Q&A: For e-voting, Holt looks to undo HAVA's havoc
The race is on to make every vote auditable in time for the November elections
Computerworld - The Help America Vote Act of 2002 (HAVA) has forced upon the electorate immature, insecure e-voting systems that undermine confidence in the elections process, says U.S. Rep. Rush Holt (D-NJ). The good news, he says, is that untangling the problem may not be out of reach -- even before the November general election -- if we move quickly.
Electronic voting systems purchased and pressed into service in the wake of HAVA have failed significant tests. Several states have examined the machines they had previously selected and found them seriously lacking. In fact, the California Secretary of State last year de-certified the Diebold Inc., Hart InterCivic Inc. and Sequoia Voting Systems Inc. direct recording electronic (DRE) systems the state had previously committed to after machines from all those companies failed in testing. And in December, Ohio Secretary of State Jennifer Brunner released the EVEREST study, which reported that leading systems have failed basic firewall, antivirus, password and system-configuration safety checks -- making them vulnerable to the most basic attack methods.
Security aside, the biggest problem with e-voting systems is that there is no way to attest to the validity of a voter record, says Holt, who holds a B.A. in physics and a 1979 patent for a type of density gradient. For the past six years, Holt has championed the Voter Confidence and Increased Accessibility Act (H.R. 811), which would require voter-verifiable paper ballots and random, mandatory audits of votes cast over e-voting systems in all counties across all states.
H.R. 811 passed the House Administration Committee in May and is awaiting a full House vote. In the meantime, there are the 2008 elections to attend to, so in January, Holt announced the Emergency Assistance for Secure Electronic Elections Act of 2008. That bill would provide $500 million to reimburse states for costs incurred in adding a paper-based system for verification and audit.
According to Verified Voting, 22 states have not yet implemented voter-verified paper records (VVPR) for every vote. VVPRs allow individual voters to examine the accuracy of the ballots they've just marked before each ballot is tallied.
Can political efforts like Holt's and grass-roots efforts such as those by Verified Voting reach the these 22 states in time? We asked Holt to speak briefly on the current situation.
E-voting is second on your list of issues. Why is this particular issue so important to you personally? I attribute it to the scientist part of me. Scientists and engineers would look all look at these systems and say, "You need a paper receipt that verifies the vote." A politician, on the other hand, is slow to recognize that software can't verify itself. The politician in me saw that [the lack of ability to verify votes] was a critical flaw in our voting systems, which could undermine confidence in the entire voting process.
- 5 Ways Dropbox for Business Keeps Your Data Protected Protecting your data isn't a feature on a checklist, something to be tacked on as an afterthought. Download here to find out how...
- The Keys to Securing Data in a Collaborative Workplace Losing data is costly. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off...
- Evaluating File Sync and Share Solutions: 12 Questions to Ask about Security File sync and share can increase productivity, but how do you pick a solution that works for you? Download to learn some important...
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!