Syllabus Help
Securing Digital Democracy
Computer technology has transformed how we participate in democracy, The way we cast our votes,
the way our votes are counted, and the way we choose who will lead are increasingly controlled by
invisible computer software, Most U.S. states have adopted electronic voting, and countries around
the world are starting to collect votes over the Internet. However, computerized voting raises startling
security risks that are only beginning to be understood outside the research lab, from voting machine
viruses that can silently change votes to the possibility that hackers in foreign countries could steal an
election.
This course will provide the technical background and public policy foundation that 21st century
citizens need to understand the electronic voting debate. You'll earn how electronic voting and
Internet voting technologies work, why they're being introduced, and what problems they aim to solve.
You'll also learn about the computer- and Internet-security risks these systems face and the serious
vulnerabilities that recent research has demonstrated. We'll cover widely used safeguards, checks,
and balances — and why they are often inadequate. Finally, we'll see how computer technology has
the potential to improve election security, if i's applied intelligently, Along the way, you'll hear stories
from the lab and from the trenches on a journey that leads from Mumbai jail cells to the halls of
Washington, D.C. You'll come away from this course understanding why you can be confident your
own vote will count — or why you should reasonably be skeptical.
1. Voting as a Security Problem
4.1 Welcome
1.2 The Security Mindset
1.3 Security Requirements for Voting
2. How We Got Here
2.1. The Living Voice
2.2 Early Paper Ballots
2.3 The Australian Secret Ballot
2.4 Mechanical Voting Machines
2.5 Punched Card Voting
3. Computers at the Polls
3.1. Optical Scan Voting
3.2 DRE Voting Machines
3.3 Inside the Black Box3.4 Paper as a Defense
4, Problems with DREs
4.1 Diebold
4.2 More Goes Wrong
43 The Test of Time
5. Election Security Procedures
5.1 Voter Registration
5.2 Authenticating Voters
5.3 Protecting Against Tampering
5.4 Field Testing
6. E-Voting Around the World
6.1 Case Studies
6.2 India’s EVMs
6.3 Tamperproof?
6.4 India’s Response
6.5 Deport on Arrival
7. Human Factors
7.1 Usability
7.2 Usable Paper Ballots
7.3 Accessibilty
7.4 Absentee Voting
8. Internet Voting?
8.1 ABad Idea
8,2 Client-side Threats
8.3 Server-side Threats
8.4 Washington, D.C.
9. Using Technology Wisely
9.1 Criteria
9.2 Post-Election Auditing
9.3. End-to-End Verifiable Voting
9.4 Verifying an E2E Result
10. E-Voting and Public Policy10.1 Election Policy in the U.S.
10.2 Testing and Certification
10,3 Recommendations / What You Can Do!
created Mon 25 Jun 2012 10:48 AM POT
Last Modtied Fi 2 Oct 20°4 6:29 PM POT