skip to main content
10.1145/3209415.3209495acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicegovConference Proceedingsconference-collections
research-article

Did Technology Fail Us?: Security Concerns in Safeguarding Democracy

Published: 04 April 2018 Publication History

Abstract

Electronic voting machines replaced paper ballots too quickly. To date, many such machines have been proven unreliable and unsecure. Due to speculations about foreign tampering attempts with the U.S. election, these machines have received further attention. The addition of paper records and a separate audit mechanism are two ways machine vulnerabilities could be overcome prior to the 2018 election. In this paper, we investigate the state of voting technology and the electoral process in the U.S. Additionally, we will analyze the foreign interference attempts in the 2016 U.S. general elections.

References

[1]
Mohammed Awad and Ernst L. Leiss. 2016. The Evolution of Voting: Analysis of Conventional and Electronic Voting Systems. International Journal of Applied Engineering Research. Volume 11, Number 12.
[2]
U.S. Election Assistance Commission. 2017. Help America Vote Act. Retrieved August 13, 2017 from https://www.eac.gov/about/help-america-vote-act/
[3]
Aviel Rubin. (2006). Brave New Ballot: The Battle to Safeguard Democracy in the Age of Electronic Voting. New York: Morgan Road Books.
[4]
Tadayoshi Kohno, Adam Stubblefield, Aviel Rubin, and Dan Wallach. 2004. Analysis of an Electronic Voting System. In proceedings of IEEE Symposium on Security and Privacy 2004. Oakland, CA.
[5]
Voters Unite. 2005. Facts About Electronic Voting. Retrieved July 30, 2016 from http://www.votersunite.org/info/electronicvotinginbrief.pdf
[6]
Verified Voting. 2017. Mandatory Manual Audits of Voter-verified Paper Records. VerifiedVoting.org. Retrieved February 25, 2015 from http://www.verifiedvoting.org
[7]
Nirwan Ansari, Pitipatana Sakarindr, Ehsan Haghani, Chao Zhang, Aridaman Jain, and Yun Shi. 2008. Evaluating Electronic Voting Systems Equipped with Voter-verified Paper Records. IEE Security & Privacy, 1540 (7993), 30--39.
[8]
Lorrie Cranor. 2001. Voting After Florida: No Easy Answers. Ubiquity. Retrieved November 2, 2010 from http://www.acm.org/ubiquity/views/l_cranor_1.html views/l_cranor_1.html
[9]
TIME. 2016. Here's Where You're Allowed to Take a Selfie While Voting. (October 2016). Retrieved June 16, 2017 from http://time.com/4546190/2016-presidential-election-ballot-selfies/
[10]
Kim Zetter. 2015. Virginia Finally Drops America's 'Worst Voting Machines'. (August 2015). Retrieved March 21, 2017 from https://www.wired.com/2015/08/virginia-finally-drops-americas-worst-voting-machines/
[11]
Warren Stewart. The End of the Line for AVS in Pennsylvania?. 2007. Verified Voting Foundation.(November 2007). Retrieved March 21, 2017 from http://www.votetrustusa.org/index.php?option=com_content&task=view&id=2663&Itemid=51
[12]
Jeremy Epstein. 2015. Decertifying The Worst Voting Machine In The US. (April 2015). Retrieved March 22, 2017 from https://freedom-to-tinker.com/2015/04/15/decertifying-the-worst-voting-machine-in-the-us/
[13]
Security Assessment Of Winvote Voting Equipment For Department Of Elections. 2015. Commonwealth Security And Risk Management. Virginia Information Technologies Agency, Chester, VA. Retrieved March 22, 2017 from https://www.wired.com/wp-content/uploads/2015/08/WINVote-final.pdf
[14]
Lawrence Norden and Christopher Famighetti. 2015. America's Voting Machines at Risk. Brennan Center for Justice. New York University School of Law, New York, NY.
[15]
Kim Zetter. 2015. The Dismal State Of America's Decade-Old Voting Machines. (September 2015). Retrieved March 22, 2017 from https://www.wired.com/2015/09/dismal-state-americas-decade-old-voting-machines/
[16]
U.S. Election Assistance Commission. 2017. Voluntary Voting System Guidelines. Retrieved March 23, 2017 from https://www.eac.gov/voting-equipment/voluntary-voting-system-guidelines/
[17]
April Glaser. 2016. Here's What We Know About Russia And The DNC Hack. (July 2016). Retrieved November 2, 2016 from https://www.wired.com/2016/07/heres-know-russia-dnc-hack/
[18]
Dmitri Alperovitch. 2016. Bears in the Midst: Intrusion into the Democratic National Committee. (June 2016). Retrieved November 2, 2016 from https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/
[19]
Department Of Homeland Security. 2016. Joint Statement from the Department Of Homeland Security and Office of the Director of National Intelligence on Election Security. (October 2016). Retrieved January 7, 2017 from https://www.dhs.gov/news/2016/10/07/joint-statement-department-homeland-security-and-office-director-national
[20]
Department Of Homeland Security. 2016. Joint DHS, ODNI, FBI Statement on Russian Malicious Cyber Activity. (December 2016). Retrieved January 7, 2017 from https://www.dhs.gov/news/2016/10/07/joint-statement-department-homeland-security-and-office-director-national
[21]
Lorenzo Franceschi-Bicchierai. 2016. How Hackers Broke Into John Podesta and Colin Powell's Gmail Accounts. (October 2016). Retrieved January 9, 2017 from https://motherboard.vice.com/en_us/article/mg7xjb/how-hackers-broke-into-john-podesta-and-colin-powells-gmail-accounts
[22]
SecureWorks Counter Threat Unit. 2016. Threat Group-4127 Targets Hillary Clinton Presidential Campaign. (June 2016). Retrieved January 9, 2017 from https://www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaign
[23]
Thomas Rid. 2016. How Russia Pulled Off The Biggest Election Hack In U.S. History. (October 2016). Retrieved February 2, 2017 from http://www.esquire.com/news-politics/a49791/russian-dnc-emails-hacked/
[24]
Jon Swaine. 2016. Security Experts Join Jill Stein's 'Election Changing' Recount Campaign. (November 2016). Retrieved March 23, 2017 from https://www.theguardian.com/us-news/2016/nov/29/security-experts-join-jill-steins-election-changing-recount-campaign
[25]
Poorvi L. Vora. 2016. Affidavit of Poorvi L. Vora. (November 2016). Retrieved March 24, 2017 from https://interactive.guim.co.uk/embed/documentcloud/index.html?docid=3227385-Wisconsin-Vora-Affidavit-With-Exhibits-11-28-16
[26]
Ronald L. Rivest. 2016. Affidavit of Ronald L. Rivest. (November 2016). Retrieved March 24, 2017 from https://interactive.guim.co.uk/embed/documentcloud/index.html?docid=3227391-Wisconsin-Rivest-Affidavit-11-28-16
[27]
Dan S. Wallach. 2016. Affidavit of Dan S. Wallach. (November 2016). Retrieved March 24, 2017 from https://interactive.guim.co.uk/embed/documentcloud/index.html?docid=3227390-Wisconsin-Wallach-Affidavit-11-28-16
[28]
Philip B. Stark. 2016. Affidavit of Philip B. Stark. (November 2016). Retrieved March 24, 2017 from https://interactive.guim.co.uk/embed/documentcloud/index.html?docid=3227392-Wisconsin-Stark-Affidavit-11-28-16
[29]
Hari Hursti. 2016. Affidavit of Hari Hursti. (November 2016). Retrieved March 24, 2017 from https://interactive.guim.co.uk/embed/documentcloud/index.html?docid=3227389-Wisconsin-Hursti-Affidavit-11-28-16
[30]
HUFFPOST. 2016. What Jill Stein's Recount Effort Actually Accomplished. (December 2016). Retrieved June 17, 2017 from http://www.huffingtonpost.com/entry/jill-stein-election-recount_us_58507032e4b092f08685ff68
[31]
Detroit Free Press. 2016. Most states would recount Michigan's mismatched ballots despite flaws. (December 2016). Retrieved June 17, 2017 from http://www.freep.com/story/news/local/michigan/2016/12/07/michigan-recount-ballot-election/95058326/
[32]
HUFFPOST. 2016. Jill Stein's Recount Bid Is Over. (December 2016). Retrieved June 17, 2017 from http://www.huffingtonpost.com/entry/jill-stein-recount-over_us_584f3b71e4b0bd9c3dfe612e
[33]
National Security Agency. 2017. Russia/Cybersecurity. (May 2017). Retrieved July 19, 2017 from https://www.documentcloud.org/documents/3766950-NSA-Report-on-Russia-Spearphishing.html#document/p1
[34]
Reuters. 2016. US contractor pleads not guilty to leaking classified information. (June 2016). Retrieved July 19, 2017 from https://www.reuters.com/article/us-usa-trump-russia-leaks-idUSKBN18Z32B
[35]
Matthew Cole, Richard Esposito, Sam Biddle, and Ryan Grim. 2017. Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election. (June 2017). Retrieved July 19, 2017 from https://theintercept.com/2017/06/05/top-secret-nsa-report-details-russian-hacking-effort-days-before-2016-election/

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICEGOV '18: Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance
April 2018
739 pages
ISBN:9781450354219
DOI:10.1145/3209415
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 April 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. E-voting
  2. election
  3. hacking
  4. phishing
  5. spear phishing
  6. spoofing

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICEGOV '18

Acceptance Rates

ICEGOV '18 Paper Acceptance Rate 104 of 184 submissions, 57%;
Overall Acceptance Rate 350 of 865 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 189
    Total Downloads
  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media