This story appeared on Network World at
Election (including security) madness
The continuing saga of poorly designed voting machines
'Net Insider By Scott Bradner , Network World , 01/08/2008
'Tis the season for being drowned in political commentary and ads. It's been a very long season indeed, and it's not over yet by a long shot.
Along with the surfeit of political commentators and more-than-daily polls (each of which comes up with a different truth) there has been an undercurrent of mistrust when it comes to the voting mechanisms many people use. The worry is that the voting machines themselves could have a deciding impact on the election in some cases.
I suppose some of you might wonder why I should take the time to write about this topic again, because so little has changed in the four years I've been commenting on it. While there may be no fundamental change that can be seen, there have been enough changes in degree that I guess it's time to revisit the mess.
There has been a minor change in official attitudes about the suitability of the current generation of electronic voting systems.
While too often local election officials seem to turn a blind eye to any problems -- perhaps preferring pilfered elections to any admission of a mistake -- state- and federal-level officials now are worrying more frequently about making sure that people's votes are accurately counted. For example, the secretaries of state in Colorado and California have decertified all of their current batch of electronic voting machines because of worries about hackability, accuracy and reliability. The state of Ohio undertook an extensive (and expensive) review of electronic voting machines and found serious problems with them. Similar issues were found by a study undertaken by the state of California.
Both reports, along with a number of others, show that the companies building these systems apparently are incapable of learning anything about security. If someone wanted to do a case study in how to not build security into a computer-based system, he or she would have plenty of real-world examples in the electronic-voting-machine industry.
In addition to many technology-related issues related to what seems to be an extraordinarily poor understanding of standard, basic, computer-security practices (for example, the use of virus checkers), many problems have been found with these companies' understanding of common-sense organizational or physical-security practices. For example, one manufacturer decided to put a lock on all its machines -- I guess to prevent unauthorized people from accessing the physical system -- but then negated the value of doing so by using the same key in all its devices and publishing a picture of the key on its Web site.
The election bombardment of attack ads and clueless commentary is quite depressing, but equally depressing is the vision of technology vendors adamantly ignoring years of many people detailing the security issues with their products. I hope this is mostly an isolated case, and other types of vendors actually listen to comments on security issues and try to fix problems.
Disclaimer: Harvard is in the business of learning. From what I can see, these vendors would not make good students, but the university has expressed no opinion on their inability to learn, so the above is my observation.
All contents copyright 1995-2008 Network World, Inc. http://www.networkworld.com