If the Internet is magic, why can't we vote on it
Network World - Regular as clockwork -- just after an election which generated far too many stories of people waiting far too long to vote (and far too many local election officials saying that everything went fine and that there were no problems) -- come the calls for voting via the Internet. The press wonders if we are a third-world country, politicians posture and most security experts say "don't go there."
*A headline in The Washington Post was "Estonia gets to vote online. Why can't America?"
*New Jersey tells people they can vote via email.
*A famed Russian computer security expert is quoted by the BBC saying that "the lack of well-established online voting systems is a real threat to the democratic nations of the Western world" (because kids will not vote if they can't do it online).
Anyone who has not been comatose these past few years already knows why we don't vote over the Internet. Most vendors of electronic systems are generically incapable of producing secure ones. Just Google "voting machine security" for many examples, and if that is not enough try "SCADA security."
Most of the articles that ask why we are not doing Internet voting answer their own question. Estonia can do Internet voting because everyone has a government issued scannable ID -- the U.S. does not have such a thing. Apparently the voters in Estonia trust the government to not figure out who voted for whom -- I kinda doubt that the U.S. population would be so trusting of its governments.
An article in The New York Times on the topic of Internet voting quoted MIT's Ron Rivest, observing, "One of the main goals of the election is to produce credible evidence to the loser that he's really lost." A hackable system, as an electronic voting system would inevitably be, would not be able to produce such credible evidence.
I just watched the ending of the History Channel's overly dramatic but still very interesting "The Men Who Built America" series. One of the threads in the episodes shown last night concerned the 1896 U.S. presidential election between William Jennings Bryan and William McKinley. Bryan had spent a lot of time campaigning against monopoly businesses and the exploitation of workers. Among his targets were J.P. Morgan, John D. Rockefeller and Andrew Carnegie -- the main subjects of the series. Morgan, Rockefeller and Carnegie decided that they needed a president who was on their side, so proceeded to essentially buy the election for McKinley.
Buying a president took some work and money in those days. It would not take much of either to buy a president in an environment were we were using Internet voting equipment manufactured by the current set of vendors, who seem to have anti-clue when it comes to security, to select our president.
Fixing the far-too-long lines at some polls would be a good thing to do, but not at the expense of making it probable that some 13-year-old kid in Eastern Europe decides who gets elected.
Disclaimer: Many people at Harvard worry about the fairness of elections, but I have not heard that any of them have expressed an opinion on hackable elections, so the above view is mine.
Read more about wide area network in Network World's Wide Area Network section.
- 10 Hot Big Data Startups to Watch
- 11 Unique Uses for Google Glass, Demonstrated by Celebs
- How to Export Your Google Reader Account
- How to Better Engage Millennials (and Why They Aren't Really so Different)
- Telltale signs of ATM skimming
- 20 security and privacy apps for Androids and iPhones
- Big screen con artists: 7 great movies about social engineering
Today, many government agencies – civilian and defense – find themselves in a technology quandary: the volume of data that must be stored is growing rapidly, while shrinking budgets are limiting capital expenditures (i.e. – servers, storage devices, etc.) required to store all of this data.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Federal IT Innovation Caught in a Catch-22
- Fed resources shoring up old infrastructure, holding back new technologies.
- Top Three Reasons Why Customers Deploy EMC VNX with EMC VPLEX
- What if you could build a cost effective, continuously available storage infrastructure? Learn the top reasons users are deploying EMC VNX with EMC...
- Clearing the Clouds for Midmarket Businesses
- The 10-point checklist included in this expert brief has been developed to help small and midsize businesses select the cloud model and cloud...
- Perforce Case Study
- Learn how EMC cost-effectively transformed their infrastructure and improved storage performance by 60% by unifying storage, deploying virtualization and leveraging Flash to meet...
- Data Center Transformation: Balancing user demands with IT mandates
- There's a flood of user requirements, computing trends, and new technologies driving the need for you to look closely at your IT infrastructure. All Government IT White Papers
- Virtustream (Vayence) video taking a 3000-Seat SAP Environment to the Cloud
- How can public cloud services help your organization reduce costs and increase security for your mission
- Williams & Fudge on Transforming IT with EMC
- Watch Williams & Fudge Data Center Director Phillip Reynolds discuss why this accounts receivable management firm turned to EMC.
- The Success Network: Driving Business Forward
- The communications and connectivity infrastructure of your organization is the focus of this KnowledgeVault Exchange, sponsored by Comcast Business.
- Advanced Voice Solutions for Your Business
- How can hosted business class voice services help mid-sized business be more agile, competitive and ready for growth?
- Bring Mobile Innovation to your Enterprise.
- With the mobility revolution well underway, CIO's and Line of Business owners are faced with the struggle to develop a winning mobile strategy. All Government IT Webcasts