Feeds

E-voting experts call for revised security guidelines

'Black box that only a regulator can understand'

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

Transparency may become the major issue for voting machine makers in the year before midterm elections in November 2006.

Many system vendors have taken exception with calls from civil-right advocates and security researchers that they open their systems to inspection. Initially, vendors argued that opening up their systems would hurt their intellectual property. However, voting system makers now worry more that the indiscriminate release of code could allow frivolous claims of vulnerabilities in the technology.

"We do not believe that open, unrestricted publication to the Internet is in the public interest and this is not based on intellectual property issues," Neil McClure, vice president and strategic technology officer for e-voting system maker Hart InterCivic said in a statement. "We believe that open inspection must be controlled and managed to prevent reckless claims from being made against our system for the protection of the public and our customers."

However, other technologists argue that voting systems should be based on open source software in order to be completely transparent. The Open Voting Consortium has proposed such a system and is funding the creation of a model voting system based on open-source software.

"Both from a democracy perspective and a security perspective, I want the League of Women Voters or the ACLU or the Democratic party, the Republican party or whoever to be able to hire a programmer and get access to the code to audit it, and I want to be able to look at the conclusions that the auditor comes to," said David Mertz, chief technology officer for the Open Voting Consortium.

The Secretary of State for California has started to form a task force to study whether requiring that all voting system code be open-source software would increase the security and trust in elections. More than a year ago, the California legislature requested that the Secretary should "investigate and evaluate the use of open-source software in all voting machines in California" by January 1, 2006.

State government have focused on open-source software and open technical specifications in recent days as a way to promote transparency of digital information. Massachusetts, for example, has set regulations that require any electronic document format to adhere to three rules that prevent companies from claiming intellectual property rights on documents created in proprietary formats and ensure that documents can be read by a variety of programs.

"The reason why open source is attractive is because it is the ultimate in transparency," said ACCURATE's Mulligan, who is also director of the Samuelson Law, Technology and Public Policy Clinic at UC Berkeley. "We can't have a system where the technology is closed and we have to trust the vendors."

However, open-source software is not a panacea, ACCURATE's Rubin stressed. The code would have to be heavily audited and carefully maintained. Moreover, if any proprietary software were included in the system, then the total security of the system would suffer.

"If you don't have a malicious developer, then it probably does add some security," Rubin said. "But if the worry is that they could hide something in the code, then an attacker could hide in the closed-source part of the system."

The Election Assistance Commission gave no date by which the final draft of the guidelines would be released.

Copyright © 2005, SecurityFocus

Secure remote control for conventional and virtual desktops

More from The Register

next story
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Detroit losing MILLIONS because it buys CHEAP BATTERIES – report
Man at hardware store was right: name brands DO last longer
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
EU justice chief blasts Google on 'right to be forgotten'
Don't pretend it's a freedom of speech issue – interim commish
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.