Protesters sue to stop use of French e-voting machines
Non non non, say electors and campaigners
IDG News Service - Campaigners have filed suit to prevent the use of electronic voting machines in the forthcoming French presidential election. They say the machines do not meet the legal requirements set out by the country's Constitutional Council.
Seven electors from Issy-les-Moulineaux, on the outskirts of Paris, attended the Administrative Court in nearby Versailles, seeking an injunction preventing their city council from using the machines. They also filed complaints from 19 others, while campaigners in other cities petitioned their courts, said Nicolas Barcet, one of those involved.
The first round of the French presidential election will take place on Sunday, and if none of the 12 candidates standing wins an absolute majority, the two polling the most votes will go forward to a second round on May 6.
The protestors in Issy and other cities used a judicial procedure to which the court must respond within 48 hours: they will know by Friday whether their demands have been accepted.
Around 80 of the 36,000 or so municipalities in France will use electronic voting systems in the presidential election, up from about 50 for the national referendum on the European constitutional treaty in 2005.
Although only a few machines are in use at the moment, there are concerns about their nature and the way they are being introduced.
"I'm very worried about the future of our democratic system," said one of the campaigners, Laurent Pieuchot, who is also a polling station supervisor and elected member of the city council for Issy-les-Moulineaux.
French elections are conducted via secret ballot. Traditionally, electors enter a polling booth and place a slip of paper printed with the name of their chosen candidate in an unmarked envelope. The next step is quite literally transparent: They then place the envelope in a transparent ballot box. This allows observers to ensure that the ballot box was empty at the start of the election, and for voters to ensure that their ballot has been received.
But electronic voting machines do not allow lay-observers to verify proceedings in the same way, and the voter has no way of knowing that their vote has been registered as they wish, the campaigners say -- they must simply have faith in the programming of the machine.
Such concerns did not form part of Tuesday's legal challenge, though. That procedure can only be invoked on the grounds of noncompliance with the legislation.
One challenge focused on the way in which the machines are physically protected from interference. The protesters say that some models do not comply with a requirement that two different keys carried by two people are needed to open the machines and initiate the count. Another of the grounds for challenge revolved around the homologation of the voting software. The iVotronic voting machines delivered to Issy carry software dated January 2007, Pieuchot said, but the Constitutional Council voted to approve the machine on Oct. 19, 2005, based on tests of an earlier software version by verification body Bureau Veritas.
The Constitutional Council published a communiqué on March 29 listing the three models it has approved: the iVotronic, manufactured by Election Systems & Software Inc. and distributed in France by Datamatique; the Point & Vote from Indra Sistemas SA, and the ESF1 from NV Nederlandsche Apparatenfabriek (Nedap).
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Budd Van Lines Moves Data Closer to Home
- Shipping and logistics company Budd Van Lines uses Infinio to improve performance on their VDI environment. The company employs a virtualized datacenter based...
- Storage Performance with Cost Control
- As IT groups expand their server virtualization initiatives, central storage performance can become the bottleneck and create poor end user experience.
- Server-side Caching for the VMware Admin
- vExpert David Davis weights in on how best-in-class server-side caching solutions can drastically improve storage performance and reduce latency without the addition of...
- Move Mission-Critical Apps to the Cloud with AWS and F5
- Read this paper to learn about adoption inhibitors of the cloud, potential solutions, and how advanced Application Delivery Controller (ADC) technologies are critical... All Government IT White Papers
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- All Government IT Webcasts