'Crash tested' e-voting machines spread doubt on Super Tuesday

Six states at 'high risk'

Securing Web Applications Made Simple and Scalable

Crash tests

Elections officials in California, Ohio Florida and Colorado have all either scrapped touch-screen voting or placed tough new limits on their use. While critics of e-voting have generally applauded the moves, not everyone is happy.

"The efforts, especially in California and Colorado and Ohio, have been to cast doubts and aspersions on the electronic voting equipment by the very tests that were conducted," says Stephen Weir, the County Clerk of California's Contra Costa County and the head of the California Association of Clerks and Election Officials. "We feel that was grossly unfair and really designed with a conclusion in mind, and that was to decertify the voting systems."

In Weir's mind, California's study was akin to the crash tests car makers perform on new models before they are delivered to consumers. Laboratory scientists strap a dummy into a vehicle that's had its brakes disconnected and is sent hurtling into a brick wall.

"Yeah, the dummy is going to go through the windshield every time," he says. Just like the crash tests, he argues, the e-voting studies didn't take into account the real-world protections that are provided by things like security workers at polling places. "None of us had a chance to say: 'By the way, here's what it looks like when you have brakes, seat belts, et cetera,'" he complains.

It's a critique that's shared with some political science experts, including Henry Brady, another professor at UC Berkeley. While he remains concerned about electronic voting's susceptibility to equipment failure or tampering, he says those risks are being exaggerated at the exclusion of others.

One such risk few people pay attention to is the use of optical scanning machines that require ballots to be transported to a central office before being processed. That leaves them vulnerable to all kinds of tampering.

"We're so focused on the security issue that we've sometimes gotten rid of e-voting machines with paper trails... and replaced them with optical scan systems with a central count," he says.

Another overlooked problem, he says, is the confusing layout elections officials sometimes choose for paper or touch-screen ballots. Sarasota County's high undercount rate in the 2006 election was most likely the result of a ballot form that included two races on the same page, a mistake that could have been made using paper ballots.

Brady's suspicion may be correct. But because the ES&S machines used by Sarasota County didn't provide paper receipts showing how, or if, each person voted, it's hard to know for sure. And it's criticisms like these that are perhaps the most common refrain among e-voting opponents.

Son of Hanging Chad

When computers are the sole means used to register a vote, there's nothing tactile or otherwise to review later if anomalies are found. That's a deficiency that's largely not found with older methods of voting. Even during the hanging chad debacle of 2000, there were punch cards that could be inspected.

"These machines are an unnecessary risk," says Brian Chess, chief scientist at Fortify Software, a security company that supplied software that was used by officials in California, Ohio and Florida to analyze the source code of touch-screen machines. "They weren't developed with state-of-the-art security in mind or robustness in mind." (Fortify has offered to make its software available free of charge to voting officials throughout the country so they can independently analyze their systems.)

He says the experience companies like Diebold have gained in building highly secure automatic teller machines is of little value when designing e-voting machines. That's because the requirements for the two machines are vastly different. ATMs collect copious amounts of information about who is using the machine, exactly what was transacted and when. Touch-screen machines, by contrast, require that ballots be cast in secret.

In many respects, the move to e-voting is the result of the contested presidential election of 2000, which was settled only after a 5-4 vote along party lines by justices of the US Supreme Court. The controversy brought attention to the aging fleet of analog voting systems and affirmed voters' resolve for equipment that would be more dependable.

But for a growing number people, the resulting reliance on computers represents a step backward, not only because they are perceived as more vulnerable to malfunctions and tampering but also because there's no easy way to know if the results they report are accurate.

"With e-voting, there's a greater danger that we could have a problem on a much wider scale," says Avi Rubin, a professor at Johns Hopkins University and a longtime critic of touch-screen voting machines. "If we have an e-voting system and you get a result that appears perfectly believable and is wrong, you would have no way of knowing that. We don't know, and that right there is cause for concern." ®

Application security programs and practises

More from The Register

next story
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
prev story


Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.