Despite e-voting improvements, audits still needed for ballot integrity
E-voting technologies have gotten more reliable since 2000, Caltech-MIT Voting Technology Project says
Computerworld - Technology and process upgrades implemented since the controversial 2000 presidential election have made electronic voting machines more secure and reliable to use, the Caltech-MIT Voting Technology Project said in a report last week.
Even so, the only way to ensure the integrity of votes cast with the systems is to have mandatory auditing of the results and of all voting technologies used in an election, the 85-page report cautioned.
Rather than setting security standards for election equipment, the better approach for safeguarding ballot integrity is to hand-count a sufficiently large and random sample of the paper records of votes cast electronically, it said. "The 2000 United States presidential election put a spotlight on the fragility and vulnerability of voting technology," the report said. "It became clear that providing robust, accurate, and secure voting systems remained an important open technical problem" for the United States.
The Voting Technology Project is a joint initiative between MIT and Caltech. It was launched originally to investigate the causes of the voting problems in Florida in 2000 and to make recommendations based on the findings.
Some progress has been made since 2000, said Michael Alvarez, professor of political science at Caltech and co-director of the Voting Technology Project. The antiquated lever-activated punch-card voting systems that led to the infamous hanging chad fiasco in Florida have been mostly replaced with newer, more reliable optical scan and electronic voting systems, he said.
In the upcoming Nov. 6 elections, nearly three out of five counties will use optical-scan technology, with the rest relying on some form of direct-record electronic systems. A very small number of counties will use purely hand-counted paper ballots.
In the past 10 years, there has also been a move away from all-electronic voting systems to electronic systems that support a voter verifiable paper ballot trail, the report noted. That trend has been driven largely by security concerns related to direct-record electronic (DRE) voting machines from companies such as Diebold.
DRE machines processed and stored all ballots electronically and offered little way for voters and election officials to determine for certain whether votes were being recorded and counted correctly. Studies conducted by numerous researchers over the past few years have shown DRE systems to be highly vulnerable to all sorts of tampering and compromises because of their poor design and engineering.
Because of such concerns, much attention has been paid to ensure that votes cast electronically this year have a paper record that can be counted and verified manually if needed. States such as California in particular have led the effort to get voting machine vendors to implement better security. The report pointed to California's decertification of all DRE machines in 2007 as one example of such efforts.
Post-election auditing technologies and approaches have also improved substantially since 2000, thanks mainly to efforts by security researchers and cryptographers, Alvarez said. This year, he said, at least half of all states will conduct post-election audits based on sound statistical principles. Others, including California, have been conducting pilot risk-limiting audits to identify potential issues before votes are cast.
Another big improvement since 2000 is the growing use of centralized statewide voter registration databases. Those databases have enabled quicker voter identification and have given states a better way to address vote loss due to registration problems, Alvarez said. Voter registration databases have also made it easier for state election officials to roll out early voting facilities, he said.
In 2000, between 4 million to 6 million votes were lost nationwide because of voting equipment and ballot problems and because of voter registration problems. But thanks to new technologies and improved processes implemented since then, the number of lost votes is expected to be dramatically lower.
Even so, concerns remain. The increased interest in Internet voting and voting by mail is worrisome, Alvarez noted. Both methods are inherently insecure and vulnerable to tampering and fraud. The federal system to certify electronic voting technologies to specific security standards has also been costly to implement and not particularly effective, he said.
When voters go to the polls this year they will see little that is new in terms of technology Alvarez said. "We haven't had an opportunity to improve voting technology" because of the recession, he said. "The problem that states and counties have had with public finances have made it difficult for election officials to invest in new technologies. We will hopefully see that change as public finances improve."
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His email address is email@example.com.
- NYC wants its old mechanical-lever voting machines back
- Twitter a big winner in 2012 presidential election
- E-voting machine swaps Obama vote for Romney; taken offline
- Ruling expected shortly in Ohio e-voting lawsuit
- Update: Lawsuit filed in Ohio over software updates to vote tabulation machines
- States rebut RNC complaints about e-voting systems
- Despite e-voting improvements, audits still needed for ballot integrity
- Obama, Romney cite Apple, tech issues in debate
- Twitter becomes new debate spin room
- IT offshoring: Romney vs. Obama
Read more about Government IT in Computerworld's Government IT Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Mobile Policy Checklist
- Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Mobile Applications Case Study: 8 Billion Transactions a Day
- The story documents how the online brokerage company tradeMONSTER created a custom mobile app and the success gleaned from this initiative. Also covered...
- Who's afraid of the big (data) bad wolf? Survive the big data storm by getting ahead of integration and governance functional requirements
- This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
- Understanding big data so you can act with confidence
- Automating information integration and governance and employing it at the point of data creation helps organizations boost confidence in their big data. All Government IT White Papers
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- Testimonial: Cystic Fibrosis Trust Peter Hawkins, the Head of IT for Cystic Fibrosis Trust, discusses the role CommVault's Simpana software platform plays in improving the company's information...
- PST Archiving: What is it and How is it Done? Learn more about what PST data is, the risks relating to it, and how the new PST Archiving feature in the Simpana 10...
- How to Select the Right IoT Platform We are rapidly entering a world where almost everything will be connected to the cloud and managing these connected things and leveraging the...
- All Government IT Webcasts