You are on page 1of 3
Syllabus Help Securing Digital Democracy Computer technology has transformed how we participate in democracy, The way we cast our votes, the way our votes are counted, and the way we choose who will lead are increasingly controlled by invisible computer software, Most U.S. states have adopted electronic voting, and countries around the world are starting to collect votes over the Internet. However, computerized voting raises startling security risks that are only beginning to be understood outside the research lab, from voting machine viruses that can silently change votes to the possibility that hackers in foreign countries could steal an election. This course will provide the technical background and public policy foundation that 21st century citizens need to understand the electronic voting debate. You'll earn how electronic voting and Internet voting technologies work, why they're being introduced, and what problems they aim to solve. You'll also learn about the computer- and Internet-security risks these systems face and the serious vulnerabilities that recent research has demonstrated. We'll cover widely used safeguards, checks, and balances — and why they are often inadequate. Finally, we'll see how computer technology has the potential to improve election security, if i's applied intelligently, Along the way, you'll hear stories from the lab and from the trenches on a journey that leads from Mumbai jail cells to the halls of Washington, D.C. You'll come away from this course understanding why you can be confident your own vote will count — or why you should reasonably be skeptical. 1. Voting as a Security Problem 4.1 Welcome 1.2 The Security Mindset 1.3 Security Requirements for Voting 2. How We Got Here 2.1. The Living Voice 2.2 Early Paper Ballots 2.3 The Australian Secret Ballot 2.4 Mechanical Voting Machines 2.5 Punched Card Voting 3. Computers at the Polls 3.1. Optical Scan Voting 3.2 DRE Voting Machines 3.3 Inside the Black Box 3.4 Paper as a Defense 4, Problems with DREs 4.1 Diebold 4.2 More Goes Wrong 43 The Test of Time 5. Election Security Procedures 5.1 Voter Registration 5.2 Authenticating Voters 5.3 Protecting Against Tampering 5.4 Field Testing 6. E-Voting Around the World 6.1 Case Studies 6.2 India’s EVMs 6.3 Tamperproof? 6.4 India’s Response 6.5 Deport on Arrival 7. Human Factors 7.1 Usability 7.2 Usable Paper Ballots 7.3 Accessibilty 7.4 Absentee Voting 8. Internet Voting? 8.1 ABad Idea 8,2 Client-side Threats 8.3 Server-side Threats 8.4 Washington, D.C. 9. Using Technology Wisely 9.1 Criteria 9.2 Post-Election Auditing 9.3. End-to-End Verifiable Voting 9.4 Verifying an E2E Result 10. E-Voting and Public Policy 10.1 Election Policy in the U.S. 10.2 Testing and Certification 10,3 Recommendations / What You Can Do! created Mon 25 Jun 2012 10:48 AM POT Last Modtied Fi 2 Oct 20°4 6:29 PM POT

You might also like