter may be prevented from voting, or the privacy of the vote might be compromised, or the vote might be altered before transmission without the voter's knowledge, etc The weaknesses of the Internet include its vulnerability to many kinds of denial of service attacks, spoofing attacks, and man-in-the-middle attacks, which could lead to massive, selective voter disenfranchisement, or to automated vote buying and selling. Attacks on Internet voting systems can be launched remotely from anywhere in the world, and might change the results of elections undetectably; or if the attack is detected, there may be no way to correct the tally Because of these security concerns the U.S. military cancelled the SERVE program (Secure Electronic Registration and Voting Experiment) in early 2004 that would have allowed military personnel and overseas citizens of eight states to vote online in the 2004 presidential election. Voter privacy and anonymity are also hard to maintain.

14

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting

U.S. Voting Methods 2000-2004 Punched-card (32%) Optical scan (28%) Lever (16%) DRE (12%) Paper (1%) Indeterminate: (11%)

Optical scan (34%) DRE (31%) Lever (14%) Punched-card (14%) Paper (1%) Indeterminate: (6%) ________________________________________________________________________ Convenience vs. security In the past, changes in the election process have proceeded deliberately and judiciously, often entailing lengthy debates over even the minutest detail. These changes have been approached with caution because discrepancies with the election system threaten the very principles that make our society democratic. Michael Shamos devised the Six Commandments of Electronic Voting. Although stated humorously, the assertions made are intended to be taken seriously. The commandments are in estimated order of importance, judged by statutes and willingness of election officials to compromise on the various requirements Six commandments of electronic voting 1. Keep each voter's choices an inviolable secret 2. Allow each eligible voter to vote only once, and only for those offices for which she is authorized to cast a vote 3. Not permit tampering with thy voting system, nor the exchange of gold for votes 4. Report all votes accurately 5. Voting system shall remain operable throughout each election 6. Keep an audit trail to detect sins against Commandments 2-4, but thy audit trail shall not violate Commandment 1

15

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting

Voters trust in elections comes from a combination of the Mechanisms and procedures we use to record and tally votes, With a plain paper-based voting system, voters can rely on some aspects of the process based solely on their own actions and observations. Voters know that the ballot they cast accurately reflects their intent because they can examine that ballot themselves. Furthermore, they know that a physical record of their vote exists. That record cannot be destroyed, lost, or tampered with without leaving some physical evidence. Voting systems that do not produce a physical record, such as mechanical-lever and electronic-voting machines, create additional trust issues. We lose transparent verifiability and must trust that the machines function correctly. This expands the scope of trust from the local election officials to include the manufacturers who make those machines as well as the people and processes used to inspect, maintain, and operate them. Electronic voting also increases the potential for large-scale fraud. If many voting machines run the same software, and no mechanisms exist for voters to verify their votes are recorded correctly or for election officials to conduct a meaningful recount, an intentional or accidental flaw in that software can irrevocably affect an elections outcome.

Voting interfaces
When it comes to voting, usability and security are closely intertwined. An elections integrity depends on the recorded votes accurately reflecting the voters intent. This could be compromised either by tampering with the recording of voter intent or by interfaces that increase the probability that the recorded votes will not accurately reflect the voters intent. A notorious example is the butterfly ballot design used in Palm Beach County, Florida, in the 2000 US presidential election, which made it easy for voters to mistakenly record their intent. This design used the votomatic punch-card ballot, which makes it difficult for voters to verify that their ballot reports their intent. One report estimated that 2,000 votes in Palm Beach that were intended for Democratic candidate Al Gore were mistakenly recorded for Republican candidate Pat Buchanan. A voter interacts with a DRE machine through a user interface, often using a touchscreen display. The goal of minimizing voter error can increase the voting machine softwares complexity and conflict with ease of use. For example, DRE machines can require a voter to confirm an undervote, but this requires an additional step from the voter. Complex interfaces also make pre-election ballot reviews more difficult. With paper ballots, it is easy to print and publicly review sample ballots before an election. With DRE equipment, it is harder to review the ballot presentation because it is in the form of a complex user interface. A series of screenshots cant capture an interface fully, and ballot issues might not be apparent without conducting test votes using the DRE machines (which exposes the machines and raises other security issues). These issues were apparent in the recent California gubernatorial recall election in which DRE machines in Alameda County were programmed so that voters could not view the

16

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting instructions after they began voting. This might have increased the number of voters who voted against the recall but did not cast a vote for a replacement candidate, even though they were allowed to do so. Recent studies conducted in Georgia and Maryland concluded that although most voters can use DRE machines without difficulty, a significant proportion of voters, especially older ones, required assistance. The Carl Vinson Institute of Government conducted a public opinion telephone survey to study voter confidence in DRE machines in Georgia.4 They found that fewer than 2 percent of responders reported difficulties in using DRE touch-screen machines. A University of Maryland study conducted an exit poll on voters using Diebolds AccuVote-TS touchscreen DRE machines in two counties in Maryland. Three percent of voters encountered technical problems with the machines, 7 percent reported that they were not easy to use, and 9 percent asked for assistance using the machines. Difficulty with the interface was correlated with age and education. Twentyone percent of the voters 65 years or older asked for help; the lowest age group asking for help was those 35 to 49, who asked for help 5 percent of the time. The youngest voters, ages 18 to 24, were second highest in asking for help at 16 percent, but this might be largely due to inexperience with voting in general. Of those with no college experience, 18 percent asked for assistance. Voters with a four-year degree or some college experience asked for help 9 percent of the time, and only 8 percent of voters with graduate school education asked for help. The amount of assistance required does play a role in voter trust in a voting system because that help will usually come from a poll-site worker. Voters who ask for he risk compromising their anonymity, and voters who need assistance might be reluctant to ask for it because of this or just personal embarrassment. This studys results indicate that many voters who did not ask for help received help anyway. This likely indicates that these voters were closely observed by poll-site workers trying to help, which some voters might interpret as a violation of privacy.

Vote Recording
Given a user interface that voters believe lets them enter their vote without error, DRE machines trustworthiness depends on how accurately the recorded vote reflects the entered vote. The trust citizens place in DRE machines depends on their experience using them as a voter and their understanding (or misunderstanding) of how the machines and the surrounding process works. One of the reasons voters trusts DRE machines is their surface resemblance to ATMs. After all, if we can trust an electronic machine to count money, surely we can trust it to count votes. The fallacy in this argument is the difference in accountability. With an ATM machine, the user receives a paper receipt as well as a monthly bank statement. If any discrepancies exist, the customer can dispute the statement with the bankin the US, it is the banks responsibility to prove the transaction record is correct. With a DRE machine, there is no receipt, no transaction statement, and no way for a voter to dispute the recorded results. The Maryland study5 asked voters if they felt confident that their vote was recorded according to their intent, and 10 percent of respondents did not feel confident that their

17

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting vote was accurately recorded. The study also asked voters if they trusted the mechanicallever or punch-card system used in previous elections. Compared to 90.7 percent of voters who trusted the DRE machines used in the election just conducted, only 70.5 percent of voters trusted the mechanical-lever or punch-card system they used in previous elections. DRE machines actual trustworthiness depends on many properties that are invisible to the voter. Unlike paper-based voting systems where voters can personally examine the physical record of their vote and deposit it in a secure ballot box, voter trust in DRE equipment depends on trusting the voting machine hardware and software in combination with the people and procedures designed to safeguard it.

Increasing trust
Several mechanisms have been proposed to provide voters with increased confidence that their vote is cast as intended and that the votes are tabulated correctly. The procedures protecting the voting process as well as the actual Process can enhance trust. A particular design decisions impact on security is often different from the impact perceived by typical voters. Measures that increase the perception of security often do not significantly increase actual security. To perform a recount electronically for votes that only exist as data on a computer, the trusted official can push a recount button, but because this is merely recounting the electronically recorded votes, it provides little actual benefit. Independently stored audit records that record each individual vote can provide somewhat more trust enhancement but only against computational counting mistakes or careless fraud that modifies only the vote totals and not the audit records. These recounts have little security benefit against accidental or malicious programming errors in the vote recording process because they can affect both the counts and audit records. We can use verification procedures to increase confidence in voting machines. In paperless voting systems, the voters depend entirely on the voting machine to record their votes correctly. Although officials are rapidly phasing out mechanical-lever machines, it is instructive to consider the procedures necessary to adequately verify a mechanicallever machine and compare those to the difficulties of verifying DRE equipment.

The value of any certification process depends on procedures to ensure that the machines used are identical to the machines that were certified. With mechanical-lever machines, we can use a tamper evident seal to ensure that the machines mechanics cannot be tampered with without detection. With DRE machines, however, this is a much harder problem. Unlike mechanical tampering, software changes are not obviously apparent. Because ballot definition files must be loaded into the machine, there must be a way of changing what is in the machines memory and any changes to the voting machine code will not be apparent. Although election procedures are designed to limit access to voting machines to trusted election officials, voting machines are often kept in insecure locations. Procedures in Alameda County for the recent California recall election left

18

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting voting machines unattended in insecure poll sites with ballots loaded for several days before the election. In addition to certification, officials test voting machines at poll sites. These tests, known as logic-and-accuracy tests typically involve poll workers casting a series of test votes on voting machines and then checking that the reported tally is consistent with the entered votes. Testers might make mistakes when entering numerous votes, so if the reported tally is off by one, this might not raise alarm. Because the number of test votes is limited by the testers patience, it is unlikely that testers would detect malicious voting software that records the first few hundred votes correctly and then incorrectly counts later votes. Another approach uses automated testing. This increases the number of votes possible and reduces the chances of testing mistakes. However, it makes the testing easily distinguished from normal use by the software and lets a clever programmer inject a bug that appears only in normal usesome DRE machines even specify a test mode, so that the tests run different code from production use. Testing procedures specify when officials should do the logic and accuracy tests, generally before and after the election, but not during it. Malicious software could be programmed to count votes correctly at all times except during the middle of election days.

Voter-verifiable ballots
One way to decrease the trust voters must place in voting machine software is to let voters physically verify that their intent is recorded correctly. Rebecca Mercuri has proposed a method for voter-verifiable ballots. After a voter has finished making selections using a DRE machine, the machine prints out a paper ballot that contains the voters selections for each choice. The printed ballot is kept behind a window to prevent voters from having any opportunity to tamper with it. Voters can examine the ballot and confirm that it accurately reflects their selections. If voters approve the ballot, they press a button to confirm their vote and observe the printed ballot drop into an opaque ballot box. If voters do not approve the ballot, they must consult a poll worker to void the ballot and vote again. This process provides voters with a high degree of confidence that their intended vote was accurately recorded. The paper ballots also provide a mechanism for validating results reported by the electronic voting machine. They can be manually counted or electronically counted to confirm the results if there is a dispute regarding the election results. Some elections should also be randomly selected for counting paper ballots. Voter-verifiable paper ballots eliminate the need to trust the voting machine software to correctly record the voters intent. Furthermore, they provide voters with substantially increased confidence that their intended vote will be counted. They are not, however, without cost. The need to support printing and collection of paper ballots increases the maintenance costs and election complexity for the poll workers. Voters must perform two steps to complete their vote: the first confirmation prints the ballot, and the second

19

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting confirmation casts the vote and deposits the ballot in the ballot box. With a fully integrated voting booth, it would be possible to include a curtain that opens only after the second confirmation is complete. Without this, voters might assume they are finished after the first confirmation and the next voter would have an opportunity to examine the previous voters ballot and decide whether to cast it or void it. Another issue that must be considered carefully is that there are now two potentially contradictory records of the election: the data stored in the DRE machine and the paper ballots. Any discrepancies between the results reported by the DRE machine and the paper audit count must be examined carefully and would likely lead to controversies. Except in cases where evidence of tampering with the paper ballots exists, the paper ballots should be considered the official record of the election because the voters had an opportunity to confirm that they recorded their intent correctly. IEEE (Voting Equipment Standards) - Project 1583 Project P1583 is charged with development of a standard of requirements and evaluation methods for election voting equipment. The standard will provide technical specifications for electronic, mechanical, and human factors that can be used by manufacturers of voting machines or by those purchasing such machines. Project Scope & Purpose P1583 was approved on June 14, 2001 with the following scope and purpose: Scope Develop a standard for the evaluation of election voting equipment. Purpose The purpose of this project is to develop an evaluation standard for election voting equipment. The standard will provide technical specifications for electronic, mechanical, and human factors that can be used by manufacturers of voting machines or by those purchasing such machines. The tests and criteria developed will assure equipment: Accessibility Accuracy Confidentiality Reliability Security Usability

20

MTECH/SIT/SEMINAR/04/01

www.seminarsonly.com

E-Voting

References 1. Voting: What Is, What could Be, Cal Tech MIT Voting Technology Project Report, July 2001; www.vote.cal-tech.edu/Reports/. 2. K. Zetter, Time to Recall E-Vote Machine 6th Oct. 2003, http://www.wired.com/news/ 3. Voting Accessibility Comparision (2001) National Organization on Disability ,Ws, DC 4. Electron Data Services, http://electiondataservices.com/ 5. Federal Election Commission http:// fec.gov/index.html 6. Election commissioner of India http://www.eci.gov.in/EVM 7. http://www.govtalk.gov.uk/ 8. Sarah Granger Trouble of E-Voting, Verifiability and Other Technical Requirements for Online Voting Systems, German National Institute of Metrology 9. E-VOTE AND PKI'S: A NEED, A BLISS OR A CURSE?, Sarah Granger www.seminarsonly.com , Universit_a degli Studi di Milano, Italy 9.Trouble of E-Voting

21

MTECH/SIT/SEMINAR/04/01

You might also like