If the Internet is magic, why can't we vote on it
Network World - Regular as clockwork -- just after an election which generated far too many stories of people waiting far too long to vote (and far too many local election officials saying that everything went fine and that there were no problems) -- come the calls for voting via the Internet. The press wonders if we are a third-world country, politicians posture and most security experts say "don't go there."
*A headline in The Washington Post was "Estonia gets to vote online. Why can't America?"
*New Jersey tells people they can vote via email.
*A famed Russian computer security expert is quoted by the BBC saying that "the lack of well-established online voting systems is a real threat to the democratic nations of the Western world" (because kids will not vote if they can't do it online).
Anyone who has not been comatose these past few years already knows why we don't vote over the Internet. Most vendors of electronic systems are generically incapable of producing secure ones. Just Google "voting machine security" for many examples, and if that is not enough try "SCADA security."
Most of the articles that ask why we are not doing Internet voting answer their own question. Estonia can do Internet voting because everyone has a government issued scannable ID -- the U.S. does not have such a thing. Apparently the voters in Estonia trust the government to not figure out who voted for whom -- I kinda doubt that the U.S. population would be so trusting of its governments.
An article in The New York Times on the topic of Internet voting quoted MIT's Ron Rivest, observing, "One of the main goals of the election is to produce credible evidence to the loser that he's really lost." A hackable system, as an electronic voting system would inevitably be, would not be able to produce such credible evidence.
I just watched the ending of the History Channel's overly dramatic but still very interesting "The Men Who Built America" series. One of the threads in the episodes shown last night concerned the 1896 U.S. presidential election between William Jennings Bryan and William McKinley. Bryan had spent a lot of time campaigning against monopoly businesses and the exploitation of workers. Among his targets were J.P. Morgan, John D. Rockefeller and Andrew Carnegie -- the main subjects of the series. Morgan, Rockefeller and Carnegie decided that they needed a president who was on their side, so proceeded to essentially buy the election for McKinley.
Buying a president took some work and money in those days. It would not take much of either to buy a president in an environment were we were using Internet voting equipment manufactured by the current set of vendors, who seem to have anti-clue when it comes to security, to select our president.
Fixing the far-too-long lines at some polls would be a good thing to do, but not at the expense of making it probable that some 13-year-old kid in Eastern Europe decides who gets elected.
Disclaimer: Many people at Harvard worry about the fairness of elections, but I have not heard that any of them have expressed an opinion on hackable elections, so the above view is mine.
Read more about wide area network in Network World's Wide Area Network section.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- The Business Value of Continuous Delivery
- Download this whitepaper to learn more about the business value of Continuous Delivery and see why it could be a game changer for...
- Ten Factors Shaping the Future of Application Delivery
- Download this research report conducted by Enterprise Management Associates (EMA) to learn how those that are seeking to accelerate application delivery are leveraging...
- Software Asset Management: Ensuring Today's Assets
- Today's trends like BYOD and SaaS are new and exciting in terms of how they will help make our jobs more productive but...
- Trends Shaping Software Management: 2014
- Most IT executives recognize the relationship between mobile computing and worker productivity, and have long issued notebook computers and other mobile devices to... All Government IT White Papers
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success!
- Transform Your IT Service Management Watch this webinar, to learn how EasyVista can increase IT productivity & efficiency and deliver streamlined & integrated IT Service & Asset Mgmt.
- IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- Leveraging Flash Storage to Accelerate Oracle Real Application Clusters Join this webinar to understand the latest solid-state storage trends, the specific applications driving solid-state storage deployments and the benefits of deploying the...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- All Government IT Webcasts