Abstract
Internet voting is unachievable for the foreseeable future and therefore not inevitable.
- Adida, B. Panelist remarks at panel on Internet voting. Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (San Francisco, Aug. 9, 2011); http://www.usenix.org/events/evtwote11/stream/benaloh_panel/index.htmlGoogle Scholar
- Bowden, M. The enemy within. The Atlantic (June 2010); http://www.theatlantic.com/magazine/archive/2010/06/the-enemy-within/8098/Google Scholar
- CBC News. Computer vandal delays leadership vote (Jan. 25, 2003); http://www.cbc.ca/news/story/2003/01/25/ndp_delay030125.htmlGoogle Scholar
- Claburn, T. Microsoft Finds U.S. Leads In Botnets. InformationWeek (Oct. 14, 2010); http://www.informationweek.com/security/vulnerabilities/microsoft-finds-us-leads-in-botnets/227800051Google Scholar
- DeGregorio, P. UOCAVA Voting Scoping Strategy. Washington Secretary of State Public Record, Jan. 18, 2009; http://www.votersunite.org/info/WA-PRR-scopingstrategy.pdfGoogle Scholar
- District of Columbia and Halderman, J.A. Thank you to voters (hacked ballot acknowledgment with Michigan fight song); https://jhalderm.com/pub/dc/thanks/Google Scholar
- Dunn, J.E. Trojan attacks credit cards of 15 U.S. banks. Techworld (July 14, 2010).Google Scholar
- Estehghari, S. and Desmedt, Y. Exploiting the client vulnerabilities in Internet e-voting systems: Hacking Helios 2.0 as an example. 2010 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (Washington D.C., Aug. 9, 2010); http://static.usenix.org/events/evtwote10/tech/full_papers/Estehghari.pdf Google ScholarDigital Library
- FBI. FBI, Slovenian and Spanish Police Arrest Mariposo Botnet Creator, Operators. Press Release, July 28, 2010; http://www.fbi.gov/news/pressrel/press-releases/fbi-slovenian-and-spanish-police-arrest-maripora-botnet-creator-operators/Google Scholar
- Fisher, D. New Service helps attackers get Zeus botnet off the ground. Threatpost (Jan. 10, 2011); http://threatpost.com/en_us/blogs/new-service-helps-attackers-get-zeus-botnet-ground-011011Google Scholar
- Ford, G.R. and Carter, J. To Assure Pride and Confidence in the Electoral Process. National Commission on Federal Election Reform, Aug. 2001; http://fl1.findlaw.com/news.findlaw.com/hdocs/docs/election2000/electionreformrpt0801.pdfGoogle Scholar
- The H Security. Antivirus Protection Worse than a Year Ago. Heise Media, U.K., Dec. 20, 2007; http://www.h-online.com/security/news/item/Antivirus-protection-worse-than-a-year-ago-735697.htmlGoogle Scholar
- Hayden, M. Hackers force Internet users to learn self defense. PBS NewsHour (Aug. 11, 2010); http://www.pbs.org/newshour/bb/science/Jul.-dec10/cyber_08-11.htmlGoogle Scholar
- Head, W. Hackers use Wikipedia to spread malware. IT News for Australian Business (Nov. 6, 2006); http://www.itnews.com.au/News/67796,hackers-use-wikipedia-to-spread-malware.aspxGoogle Scholar
- Helios. http://heliosvoting.org/Google Scholar
- InfoSecurity. McCartney site serves up Zeus malware. InfoSecurity (Apr. 8, 2009); http://www.infosecurity-us.com/view/1178/mccartney-site-serves-up-zeus-malware/Google Scholar
- Jefferson D. Email voting: A national security threat in government elections. VerifiedVoting blog (June 2011); http:/blog.verifiedvoting.org/2011/06/20/1375Google Scholar
- Jefferson, D., Rubin, A.B., Simons, B., and Wagner, D. A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE), Jan. 20, 2004; http://servesecurityreport.org/Google Scholar
- Kanan, K., Rees, J., and Spafford, E. Unsecured Economies: Protecting Vital Information. Technical Report. McAfee, Inc., Santa Clara, CA, Feb. 2009; resources.mcafee.com/content/NAunsecuredEconomiesReportGoogle Scholar
- Keizer, G. Zeus botnet gang targets Charles Schwab accounts. Computerworld (Oct. 16, 2010); http://www.computerworld.com/s/article/9191479/Zeus_botnet_gang_targets_Charles_Schwab_accountsGoogle Scholar
- Kirk, J. Comodo hacker claims credit for DigiNotar attack. Computerworld (Sept. 2011); http://www.computerworld.com/s/article/9219739/Comodo_hacker_claims_credit_for_DigiNotar_attackGoogle Scholar
- KITV. Voting drops 83 percent in all-digital election. Honolulu, May 2009; http://www.kitv.com/politics/19573770/detail.htmlGoogle Scholar
- Kurtz, G. Operation 'Aurora' hit Google, others. McAfee Security Insights blog, Jan. 10, 2010; http://blogs.mcafee.com/corporate/cto/operation-aurora-hit-google-othersGoogle Scholar
- Leyden, J. UK cybercops cuff 19 Zeus banking trojan suspects. The Register (Sept. 29, 2010); www.theregister.co.uk/2010/09/29/zeus_cybercrime_arrests/Google Scholar
- M86 Security. M86 Security Labs Discovers Customers of Global Financial Institution Hit by Cybercrime. Press Release, London, U.K., Aug. 10, 2010; http://www.marketwire.com/press-release/m86-security-labs-discovers-customers-global-financial-institution-hit-cybercrime-1302266.htmGoogle Scholar
- Mahoney, M.R. Comment on Pilot Project Testing and Certification. EAC, Washington, D.C., Apr. 2010; http://www.eac.gov/assets/1/AssetManager/Martha%20Mahoney%20-%20Comment%20on%20Pilot%20Project%20Testing%20and%20Certification.pdfGoogle Scholar
- Marsan, C.D. Feds to shore up net security. Network World (Jan. 19, 2009); http://www.pcworld.com/businesscenter/article/157909/feds_to_shore_up_net_security.htmlGoogle Scholar
- Messmer, E. America's 10 most wanted botnets. Network World (July 22, 2009); http://www.networkworld.com/news/2009/072209-botnets.htmlGoogle Scholar
- Military Postal Service Agency. 2010 Analysis of the Military Postal System Compliance with the MOVE Act. Washington, D.C., Aug. 2, 2011; www.fvap.gov/resources/media/2010_MPSA_after_action_report.pdfGoogle Scholar
- Mills, E. Spam offers to let people use their PC to attack Obama site. CNET (Aug. 18, 2009); http://news.cnet.com/8301-1009_3-10312641-83.html?tag=nl.e757Google Scholar
- Mueller III, R.S. Prepared Remarks. RSA Security Conference, San Francisco, Mar. 4, 2010; http://www.fbi.gov/news/speeches/tackling-the-cyber-threatGoogle Scholar
- Nakashima, E., Miller, G., and Tate, J. U.S., Israel developed computer virus to slow Iranian nuclear efforts, officials say. Washington Post (June 19, 2012); http://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officialssay/2012/06/19/gJQA6xBPoV_story.html?wpisrc=al_nationalGoogle Scholar
- New South Wales Electoral Commission. Report on the Conduct of the NSW State Election 2011; http://www.parliament.nsw.gov.au/Prod/parlment/committee.nsf/0/67f2055c4d085409ca25795a0017cf2c/$FILE/NSW%20EC%27s%20Report%20on%20the%202011%20State%20Election.pdfGoogle Scholar
- Oberheide, J., Cooke, E., and Jahanian, F. CloudAV: N-version antivirus in the network cloud. In Proceedings of the 17 th USENIX Security Symposium (San Jose, CA, July 28-Aug. 1, 2008), 91--106. Google ScholarDigital Library
- Palmer, C. Unqualified Names in SSL Observatory. Electronic Frontier Foundation Deeplinks blog, Apr. 5, 2011; https://www.eff.org/deeplinks/2011/04/unqualified-names-ssl-observatoryGoogle Scholar
- Peters, S. 14th Annual CSI Computer Crime and Security Survey, Executive Summary. Computer Security Institute, New York, Dec. 2009; http://www.docstoc.com/docs/40697141Google Scholar
- Remotegrity. 2011; https://demo.remotegrity.org/http://www.scantegrity.org/wiki/index.php/Remotegrity_Frequently_Asked_QuestionsGoogle Scholar
- Sanger, D.E. Obama order sped up wave of cyberattacks against Iran. New York Times (June 1, 2012); http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=allGoogle Scholar
- Trusteer Inc. Measuring the In-the-Wild Effectiveness of Antivirus Against Zeus. White Paper, Sept. 14, 2009; http://www.techrepublic.com/whitepapers/measuring-the-in-the-wild-effectiveness-of-antivirus-against-zeus/1686945/postGoogle Scholar
- U.K. Electoral Commission. Key Issues and Conclusions, May 2007 Electoral Pilot Schemes. London, Aug. 2007; http://www.electoralcommission.org.uk/__data/assets/electoral_commission_pdf_file/0009/16200/ICMElectoralPilotsresearchreport_27285-20161__E__N__S__W__.pdfGoogle Scholar
- Vascellaro, J.E. and Solomon, J. Yahoo! was also targeted in hacker attack. Wall Street Journal (Jan. 14, 2010); http://online.wsj.com/article/SB10001424052748703657604575004421409691754.htmlGoogle Scholar
- Verified Voting Foundation. Internet Voting 2012; http://www.verifiedvotingfoundation.org/article.php?list=type&type=27Google Scholar
- Weiss, T.R. Pentagon drops online votes for armed forces. Computer Weekly (Feb. 6, 2004); http://www.computerweekly.com/news/2240054464/Pentagon-drops-online-votes-for-armed-forcesGoogle Scholar
- Wolchok, S., Wustrow, E. Isabel, D., and Halderman, J.A. Attacking the Washington, D.C. Internet voting system. In Proceedings of the 16 th Conference on Financial Cryptography and Data Security (Bonaire, Feb. 28. 2012); http://fc12.ifca.ai/pre-proceedings/paper_79.pdfGoogle ScholarCross Ref
- Zetter, K. Vulnerabilities allow attacker to impersonate any website. Wired.com (July 29, 2009); http://www.wired.com/threatlevel/2009/07/kaminsky/Google Scholar
Index Terms
- Internet voting in the U.S.
Recommendations
Internet voting: a smarter way to vote in Pakistan
ICEGOV '13: Proceedings of the 7th International Conference on Theory and Practice of Electronic GovernanceOver the years, the average voter turnout in Pakistan General Elections has been around 45%, ranking Pakistan among countries with the lowest turnout in the world. Some of the reasons contributing to this low turnout were found to be lack of trust in ...
Practical Internet voting system
Recently, Internet voting systems have gained popularity and have been used for government elections and referendums in the United Kingdom, Estonia and Switzerland as well as municipal elections in Canada and party primary elections in the United States ...
An Anonymous Electronic Voting Protocol for Voting Over The Internet
WECWIS '01: Proceedings of the Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS '01)Abstract: In this work we propose a secure electronic voting protocol that is suitable for large scale voting over the Internet. The protocol allows a voter to cast his or her ballot anonymously, by exchanging untraceable yet authentic messages. The ...
Comments