- This presentation courtesy of Black Box Voting - Election Integrity

Size: px
Start display at page:

Download "- This presentation courtesy of Black Box Voting - Election Integrity"

Transcription

1 Election Integrity

2 40 years ago Voting Rights Act of 1965: Meant to reverse the disenfranchisement of minority voters. Key portions of this Act are set to expire in August Our brothers died for this

3 85 years ago Our mothers died for this June 4, 1919: 19 th Amendment passed, giving women the right to vote

4 In the 1800s Our soldiers died for this March 30, 1870: 15 th Amendment passed, giving men of color the right to vote - This presentation courtesy of Black Box Voting -

5 Throughout our history Our ancestors came for this Currently, approximately 13 percent of the U.S. population is Latino. Between 1892 and 1924 over 22 million people came through Ellis Island and the Port of New York, many of them seeking citizenship.

6 And in the beginning We had revolution over this

7 If this was simple - This presentation courtesy of Black Box Voting -

8 If this was simple people wouldn t keep dying Just to give our children the right to vote - This presentation courtesy of Black Box Voting -

9 Election Security Issues Are Real Incentives to manipulate elections: -Power -Money - Tradition How people persuaded to do it: M.I.C.E. Money, Intelligent reason, Courtesy, Emotion Money = Often under $10,000 Courtesy = Favors Source for bribery amounts: Black Box Voting news archives, monthly Bucket of Bribes articles. The under $10,000 figure refers to bribery of government officials of all kinds, not just elections-related bribery.

10 Election Security Issues Are Real When dealing with public officials: - Focus on REAL mechanics, not theories - Identify risks - Describe proven exploits - Expect vendor-driven rebuttals Remember that most election officials are dependent on their vendor for their upcoming elections. For more background on vendor dependency, see video in Black Box Voting document archives: Vendors are like family

11 Mechanics of Election Manipulation It s not about Bush BOTH PARTIES obstructing & denying It s not about being nonpartisan It s about defining problem accurately It s not about the presidential election It s supervisors, primaries, judges The mechanics are a patchwork: not uniform Traditional targets for election manipulation: County supervisors, commissioners, who allocate construction projects and approve land use; Sheriffs, who control contraband & also affect zoning decisions (traffic control study sign-off). These local races were probably the first beneficiaries of voting machine manipulation.

12 To analyze REAL mechanics, you start by building an ATTACK TREE Examine real systems and real elections procedures Follow the right approach, or officials will tune us out. (And there are those who want to tune this out.) - Identify attack categories - Map attack points - Identify specific attack vectors - Calculate risk value for each specific attack vector (# people, money, skill needed) - Do proof of concept testing Improving Election Integrity

13 Identify attack categories - People - Software - Hardware - Materials - Procedures - Laws & regulations Improving Election Integrity

14 Map attack points - District mapping - Ballot Access -Voter registration -Ballot design & printing - Vote suppression -Vote authentication - Vote casting - Data / ballot transfer -Data consolidation (central tabulation) - Results reporting - Final canvass Improving Election Integrity

15 Identify specific attack vectors: Here are just a few - District mapping --- Demographics --- Overlay voter registration party preference --- Split or consolidate ethnic areas - Ballot Access --- Change rules for what constitutes an official political party --- Require more signatures --- Omit undesired parties from debates -Voter registration --- Design VR software for arbitrary purging --- Overgenerous felon purges --- Register the same voter multiple times --- Selective purging of inactives -Ballot design, print --- Incorporate triggers into ballot ID code --- Overlay certain portions with Infra-red --- Use tampered op-scan calibration sheet --- Slight displacement of vote areas - Vote suppression --- Ditch absentee ballots at mail proc. center --- Switch polling places --- Under-assign voting machines - Vote authentication --- Create arbitrary automated signature comparison for absentee ballots --- Insert trigger into selected voter card activators --- Omit names from electronic pollbook - Vote casting --- Miscalibrate touch screens --- Place pens with organic ink in booths --- Pre-stuff the electronic ballot box with negative/positive votes - Data / ballot transfer --- Create report falsifying program inside the electronic ballot box --- Swap the early voting ballots when they are driven to HQ --- Man in the middle remote attack -Data consolidation (central tabulation) --- Insert trojan horse script in tabulator --- Manually change tabulator results --- Edit stored business logic in tabulator - Results reporting --- Falsify Web / Media interim reports (fix raw data later) - Final canvass --- Add or swap ballots Improving Election Integrity

16 Real life attack points Ballot design, print - Triggers in ballot ID code - Tampered op-scan calibration - Slight displacement of vote areas Vote suppression - Ditch absentee ballots at mail processing center Vote authentication - Arbitrary sig. comparison - Put trigger into voter card activators for touch-screens Vote casting - Miscalibrate touchscreens - Pre-stuff ballot box with negative/positive votes Data / ballot transfer - Create report falsifying program in memory card - Remote attack Data consolidation (central tabulation) - Insert trojan horse script in tabulator - Edit stored business logic Improving Election Integrity

17 Miscalibrate touch-screens Palm Beach County, FL (Sequoia touch-screens): - 4,313 Voting Machines - Recalibrated 1,475 times Nov. 2 - This presentation courtesy of Black Box Voting -

18 Real life attack points Ballot design, print - Triggers in ballot ID code - Tampered op-scan calibration - Slight displacement of vote areas Vote suppression - Ditch absentee ballots at mail processing center Vote authentication - Arbitrary sig. comparison - Put vote-flipping trigger into targeted voter card activators for touch-screens Vote casting - Miscalibrate touchscreens - Pre-stuff ballot box with negative/positive votes Data / ballot transfer - Create report falsifying program in memory card - Remote attack Data consolidation (central tabulation) - Insert trojan horse script in tabulator - Edit stored business logic Improving Election Integrity

19 How to Pre-Stuff the Ballot Box (Diebold precinct-based optical scan) Voting Machine Voting Machine Voting Machine Memory Cards GEMS - This presentation courtesy of Black Box Voting -

20 How to Pre-Stuff the Ballot Box Voting Machine Voting Machine Voting Machine Pre-stuff memory cards to roll over odometer GEMS Most people are familiar with the odometer in a car, which rolls over to zero after 99,999 miles. The rollover point in Diebold precinctbased optical scans is 65,535 votes. Proof of Concept: Harri Hursti on Diebold optical scan machine. May 26, Leon County, FL Don t look at me - This presentation courtesy of Black Box Voting -

21 Real life attack points Ballot design, print - Triggers in ballot ID code - Tampered op-scan calibration - Slight displacement of vote areas Vote suppression - Ditch absentee ballots at mail processing center Vote authentication - Arbitrary sig. comparison - Put vote-flipping trigger into targeted voter card activators for touch-screens Vote casting - Miscalibrate touchscreens - Pre-stuff ballot box with negative/positive votes Data / ballot transfer - Create report falsifying program in memory card - Remote attack Data consolidation (central tabulation) - Insert trojan horse script in tabulator - Edit stored business logic Improving Election Integrity

22 How to create a false poll tape Poll Tape Voting Machine Voting Machine Voting Machine Poll Tape Poll Tape Memory Cards Report commands Report commands Report commands GEMS Diebold memory cards contain report-making program Don t look at me - This presentation courtesy of Black Box Voting -

23 How to create a false poll tape Load false reporting program either from GEMS or by swapping cards Voting Machine Voting Machine Voting Machine AccuBasic files GEMS Don t look at me - This presentation courtesy of Black Box Voting -

24 Real and falsified poll tapes This Diebold voting machine was programmed to create false poll tapes Proof of Concept: Harri Hursti on Diebold optical scan machine. May 26, Leon County, FL Don t look at me - This presentation courtesy of Black Box Voting -

25 Real life attack points Ballot design, print - Triggers in ballot ID code - Tampered op-scan calibration - Slight displacement of vote areas Vote suppression - Ditch absentee ballots at mail processing center Vote authentication - Arbitrary sig. comparison - Put vote-flipping trigger into targeted voter card activators for touch-screens Vote casting - Miscalibrate touchscreens - Pre-stuff ballot box with negative/positive votes Data / ballot transfer - Create report falsifying program in memory card - Remote attack Data consolidation (central tabulation) - Insert trojan horse script in tabulator - Edit stored business logic Improving Election Integrity

26 Remote Attacks Attack vectors: - Telephone lines - RAS (Remote Access Server) on GEMS tabulator - Networks on Sequoia systems - San Diego: GEMS connected to Internet (July 2005 election) Proof of Concept: RABA Technologies Jan 2004, Maryland Other considerations: - Setup varies in each jurisdiction - Why wait until Election night? (Easier to do in advance; remote access attacks more likely if additional corrections needed after results coming in)

27 Real life attack points Ballot design, print - Triggers in ballot ID code - Tampered op-scan calibration - Slight displacement of vote areas Vote suppression - Ditch absentee ballots at mail processing center Vote authentication - Arbitrary sig. comparison - Put vote-flipping trigger into targeted voter card activators for touch-screens Vote casting - Miscalibrate touchscreens - Pre-stuff ballot box with negative/positive votes Data / ballot transfer - Create report falsifying program in memory card - Remote attack Data consolidation (central tabulation) - Insert trojan horse script in tabulator - Edit stored business logic Improving Election Integrity

28 Insert Trojan script into GEMS or WinEDS tabulator -Most GEMS (Diebold tabulator) versions in use are built on a Microsoft Access-compatible database. -Other tabulators, like Sequoia WinEDS, are built with SQL. - Both Visual Basic scripts and Java scripts worked when applied to GEMS Proof of Concept: Dr. Herbert Thompson Feb. 14, 2005, Leon County FL Windows inherently supports Visual Basic scripts. You simply type the commands into any text editor (like Notepad or even the DOS edit function) you never need to open the voting system program at all. The scripts works in the background and then you own the election. Scripts like this are often used to create viruses (programs running on your computer that you are unaware of). These kinds of scripts can be implanted months or years ahead of time, and can be set to trigger only when certain events take place. It took Dr. Thompson less than a minute to implant a script that controlled the GEMS tabulator.

29 Real life attack points Ballot design, print - Triggers in ballot ID code - Tampered op-scan calibration - Slight displacement of vote areas Vote suppression - Ditch absentee ballots at mail processing center Vote authentication - Arbitrary sig. comparison - Put vote-flipping trigger into targeted voter card activators for touch-screens Vote casting - Miscalibrate touchscreens - Pre-stuff ballot box with negative/positive votes Data / ballot transfer - Create report falsifying program in memory card - Remote attack Data consolidation (central tabulation) - Insert trojan horse script in tabulator - Edit stored business logic Improving Election Integrity

30 Edit stored business logic in central tabulator -Sequoia WinEDS tabulator makes the source code for its stored business logic available in menu items, so any user can edit the source code on the fly. - For example, Jeremiah Akin demonstrated editing the source code for the fonts on the WinEDS reports. Proof of Concept: Jeremiah Akin Riverside, CA This manipulation altered the functionality of the tabulator, and the manipulation later erased itself automatically. Source code consists of English-like commands which tell the computer what to do. It is unusual bizarre, in fact to create a program designed for security which allows modification of the source code simply by entering a menu. Menu items are designed to allow users to find functions easily. The WinEDS program, therefore, allows users to easily locate a way to re-write the commands that tell the tabulator what to do. Jeremiah rewrote a section about fonts so that when you change a font on a report, the tabulator would alter the way it counts the vote. - This presentation courtesy of Black Box Voting -

31 Real life attack points Ballot design, print - Triggers in ballot ID code - Tampered op-scan calibration - Slight displacement of vote areas Vote suppression - Ditch absentee ballots at mail processing center Vote authentication - Arbitrary sig. comparison - Put vote-flipping trigger into targeted voter card activators for touch-screens Vote casting - Miscalibrate touchscreens - Pre-stuff ballot box with negative/positive votes Data / ballot transfer - Create report falsifying program in memory card - Remote attack Data consolidation (central tabulation) - Insert trojan horse script in tabulator - Edit stored business logic Improving Election Integrity

32 Put triggers into the ballot codes -Each ballot contains code which tells the optical scan machine information like ballot style and precinct. Usually, this is benign. -Diebold ballots contain a series of dashes along the bottom which contain comments (commands for the computer) - ES&S and Sequoia have these on the side Proof of Concept: Harri Hursti Hursti s absentee ballot reader decodes the code - Hart Intercivic has three bar codes along the side - This presentation courtesy of Black Box Voting -

33 Put triggers into the ballot codes Diebold Hart Intercivic - This presentation courtesy of Black Box Voting -

34 Real life attack points Ballot design, print - Triggers in ballot ID code - Tampered op-scan calibration - Slight displacement of vote areas Vote suppression - Ditch absentee ballots at mail processing center Vote authentication - Arbitrary sig. comparison - Put vote-flipping trigger into targeted voter card activators for touch-screens Vote casting - Miscalibrate touchscreens - Pre-stuff ballot box with negative/positive votes Data / ballot transfer - Create report falsifying program in memory card - Remote attack Data consolidation (central tabulation) - Insert trojan horse script in tabulator - Edit stored business logic Improving Election Integrity

35 Tamper with Optical Scan Calibration - Diebold optical scan calibration tells the machine how dark a mark must be in order to read it - You can increase undervotes or overvotes by miscalibrating them -Calibrations are done simply by running a calibrator page through the machine. -Diebold high speed digital scanners also have an autocorrect setting that should NOT be on - This presentation courtesy of Black Box Voting -

36 Real life attack points Ballot design, print - Triggers in ballot ID code - Tampered op-scan calibration - Slight displacement of vote areas Vote suppression - Ditch absentee ballots at mail processing center Vote authentication - Arbitrary sig. comparison - Put vote-flipping trigger into targeted voter card activators for touch-screens Vote casting - Miscalibrate touchscreens - Pre-stuff ballot box with negative/positive votes Data / ballot transfer - Create report falsifying program in memory card - Remote attack Data consolidation (central tabulation) - Insert trojan horse script in tabulator - Edit stored business logic Improving Election Integrity

37 Slight displacement of vote area - Diebold digital scanners have a skew built into the scan hardware. Certain locations on the ballot may under-report the votes. - Old Diebold optical scanners do not register the whole image, just a few lines through the image (as few as two). Thus, slight offsets on certain races can produce higher undervotes -Old ES&S and Sequoia scanners have similar vulnerabilities. - This presentation courtesy of Black Box Voting -

38 Real life attack points Ballot design, print - Triggers in ballot ID code - Tampered op-scan calibration - Slight displacement of vote areas Vote suppression - Ditch absentee ballots at mail processing center Vote authentication - Arbitrary sig. comparison - Put vote-flipping trigger into targeted voter card activators for touch-screens Vote casting - Miscalibrate touchscreens - Pre-stuff ballot box with negative/positive votes Data / ballot transfer - Create report falsifying program in memory card - Remote attack Data consolidation (central tabulation) - Insert trojan horse script in tabulator - Edit stored business logic Improving Election Integrity

39 Ditch Absentee Ballots at the Mail Processing Center Many locations use PSI Group to do ballot mailing. Some also have PSI process incoming ballots. PSI sorts the incoming absentee ballots and gives them to the elections division. PSI routinely hires felons and immigrants. PSI payroll registers obtained by Black Box Voting include people with no last names: Jack Jack and simply Joe. PSI upper management includes Neil Dean, brother of voting machine programmer Jeffrey Dean -- Jeff was in prison for four years on 23 counts of embezzlement involving criminal computer programming. Jeff Dean s first job, upon leaving prison, was PSI.

40 Real life attack points Ballot design, print - Triggers in ballot ID code - Tampered op-scan calibration - Slight displacement of vote areas Vote suppression - Ditch absentee ballots at mail processing center Vote authentication - Arbitrary sig. comparison - Put vote-flipping trigger into targeted voter card activators for touch-screens Vote casting - Miscalibrate touchscreens - Pre-stuff ballot box with negative/positive votes Data / ballot transfer - Create report falsifying program in memory card - Remote attack Data consolidation (central tabulation) - Insert trojan horse script in tabulator - Edit stored business logic Improving Election Integrity

41 Ability to perform arbitrary, mechanized signature authentication for mail-in ballots Diebold Vote Remote This program allows you to arbritrarily set the rate at which the signature comparison rejects voters. You can set it higher for some areas than for others. - This presentation courtesy of Black Box Voting -

42 Real life attack points Ballot design, print - Triggers in ballot ID code - Tampered op-scan calibration - Slight displacement of vote areas Vote suppression - Ditch absentee ballots at mail processing center Vote authentication - Arbitrary sig. comparison - Put vote-flipping trigger into targeted voter card activators for touch-screens Vote casting - Miscalibrate touchscreens - Pre-stuff ballot box with negative/positive votes Data / ballot transfer - Create report falsifying program in memory card - Remote attack Data consolidation (central tabulation) - Insert trojan horse script in tabulator - Edit stored business logic Improving Election Integrity

43 (Speculative) Put vote-flipping trigger into voter activation card These are actual election logs from Sequoia touch-screens Card authenticated Election activated Cast vote Card authenticated Election activated Cast vote Card authenticated Election activated Voter card removed Card authenticated Cast vote Card authenticated Election activated Cast vote Election activated Voter card removed Card authenticated Cast vote We have ascertained that voter cards were NOT removed L&A test: error did not occur Election Day: error occurred on 99 percent of all 900 machines What about the 1% with no error? These were the ONLY machines with the same voter card activator used for the L&A tests. - This presentation courtesy of Black Box Voting -

44 Election integrity varies from place to place Presenting a patchwork of opportunities for tampering.

45 Methods will vary from place to place because of different voting systems & procedures. Human factors also differ from place to place

46 Susceptibility to Cash $ $ $ Improving Election Integrity

47 Business influences Improving Election Integrity

48 How much control vendor has over local elections Mechanics of vote-rigging

49 Local yokels & traditions Improving Election Integrity

50 Butt-covering, worries about job security Don t look at me Improving Election Integrity

51 Bungling & Incompetence Don t look at me Improving Election Integrity

52 To manipulate federal elections Skilled operatives would have to cobble together local opportunities - This presentation courtesy of Black Box Voting -

53 More uniformity will make federal election manipulation easier - Uniform statewide systems - Remove / prohibit use of audit trails - Consolidate training, talking points

54 There is little will among elected officials to shine light on anything that could cast doubt on how they got into office. Therefore, improving election integrity must come from citizens, like you. There is no magic solution that will solve everything. Right now, it s plugging holes in the dike. One small plug: Count-it-yourself software for digital image optical scanners, developed by Harri Hursti, underwritten by Black Box Voting. Open source code, available for FREE, right now. More:

55 Do something. Do anything. But don t wait for someone else to do it for you. It s your freedom: Use it or lose it.

56 They stood up for your rights

57 Now it s your turn - This presentation courtesy of Black Box Voting -

Election System and Software

Election System and Software Election System and Software Examination Report January 2007 Tom Watson Examiner The following systems were examined in Austin on January 18 and 19, 2007: AutoMARK Voter Assist Terminal (VAT) 1.1.2258

More information

VOTER REGISTRATION APPLICATION

VOTER REGISTRATION APPLICATION VOTER REGISTRATION APPLICATION Powered by PresidentialElection.com You are not registered until you: Print, sign, stamp, and mail complete form. INSTRUCTIONS 1 Print and Sign the form. You must sign the

More information

BALLOT ON DEMAND PROCEDURES FOR THE BOARD OF ELECTIONS IN THE CITY OF NEW YORK

BALLOT ON DEMAND PROCEDURES FOR THE BOARD OF ELECTIONS IN THE CITY OF NEW YORK BALLOT ON DEMAND PROCEDURES FOR THE BOARD OF ELECTIONS IN THE CITY OF NEW YORK Revision History: Original Effective Date 4/5/2016 Revision Date N/A Version # 1 Authors EVS Department Requested By Board

More information

User Manual. Last updated 1/19/2012

User Manual. Last updated 1/19/2012 User Manual Last updated 1/19/2012 1 Table of Contents Introduction About VoteCast 4 About Practical Political Consulting 4 Contact Us 5 Signing In 6 Main Menu 7 8 Voter Lists Voter Selection (Create New

More information

E-POLL BOOK REFRESHER

E-POLL BOOK REFRESHER E-POLL BOOK REFRESHER Turn computer on by using the button located on the top left corner of the key board. 1. Insert Memory Stick in the USB port located on the left or right side of your laptop. 2. A

More information

Managing IT & Election Systems. U.S. Election Assistance Commission 1

Managing IT & Election Systems. U.S. Election Assistance Commission   1 Managing IT & Election Systems U.S. Election Assistance Commission www.eac.gov 1 Election Administrators are IT Managers Election Officials and their constituencies must understand that they are complex

More information

Style Guide for Voting System Documentation

Style Guide for Voting System Documentation NISTIR 7519 Style Guide for Voting System Documentation Dana E. Chisnell UsabilityWorks Susan C. Becker Codewords Sharon J. Laskowski Information Access Division Information Technology Laboratory National

More information

Electronic Pollbook Election Inspector s User Manual

Electronic Pollbook Election Inspector s User Manual Electronic Pollbook Election Inspector s User Manual Michigan Department of State Bureau of Elections July 2015 Electronic Pollbook Election Inspector Manual - Table of Contents The Electronic Pollbook

More information

GUIDANCE ON ELECTRONIC VOTING SYSTEM PREPARATION AND SECURITY

GUIDANCE ON ELECTRONIC VOTING SYSTEM PREPARATION AND SECURITY September, 2016 GUIDANCE ON ELECTRONIC VOTING SYSTEM PREPARATION AND SECURITY As a reminder for counties, and refresher on good cyber hygiene practices, DOS recommends the following procedures in the preparation

More information

Diebold TSx Evaluation

Diebold TSx Evaluation 330 SW 43 rd St Suite K PMB 547 Renton WA 98055 425-793-1030 http://www.blackboxvoting.org Diebold TSx Evaluation SECURITY ALERT: May 22, 2006 Supplemental report, additional observations A Black Box Voting

More information

Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines

Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines Sean Peisert Matt Bishop Alec Yasinsac given at HICSS 09 Waikoloa, HI January 7, 2009 1 Meltdowns in Elections Most have

More information

California Secretary of State Consultant s Report on:

California Secretary of State Consultant s Report on: California Secretary of State Consultant s Report on: HART INTERCIVIC SYSTEM 6.2: Ballot Now3.3, Release 3.3.11 BOSS 4.3, Release 4.3.13 Rally 2.3, Release 2.3.7 Tally 4.3, Release 4.3.10 SERVO 4.2, Release

More information

ELECTRONIC POLL BOOK INSTRUCTIONS

ELECTRONIC POLL BOOK INSTRUCTIONS ELECTRONIC POLL BOOK INSTRUCTIONS Clerk s Office Rochester Hills 1000 Rochester Hills Dr. Rochester Hills, MI 48309 www.rochesterhills.org Phone: 248.656.4630 Fax: 248.656.4744 Rev. 10/2017 Table of Contents

More information

CONDITIONS FOR USE FOR CLEAR BALLOT GROUP S CLEARVOTE VOTING SYSTEM

CONDITIONS FOR USE FOR CLEAR BALLOT GROUP S CLEARVOTE VOTING SYSTEM CONDITIONS FOR USE FOR CLEAR BALLOT GROUP S CLEARVOTE 1.4.1 VOTING SYSTEM The Secretary of State promulgates the following conditions for use for Clear Ballot Group s ClearVote 1.4.1 voting system by political

More information

RECORDS MANAGEMENT AND YOU

RECORDS MANAGEMENT AND YOU RECORDS MANAGEMENT AND YOU Carolyn Smith S.C. Archives & History Why Records Management Matters Citizens have a right to know. Records have historical importance. Good records makes your job easier. What

More information

Election Night Reporting Quick Start Guide

Election Night Reporting Quick Start Guide Election Night Reporting Quick Start Guide The Election Night Reporting (ENR) display provides extensive details on election results. Web visitors can view which candidates are leading for a contest as

More information

Shift No No Yes Preferred Human Voice. Yes Activated at any time during the voting process. Yes Preferred Human Voice

Shift No No Yes Preferred Human Voice. Yes Activated at any time during the voting process. Yes Preferred Human Voice Vendor Model Zoom/ Font Size Diebold AccuVote-TS Activated at any time Activated at any time Contrast Color Shift Audio No No Preferred Human Voice Activated at any time Activated at any time Preferred

More information

Acknowledgments/Transfers/Confirmations

Acknowledgments/Transfers/Confirmations Acknowledgments/Transfers/Confirmations STATISTICAL REPORTING REQUIREMENTS The State Board compiles an annual report which details the impact and productivity of the NVRA. Surveys are sent to County Boards.

More information

ROV Response: ROV Response: ROV Response: ROV Response:

ROV Response: ROV Response: ROV Response: ROV Response: SETTING UP THE TOUCHSCREEN Source: Voting Equipment Instructions provided in The Guide and attached to the Inspector: Opening Job Card 1 /* NHR: Hopefully any changes made here will show up in both of

More information

What. Why. Where. Setting up Grid View. 5.1 Grid View. Quick Sheets Section 5 - Data Entry

What. Why. Where. Setting up Grid View. 5.1 Grid View. Quick Sheets Section 5 - Data Entry My Voters Quick Sheets Section 5 - Data Entry 5. Data Entry 5.1 Grid View 5.2 Scanning Bar Codes 5.3 Form View 5.4 Quick Mark 5.5. Bulk Uploader 5.6 Adding Marked Register Data 5.1 Grid View What Why This

More information

Application for anonymous registration. How do I register as an anonymous elector? Returning the form. More information

Application for anonymous registration. How do I register as an anonymous elector? Returning the form. More information Application for anonymous registration You need to be on the electoral register to vote in elections and referendums. If the safety of you (or someone in your household) would be at risk if your name or

More information

Provisional Envelopes An Overview

Provisional Envelopes An Overview Provisional Envelopes An Overview This section of the Provisional Manual contains this Overview, Images of Provisional Envelopes in a pdf format, and a spreadsheet summarizing size and attributes of the

More information

Voting System Security as per the VVSG

Voting System Security as per the VVSG Voting System Security as per the VVSG Austin Conference on State Certification Testing for Voting Systems (2017) Michael Santos Test Manager SLI Compliance Elements of Security Outside Vendor Control

More information

NASCIO 2018 State IT Recognition Awards

NASCIO 2018 State IT Recognition Awards NASCIO 2018 State IT Recognition Awards Title: Georgia Gateway Category: Cross-boundary Collaboration and Partnerships State: Georgia Contact: Venkat R. Krishnan Venkat.Krishnan@dhs.ga.gov 404.556.8198

More information

AccuVote-OS. Precinct Count 1.96 User s Guide

AccuVote-OS. Precinct Count 1.96 User s Guide AccuVote-OS Precinct Count 1.96 User s Guide Revision 1.0 August 27, 2002 Copyright AccuVote-OS Precinct Count User s Guide Copyright Diebold Election Systems, Inc. and Diebold Election Systems Inc., 2002

More information

HVIP Voucher Processing Outline

HVIP Voucher Processing Outline HVIP Voucher Processing Outline Voucher Processing Timing Signing into Dealer Home Submitting a Voucher Request Confirming a Voucher Requirements of an Approved Voucher HVIP Voucher Processing Outline

More information

Getting Started!... 2! Quick Lookup!... 3! Creating Lists!... 6! Saving a List!... 8! Loading Lists!... 9! Sharing Lists!... 10!

Getting Started!... 2! Quick Lookup!... 3! Creating Lists!... 6! Saving a List!... 8! Loading Lists!... 9! Sharing Lists!... 10! CONTENTS Getting Started... 2 Quick Lookup... 3 Creating Lists... 6 Saving a List... 8 Loading Lists... 9 Sharing Lists... 10 Adding, Removing and Narrowing from a List... 11 Creating Phone Lists... 12

More information

Increasing the security of your election by fixing it

Increasing the security of your election by fixing it Increasing the security of your election by fixing it Daniel C. Silverstein dans@csua.berkeley.edu Damon McCormick damonmcc@uclink.berkeley.edu Part One: Disaster Strikes The 2000 US Presidential Election

More information

Cybersecurity is a Team Sport

Cybersecurity is a Team Sport Cybersecurity is a Team Sport Cyber Security Summit at Loyola Marymount University - October 22 2016 Dr. Robert Pittman, CISM Chief Information Security Officer National Cyber Security Awareness Month

More information

Voting System Certification Evaluation Report. Hart InterCivic Hart Voting System Version 6.2.1

Voting System Certification Evaluation Report. Hart InterCivic Hart Voting System Version 6.2.1 Voting System Certification Evaluation Report Hart InterCivic Hart Voting System Version 6.2.1 Introduction The Hart InterCivic Voting System, Version 6.2.1 (the system) was evaluated for certification

More information

Precinct Organizing: Getting Started

Precinct Organizing: Getting Started Precinct Organizing: Getting Started September 11 th, 2007 Paid for by Democracy for America, www.democracyforamerica.com, and not authorized by any candidate or candidate s committee. Tonight s Trainers

More information

Berkeley 2017 State House Dist 99 General Audit Report

Berkeley 2017 State House Dist 99 General Audit Report Berkeley Ballot Audit Report Audit Date: 11:18:40, Fri Jan 19, 2018 Berkeley 2017 State House Dist 99 General Audit Report Prec Precinct ----------------EL30A--------------- -------------------Audit------------------

More information

Multi-level Information Modeling and Preservation of egov Data

Multi-level Information Modeling and Preservation of egov Data Multi-level Information Modeling and Preservation of egov Data Richard Marciano 1, Bertram Ludäscher 1, Ilya Zaslavsky 1, Reagan Moore 1, and Keith Pezzoli 2 University of California San Diego, 9500 Gilman

More information

WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES

WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Intermediate School District #917 WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Procedures Manual April 2009 Table of Contents Overview 3 Definitions 3 General Guidelines 4 Eligibility Requirements 5

More information

Voting System Certification Evaluation Report. Dominion Voting Systems ASSURE 1.3

Voting System Certification Evaluation Report. Dominion Voting Systems ASSURE 1.3 Voting System Certification Evaluation Report Dominion Voting Systems ASSURE 1.3 Introduction The Dominion Voting Systems Assure 1.3 Voting System was evaluated for certification by the State of Texas

More information

DISTRIBUTED DATABASE MODEL FOR MOBILE E-POLLING SYSTEM

DISTRIBUTED DATABASE MODEL FOR MOBILE E-POLLING SYSTEM CHAPTER 5 DISTRIBUTED DATABASE MODEL FOR MOBILE E-POLLING SYSTEM At present, the two ways of vote casting are Paper- Ballot system and Electronic Voting Machine (EVM). Both these methods do not ensure

More information

WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES

WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Goodhue County Education District #6051 WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Procedures Manual Updated January 2016 Table of Contents Overview 3 Definitions 3 General Guidelines 4 Eligibility

More information

Voting System Certification Evaluation Report. Election Systems and Software (ESS) Unity Voting System

Voting System Certification Evaluation Report. Election Systems and Software (ESS) Unity Voting System Report Prepared for the Texas Secretary of State Elections Division Voting System Certification Evaluation Report Election Systems and Software (ESS) Unity 3.4.1.0 Voting System Introduction This report

More information

State of Utah Certified Election Equipment Last update 4/30/2018

State of Utah Certified Election Equipment Last update 4/30/2018 State of Utah Certified Election Equipment Last update 4/30/2018 Company Equipment Date Certified Voting Technologies Touch Screen Voting System 05/22/02 Avante International Vote-Trakker EVC 308 01/10/03

More information

Precinct Organizing: Recruiting Your Precinct Team

Precinct Organizing: Recruiting Your Precinct Team Precinct Organizing: Recruiting Your Precinct Team September 18 th, 2007 Paid for by Democracy for America, www.democracyforamerica.com, and not authorized by any candidate or candidate s committee. Tonight

More information

SO OS Secure Online Voting System

SO OS Secure Online Voting System Johns Hopkins Engineering for Professionals Secure Online Voting System Systems Engineering Project Oral Presentation Haijing Henry Chen May 1, 2018 Agenda Introduction Proposed System Deliverables Requirement

More information

The Mail Must Go Through: USPS & California Elections CACEO SA CRAMENTO, CA DECEMBER 15, 2016

The Mail Must Go Through: USPS & California Elections CACEO SA CRAMENTO, CA DECEMBER 15, 2016 The Mail Must Go Through: USPS & California Elections CACEO SA CRAMENTO, CA DECEMBER 15, 2016 PCEA Recommendations & USPS Expansion of Voting Opportunities USPS Communication USPS Ballot Tracking Data

More information

Connecticut Electronic Poll Book System Requirement Specification V1.0

Connecticut Electronic Poll Book System Requirement Specification V1.0 DENISE W. MERRILL CONNECTICUT SECRETARY OF THE STATE V1.0 APPROVED Denise W. Merrill Connecticut Secretary of the State March 6, 2015 1 Table of Contents 1 TABLE OF CONTENTS 2 2 INTRODUCTION 4 2.1 PURPOSE

More information

Voters and Mail. 5 Insights to Boost Campaign Impact. A United States Postal Service and American Association of Political Consultants (AAPC) study

Voters and Mail. 5 Insights to Boost Campaign Impact. A United States Postal Service and American Association of Political Consultants (AAPC) study Voters and Mail 5 Insights to Boost Campaign Impact A United States Postal Service and American Association of Political Consultants (AAPC) study Voters are waiting for you at the mailbox. The American

More information

Review of the Documentation of the Sequoia Voting System

Review of the Documentation of the Sequoia Voting System Review of the Documentation of the Sequoia Voting System Aaron J. Burstein University of California, Berkeley 1 Nathan S. Good University of California, Berkeley Deirdre K. Mulligan University of California,

More information

I-765 Completion Guide for 24-Month STEM OPT Extension International Student Advising

I-765 Completion Guide for 24-Month STEM OPT Extension International Student Advising I-765 Completion Guide for 24-Month STEM OPT Extension International Student Advising Read the Instructions for Form I-765 This document is a general guide to help you complete form I- 765. It is your

More information

State Certification Conference June 5, Dr. Jay Bagga, Dr. Joe Losco Dr. Ray Scheele, Sujan Pradhan, MS

State Certification Conference June 5, Dr. Jay Bagga, Dr. Joe Losco Dr. Ray Scheele, Sujan Pradhan, MS State Certification Conference June 5, 2014 Dr. Jay Bagga, Dr. Joe Losco Dr. Ray Scheele, Sujan Pradhan, MS Certifying E-Poll Books: The Indiana Experience The Good, The Bad and The Ugly Epoll book standards

More information

Electronic Pollbook User Manual

Electronic Pollbook User Manual Michigan Department of State Bureau of Elections July 2014 2 Electronic Pollbook User Manual Electronic Pollbook User Manual - Table of Contents The Electronic Pollbook User Manual is structured to be

More information

New Graduate Guide to the Online Application Process

New Graduate Guide to the Online Application Process New Graduate Guide to the Online Application Process April 2018 Before Getting Started This guide is intended to help recent graduates navigate the online portion of the application process and it is not

More information

HACKER S DELIGHT DESTROYING THE SYSTEM ONLY MAKES IT STRONGER

HACKER S DELIGHT DESTROYING THE SYSTEM ONLY MAKES IT STRONGER HACKER S DELIGHT DESTROYING THE SYSTEM ONLY MAKES IT STRONGER OVERVIEW The meaning of hacking Types of hacking Methods of hacking Implications of hacking HACKING: AN INTRODUCTION A DEFINITION To tinker

More information

Diebold TSx Touch-screen Voting Machine Issues Matrix 8/3/06

Diebold TSx Touch-screen Voting Machine Issues Matrix 8/3/06 Diebold TSx Touch-screen Voting Machine Issues Matrix 8/3/06 The objective of this document is to identify a number of the issues raised by constituents opposed to the use of the voting machines as well

More information

The Board of Elections in the City of New York. Canvass/Recanvass Procedures Step-by-Step Section

The Board of Elections in the City of New York. Canvass/Recanvass Procedures Step-by-Step Section The Board of Elections in the City of New York Canvass/Recanvass Procedures Step-by-Step Section Revision History: Draft Date: 8-25-17 Original Effective Date: 8-29-17 Revision Date: Version #: 5 Author:

More information

OFFICIAL ELECTION MAIL GRAPHIC GUIDELINES AND LOGOS. March 2018 Publication 631

OFFICIAL ELECTION MAIL GRAPHIC GUIDELINES AND LOGOS. March 2018 Publication 631 OFFICIAL GRAPHIC GUIDELINES AND LOGOS March 2018 Publication 631 U.S. POSTAL SERVICE FEBRUARY 2016 2 Contents Official Election Mail Logo......................... 4 Conditions of Use.............................

More information

Connecticut Election Management System

Connecticut Election Management System Connecticut Election Management System Registrar User Manual Version 1.3 August 17, 2017 Table of Contents 1. SYSTEM REQUIREMENTS... 4 2. REGISTRAR LOGIN... 4 How to Create First Time User - Registrar...

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks Overview Handling Security Incidents Chapter 7 Lecturer: Pei-yih Ting Attacks Security Incidents Handling Security Incidents Incident management Methods and Tools Maintaining Incident Preparedness Standard

More information

REQUEST FOR PROPOSAL AND TECHNICAL SPECIFICATIONS FOR THE DEVELOPMENT OF AN ELECTION STAFF MANAGEMENT SYSTEM IN KOSOVO RFQ/15/176 QUESTIONS & ANSWERS

REQUEST FOR PROPOSAL AND TECHNICAL SPECIFICATIONS FOR THE DEVELOPMENT OF AN ELECTION STAFF MANAGEMENT SYSTEM IN KOSOVO RFQ/15/176 QUESTIONS & ANSWERS REQUEST FOR PROPOSAL AND TECHNICAL SPECIFICATIONS FOR THE DEVELOPMENT OF AN ELECTION STAFF MANAGEMENT SYSTEM IN KOSOVO RFQ/15/176 QUESTIONS & ANSWERS 1. How is the total number of positions at each polling

More information

Supervisors of Elections DOS Online Grants System User Manual

Supervisors of Elections DOS Online Grants System User Manual Supervisors of Elections DOS Online Grants System User Manual Last Updated 1/18 OVERVIEW DOS Grants is the online application and management system for grants offered by the Department of State s Divisions

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

Risks of Computers: What do we Do? Steven M. Bellovin April 15,

Risks of Computers: What do we Do? Steven M. Bellovin April 15, Risks of Computers: What do we Do? Steven M. Bellovin April 15, 2010 1 We Have Problems... Software is buggy It takes too long to develop It s generally over budget What do we do? Steven M. Bellovin April

More information

#READYTOVOTE A TOOLKIT TO HELP YOU ENCOURAGE YEAR OLDS IN SCOTLAND TO REGISTER TO VOTE

#READYTOVOTE A TOOLKIT TO HELP YOU ENCOURAGE YEAR OLDS IN SCOTLAND TO REGISTER TO VOTE #READYTOVOTE A TOOLKIT TO HELP YOU ENCOURAGE 15 17 YEAR OLDS IN SCOTLAND TO REGISTER TO VOTE THE 2016 SCOTTISH PARLIAMENT ELECTION IS THE FIRST IN WHICH 16 AND 17 YEAR OLDS CAN VOTE People who are 16 or

More information

Scytl Election Results User Guide

Scytl Election Results User Guide Scytl Election Results User Guide Allegheny County has contracted with Scytl to display County election results in a manner that is transparent and simple for both the general public and users who are

More information

P1_L3 Operating Systems Security Page 1

P1_L3 Operating Systems Security Page 1 P1_L3 Operating Systems Security Page 1 that is done by the operating system. systems. The operating system plays a really critical role in protecting resources in a computer system. Resources such as

More information

Risks of Computers: Voting Machines. Steven M. Bellovin February 10,

Risks of Computers: Voting Machines. Steven M. Bellovin February 10, Risks of Computers: Voting Machines Steven M. Bellovin February 10, 2016 1 Voting Systems and Computers There is a long history of problems (or perceived problems) with voting systems Technology has frequently

More information

ALABAMA STATE BOARD OF PUBLIC ACCOUNTANCY ADMINISTRATIVE CODE

ALABAMA STATE BOARD OF PUBLIC ACCOUNTANCY ADMINISTRATIVE CODE ALABAMA STATE BOARD OF PUBLIC ACCOUNTANCY ADMINISTRATIVE CODE CHAPTER 30-X-4 EXAMINATIONS, QUALIFICATIONS OF CANDIDATES, APPLICATIONS, PASSING GRADES, CONDITIONED SUBJECTS, TRANSFER OF CREDITS, ISSUANCE

More information

Indian Residential Schools Settlement Agreement Personal Credits General Information

Indian Residential Schools Settlement Agreement Personal Credits General Information What are Personal Credits: Indian Residential Schools Settlement Agreement Personal Credits General Information The Indian Residential School Settlement Agreement ( IRSSA ) stipulates that once all Common

More information

AccuVote and AutoMark Judge

AccuVote and AutoMark Judge AccuVote and AutoMark Judge Polling place 6:00 a.m. AccuVote & AutoMark Judge duty bag includes: oinstructions osamples oforms osupplies 6:00 a.m. Set up the AccuVote Set up the Automark Verify the ballot

More information

SECURITY ENHANCEMENT OF E-VOTING SYSTEM

SECURITY ENHANCEMENT OF E-VOTING SYSTEM SECURITY ENHANCEMENT OF E-VOTING SYSTEM CHAPTER-4 Security is one of the most important issues for a reliable and trusted Electronic Voting system. The term E-Voting is used in different ways and it encompasses

More information

FIELD RESEARCH CORPORATION

FIELD RESEARCH CORPORATION FIELD RESEARCH CORPORATION FOUNDED IN 1945 BY MERVIN FIELD 601 California Street San Francisco, California 94108 415-392-5763 Tabulations From a Field Poll Survey of California Registered Voters About

More information

Product Catalog

Product Catalog Hart Voting System Product Catalog 866.216.4278 electionsupplies@hartic.com www.hartintercivic.com Hart InterCivic 15500 Wells Port Drive Austin, Texas 78728 800.223.4278 info@hartic.com www.hartintercivic.com

More information

Martin & Chapman Co Wright Circle * Anaheim, California * 714/ * Fax 714/

Martin & Chapman Co Wright Circle * Anaheim, California * 714/ * Fax 714/ Martin & Chapman Co. 1951 Wright Circle * Anaheim, California 92806 * 714/939-9866 * Fax 714/939-9870 CITY OF BURBANK October 13, 2016 OFFICE OF THE CITY CLERK Estimate All Mail 275 E OLIVE AVE Estimate

More information

Overview of Court Information Technology

Overview of Court Information Technology Overview of Court Information Technology Presented to the Joint Legislative Oversight Committee on Justice and Public Safety April 10, 2014 Jeffrey M. Marecic, Chief Information Officer Agenda IT Service

More information

Colorado Results. For 10/3/ /4/2012. Contact: Doug Kaplan,

Colorado Results. For 10/3/ /4/2012. Contact: Doug Kaplan, Colorado Results For 10/3/2012 10/4/2012 Contact: Doug Kaplan, 407-242-1870 Executive Summary Following the debates, Gravis Marketing, a non-partisan research firm conducted a survey of 1,438 likely voters

More information

Package rcv. August 11, 2017

Package rcv. August 11, 2017 Type Package Title Ranked Choice Voting Version 0.2.1 Package rcv August 11, 2017 A collection of ranked choice voting data and functions to manipulate, run elections with, and visualize this data and

More information

HR_200 Human Resources Overview. Day Trip. SAP Travel Document Solution - TRIP. Day Trip - SAP Travel Document Solution TRIP

HR_200 Human Resources Overview. Day Trip. SAP Travel Document Solution - TRIP. Day Trip - SAP Travel Document Solution TRIP HR_200 Human Resources Overview Day Trip SAP Travel Document Solution - TRIP 1 TRIP Overview Trip is an SAP travel document solution designed to streamline the creation, submission, approval, and payment

More information

Threat Assessment Summary. e-voting, Admin, and pvoting TOE s

Threat Assessment Summary. e-voting, Admin, and pvoting TOE s Threat Assessment Summary e-voting, Admin, and pvoting TOE s, 2011 Page 1 of 22 Source Code, High Level Architecture Documentation and Common Criteria Documentation Copyright (C) 2010-2011 and ownership

More information

The Intelligent Mail Barcode Tracking Mail Ballots

The Intelligent Mail Barcode Tracking Mail Ballots 24th Annual National Conference Dallas, Texas 2008 Professional Practices Program The Intelligent Mail Barcode Tracking Mail Ballots Leon County, Florida by: Submitted Nicholas Martinez Demographic/GIS

More information

Analyzing Systems. Steven M. Bellovin November 26,

Analyzing Systems. Steven M. Bellovin November 26, Analyzing Systems When presented with a system, how do you know it s secure? Often, you re called upon to analyze a system you didn t design application architects and programmers build it; security people

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2008 Lecture 21

CIS 551 / TCOM 401 Computer and Network Security. Spring 2008 Lecture 21 CIS 551 / TCOM 401 Computer and Network Security Spring 2008 Lecture 21 Announcements Project 4 is Due Friday May 2nd at 11:59 PM Final exam: Friday, May 12th. Noon - 2:00pm DRLB A6 Topic for today: "Analysis

More information

The Root Cause of Unstructured Data Problems is Not What You Think

The Root Cause of Unstructured Data Problems is Not What You Think The Root Cause of Unstructured Data Problems is Not What You Think PRESENTATION TITLE GOES HERE Bruce Thompson, CEO Action Information Systems www.expeditefile.com What is this presentation all about?

More information

McCormick 2016 Statewide Runoff Audit Report

McCormick 2016 Statewide Runoff Audit Report McCormick Ballot Audit Report Audit Date: 10:44:53, Thu Jun 30, 2016 McCormick 2016 Statewide Runoff Audit Report Prec Precinct ----------------EL30A--------------- -------------------Audit------------------

More information

I-765 Completion Guide For Pre- & Post-Completion OPT International Student Advising

I-765 Completion Guide For Pre- & Post-Completion OPT International Student Advising I-765 Completion Guide For Pre- & Post-Completion OPT International Student Advising Read the Instructions for Form I-765 This document is a general guide to help you complete form I- 765. It is your responsibility

More information

Thailand Initiatives and Challenges in Cyber Terrorism

Thailand Initiatives and Challenges in Cyber Terrorism Thailand Initiatives and Challenges in Cyber Terrorism Agenda Cyber-Terrorism weapons & tactics MICT Cyber Inspector Group IT Laws Development Challenges Cyber-Terrorism weapons & tactics What is Cyber-Terrorism?

More information

Crash Course in Modernization. A whitepaper from mrc

Crash Course in Modernization. A whitepaper from mrc Crash Course in Modernization A whitepaper from mrc Introduction Modernization is a confusing subject for one main reason: It isn t the same across the board. Different vendors sell different forms of

More information

Verity Central Quick Reference Manual. Document ID A04

Verity Central Quick Reference Manual. Document ID A04 Verity Central Quick Reference Manual Document ID 6620-003-A04 Welcome to Verity Central. This Quick Reference Manual is intended to be used in tandem with the Verity Central Technical Reference Manual,

More information

Q1. Do you have a cellphone, or not? 1. Yes 2. No [SHOW IF Q1=1] Q2. Do you have a cellphone that connects to the Internet and can have apps, or does your phone only receive calls and text messages? 1.

More information

LWV Texas VOTE411 Local League Checklist 2018

LWV Texas VOTE411 Local League Checklist 2018 LWV Texas VOTE411 Local League Checklist 2018 This document is a supplement to the LWVUS VOTE411 Online Candidate Information How- To 2018 manual. It provides additional tips, some alternate ways to enter

More information

PUBLIC RECORDS. May 2016

PUBLIC RECORDS. May 2016 PUBLIC RECORDS May 2016 ACCESS Florida Law creates a right of access to inspect and/or have copies of public records. WHO? This means ANYONE regardless of: Identity Reason YOU MAY NOT REQUIRE A REQUESTOR

More information

Nassau County Voter Data Request Packet. Vicki P. Cannon Supervisor of Elections

Nassau County Voter Data Request Packet. Vicki P. Cannon Supervisor of Elections Nassau County Voter Data Request Packet Vicki P. Cannon Supervisor of Elections James S. Page Governmental Complex 96135 Nassau Place, Suite 3, Yulee, Florida 32097 Phone: 904.491.7500 Toll Free: 1.866.260.4301

More information

Telephone Survey Response: Effects of Cell Phones in Landline Households

Telephone Survey Response: Effects of Cell Phones in Landline Households Telephone Survey Response: Effects of Cell Phones in Landline Households Dennis Lambries* ¹, Michael Link², Robert Oldendick 1 ¹University of South Carolina, ²Centers for Disease Control and Prevention

More information

White Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

White Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Executive Summary SMBs in general don t have the same IT budgets and staffs as larger enterprises. Yet just like larger organizations

More information

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA

More information

Risks of Computers: Voting Machines. Steven M. Bellovin February 11,

Risks of Computers: Voting Machines. Steven M. Bellovin February 11, Risks of Computers: Voting Machines Steven M. Bellovin February 11, 2018 1 Voting Systems and Computers There is a long history of problems (or perceived problems) with voting systems Technology has frequently

More information

The Growing Gap between Landline and Dual Frame Election Polls

The Growing Gap between Landline and Dual Frame Election Polls MONDAY, NOVEMBER 22, 2010 Republican Share Bigger in -Only Surveys The Growing Gap between and Dual Frame Election Polls FOR FURTHER INFORMATION CONTACT: Scott Keeter Director of Survey Research Michael

More information

Security Assessment of the Diebold Optical Scan Voting Terminal

Security Assessment of the Diebold Optical Scan Voting Terminal VoTeR Center UConn Voting Technology Research Center http://voter.engr.uconn.edu Security Assessment of the Diebold Optical Scan Voting Terminal A. Kiayias L. Michel A. Russell A. A. Shvartsman UConn VoTeR

More information

Jury Managers Toolbox

Jury Managers Toolbox Jury Managers Toolbox Best Practices to Decrease Undeliverable Rates Overview Nationally, an average of 12% of qualification questionnaires and jury summonses are returned by the U.S. Postal Service marked

More information

Lecture 5 Security Procedures. J. Alex Halderman University of Michigan

Lecture 5 Security Procedures. J. Alex Halderman University of Michigan Lecture 5 Security Procedures J. Alex Halderman University of Michigan 5.1 Voter Registration Voter Registration 5.1 Voter Registration Voter Authentication ti ti Enfranchisement Almost 1/3 of eligible

More information

Frequently Asked Questions about the NDIS

Frequently Asked Questions about the NDIS Frequently Asked Questions about the NDIS Contents 3 4 5 5 5 5 6 6 7 7 8 8 8 8 8 9 9 9 9 9 10 10 10 10 11 11 11 11 12 12 12 12 13 13 13 14 14 What is the NDIS and how is it different to current funding

More information

Vote-by-Mail Envelope Design for California

Vote-by-Mail Envelope Design for California Design Documentation Vote-by-Mail Envelope Design for California December 15, 2017 In 2018, the first counties in California will start the transition to a new elections model under the Voter s Choice

More information

Transparent Open Secure e- Voting using OASIS EML Exploring the Paradox. Introduction

Transparent Open Secure e- Voting using OASIS EML Exploring the Paradox. Introduction Transparent Open Secure e- Voting using OASIS EML Exploring the Paradox Introduction Citizens expect the voting process to be open and transparent and at the same time secure. When transferred to the digital

More information