Channel 04 --- Imagination Station

FREE , UNCENSORED , INCONSPICUOUS and MYSTERIOUS.

Top Dozen

  • Youth Justice 😡
  • TPS News
  • TAX Scam
  • Quebec
  • New Zealand
  • NATO
  • icij
  • Debauchery
  • Dark Tracer
  • Crime Stoppers
  • CRIME
  • CRIB
  • Clearview
  • CCLA
  • Carbon brief

Thursday, July 8, 2021

A Beginner’s Guide to Electronic Voting and Fair Elections

 


The Friday Times
Home 

A Beginner’s Guide to Electronic Voting and Fair Elections

Major General Syed Ali Hamid by Major General Syed Ali Hamid
 
 July 9, 2021
 

Electronic audit of the results along with a paper trail are prominent features of the e-voting system in the Philippines

Voting is an important part of our political landscape but while most people are galvanized to participate in elections, they don’t have faith in the voting system. The integrity of elections is questioned from voter registration to vote submission and everything in between – particularly by those who lose. Electoral integrity is a term that refers to international standards and global norms governing the appropriate conduct of elections. These standards apply throughout the electoral cycle, including during the pre-electoral period, the campaign, polling day, and in its aftermath.

Introducing technology into the election process has many advantages. The casting of votes becomes far easier, encouraging people to participate. The results appear within a couple of hours, which enhances the confidence of the candidates and the voters in the process and results. This in turn reduces incidents of post-election violence. In the long-term it reduces organizational and implementation costs significantly and compared to traditional paper voting, increases the efficiency of election management. While most people recognize and appreciate these advantages, they find it difficult to accept the fact that it is also a lot more secure than manual voting.

The reason is simple. It is a common human failing that what you cannot see you don’t trust. The teller at the bank counter counts a wad of notes faster than your eye can follow, but because they have done it up-front, most of us will trust the process. Similarly, the candidates and their representatives at the polling booths in Pakistan feel more comfortable when they see a battery of teachers emptying ballot boxes onto the table and counting votes. However, we all know that human error, fraud and manipulation leading on to violence are central to electoral processes in many third world countries and Pakistan is no exception.

Polling staff in India unpack EVMs and set up polling booths

The security of paper-based manual balloting with a manual count is extremely low. The fact that there are just single copies of each paper ballot makes them extremely vulnerable. Paper ballots can be destroyed, tampered with, manipulated, intercepted, lost, forged, or fraudulently pre-marked. Ballot boxes can be lost or stuffed with fraudulent votes. Every step from voting to counting to final tally, and at every else in between are subject to human error, malicious or otherwise. Yet there are many politicians and analysts who are not willing to allow the introduction of a well-designed, special-purpose system that reduces the possibility of results tampering and eliminate fraud. They question its security, secrecy and safety. This article considers critical aspects of e-voting – security and auditing of voting machines, identification of voters, risk-limiting audit and creating a paper trail.

The logistics and warehousing involved in automated elections can be a complex undertaking. However, it is miniscule compared to the scale of logistics and warehouses routinely handled by project managers of large mail-order companies like Amazon and Ali Baba and manufacturing giants like Toyota. Election commissions worldwide store EVMs and election paraphernalia under lock and key, with armed security, surveillance cameras and access control. It would be next to impossible for unauthorized persons to access the machines and any tampering can be easily detected in the pre-election audits. A few days prior to the elections, the e-voting system is audited independent of vendors and preferably by computer security and telecom experts. If a pre-election audit is completed successfully and the automated election system gets the approval of all parties, it will increase the public’s confidence that will result in more voters willing to participate.

Biometric voter authentication (BVA) deters fraud by preventing people from attempting to vote multiple times but NADRA admits that at best it can recognize fingerprints of 82% voters. The anti e-voting lobby in Pakistan cite this as one of the weaknesses of the system. They don’t realize that voter authentication is a completely distinct and separate process from e-voting. Voter authentication can still be performed in the traditional method, even while e-voting proceeds independently and with all the attendant benefits. The pioneers of e-voting did not immediately adopt BVA. Brazil and Venezuela went ahead with automated elections and later shifted to BVA, while the Philippines, India, Bulgaria, Colombia and the USA added BVA to supplement the traditional process.

In fact, to protect the secrecy of the vote, any connection between the voter’s identity and the vote cast is avoided. A secret vote is the essential integrity safeguard because it enables voters to cast their ballot with full independence. A well-designed e-voting system further ensures secrecy by completely randomizing the votes cast and uses sophisticated algorithms to ensure that votes are never stored in sequence. There is so much that technology allows that can never be achieved by a manual system and yet the less informed are bent on creating suspicion around e-voting.

A well designed tamper-proof and tamper-evident system allows for risk-limiting audits that guarantee the legitimacy of results. A risk-limiting audit (RLA) checks a random sample of voter-verifiable paper ballots, giving strong evidence to support the reported election results. The audit stops as soon as it finds strong evidence that the reported outcome was correct. If the reported outcome was wrong because ballots were miscounted, it triggers a full recount that corrects the outcome before the election results are certified. RLAs provide strong assurance that the final outcome matches the ballots cast. Contests with wide margins can be audited with very few ballots, freeing up resources for auditing closer contests, which generally require checking more ballots.

Unlike manual systems, a well-designed e-voting system produces multiple copies of every data point both in electronic and paper-based forms, creating a very rich audit trail that cannot be circumvented. It also ensures that data is never lost, modified or destroyed. Audit trails give all stakeholders in the election the possibility to verify that the results reflect the will of the voters. Such systems have become the ‘Gold Standard’ in automated elections, providing both electronic records and corroborating paper records of the vote. The vote is verified by the voter-verified paper report (VVPR) but cannot be traced back to the voter. This double set of records provides a concrete means to audit the election after the conclusion of the voting.

As a best practice, well-designed voting systems furnish physical proof of all votes cast, in case a recount is needed. A printed paper ballot is now a mandatory component of automated election systems as it facilitates the most common audit performed after closing the polling centers on election day: comparing vote receipts against tally reports. With paper trails, post event audits can also be carried out upon request from any of the parties involved. A paper trail for audit is neither a complex nor expensive feature. As soon as the ballot is cast, EVMs with integrated printers automatically generate a voter verified paper trail (vote receipts). Printers represent 8-10% of the cost of voting machines and use the internal batteries of the voting machines.

Finally, the e-voting solution to be implemented has to be proven in multiple countries with different geographies and particular circumstances; and the company deploying the technology must have diverse experiences deploying voting technologies on a massive scale, as elections are unique projects. Its nature is fundamentally different from any other technology project: implementation happens on one day, it is nationwide, a large portion of the population uses the technology within eight or so hours on a pre-determined day, the project cannot be postponed, deployment means a massive logistical operation and coordination, and implementation mistakes could have drastic negative consequences for the entire country.

In the vast majority of countries that are discussing the implementation of an e-voting solution, the entire discussion revolves only around the voting machine equipment itself. Neglected is the question how this hardware will operate in ten or hundred thousand of polling locations on a single day without failure. An IT graduate may probably be able to put together a system that records votes electronically and totals the votes. The difference between a solution that works in a meeting room and a system that is trusted, immune to attacks and is working in a pre-determined timeframe nationwide is however fundamental. Ignoring the deployment aspect of electronic voting during initial discussions is another reason why implementation projects fail when election modernization is run on significant scale.

A well-designed automated election system should be both tamper-proof and tamper evident. When an automated election system lends itself to detailed scrutiny of its software source code at all levels, as well as its security mechanisms for data storage and transmission, it succeeds in providing ample guarantees that will foster the confidence of both election authorities and voting public alike.

Tags: Perspective
Major General Syed Ali Hamid

Major General Syed Ali Hamid

Related Posts

On the (book)shelf

On the (book) shelf

 JULY 9, 2021

Mystics of Maira Sharif

 JULY 9, 2021

Predicting the New Normal: the Future of Covid-19

 JULY 9, 2021

Time Travel through Sindh and Social Reform in the 1930s – V

 JULY 9, 2021

Leave a Reply

Your email address will not be published. Required fields are marked *

19 − 13 = 

This site uses Akismet to reduce spam. Learn how your comment data is processed.

SUCH GUP

Such Gup
by TFT
 JULY 2, 2021

Diary of a Social Butterfly

Diary of a Social Butterfly
by TFT
 JULY 2, 2021

SUCH GUP

Such Gup
by TFT
 JUNE 25, 2021

Howzzat

Howzzat
by TFT
 JUNE 25, 2021
  • About Us
  •  
  • Online advertisement tariff

© 2019 All copyrights reserved by The Friday Times

  • Home
  • ePaper
  • Editorials
  • News
  • Features
  • Hot Features
  • Audio
  • Good Times
  • Blogs

© 2019 All copyrights reserved by The Friday Times

Posted by Bismuth Pentium -- M25G at 4:02 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

The Truth is ..All Lives Matter .

The Truth is ..All Lives Matter .
The Truth is ..All Lives Matter , it's SAD to Find out some People think black Lives Doesn't Matter or they Matter LESS😡

Using a Vehicle as a Weapon

Using a Vehicle as a Weapon
Using a Vehicle as a Weapon

Animals Use their Mouth as a Weapon. What do Humans Use as a Weapon ? Atomic , Nuclear , Vehicles ,

Animals Use their Mouth as a Weapon. What do Humans Use as a Weapon ? Atomic , Nuclear , Vehicles ,
Humans use Guns , Knives , RPGS...etc

dark tracker

dark tracker
dark web

V 8765487654

  • A
  • Bruce McArthur.. Toronto
  • 2019 Police report on Hate

F 97654487543

  • B
  • Mao_Zedong
  • AWZ Ventures
  • Killing_of_Ahmaud_Arbery

m

m
b

Racism

Racism
Injustice

WE ARE ALL RUSSIAN SPIES

WE ARE ALL RUSSIAN SPIES
INCONSPICUOS AGENTS

S 87654487543

  • Y
  • Bill 21
  • Communism
  • Socialism
  • Capitalism
  • Islamism
  • New Ball Fire Extinguisher
  • Galileo_affair

B 876544876

  • G
  • Abraham Accords
  • Aspen Security Group
  • Tahrir Square 2011 Egypt
  • NISA Somalia
  • Sabra_and_Shatila_massacre
  • Wiki Middle East Forum

Hiroshima and Nagasaki.( August 6-9 )

Hiroshima and Nagasaki.( August 6-9 )
Humans are a Million times More Dangerous than Animals

History of Palestine

History of Palestine
Bitter Truth

Cyberspace Solarium Commission

Cyberspace Solarium Commission
Defense

Canadian Dark History

Canadian Dark History
Residential Schools

Lost Homes

Lost Homes
Palestine

No Justice ,No Peace

No Justice ,No Peace
Straight forward

Middle East

Middle East
Statistics

Al Quds day

Al Quds day
Palestine

Executions...Top ten

Executions...Top ten
Y 2020

Ff

Ff
Pp

N

N
D

M

M
V

My Home . Earth. Seen from the Red Planet.

My Home . Earth. Seen from the Red Planet.
Earth seen from mars

NASA

NASA
Logo

Mars'Touchdown


Police Brutality

Police Brutality
How Many Weren't FILMED ?

Fb

Fb
Warning

The NRA

The NRA
Guns and Gangs

Doomsday

Doomsday
Clock

K 446578

  • 222 TIPS - Crime Stoppers
  • CID Kenya
  • 25 Most Failed States
  • Failed State
  • VICE...
  • Ontario Crime Stoppers
  • Breitbart
  • Bill C-7. Dying
  • Police Brutality
  • UN for Climate change
  • Justia
  • Amnesty international
  • Toronto Police News. Release
  • The Criminal Code of Canada
  • D.O.D. USA News release
  • D.O.D. Usa
  • Halifax Security Forum
  • Munich Security Conference
  • Bill C 22
  • 5 th. Homicide of 2021
  • Global Uranium Time lapse
  • Global Nuclear Timelapse
  • Crime Stoppers
  • Terrorist by County
  • next block homicide
  • 9-11 Attacks
  • Fox on Terror
  • Qasem Soleimani Assassination 😡

100 seconds. Doomsday Clock

100 seconds. Doomsday Clock
To Midnight

Homicide

Homicide
Book

Crime

Crime
Vocabulary

Mig 66654

  • JCPA Nuclear deal
  • Iran Nuclear deal
  • Wiki George Floyd
  • Paris Agreement or Accord
  • Genocide
  • UN on drugs and Crime
  • Clearview A.I
  • The Full List of Terrorist...by the Feds.
  • Terrorist....Classified by The Feds.
  • Federal Anti Racism
  • Doomsday Clock
  • Far Right
  • Oath_Keepers

AN INCIDENT or AN ACCIDENT

AN  INCIDENT or AN ACCIDENT
POLICE

Black

Black
Tears

R

R
E

D 87544678

  • CSIS
  • BBC Hard Talk
  • IAEA
  • Grenada
  • Grenfell Towers
  • Amber Alert
  • DATA -- Toronto police
  • Crime Analysis
  • IMO Statement
  • About imo Stabbing...YT
  • IMO police release
  • IMO Stabbing Fatality
  • Cyber Command
  • Cops Video 7
  • Cops video
  • Kenyan Coup

Doomsday Clock

Doomsday Clock closest to midnight in 73 years amid nuclear war fears, climate change:


https://globalnews.ca/news/6453797/doomsday-clock-2020/

C 87655

  • DHS Websites
  • Pegasus
  • Threats
  • CSiS
  • Ministry of Solicitor General
  • Cyber tip
  • Atlantic Council
  • Atlanticim
  • Towards
  • Parler
  • Cellebrite
  • Munk School

2 - Fire

2 - Fire
Building Burning - Grenfell

Sherif

Sherif
Coroner

X 87675657

Rip off
Scams
Crimes
Frauds
ONLINE

Predators and Preys


FOOD CHAIN

Introduction: PredationEdit

Ultimately, the source of energy for all life originates from the sun. Plants utilize the sun's energy, animals eat plants and utilize the plants' energy, and some animals eat other animals and utilize their energy. The food chain is a cycle of predation, and although it is necessary for life to exist, it has to have limits. Prey develop defenses against their predators, and predators strive to overcome such obstacles. The balance between survival of prey and predator is part of the reason that our ecosystem is so diverse.

Nuclear Reactors in the world. About ~ 500

HIROSHIMA: 75 years since atomic bomb obliterated city

HIROSHIMA: 75 years since atomic bomb obliterated city
atomic bomb

Doomsday

Doomsday
Clock

Ontario Nuclear Alert

Ontario Nuclear Alert
Warnings

Knife

Knife
Attack

What's NOT Available on the INTERNET ?

What's NOT Available on the INTERNET ?

What can't we access online ?

L 77786543

  • Sex Education
  • Carnal Knowledge
  • Haaretz
  • Wiki Caliphate Podcasts
  • Cost of War
  • Sex Crimes
  • INCEL
  • SHOOTING / HOMICIDE - YEAR TO DATE
  • Mueller Report
  • WikiLeaks
  • Bellingcat
  • Global Research
  • THE DARK WEB AS YOU KNOW IT IS A MYTH
  • Access-dark-web
  • Wiki Dark WEB
  • Search THE DARK WEB

Blog Archive

  • ►  2022 (12)
    • ►  May (1)
    • ►  March (3)
    • ►  February (4)
    • ►  January (4)
  • ▼  2021 (65)
    • ►  December (3)
    • ►  October (2)
    • ►  September (7)
    • ►  August (14)
    • ▼  July (9)
      • Hiroshima and Nagasaki
      • Racism
      • Dark Tracker
      • Right
      • The Story
      • Germany Thwarts Cyberattack, Denies Impact on Bank...
      • A Beginner’s Guide to Electronic Voting and Fair E...
      • Cyberspace Solarium Commission
      • Canadian Dark History
    • ►  June (5)
    • ►  May (8)
    • ►  April (2)
    • ►  March (4)
    • ►  February (8)
    • ►  January (3)
  • ►  2020 (10)
    • ►  November (3)
    • ►  August (3)
    • ►  July (1)
    • ►  May (1)
    • ►  April (2)
  • ►  2019 (5)
    • ►  June (1)
    • ►  May (2)
    • ►  March (1)
    • ►  February (1)
  • ►  2018 (1)
    • ►  April (1)

L 5946212

  • Islam against extremism
  • stimson
  • carnegie endowment
  • Dying
  • Terror Info.
  • The Muslim Turtle
  • Channel 4
  • NRA
  • The Atlantic Mag.
  • HOOVER
  • Gate stone institute
  • urban dictionary
  • Theory of Mind
  • PHILOSOPHY OF TIME
  • disqus

L 5462545

  • UK. Ncsc
  • All about Sex Show
  • Abdurahman Abdi Ottawa
  • New Zealand Mosque Shooting
  • Guantanamo Prison
  • Abu Graib prison ,Iraq
  • Sacred Texts
  • Bosnia
  • .Breitbart.
  • hanson robotics
  • jihad watch
  • HEAVY
  • Diversions
  • vice news
  • the daily beast
  • GAWKER
  • JUST RIVALS
  • solitaire
  • GAMES yahoo

10

10

Lions and a Buffalo 👹

Lions and a Buffalo 👹
Food Fight 😡

Aviation🌶️📌

Aviation🌶️📌
Alphabet 🍉🔥

The World is on Fire.

The World is on Fire.
Energy Use Round the Globe

Usa

Usa
Cyber

2345

2345
5432

g

g
v

Online Criminals

Online Criminals
It is Wrong to break the Law !!

Sex Crimes

Sex Crimes
Child Porn

God Forgives....the Bandidos DO NOT !

God Forgives....the Bandidos DO NOT !
The Bandidos

K

K
Z

5678

5678
8765

1234

1234
4321

debauchery

debauchery

noun

Synonyms and Antonyms of debauchery

1immoral conduct or practices harmful or offensive to society
  • a Roman emperor's descent into debauchery
Synonyms of debauchery

corruption, depravity, immorality, iniquitousness, iniquity, libertinism, licentiousness,profligacy, sin, vice

Words Related to debauchery

bad, badness, blackness, evil, evildoing, ill, turpitude, villainy, wickedness, wrong

atrociousness, evilness, heinousness, sinfulness, unscrupulousness, viciousness, vileness,villainousness

devilry (or deviltry), fiendishness

corruptness, debasement, degeneracy, degeneration, depravedness, dissoluteness,dissolution

indecency, lasciviousness, lechery, lewdness, looseness, perversion, pervertedness,wantonness

abomination, anathema, taboo (also tabu)

criminality, reprehensibleness

baseness, despicableness, dirtiness, lowness, meanness

lousiness, miserableness, wretchedness

Near Antonyms of debauchery

good, right

honesty, honor, integrity, legitimacy, probity, rectitude, scrupulosity, scrupulousness,uprightness

goodness, righteousness, virtuousness

blamelessness

chastity, innocence, perfection, pureness, purity, spotlessness

cleanness, correctness, decency, decorousness, propriety, rightness, seemliness


Cyber War

Cyber War
Global Digital Conflict
Simple theme. Powered by Blogger.

TPS OPERATIONS

Tweets by TPSOPERATIONS

Fire , Burning Building

Fire , Burning Building
Danger