Sale!
Placeholder

e-voting Technical Issues and Voting Rights of the UK Government

10,000 3,000

Topic Description

Abstract
This report discusses the technical and social considerations of the proposed e-voting system of the UK Government. In particular, the effects that an evoting system such as the one proposed by the UK Government will affect the voting rights of constituents. Focus for this paper will be placed on two key
issues, who, where and how a system of this type could be technically undermined, and how this would affect the voters and the democratic system of this country.
The report concludes that th e e-voting system proposed by the Government cannot provide secure voting processes. The system model proposed is technically unfeasible and because of the technical issues, the system has the potential to infringe upon the voting rights UK voters.

TABLE OF CONTENT

1. AIM OF THE PROJECT 4
1.1 OBJECTIVES OF THE PROJECT 4
1.2MINIMUM REQUIREMENTS 4
1.3 FURTHER ENHANCEMENTS 4
2. INTRODUCTION 5
2.1 PROBLEM 5
3. BACKGROUND 6
3.1 DEFINITION 6
3.2 HISTORY OF E-VOTING PROJECTS (IN THE UK AND AROUND THE WORLD) 6
3.3 PRINCIPLES OF E-VOTING SYSTEMS (THE SIX COMMANDMENTS) 7
3.4 CURRENT AND PLANNED FUTURE USE OF E-VOTING IN THE UK 7
3.5 THE PROPOSED UK E-VOTING SYSTEM 7
3.6 TECHNICAL READING 8
3.6.1 THE INTERNET AS ASECURE MEDIUM 8
3.6.2 STANDARD HOME PCS AS VOTING PLATFORMS 9
3.7 POSSIBLE ATTACKS 10
4. METHODOLOGY 12
4.1 PROJECT METHODOLOGY 12
4.1.1 PERSPECTIVE 12
4.1.2 CHOSEN METHODOLOGY: GROUNDED THEORY 12
4.2 AREAS OF INVESTIGATION 12
4.3 INVESTIGATION PROCESS 12
4.4 RISK ASSESSMENT 13
4.5 PROJECT MANAGEMENT 13
5. FINDINGS AND CONCLUSIONS 14
5.1 REVISIONS TO THE PROJECT PLAN 14
5.2 VERIFICATION OF INDIVIDUALS 14
5.2.1 TECHNICAL ISSUES OF VERIFICATION 14
5.2.2 SOCIAL ASPECTS OF VERIFICATION 15
5.3 SEPARATION OF IDENTITY AND VOTE 15
5.3.1 TECHNICAL ISSUES OF SEPARATING IDENTITY AND VOTE 15
5.3.2 SOCIAL ISSUES OF SEPARATING IDENTITY AND VOTE 16
5.4 VERIFIABLE AND ACCOUNTABLE VOTING SYSTEM 16
5.4.1 TECHNICAL ISSUES FOR A VERIFIABLE AND ACCOUNTABLE VOTING SYSTEM 17
5.4.2 SOCIAL ISSUES OF A VERIFIABLE AND ACCOUNTABLE SYSTEM 17
5.5 SELECTED MEDIUM FOR TRANSPORTATION OF VOTES 17
5.5.1 TECHNICAL ISSUES OF TRANSPORTATION MEDIUM 17
5.5.2 SOCIAL ISSUES OF TRANSPORTATION MEDIUM 18
5.6 THE SYSTEM AND SHAMOS’ SIX COMMANDMENTS 19
5.7 RISK ASSESSMENT OF THE PROPOSED E-VOTING SYSTEM NEEDS READING
THROUGH 20
5.7.1 ASSESSING THE RISK 20
5.8 EXAMINATION OF THREAT 20
5.8.1 THE ATTACK 20
5.8.2 THE ATTACKER 21
5.8.3 DAMAGE CAUSED AND VALUE ACHIEVED 21
5.8.4 LIKELIHOOD OF ATTACK 22
5.8.5 RISK OF ATTACK 22
5.9MALICIOUS PAYLOAD ATTACK USING BACKORIFICE 2000 (BO2K) 22
5.9.1 THE ATTACK 22
DESCRIPTION OF THE ATTACK 22
LEVEL OF EXPERTISE REQUIRED 23
5.9.2 THE ATTACKER 23
5.9.3 DAMAGE CAUSED AND VALUE ACHIEVED 23
5.9.4 LIKELIHOOD OF ATTACK 24
5.9.5 RISK OF A MALICIOUS CODE (BO2K)ATTACK 24
5.10 DISTRIBUTED DENIAL OF SERVICE ATTACK (DDOS) 25
5.10.1 THE ATTACK 25
DESCRIPTION OF THE ATTACK 25
LEVEL OF SKILL REQUIRED 25
5.10.2 THE ATTACKER 25
5.10.3 DAMAGE CAUSED AND VALUE ACHIEVED 26
5.10.4 LIKELIHOOD OF ATTACK 26
5.10.5 RISK OF DDOS ATTACK 27
5.11 CONCLUSIONS 27
6. RECOMMENDATIONS 29
6.1 RECOMMENDATIONS BASED UPON THE PROPOSED SYSTEM 29
6.1.1 THE USE OF THE INTERNET AS THE TRANSPORTATION MEDIUM 29
6.1.2 USING HOME PCS AS VOTING PLATFORMS 30
6.2 RECOMMENDATIONS FOR FUTURE E-VOTING BASED UPON EMERGENT TECHNOLOGY
30
7. EVALUATION 31
7.1 THE PROCESS 31
7.2 FINDINGS 32
7.3 FURTHER STUDY 33
REFERENCES 34
APPENDIX A – PERSONAL REFLECTION 36
APPENDIX B – GANTT CHARTS

GET COMPLETE PROJECT