Paperless e-voting concerns overblown, say officials
Some argue that paperless systems have been used in many previous elections without incident
Computerworld - Officials in some states that rely solely on paperless electronic voting systems today downplayed concerns raised by e-voting watchdogs about their reliability and auditability.
One in four voters in next week's federal and state elections are expected to use direct recording electronic (DRE) voting systems that offer no verifiable paper records of their vote.
Such systems are used statewide in Delaware, Georgia, Louisiana, Maryland, New Jersey and South Carolina. In five other states -- Indiana, Pennsylvania, Texas, Tennessee and Virginia -- a vast majority of voters will use paperless DREs.
Election watchdogs have long expressed concerns about the use of such systems due to what they call the inability to verify the accuracy of electronic tallies. Voter-marked paper ballots and electronic systems that generate paper copies of votes, they argue, provide for easy auditing of election tallies.
Watchdog groups have also expressed concern about the susceptibility of electronic voting systems to software errors and malicious tampering.
Jacques Berry, spokesman for Louisiana Secretary of State Jay Dardenne today brushed aside such concerns. For Tuesday's election, the state will use close to 10,000 DREs, none of which will generate a paper record.
The state has found no problems in earlier elections, and believes that there's little reason to doubt the integrity or reliability of the system, Berry said.
Each of the DRE's maintains an auditable paper trail of voters and ballots that use the machine, but there is no copy of marked ballots, he said. "We believe that is as it should be. Voter privacy is very important and we don't want to be able to go back and check" how an individual voted, he said.
"We have never had an instance of proven vote switching or anything of that sort," he added. Most problems are due to human error -- such as pressing the wrong button, he said.
All systems have seals designed to prevent tampering so it is relatively easy to detect misuse, he said. The likelihood of anyone tampering with an electronic voting system during an election is remote, he said.
Concerns about hacking are "completely irrational," he said. "I don't disagree that it is possible to hack any computer control device. But the people who claim they are able to hack into and compromise an electronic voting machine in an actual election are being ridiculous."
Chris Whitmire, public information officer for the South Carolina State Election Commission expressed similar sentiments.
The state has been using DRE systems since 2004, and millions of votes have been cast without problems, he said. "Our experience has been that the voting system has performed accurately and reliably every single time," he added.
The election commission's confidence in the system is reflected by voters in the state, Whitmire said. A statewide election conducted in 2006 showed 92% of South Carolinians believed the election was "honest, fair and accurate," Whitmire said.
According to Whitmire, each county conducts logic and accuracy tests on each machine before elections to ensure accuracy and reliability. "We take concerns about the validity of the voting system seriously, and when questions arise, we take immediate steps to address them," he said.
A total of 32 states and the District of Columbia have laws that mandate the use of voting systems with verifiable paper records. Election officials in six other states are doing so voluntarily.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
- NYC wants its old mechanical-lever voting machines back
- Twitter a big winner in 2012 presidential election
- E-voting machine swaps Obama vote for Romney; taken offline
- Ruling expected shortly in Ohio e-voting lawsuit
- Update: Lawsuit filed in Ohio over software updates to vote tabulation machines
- States rebut RNC complaints about e-voting systems
- Despite e-voting improvements, audits still needed for ballot integrity
- Obama, Romney cite Apple, tech issues in debate
- Twitter becomes new debate spin room
- IT offshoring: Romney vs. Obama
Read more about Gov't Legislation/Regulation in Computerworld's Gov't Legislation/Regulation Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Gov't Legislation/Regulation White Papers | Webcasts