Despite e-voting improvements, audits still needed for ballot integrity
E-voting technologies have gotten more reliable since 2000, Caltech-MIT Voting Technology Project says
Computerworld - Technology and process upgrades implemented since the controversial 2000 presidential election have made electronic voting machines more secure and reliable to use, the Caltech-MIT Voting Technology Project said in a report last week.
Even so, the only way to ensure the integrity of votes cast with the systems is to have mandatory auditing of the results and of all voting technologies used in an election, the 85-page report cautioned.
Rather than setting security standards for election equipment, the better approach for safeguarding ballot integrity is to hand-count a sufficiently large and random sample of the paper records of votes cast electronically, it said. "The 2000 United States presidential election put a spotlight on the fragility and vulnerability of voting technology," the report said. "It became clear that providing robust, accurate, and secure voting systems remained an important open technical problem" for the United States.
The Voting Technology Project is a joint initiative between MIT and Caltech. It was launched originally to investigate the causes of the voting problems in Florida in 2000 and to make recommendations based on the findings.
Some progress has been made since 2000, said Michael Alvarez, professor of political science at Caltech and co-director of the Voting Technology Project. The antiquated lever-activated punch-card voting systems that led to the infamous hanging chad fiasco in Florida have been mostly replaced with newer, more reliable optical scan and electronic voting systems, he said.
In the upcoming Nov. 6 elections, nearly three out of five counties will use optical-scan technology, with the rest relying on some form of direct-record electronic systems. A very small number of counties will use purely hand-counted paper ballots.
In the past 10 years, there has also been a move away from all-electronic voting systems to electronic systems that support a voter verifiable paper ballot trail, the report noted. That trend has been driven largely by security concerns related to direct-record electronic (DRE) voting machines from companies such as Diebold.
DRE machines processed and stored all ballots electronically and offered little way for voters and election officials to determine for certain whether votes were being recorded and counted correctly. Studies conducted by numerous researchers over the past few years have shown DRE systems to be highly vulnerable to all sorts of tampering and compromises because of their poor design and engineering.
Because of such concerns, much attention has been paid to ensure that votes cast electronically this year have a paper record that can be counted and verified manually if needed. States such as California in particular have led the effort to get voting machine vendors to implement better security. The report pointed to California's decertification of all DRE machines in 2007 as one example of such efforts.
Post-election auditing technologies and approaches have also improved substantially since 2000, thanks mainly to efforts by security researchers and cryptographers, Alvarez said. This year, he said, at least half of all states will conduct post-election audits based on sound statistical principles. Others, including California, have been conducting pilot risk-limiting audits to identify potential issues before votes are cast.
Another big improvement since 2000 is the growing use of centralized statewide voter registration databases. Those databases have enabled quicker voter identification and have given states a better way to address vote loss due to registration problems, Alvarez said. Voter registration databases have also made it easier for state election officials to roll out early voting facilities, he said.
In 2000, between 4 million to 6 million votes were lost nationwide because of voting equipment and ballot problems and because of voter registration problems. But thanks to new technologies and improved processes implemented since then, the number of lost votes is expected to be dramatically lower.
Even so, concerns remain. The increased interest in Internet voting and voting by mail is worrisome, Alvarez noted. Both methods are inherently insecure and vulnerable to tampering and fraud. The federal system to certify electronic voting technologies to specific security standards has also been costly to implement and not particularly effective, he said.
When voters go to the polls this year they will see little that is new in terms of technology Alvarez said. "We haven't had an opportunity to improve voting technology" because of the recession, he said. "The problem that states and counties have had with public finances have made it difficult for election officials to invest in new technologies. We will hopefully see that change as public finances improve."
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His email address is firstname.lastname@example.org.
- NYC wants its old mechanical-lever voting machines back
- Twitter a big winner in 2012 presidential election
- E-voting machine swaps Obama vote for Romney; taken offline
- Ruling expected shortly in Ohio e-voting lawsuit
- Update: Lawsuit filed in Ohio over software updates to vote tabulation machines
- States rebut RNC complaints about e-voting systems
- Despite e-voting improvements, audits still needed for ballot integrity
- Obama, Romney cite Apple, tech issues in debate
- Twitter becomes new debate spin room
- IT offshoring: Romney vs. Obama
Read more about Government IT in Computerworld's Government IT Topic Center.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- The Challenges and Opportunities of Mobile Application Development
- Nearly all business users now demand mobile devices--their own or company-owned--along with anywhere access to corporate applications and data. What turns mobile devices...
- Gartner MarketScope for Group Video Systems
- The Gartner "MarketScope for Group Video Systems" evaluates 7 group video system vendors based on 6 customer-focused criteria such as customer experience, market...
- The Role of the User Experience in Video Conferencing
- While video conferencing can offer significant benefits to companies and their employees, all video conferencing solutions are not alike. To ensure successful deployment...
- Video is the New Document: Four Things You Can't Miss
- Download this research summary to find out the 4 reasons why video is quickly replacing print media and see how this can fit... All Government IT White Papers
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- All Government IT Webcasts