Q&A: E-voting activist more optimistic about voting systems
Most states have switched to paper records, Rubin notes
Computerworld - For more than a decade, Aviel "Avi" Rubin, a professor of computer science at Johns Hopkins University in Baltimore and an e-voting activist, has been a vocal critic of e-voting systems across the nation. In 2006, Rubin wrote the book, Brave New Ballot: The Battle to Safeguard Democracy in the Age of Electronic Voting, which heavily criticized e-voting machines for security and reliability shortcomings. Rubin talked with Computerworld about the recent presidential primary election cycle and his thoughts on e-voting going into the November elections. The following is an edited version of that interview.
Now that we've finished our presidential primaries, how do you think e-voting went this election season? E-voting is really dangerous and unpopular with security people, not because of how the election is likely to go in what's perceived, but with the problems that might happen that are not perceived.
The kinds of problems that we worry about are exactly the kind that don't necessarily have a noticeable manifestation. I do think one of the risks of fully electronic voting is that a small mistake can be magnified in scale all over the place because the touch-screen e-voting machines are all the same, they're all electronic, they all require power, and they all use computer code and a particular set of circumstances that could cause something bad to happen everywhere. I don't usually think it's likely to happen, and in this case, it doesn't appear to have happened. But the concerns of security and auditability are not necessarily things that would leave any incriminating evidence of a potential problem.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts