skip to main content
research-article
Free Access

Internet voting in the U.S.

Published:01 October 2012Publication History
Skip Abstract Section

Abstract

Internet voting is unachievable for the foreseeable future and therefore not inevitable.

References

  1. Adida, B. Panelist remarks at panel on Internet voting. Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (San Francisco, Aug. 9, 2011); http://www.usenix.org/events/evtwote11/stream/benaloh_panel/index.htmlGoogle ScholarGoogle Scholar
  2. Bowden, M. The enemy within. The Atlantic (June 2010); http://www.theatlantic.com/magazine/archive/2010/06/the-enemy-within/8098/Google ScholarGoogle Scholar
  3. CBC News. Computer vandal delays leadership vote (Jan. 25, 2003); http://www.cbc.ca/news/story/2003/01/25/ndp_delay030125.htmlGoogle ScholarGoogle Scholar
  4. Claburn, T. Microsoft Finds U.S. Leads In Botnets. InformationWeek (Oct. 14, 2010); http://www.informationweek.com/security/vulnerabilities/microsoft-finds-us-leads-in-botnets/227800051Google ScholarGoogle Scholar
  5. DeGregorio, P. UOCAVA Voting Scoping Strategy. Washington Secretary of State Public Record, Jan. 18, 2009; http://www.votersunite.org/info/WA-PRR-scopingstrategy.pdfGoogle ScholarGoogle Scholar
  6. District of Columbia and Halderman, J.A. Thank you to voters (hacked ballot acknowledgment with Michigan fight song); https://jhalderm.com/pub/dc/thanks/Google ScholarGoogle Scholar
  7. Dunn, J.E. Trojan attacks credit cards of 15 U.S. banks. Techworld (July 14, 2010).Google ScholarGoogle Scholar
  8. Estehghari, S. and Desmedt, Y. Exploiting the client vulnerabilities in Internet e-voting systems: Hacking Helios 2.0 as an example. 2010 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (Washington D.C., Aug. 9, 2010); http://static.usenix.org/events/evtwote10/tech/full_papers/Estehghari.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. FBI. FBI, Slovenian and Spanish Police Arrest Mariposo Botnet Creator, Operators. Press Release, July 28, 2010; http://www.fbi.gov/news/pressrel/press-releases/fbi-slovenian-and-spanish-police-arrest-maripora-botnet-creator-operators/Google ScholarGoogle Scholar
  10. Fisher, D. New Service helps attackers get Zeus botnet off the ground. Threatpost (Jan. 10, 2011); http://threatpost.com/en_us/blogs/new-service-helps-attackers-get-zeus-botnet-ground-011011Google ScholarGoogle Scholar
  11. Ford, G.R. and Carter, J. To Assure Pride and Confidence in the Electoral Process. National Commission on Federal Election Reform, Aug. 2001; http://fl1.findlaw.com/news.findlaw.com/hdocs/docs/election2000/electionreformrpt0801.pdfGoogle ScholarGoogle Scholar
  12. The H Security. Antivirus Protection Worse than a Year Ago. Heise Media, U.K., Dec. 20, 2007; http://www.h-online.com/security/news/item/Antivirus-protection-worse-than-a-year-ago-735697.htmlGoogle ScholarGoogle Scholar
  13. Hayden, M. Hackers force Internet users to learn self defense. PBS NewsHour (Aug. 11, 2010); http://www.pbs.org/newshour/bb/science/Jul.-dec10/cyber_08-11.htmlGoogle ScholarGoogle Scholar
  14. Head, W. Hackers use Wikipedia to spread malware. IT News for Australian Business (Nov. 6, 2006); http://www.itnews.com.au/News/67796,hackers-use-wikipedia-to-spread-malware.aspxGoogle ScholarGoogle Scholar
  15. Helios. http://heliosvoting.org/Google ScholarGoogle Scholar
  16. InfoSecurity. McCartney site serves up Zeus malware. InfoSecurity (Apr. 8, 2009); http://www.infosecurity-us.com/view/1178/mccartney-site-serves-up-zeus-malware/Google ScholarGoogle Scholar
  17. Jefferson D. Email voting: A national security threat in government elections. VerifiedVoting blog (June 2011); http:/blog.verifiedvoting.org/2011/06/20/1375Google ScholarGoogle Scholar
  18. Jefferson, D., Rubin, A.B., Simons, B., and Wagner, D. A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE), Jan. 20, 2004; http://servesecurityreport.org/Google ScholarGoogle Scholar
  19. Kanan, K., Rees, J., and Spafford, E. Unsecured Economies: Protecting Vital Information. Technical Report. McAfee, Inc., Santa Clara, CA, Feb. 2009; resources.mcafee.com/content/NAunsecuredEconomiesReportGoogle ScholarGoogle Scholar
  20. Keizer, G. Zeus botnet gang targets Charles Schwab accounts. Computerworld (Oct. 16, 2010); http://www.computerworld.com/s/article/9191479/Zeus_botnet_gang_targets_Charles_Schwab_accountsGoogle ScholarGoogle Scholar
  21. Kirk, J. Comodo hacker claims credit for DigiNotar attack. Computerworld (Sept. 2011); http://www.computerworld.com/s/article/9219739/Comodo_hacker_claims_credit_for_DigiNotar_attackGoogle ScholarGoogle Scholar
  22. KITV. Voting drops 83 percent in all-digital election. Honolulu, May 2009; http://www.kitv.com/politics/19573770/detail.htmlGoogle ScholarGoogle Scholar
  23. Kurtz, G. Operation 'Aurora' hit Google, others. McAfee Security Insights blog, Jan. 10, 2010; http://blogs.mcafee.com/corporate/cto/operation-aurora-hit-google-othersGoogle ScholarGoogle Scholar
  24. Leyden, J. UK cybercops cuff 19 Zeus banking trojan suspects. The Register (Sept. 29, 2010); www.theregister.co.uk/2010/09/29/zeus_cybercrime_arrests/Google ScholarGoogle Scholar
  25. M86 Security. M86 Security Labs Discovers Customers of Global Financial Institution Hit by Cybercrime. Press Release, London, U.K., Aug. 10, 2010; http://www.marketwire.com/press-release/m86-security-labs-discovers-customers-global-financial-institution-hit-cybercrime-1302266.htmGoogle ScholarGoogle Scholar
  26. Mahoney, M.R. Comment on Pilot Project Testing and Certification. EAC, Washington, D.C., Apr. 2010; http://www.eac.gov/assets/1/AssetManager/Martha%20Mahoney%20-%20Comment%20on%20Pilot%20Project%20Testing%20and%20Certification.pdfGoogle ScholarGoogle Scholar
  27. Marsan, C.D. Feds to shore up net security. Network World (Jan. 19, 2009); http://www.pcworld.com/businesscenter/article/157909/feds_to_shore_up_net_security.htmlGoogle ScholarGoogle Scholar
  28. Messmer, E. America's 10 most wanted botnets. Network World (July 22, 2009); http://www.networkworld.com/news/2009/072209-botnets.htmlGoogle ScholarGoogle Scholar
  29. Military Postal Service Agency. 2010 Analysis of the Military Postal System Compliance with the MOVE Act. Washington, D.C., Aug. 2, 2011; www.fvap.gov/resources/media/2010_MPSA_after_action_report.pdfGoogle ScholarGoogle Scholar
  30. Mills, E. Spam offers to let people use their PC to attack Obama site. CNET (Aug. 18, 2009); http://news.cnet.com/8301-1009_3-10312641-83.html?tag=nl.e757Google ScholarGoogle Scholar
  31. Mueller III, R.S. Prepared Remarks. RSA Security Conference, San Francisco, Mar. 4, 2010; http://www.fbi.gov/news/speeches/tackling-the-cyber-threatGoogle ScholarGoogle Scholar
  32. Nakashima, E., Miller, G., and Tate, J. U.S., Israel developed computer virus to slow Iranian nuclear efforts, officials say. Washington Post (June 19, 2012); http://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officialssay/2012/06/19/gJQA6xBPoV_story.html?wpisrc=al_nationalGoogle ScholarGoogle Scholar
  33. New South Wales Electoral Commission. Report on the Conduct of the NSW State Election 2011; http://www.parliament.nsw.gov.au/Prod/parlment/committee.nsf/0/67f2055c4d085409ca25795a0017cf2c/$FILE/NSW%20EC%27s%20Report%20on%20the%202011%20State%20Election.pdfGoogle ScholarGoogle Scholar
  34. Oberheide, J., Cooke, E., and Jahanian, F. CloudAV: N-version antivirus in the network cloud. In Proceedings of the 17 th USENIX Security Symposium (San Jose, CA, July 28-Aug. 1, 2008), 91--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Palmer, C. Unqualified Names in SSL Observatory. Electronic Frontier Foundation Deeplinks blog, Apr. 5, 2011; https://www.eff.org/deeplinks/2011/04/unqualified-names-ssl-observatoryGoogle ScholarGoogle Scholar
  36. Peters, S. 14th Annual CSI Computer Crime and Security Survey, Executive Summary. Computer Security Institute, New York, Dec. 2009; http://www.docstoc.com/docs/40697141Google ScholarGoogle Scholar
  37. Remotegrity. 2011; https://demo.remotegrity.org/http://www.scantegrity.org/wiki/index.php/Remotegrity_Frequently_Asked_QuestionsGoogle ScholarGoogle Scholar
  38. Sanger, D.E. Obama order sped up wave of cyberattacks against Iran. New York Times (June 1, 2012); http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=allGoogle ScholarGoogle Scholar
  39. Trusteer Inc. Measuring the In-the-Wild Effectiveness of Antivirus Against Zeus. White Paper, Sept. 14, 2009; http://www.techrepublic.com/whitepapers/measuring-the-in-the-wild-effectiveness-of-antivirus-against-zeus/1686945/postGoogle ScholarGoogle Scholar
  40. U.K. Electoral Commission. Key Issues and Conclusions, May 2007 Electoral Pilot Schemes. London, Aug. 2007; http://www.electoralcommission.org.uk/__data/assets/electoral_commission_pdf_file/0009/16200/ICMElectoralPilotsresearchreport_27285-20161__E__N__S__W__.pdfGoogle ScholarGoogle Scholar
  41. Vascellaro, J.E. and Solomon, J. Yahoo! was also targeted in hacker attack. Wall Street Journal (Jan. 14, 2010); http://online.wsj.com/article/SB10001424052748703657604575004421409691754.htmlGoogle ScholarGoogle Scholar
  42. Verified Voting Foundation. Internet Voting 2012; http://www.verifiedvotingfoundation.org/article.php?list=type&type=27Google ScholarGoogle Scholar
  43. Weiss, T.R. Pentagon drops online votes for armed forces. Computer Weekly (Feb. 6, 2004); http://www.computerweekly.com/news/2240054464/Pentagon-drops-online-votes-for-armed-forcesGoogle ScholarGoogle Scholar
  44. Wolchok, S., Wustrow, E. Isabel, D., and Halderman, J.A. Attacking the Washington, D.C. Internet voting system. In Proceedings of the 16 th Conference on Financial Cryptography and Data Security (Bonaire, Feb. 28. 2012); http://fc12.ifca.ai/pre-proceedings/paper_79.pdfGoogle ScholarGoogle ScholarCross RefCross Ref
  45. Zetter, K. Vulnerabilities allow attacker to impersonate any website. Wired.com (July 29, 2009); http://www.wired.com/threatlevel/2009/07/kaminsky/Google ScholarGoogle Scholar

Index Terms

  1. Internet voting in the U.S.

                  Recommendations

                  Reviews

                  Ned Chapin

                  The pros and cons of using the capabilities of the Internet to vote in elections are broadly addressed in this lengthy article. Topics include the many varieties of Internet voting means, situations, and environments. As the title suggests, the focus is mostly on US voters, but some attention is given to Internet voting experiences and projects in other nations. The authors cite only 40 of the 45 references in their bibliography. The article has a total of two images (one of a ballot and one of a web page) and no tables. The article consists of seven major sections. The first section has no heading, but serves as both introduction and overview; it has four subsections. The first subsection has no heading; the other three subsections are "D.C. Pilot Test," "The Break-In," and "Implications of the Attack." The six other sections discuss the pros and cons, and provide more detail about the underlying topics introduced in the first section. Section 2, "The Case for Internet Voting," has four subsections. Again, the first has no heading, followed by three pro positions: "Saves Money," "Increases Turnout," and "Web-Based Voting Is More Secure." The third section addresses military voting in four subsections, focusing on the Uniformed and Overseas Citizens Absentee Voting Act (UOCAVA), Secure Electronic Registration and Voting Experiment (SERVE), Operation BRAVO (Bring Remote Access to Voters Overseas), and the Military and Overseas Voter Empowerment Act (MOVE). Section 4 considers risks in seven areas: the server; insider attacks; the client, with coverage of Conflicker and the Zeus virus; election server impersonations; denial-of-service (DoS) attacks; ballot secrecy; and bribery. A brief fifth section-a single paragraph-discusses issues in other countries, although there are related comments scattered throughout the rest of the article. Section 6, "Far Future," notes that the time for Internet voting "has not yet come." The last section presents the authors' conclusions and a short summary of the article's basic contributions. Readers attracted to the general topic of online voting will find interesting details throughout this lengthy article. Section 4 will probably be the most interesting and rewarding for most readers. Online Computing Reviews Service

                  Access critical reviews of Computing literature here

                  Become a reviewer for Computing Reviews.

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in

                  Full Access

                  • Published in

                    cover image Communications of the ACM
                    Communications of the ACM  Volume 55, Issue 10
                    October 2012
                    101 pages
                    ISSN:0001-0782
                    EISSN:1557-7317
                    DOI:10.1145/2347736
                    Issue’s Table of Contents

                    Copyright © 2012 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 1 October 2012

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • research-article
                    • Popular
                    • Refereed

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader

                  HTML Format

                  View this article in HTML Format .

                  View HTML Format