Feeds

E-voting experts call for revised security guidelines

'Black box that only a regulator can understand'

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

Transparency may become the major issue for voting machine makers in the year before midterm elections in November 2006.

Many system vendors have taken exception with calls from civil-right advocates and security researchers that they open their systems to inspection. Initially, vendors argued that opening up their systems would hurt their intellectual property. However, voting system makers now worry more that the indiscriminate release of code could allow frivolous claims of vulnerabilities in the technology.

"We do not believe that open, unrestricted publication to the Internet is in the public interest and this is not based on intellectual property issues," Neil McClure, vice president and strategic technology officer for e-voting system maker Hart InterCivic said in a statement. "We believe that open inspection must be controlled and managed to prevent reckless claims from being made against our system for the protection of the public and our customers."

However, other technologists argue that voting systems should be based on open source software in order to be completely transparent. The Open Voting Consortium has proposed such a system and is funding the creation of a model voting system based on open-source software.

"Both from a democracy perspective and a security perspective, I want the League of Women Voters or the ACLU or the Democratic party, the Republican party or whoever to be able to hire a programmer and get access to the code to audit it, and I want to be able to look at the conclusions that the auditor comes to," said David Mertz, chief technology officer for the Open Voting Consortium.

The Secretary of State for California has started to form a task force to study whether requiring that all voting system code be open-source software would increase the security and trust in elections. More than a year ago, the California legislature requested that the Secretary should "investigate and evaluate the use of open-source software in all voting machines in California" by January 1, 2006.

State government have focused on open-source software and open technical specifications in recent days as a way to promote transparency of digital information. Massachusetts, for example, has set regulations that require any electronic document format to adhere to three rules that prevent companies from claiming intellectual property rights on documents created in proprietary formats and ensure that documents can be read by a variety of programs.

"The reason why open source is attractive is because it is the ultimate in transparency," said ACCURATE's Mulligan, who is also director of the Samuelson Law, Technology and Public Policy Clinic at UC Berkeley. "We can't have a system where the technology is closed and we have to trust the vendors."

However, open-source software is not a panacea, ACCURATE's Rubin stressed. The code would have to be heavily audited and carefully maintained. Moreover, if any proprietary software were included in the system, then the total security of the system would suffer.

"If you don't have a malicious developer, then it probably does add some security," Rubin said. "But if the worry is that they could hide something in the code, then an attacker could hide in the closed-source part of the system."

The Election Assistance Commission gave no date by which the final draft of the guidelines would be released.

Copyright © 2005, SecurityFocus

5 things you didn’t know about cloud backup

More from The Register

next story
GCHQ protesters stick it to British spooks ... by drinking urine
Activists told NOT to snap pics of staff at the concrete doughnut
Britain's housing crisis: What are we going to do about it?
Rent control: Better than bombs at destroying housing
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
Redmond resists order to hand over overseas email
Court wanted peek as related to US investigation
What do you mean, I have to POST a PHYSICAL CHEQUE to get my gun licence?
Stop bitching about firearms fees - we need computerisation
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?