If the Internet is magic, why can't we vote on it
Network World - Regular as clockwork -- just after an election which generated far too many stories of people waiting far too long to vote (and far too many local election officials saying that everything went fine and that there were no problems) -- come the calls for voting via the Internet. The press wonders if we are a third-world country, politicians posture and most security experts say "don't go there."
*A headline in The Washington Post was "Estonia gets to vote online. Why can't America?"
*New Jersey tells people they can vote via email.
*A famed Russian computer security expert is quoted by the BBC saying that "the lack of well-established online voting systems is a real threat to the democratic nations of the Western world" (because kids will not vote if they can't do it online).
Anyone who has not been comatose these past few years already knows why we don't vote over the Internet. Most vendors of electronic systems are generically incapable of producing secure ones. Just Google "voting machine security" for many examples, and if that is not enough try "SCADA security."
Most of the articles that ask why we are not doing Internet voting answer their own question. Estonia can do Internet voting because everyone has a government issued scannable ID -- the U.S. does not have such a thing. Apparently the voters in Estonia trust the government to not figure out who voted for whom -- I kinda doubt that the U.S. population would be so trusting of its governments.
An article in The New York Times on the topic of Internet voting quoted MIT's Ron Rivest, observing, "One of the main goals of the election is to produce credible evidence to the loser that he's really lost." A hackable system, as an electronic voting system would inevitably be, would not be able to produce such credible evidence.
I just watched the ending of the History Channel's overly dramatic but still very interesting "The Men Who Built America" series. One of the threads in the episodes shown last night concerned the 1896 U.S. presidential election between William Jennings Bryan and William McKinley. Bryan had spent a lot of time campaigning against monopoly businesses and the exploitation of workers. Among his targets were J.P. Morgan, John D. Rockefeller and Andrew Carnegie -- the main subjects of the series. Morgan, Rockefeller and Carnegie decided that they needed a president who was on their side, so proceeded to essentially buy the election for McKinley.
Buying a president took some work and money in those days. It would not take much of either to buy a president in an environment were we were using Internet voting equipment manufactured by the current set of vendors, who seem to have anti-clue when it comes to security, to select our president.
Fixing the far-too-long lines at some polls would be a good thing to do, but not at the expense of making it probable that some 13-year-old kid in Eastern Europe decides who gets elected.
Disclaimer: Many people at Harvard worry about the fairness of elections, but I have not heard that any of them have expressed an opinion on hackable elections, so the above view is mine.
Read more about wide area network in Network World's Wide Area Network section.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you think getting it right from day one is always what matters, you probably haven't been following technology too closely.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Bring Networks and Applications Closer--Cisco ONE
- A series of sweeping trends is placing new requirements on the tried-and-true network model--requiring network infrastructure and applications to communicate. Get the open...
- Lippis Research Reviews the Cisco Catalyst 2960-X
- In this Lippis Report Research Note, Lippis Research reviews the latest edition of the "most popular access switch on the planet" -- the...
- Design Guide--Scaling Up to a Campus-Wide LAN
- Is it time to scale your network environment to a campus wired LAN? Here's the framework you need to set up your LAN...
- Comprehensive Security: Cisco Catalyst 2960 Series
- With a rich and comprehensive set of security features, Cisco Catalyst 2960-X and 2960-XR Series Switches can help you address networking megatrends such...
- Be Energy Efficient--The Cisco Catalyst 2960 Series
- How much energy could be saved if all 230 million Layer 2 and 3 fixed managed switch ports sold in 2012 were as... All Government IT White Papers
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- Vblock™ Specialized System for SAP HANA® Overview video from DJ Long about the new Vblock Specialized System for SAP HANA®.
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- Fighting Fraud Videos: IBM Intelligent Investigation Manager Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 20, 2013.