Rebecca Mercuri

Last updated
Rebecca Mercuri
Alma mater University of Pennsylvania
Known for Mercuri method
Scientific career
Fields Computer security, computer forensics
InstitutionsNotable Software
Thesis Electronic Vote Tabulation: Checks & Balances  (2000)
Website www.notablesoftware.com

Rebecca Mercuri is a computer scientist specializing in computer security and computer forensics. She is considered a leading expert on electronic voting systems. [1]

Contents

Education

Mercuri earned her Ph.D. from the University of Pennsylvania in 2000 after defending her thesis on electronic voting. [2] She was a fellow at the Belfer Center for Science and International Affairs at the John F. Kennedy School of Government. [3] From 2004–2005, she was a computer science fellow at Harvard University's Radcliffe Institute for Advanced Study, focusing on transparency and trust in computational systems. [4]

Career

In 1981, Mercuri founded the computer security and forensics consulting company Notable Software, where she continues to work. [5]

In 2000, Mercuri provided expert testimony to the U.S. Court of Appeals in the proceedings following the 2000 United States presidential election, and was mentioned in a brief presented to the Supreme Court for the Bush v. Gore decision. She has also provided testimony to the United States House Committee on Science, Space and Technology; the Federal Election Commission; the United States Commission on Civil Rights; the National Institute of Standards and Technology; and the Cabinet of the United Kingdom. [6]

In 2002, Mercuri was asked to inspect the electronic voting machines that malfunctioned in the 2002 Florida gubernatorial election. [7]

Mercuri was the author of a column called "Security Watch", which was published in the Communications of the Association for Computing Machinery. She was also a contributing editor to the journal from 2002–2008. [8]

After the 2014 security breach of the United States federal government's Healthcare.gov website, Mercuri was noted in the media for the security audit she had performed the previous year, which had concluded that the website had security issues. [9] [10]

Mercuri was an expert witness for the defense in the trial of Roderick Vosburgh. Vosburgh was convicted and jailed. The case was notable for featuring as evidence images of internet-famous "camgirl" Loli-chan. [11] [12]

Mercuri method

Mercuri is known for the Mercuri method, a version of a voter-verified paper audit trail. In her method, a person casts their votes on a machine which then outputs them on an enclosed paper record for verification. The electronic entry provides some of the efficiency afforded by purely electronic systems; the enclosure ensures that the votes are not electronically tampered with after being cast; and the glass safeguards the vote from being removed from the voting booth before it is deposited into the secure ballot box. [1]

Related Research Articles

Computer security The protection of computer systems from theft or damage

Computer security, cybersecurity or information technology security is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

DEF CON hacker gathering in Las Vegas

DEF CON is one of the world's largest and most notable hacker conventions, held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions. Contests held during the event are extremely varied, and can range from creating the longest Wi-Fi connection (aircrack-ng) to finding the most effective way to cool a beer in the Nevada heat.

Premier Election Solutions, formerly Diebold Election Systems, Inc. (DESI), was a subsidiary of Diebold that makes and sells voting machines.

Electronic voting is voting that uses electronic means to either aid or take care of casting and counting votes.

Edward Felten professor of computer science and public affairs

Edward William Felten is the Robert E. Kahn Professor of Computer Science and Public Affairs at Princeton University, where he was also the Director of the Center for Information Technology Policy from 2007 to 2019. On November 4, 2010, he was named Chief Technologist for the Federal Trade Commission, a position he officially assumed January 3, 2011. On May 11, 2015, he was named the Deputy U.S. Chief Technology Officer.

Computer forensics

Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.

Voter verifiable paper audit trail (VVPAT) or verified paper record (VPR) is a method of providing feedback to voters using a ballotless voting system. A VVPAT is intended as an independent verification system for voting machines designed to allow voters to verify that their vote was cast correctly, to detect possible election fraud or malfunction, and to provide a means to audit the stored electronic results. It contains the name of the candidate and symbol of the party/individual candidate.

A direct-recording electronic (DRE) voting machine records votes by means of a ballot display provided with mechanical or electro-optical components that can be activated by the voter ; that processes data by means of a computer program; and that records voting data and ballot images in memory components. After the election it produces a tabulation of the voting data stored in a removable memory component and as printed copy. The system may also provide a means for transmitting individual ballots or vote totals to a central location for consolidating and reporting results from precincts at the central location. The device started to be massively used in 1996, in Brazil, where 100% of the elections voting system is carried out using machines.

National Software Reference Library organization

The National Software Reference Library (NSRL), is a project of the National Institute of Standards and Technology (NIST) which maintains a repository of known software, file profiles and file signatures for use by law enforcement and other organizations involved with computer forensic investigations. The project is supported by the United States Department of Justice's National Institute of Justice, the Federal Bureau of Investigation (FBI), Defense Computer Forensics Laboratory (DCFL), the U.S. Customs Service, software vendors, and state and local law enforcement. It also provides a research environment for computational analysis of large sets of files.

Dorothy E. Denning American information security researcher

Dorothy Elizabeth Denning, born August 12, 1945, is a US-American information security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She published four books and over 200 articles. Inducted into the National Cyber Security Hall of Fame in 2012, she is now Emeritus Distinguished Professor of Defense Analysis, Naval Postgraduate School.

The Mercuri method is another name for a Voter Verified Paper Audit Trail—a modification to DRE (electronic) voting machines that provides for a physical (paper) audit record that may be used to verify the electronic vote count.

Secure Electronic Registration and Voting Experiment (SERVE) was an experiment by the Federal Voting Assistance Program (FVAP) to allow military personnel and overseas citizens covered by the Uniformed and Overseas Citizens Absentee Voting Act (UOCAVA) to vote in elections in the United States via the Internet. While called an experiment, SERVE included participation from 51 counties including up to 100,000 voters and ballots cast would have been counted toward actual election results. According to the SERVE security report, there were "two groups of eligible voters: (1) American citizens living outside the U.S., and (2) military personnel and their dependents, regardless of whether they reside in the U.S. or overseas."

Electronic voting by country varies and may include voting machines in polling places, centralized tallying of paper ballots, and internet voting. Many countries use centralized tallying. Some also use electronic voting machines in polling places. Very few use internet voting. Several countries have tried electronic approaches and stopped, because of difficulties or concerns about security and reliability.

Information technology law concerns the law of information technology, including computing and the internet. It is related to legal informatics, and governs the digital dissemination of both (digitalized) information and software, information security and electronic commerce. aspects and it has been described as "paper laws" for a "paperless environment". It raises specific issues of intellectual property in computing and online, contract law, privacy, freedom of expression, and jurisdiction.

Susan Landau is an American mathematician, engineer, cybersecurity policy expert, and Bridge Professor in Cybersecurity and Policy at the Fletcher School of Law and Diplomacy at Tufts University. She previously worked as a Senior Staff Privacy Analyst at Google. She was a Guggenheim Fellow and a Visiting Scholar at the Computer Science Department, Harvard University in 2012.

Katie Moussouris is an American computer security researcher, entrepreneur, and pioneer in vulnerability disclosure, and is best known for her ongoing work advocating responsible security research. Previously a member of @stake, she created the bug bounty program at Microsoft and was directly involved in creating the U.S. Department of Defense's first bug bounty program for hackers. She previously served as Chief Policy Officer at HackerOne, a vulnerability disclosure company based in San Francisco, California, and currently is the founder and CEO of Luta Security.

Election audit

An election audit is any review conducted after polls close for the purpose of determining whether the votes were counted accurately or whether proper procedures were followed, or both.

Strengthening State and Local Cyber Crime Fighting Act of 2017

The Strengthening State and Local Cyber Crime Fighting Act of 2017 is a bill introduced in the United States House of Representatives by U.S. Representative John Ratcliffe (R-Texas). The bill would amend the Homeland Security Act of 2002 to authorize the National Computer Forensics Institute, with the intent of providing local and state officials with resources to better handle cybercrime threats. Ratcliffe serves as the current chairman of the House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection.

Mercuri is a surname. Notable people with the surname include:

Electronic voting in the United States

Electronic voting in the United States involves several types of machines: touch screens for voters to mark choices, scanners to read paper ballots, scanners to verify signatures on envelopes of absentee ballots, and web servers to display tallies to the public. Aside from voting, there are also computer systems to maintain voter registrations and display these electoral rolls to polling place staff.

References

  1. 1 2 Barrett, Grant (2006). Hatchet Jobs and Hardball: The Oxford Dictionary of American Political Slang. Oxford University Press. ISBN   9780199760459.
  2. Mercuri, Rebecca (15 March 2007). "Memorandum of Clarification". Notable Software. Retrieved 31 August 2016.
  3. Lipner, S.B. "Speaker Biographies" (PDF). Institute of Electrical and Electronics Engineers. Retrieved 4 September 2016.
  4. Lambert, Craig (November–December 2004). "Voting into Vapor". Harvard Magazine. Retrieved 31 August 2016.
  5. "History". Notable Software. Retrieved 31 August 2016.
  6. "Fellow Rebecca Mercuri". Radcliffe Institute for Advanced Study. Harvard University. 2005. Retrieved 4 September 2016.
  7. Manjoo, Farhad (5 November 2002). "Voting into the void". Salon. Retrieved 4 September 2016.
  8. "Rebecca Mercuri". Notable Software. Retrieved 4 September 2016.
  9. Norman, Brett (4 September 2014). "GOP on attack over health site hack". Politico. Retrieved 4 September 2016.
  10. Storm, Darlene (8 September 2014). "Healthcare.gov hacked? If only someone had warned it was hackable...Oh wait". Computerworld. Retrieved 4 September 2014.
  11. "4chan Camgirl Loli-chan Grows Up". Miami New Times. Retrieved 24 September 2017.
  12. "UNITED STATES v. VOSBURGH". FindLaw. Retrieved 24 September 2017.