Experts say changes in e-voting likely to come
It's been a long time coming, say watchdogs, but ...
IDG News Service - Rules requiring independent audit mechanisms for electronic voting machines are likely coming, but the changes won't happen overnight, a group of advocates said Friday.
More than 18,000 undervotes in a still-disputed Florida congressional election from November show the need for independent audit mechanisms, said panelists at an event sponsored by several advocacy groups, including the Electronic Frontier Foundation and Common Cause.
"We're at this point ... where I believe there's a consensus that we need to do something," said Trey Grayson, secretary of state in Kentucky. "However, the consensus is ahead of the solution."
All but one of Kentucky's counties use e-voting machines without paper trails, and many local elections officials are opposed to making big changes, Grayson said. Kentucky has used e-voting machines since the 1980s, and only recently have some state residents questioned their security and reliability, he added.
While many e-voting security critics have called for printouts to back up e-voting results, printers currently in use have encountered problems in recent elections, said Courtenay Strickland-Bhatia, president and chief executive of the Verified Voting Foundation. Some printers have jammed, and with some e-voting machines printouts weren't easily accessible for voters who wanted to double-check their votes, she said.
But e-voting machines need audit mechanisms and a "transparent" design that allows voters to understand how votes are counted, she added. Without an audit mechanism, "it simply is not possible to know if a problem has happened" in an e-voting machine, she said.
Beyond audit mechanisms, states need to require random audits of machines, added Lawrence Norden, an e-voting security researcher and associate counsel at the Brennan Center for Justice at New York University. While 27 states currently require paper-trail mechanisms along with e-voting machines, only 11 states require voting officials to conduct audits matching the electronic results with the paper ones.
No e-voting machine vendors were represented at the event. In November, Michael Kerr, director of the Election Technology Council at the Information Technology Association of America (ITAA), said the election generally went smoothly. The ITAA, a trade group that represents e-voting machine vendors, expects voters to adjust to the new systems that many states adopted after paper ballot problems in the 2000 presidential election, he said.
E-voting vendors will build machines that include audit trails if that's what customers want, Kerr said in December, after the U.S. Election Assistance Commission (EAC) approved a testing and certification program for electronic-voting systems.
Also in December, the Technical Guidelines Development Committee, an advisory board to the EAC, voted to draft requirements for independently verifiable voting records to be used with e-voting machines.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva.