ITAA fires back at e-voting critics
The vendor lobby is accusing security researchers of pushing an open-source agenda
Computerworld - WASHINGTON -- The president of one of the most influential IT vendor associations is accusing electronic voting system critics, many of whom are IT security researchers, of using the issue of e-voting security to wage a "religious war" that pits open-source software against proprietary software.
A recent survey by the Arlington, Va.-based Information Technology Association of America (ITAA) showed that 77% of registered voters aren't concerned about the security of e-voting systems, and ITAA President Harris Miller said critics who claim to be concerned about the issue are really pushing a political agenda on behalf of the open-source software community.
"It's not about voting machines. It's a religious war about open-source software vs. proprietary software," Miller said in an interview with Computerworld. "If you're a computer scientist and you think that open-source software is the solution to everything because you're a computer scientist and you can spot all flaws, then you hate electronic voting machines. But if you're a person who believes that proprietary software and open-source software can both be reliable, then you don't hate electronic voting machines."
Kim Alexander, president of the California Voter Foundation, called Miller's characterization "nonsense."
"Every technologist that I have worked with believes that even if we had open-source software, we would still need a paper [audit] trail," said Alexander. "There would be no guarantee that the software that was inspected by the public would be the same software that is running on every machine in every jurisdiction in the country."
Eric Raymond, president of the Open Source Initiative (OSI), a nonprofit organization that promotes standards and criteria for open-source software, said Miller has the issue wrong. "Most [e-voting] critics, including me, aren't focusing on open-source vs. closed-source at all, but rather on the lack of any decent audit trail of votes -- one that can't be corrupted by software. Open-source would be nice for all the real reasons but is less important than the audit trail."
Other supporters of voter-verifiable paper audit trails, including Avi Rubin, a professor at the Johns Hopkins University Information Security Institute, questioned the ITAA's decision to survey average voters about a technical security question.
"Would they ask questions about the safety of a medical procedure of patients or of doctors?" asked Rubin. "They should ask computer security experts about computer security questions, not end users, who may like the look and feel of the machines but have no way of knowing if they are really secure."
Miller acknowledged that security has to be a top priority but stopped short of saying that the IT security community
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you like your iPhone, you can keep your iPhone. Period.
President Obama has revealed that he's not permitted to carry an iPhone. It's too insecure for the job, he says. Instead, he's stuck with a BlackBerry. Well, someone's got to have one still. However, it turns out that the Pentagon has also outlawed non-BlackBerry smartphones. In IT Blogwatch, bloggers joke that 2006 called and they want their smartphones back.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
- Review: Box beats Dropbox - and all the rest - for business
- Box trumps Dropbox, Engyte, Citrix ShareFile, EMC Syncplicity, and OwnCloud with rich mix of file sync, file sharing, user management, deep reporting and... All Government IT White Papers
- Video: 5 Secrets To Scaling Enterprise Apps Watch this video to learn how to successfully scale enterprise apps>>
- Collaboration 2013: Where Mobility Meets Connectivity Mobility and collaboration are quickly converging and users are demanding more capabilities. It's no longer enough to enable file sharing. This Webcast dives...
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.