In elections to the Duma Russians will be able to vote via the Internet.
Chairman of the CEC of Russia Vladimir Churov proposes that in the State Duma elections in December 2011 an opportunity for voters to vote remotely by internet or by mobile phone. In his opinion, it will increase turnout and reduce the cost of elections.
"There should be a possibility of remote voting via the Internet or mobile communications - satellite, or conventional, it can seriously affect the increase in turnout," - he said Tuesday at a meeting of the Federation Council Committee on Regional Policy.
In addition, says Mr. Churov, such a move would seriously reduce the cost of expenditure on elections, because, for example, in the Murmansk region helicopter, which gives the voters the ballot box, costs about 65 thousand rubles per hour, and the Far East - More expensive.
"No reason to resist the remote vote no" - quoted by the CEC Chairman , RIA Novosti . According to him, remote voting in elections to the Duma may be introduced in remote regions, as well as the vote of Russians abroad.
http://tinyurl.com/IVinRuski
USA Wake Up!!
Wednesday, November 10, 2010
Saturday, November 6, 2010
Was the DC Hack a Conspiracy?
RE: Washington Post article on DC hack, at http://ow.ly/31Wgp
One true statements in this article is, “For more than a decade, computer security scientists have been warning of certain core dangers related to Internet voting." Yes, "warning," but never offering any evidence!
Simons and Jefferson, especially, are experts in what I call the Halloween method of opposing Internet voting; that is, telling really scary stories about what COULD happen if a system was hacked.(1) After a decade of crying "wolf!" without any actual facts to point to, the alarmists needed something concrete. The DC fiasco seems to be just what the doctor ordered. Now they use the DC hack as if it were proof that ALL Internet voting systems are as easy to hack. How convenient! Never mind the fact that in Europe, Canada, and the US Internet voting trials have all worked well – right now West Virginia and Arizona are having great success with well-built Internet voting systems.
Besides those pesky facts, all the facts have yet to be discovered about the DC incident. The article neglects to mention that the team at Trust the Vote, who built the DC system, have been long-time critics of Internet voting. That raises some yet unanswered questions.
Why did they submit a bid to build an Internet voting system? Why did the DC officials hire them, as opposed to the companies that built the currently successful West Virginia and Arizona systems?
One observer wrote on Slashdot (not me) that the system seems designed to fail.(2) Could that be true? Was the very construction of the system an insider attack? Did the builders plant a back door? What kind of communication did Trust the Vote members have with Halderman, after they got the DC contract? Just how duped and used were the DC officials?
1. For more details on this history see "Scary Stories Fail to Stop Internet Voting"
http://ssrn.com/author=1053589
2. More details and citations at, http://bit.ly/bk0cpQ
William J. Kelleher, Ph.D.
Email: InternetVoting@gmail.com
Blog: http://internetvotingforall.blogspot.com/
Twitter: wjkno1
FB: William Kelleher
Posted as a comment to the WashP article by: wjkellpro | October 30, 2010 3:50 PM
One true statements in this article is, “For more than a decade, computer security scientists have been warning of certain core dangers related to Internet voting." Yes, "warning," but never offering any evidence!
Simons and Jefferson, especially, are experts in what I call the Halloween method of opposing Internet voting; that is, telling really scary stories about what COULD happen if a system was hacked.(1) After a decade of crying "wolf!" without any actual facts to point to, the alarmists needed something concrete. The DC fiasco seems to be just what the doctor ordered. Now they use the DC hack as if it were proof that ALL Internet voting systems are as easy to hack. How convenient! Never mind the fact that in Europe, Canada, and the US Internet voting trials have all worked well – right now West Virginia and Arizona are having great success with well-built Internet voting systems.
Besides those pesky facts, all the facts have yet to be discovered about the DC incident. The article neglects to mention that the team at Trust the Vote, who built the DC system, have been long-time critics of Internet voting. That raises some yet unanswered questions.
Why did they submit a bid to build an Internet voting system? Why did the DC officials hire them, as opposed to the companies that built the currently successful West Virginia and Arizona systems?
One observer wrote on Slashdot (not me) that the system seems designed to fail.(2) Could that be true? Was the very construction of the system an insider attack? Did the builders plant a back door? What kind of communication did Trust the Vote members have with Halderman, after they got the DC contract? Just how duped and used were the DC officials?
1. For more details on this history see "Scary Stories Fail to Stop Internet Voting"
http://ssrn.com/author=1053589
2. More details and citations at, http://bit.ly/bk0cpQ
William J. Kelleher, Ph.D.
Email: InternetVoting@gmail.com
Blog: http://internetvotingforall.blogspot.com/
Twitter: wjkno1
FB: William Kelleher
Posted as a comment to the WashP article by: wjkellpro | October 30, 2010 3:50 PM
Saturday, October 30, 2010
Breaking News!
The Washington Post has just published an article by anti-Internet voting extremists Epstein, Simons, and Jefferson. They make the ridiculous claim that the DC hackers did the nation a service. But, the paper also printed my critique, and my suggestion that the hack may have been a conspiracy. Go to http://ow.ly/31Wgo
(Copy and paste)
Hearing both sides, folks can decide -- DC hackers: good guys or conspirators?
(Copy and paste)
Hearing both sides, folks can decide -- DC hackers: good guys or conspirators?
Friday, October 29, 2010
CSOonline.com Dodges Debate on Internet Voting Security!
I tried to balance out this anti-Internet voting propaganda with facts and commonsense, but CSOonline.com would have none of that. Apparently, they only want to see one side. I wouldn’t have bothered to disillusion them, but for two reasons I had to persist. One is that the author is a worshipper of St. David Jefferson, and the other is that John Sebes has joined the love fest (he’s an insider on the DC fiasco).
Why won’t any of these True Believers engage me in an intelligent debate? (Do they all share a lack of courage? Sebes has even deleted my efforts to engage him on his blog; right, John?)
So, here is the propaganda piece, and my forbidden reply:
E-voting: How secure is it?
More than half of all states in the U.S. will allow some kind of internet voting this year. But security experts say it's a mistake and puts the nation at risk.
By Joan Goodchild, Senior Editor, October 28, 2010 — CSO —
Election fraud and vote tampering is as old as government. Before the American Revolution, most voting was done by voice. Voters would call out their pick for all to hear, which lead to intimidation and other nefarious tactics by those hoping to impact election results. The creation of the secret ballot was an improvement, but brought with it another host of possible modes of manipulation. In a quote that is now famous in American history, corrupt politician and Tammany Hall leader Boss Tweed often told constituents to 'vote early, and often.'
But surely, by 2010, with technology as sophisticated as it is and elections as regulated as they are, any voting system rolled out these days is no doubt fool-proof and iron-clad in terms of security, right? Not so, say some voting security experts. And, in fact, it's technology that makes new voting systems dangerous.
Back in 1999, David Jefferson, a computer scientist at the Lawrence Livermore National Laboratory and chairman of Verified Voting, an organization that monitors security of election systems, first began examining the issue of electronic voting, specifically internet voting, as technical chairman of a task force set up by the Secretary of State in California. "The original idea was that internet voting was a fine idea, and the only question was how best to deliver this capability to the citizens of California," recalled Jefferson. "The vision was people would be able to vote from home with computers, in their pajamas, or they could vote on the road, from the hotel, or from an Internet café. At any time, from anywhere. But as we studied the issue more carefully, we realized that it was a hopelessly dangerous concept."
The result, said Jefferson, was a report authored by the group advising election officials not to proceed with internet voting, at least not for a very long time. And in the 10-plus years since the report was released, Jefferson says the concept of internet voting has become no more secure.
Yet many states, in an effort to allow military and other overseas citizenry to vote, have opted to adopt it, much to Jefferson's amazement.
According to the Verified Voting, more than 30 states will allow ballots to be cast by email, fax or online this year. "This is a national security issue," said Jefferson, who vehemently opposes internet voting as much today as he did in 1999. "In elections, we are electing the President and the members of Congress who are going to make law and run the government of the United States. But we can expose the election infrastructure to cyber attacks by anybody in the world. That's what we do when we conduct online elections."
Case in point, according to Jefferson, is the recent demonstration by a team of students led by University of Michigan professor Alex Halderman. The group managed to easily hack into an internet-based system for overseas and military voters that the District of Columbia planned to test in the November election. Along the way, the team also found evidence the system had been penetrated by both Iranian and Chinese hackers.
"One of the great fears in an internet election is that you are exposing our votes to manipulation by foreign powers," said Jefferson. "I just consider this to be a major national security risk; a totally unnecessary, needless risk and it's shocking to me that election officials turn away from this. They don't want to hear it, and they certainly don't want to do anything about it." [THEY don’t want to hear it! Ed]
"As we moved to mechanical voting machines a century ago we moved into the era of Dilbert's boss administering technology he didn't understand," said Douglas Jones, an associate professor in the Department of Computer Science at the University of Iowa and a scientific expert serving on the federal Election Assistance Commission's Technical Guidelines Development Committee. "We're still there. We've advanced the technology and Dilbert's boss knows more now than he did a century ago. But he still doesn't know enough to master the system he's running."
Jones says elections officials in D.C. deserve a lot of credit for allowing the pilot system to be opened up to public test before actually using it in an election, even if it was done late and exposed serious problems. But he fears these kinds of precautions aren't being taken in smaller municipalities around the country with limited funds.
"The people in the D.C. election office who were administering the servers were people who have a lot of experience administering servers in the closed world of classical elections with no internet connections and no outsiders to deal with," said Jones. "This is evidence that the election office wasn't anywhere near up to administering a machine that was connected to the public internet. And the Washington D.C. people actually have a staff of professionally-trained people who know what they're doing. You can't say that in your typical county. The large, urban counties have resources in their election offices that average county doesn't have."
On-site electronic voting machines also risky
Both security experts also point to electronic voting machines as security risks, too. Electronic machines that allow votes to be cast at precincts without paper became popular after the 2000 U.S. Presidential election, and the now famous "hanging chad" controversy. But even these machines, used in a closed-precinct environment, still make Jefferson uncomfortable because of the possibility of vote tampering.
"The paperless, electronic-voting machines, machines in which there is no paper trail, and no way of auditing those machines, are a major security risk. But there are many election officials, even entire states, that insist they can conduct elections strictly with electronic-voting machines and that there are no security risks with it."
The lack of auditing inherent in many types of these kinds of machines causes controversy regularly. In fact, a conservative watchdog group in Nevada is currently embroiled in an argument with voting machine technicians in one county that are represented by the union SEIU. The group, Americans for Limited Government, wants state officials to intervene and ensure SEIU workers who operate the machines don't skew the results in favor of Senate Majority Leader Harry Reid, the union-endorsed candidate. Issues like this crop up every election season, noted Jefferson. Still, it's internet voting, and it's possible widespread adoption, that keeps him up at night.
"Internet voting is really this year's voting problem and I have to say it's about a thousand-times worse than the security risk of straight electronic voting machines in precincts," he said. [end]
http://www.csoonline.com/article/630699/e-voting-how-secure-is-it-
KELLEHER’S FORBIDDEN COMMENT
This article is a tad one-sided. The message it conveys is that “some voting security experts,” like David Jefferson and Douglas Jones, have sure-fire knowledge about the insecurity of Internet voting, while all the government officials who are trying it are clueless. Of course, it is not only the local election officials who do not understand, it is all those who have advised them along the way. That includes the experts who set up the systems now being successfully used by West Virginia and Arizona.
Six years ago, the Department of Defense had an Internet voting system ready to be used by a group of 100,000 overseas volunteers. Jefferson was one of the four rouge computer scientists who, with the help of the New York Times, publicized a pack of really scary stories about what a “catastrophe” would occur with Internet voting. One example is, “you are exposing our votes to manipulation by foreign powers,” an old refrain used again in Ms Goodchild’s article. Frightened out of his wits, Assistant Secretary of Defense, Paul Wolfowitz, who was also angling for the presidency of the World Bank, ordered a halt to the program. (He got the job.)
That was in 2004. Since then Internet voting has been tried with repeated success in some provinces in Canada, and in several nations in Europe. Hall and Alvarez write that no security, or other, problems have been reported. (Electronic Elections, page 71.) The voting security experts who built these systems must also be deluded, if Jones and Jefferson are to be believed.
But the repeated success of Internet voting trials around the world seems to belie the cries of “wolf!” that alarmists like Jefferson have made a career on. Their scary stories appear to have no basis in experience, with the sole exception of the recent DC fiasco. (For more details on this see “Scary Stories Fail to Stop Internet Voting”
http://ssrn.com/author=1053589 )
Also, Bob Carey, head of the Federal Voting Assistance Program, announced at a recent meeting that the Department of Defense has decided to restore the old SERVE system, with all the updates now available. (Citation given in “Scary Stories”)
Ms Goodchild’s article refers to the DC hack as if it were evidence in favor of the case made by Jefferson et al. But all the facts have yet to be discovered. For instance, the team at Trust the Vote, who built the DC system, have been, like Jefferson, long-time critics of Internet voting. Why did they submit a bid to build the system? Why did the DC officials hire them, as opposed to the companies that built the West Virginia and Arizona systems?
One observer wrote on Slashdot, not me, that the system seems designed to fail. Could that be true? Was the very construction of the system an insider attack? After a decade of crying “wolf!” without any actual facts to point to, the anti-Internet voting activists needed something tangible. The DC fiasco seems to be just what the doctor ordered.
Since John Sebes has joined the discussion, perhaps he can address some of these questions. (For more on this, including citations, see “Does the DC Fiasco Damn Internet Voting?” http://bit.ly/aIfiRa )
The Internet voting security debate has been one-sided for far too long, with the alarmist squeaky wheel getting all the attention. CIO.com would be an excellent spot for an intellectually honest engagement of the issues.
William J. Kelleher, Ph.D.
Fri, 2010-10-29 18:48
"Your comment has been queued for moderation by site administrators and will be published after approval."
Why won’t any of these True Believers engage me in an intelligent debate? (Do they all share a lack of courage? Sebes has even deleted my efforts to engage him on his blog; right, John?)
So, here is the propaganda piece, and my forbidden reply:
E-voting: How secure is it?
More than half of all states in the U.S. will allow some kind of internet voting this year. But security experts say it's a mistake and puts the nation at risk.
By Joan Goodchild, Senior Editor, October 28, 2010 — CSO —
Election fraud and vote tampering is as old as government. Before the American Revolution, most voting was done by voice. Voters would call out their pick for all to hear, which lead to intimidation and other nefarious tactics by those hoping to impact election results. The creation of the secret ballot was an improvement, but brought with it another host of possible modes of manipulation. In a quote that is now famous in American history, corrupt politician and Tammany Hall leader Boss Tweed often told constituents to 'vote early, and often.'
But surely, by 2010, with technology as sophisticated as it is and elections as regulated as they are, any voting system rolled out these days is no doubt fool-proof and iron-clad in terms of security, right? Not so, say some voting security experts. And, in fact, it's technology that makes new voting systems dangerous.
Back in 1999, David Jefferson, a computer scientist at the Lawrence Livermore National Laboratory and chairman of Verified Voting, an organization that monitors security of election systems, first began examining the issue of electronic voting, specifically internet voting, as technical chairman of a task force set up by the Secretary of State in California. "The original idea was that internet voting was a fine idea, and the only question was how best to deliver this capability to the citizens of California," recalled Jefferson. "The vision was people would be able to vote from home with computers, in their pajamas, or they could vote on the road, from the hotel, or from an Internet café. At any time, from anywhere. But as we studied the issue more carefully, we realized that it was a hopelessly dangerous concept."
The result, said Jefferson, was a report authored by the group advising election officials not to proceed with internet voting, at least not for a very long time. And in the 10-plus years since the report was released, Jefferson says the concept of internet voting has become no more secure.
Yet many states, in an effort to allow military and other overseas citizenry to vote, have opted to adopt it, much to Jefferson's amazement.
According to the Verified Voting, more than 30 states will allow ballots to be cast by email, fax or online this year. "This is a national security issue," said Jefferson, who vehemently opposes internet voting as much today as he did in 1999. "In elections, we are electing the President and the members of Congress who are going to make law and run the government of the United States. But we can expose the election infrastructure to cyber attacks by anybody in the world. That's what we do when we conduct online elections."
Case in point, according to Jefferson, is the recent demonstration by a team of students led by University of Michigan professor Alex Halderman. The group managed to easily hack into an internet-based system for overseas and military voters that the District of Columbia planned to test in the November election. Along the way, the team also found evidence the system had been penetrated by both Iranian and Chinese hackers.
"One of the great fears in an internet election is that you are exposing our votes to manipulation by foreign powers," said Jefferson. "I just consider this to be a major national security risk; a totally unnecessary, needless risk and it's shocking to me that election officials turn away from this. They don't want to hear it, and they certainly don't want to do anything about it." [THEY don’t want to hear it! Ed]
"As we moved to mechanical voting machines a century ago we moved into the era of Dilbert's boss administering technology he didn't understand," said Douglas Jones, an associate professor in the Department of Computer Science at the University of Iowa and a scientific expert serving on the federal Election Assistance Commission's Technical Guidelines Development Committee. "We're still there. We've advanced the technology and Dilbert's boss knows more now than he did a century ago. But he still doesn't know enough to master the system he's running."
Jones says elections officials in D.C. deserve a lot of credit for allowing the pilot system to be opened up to public test before actually using it in an election, even if it was done late and exposed serious problems. But he fears these kinds of precautions aren't being taken in smaller municipalities around the country with limited funds.
"The people in the D.C. election office who were administering the servers were people who have a lot of experience administering servers in the closed world of classical elections with no internet connections and no outsiders to deal with," said Jones. "This is evidence that the election office wasn't anywhere near up to administering a machine that was connected to the public internet. And the Washington D.C. people actually have a staff of professionally-trained people who know what they're doing. You can't say that in your typical county. The large, urban counties have resources in their election offices that average county doesn't have."
On-site electronic voting machines also risky
Both security experts also point to electronic voting machines as security risks, too. Electronic machines that allow votes to be cast at precincts without paper became popular after the 2000 U.S. Presidential election, and the now famous "hanging chad" controversy. But even these machines, used in a closed-precinct environment, still make Jefferson uncomfortable because of the possibility of vote tampering.
"The paperless, electronic-voting machines, machines in which there is no paper trail, and no way of auditing those machines, are a major security risk. But there are many election officials, even entire states, that insist they can conduct elections strictly with electronic-voting machines and that there are no security risks with it."
The lack of auditing inherent in many types of these kinds of machines causes controversy regularly. In fact, a conservative watchdog group in Nevada is currently embroiled in an argument with voting machine technicians in one county that are represented by the union SEIU. The group, Americans for Limited Government, wants state officials to intervene and ensure SEIU workers who operate the machines don't skew the results in favor of Senate Majority Leader Harry Reid, the union-endorsed candidate. Issues like this crop up every election season, noted Jefferson. Still, it's internet voting, and it's possible widespread adoption, that keeps him up at night.
"Internet voting is really this year's voting problem and I have to say it's about a thousand-times worse than the security risk of straight electronic voting machines in precincts," he said. [end]
http://www.csoonline.com/article/630699/e-voting-how-secure-is-it-
KELLEHER’S FORBIDDEN COMMENT
This article is a tad one-sided. The message it conveys is that “some voting security experts,” like David Jefferson and Douglas Jones, have sure-fire knowledge about the insecurity of Internet voting, while all the government officials who are trying it are clueless. Of course, it is not only the local election officials who do not understand, it is all those who have advised them along the way. That includes the experts who set up the systems now being successfully used by West Virginia and Arizona.
Six years ago, the Department of Defense had an Internet voting system ready to be used by a group of 100,000 overseas volunteers. Jefferson was one of the four rouge computer scientists who, with the help of the New York Times, publicized a pack of really scary stories about what a “catastrophe” would occur with Internet voting. One example is, “you are exposing our votes to manipulation by foreign powers,” an old refrain used again in Ms Goodchild’s article. Frightened out of his wits, Assistant Secretary of Defense, Paul Wolfowitz, who was also angling for the presidency of the World Bank, ordered a halt to the program. (He got the job.)
That was in 2004. Since then Internet voting has been tried with repeated success in some provinces in Canada, and in several nations in Europe. Hall and Alvarez write that no security, or other, problems have been reported. (Electronic Elections, page 71.) The voting security experts who built these systems must also be deluded, if Jones and Jefferson are to be believed.
But the repeated success of Internet voting trials around the world seems to belie the cries of “wolf!” that alarmists like Jefferson have made a career on. Their scary stories appear to have no basis in experience, with the sole exception of the recent DC fiasco. (For more details on this see “Scary Stories Fail to Stop Internet Voting”
http://ssrn.com/author=1053589 )
Also, Bob Carey, head of the Federal Voting Assistance Program, announced at a recent meeting that the Department of Defense has decided to restore the old SERVE system, with all the updates now available. (Citation given in “Scary Stories”)
Ms Goodchild’s article refers to the DC hack as if it were evidence in favor of the case made by Jefferson et al. But all the facts have yet to be discovered. For instance, the team at Trust the Vote, who built the DC system, have been, like Jefferson, long-time critics of Internet voting. Why did they submit a bid to build the system? Why did the DC officials hire them, as opposed to the companies that built the West Virginia and Arizona systems?
One observer wrote on Slashdot, not me, that the system seems designed to fail. Could that be true? Was the very construction of the system an insider attack? After a decade of crying “wolf!” without any actual facts to point to, the anti-Internet voting activists needed something tangible. The DC fiasco seems to be just what the doctor ordered.
Since John Sebes has joined the discussion, perhaps he can address some of these questions. (For more on this, including citations, see “Does the DC Fiasco Damn Internet Voting?” http://bit.ly/aIfiRa )
The Internet voting security debate has been one-sided for far too long, with the alarmist squeaky wheel getting all the attention. CIO.com would be an excellent spot for an intellectually honest engagement of the issues.
William J. Kelleher, Ph.D.
Fri, 2010-10-29 18:48
"Your comment has been queued for moderation by site administrators and will be published after approval."
Saturday, October 23, 2010
Scary Stories Fail to Stop Internet Voting
Go to http://internetvotingforall.blogspot.com/2010/10/scary-stories-fail-to-stop-internet.html?spref=tw for revised version -- free read or download
wjk
5-10-11
wjk
5-10-11
Tuesday, October 19, 2010
Does the DC Fiasco Damn Internet Voting?
This year the DC Board of Elections had a great idea. DC had a bad reputation for sending absentee ballots out to its voters in the military so late that the poor voter didn’t have time to mail the thing back before the end of the election. (The Pew Center chided DC for this in their 2009 study “No Time to Vote.”)
So DC hired some programmers who said they could set up an Internet voting system. This would enable the overseas voter to request an absentee ballot, vote it, and return it – all in just a few minutes. No more wasted time, or uncertainty about whether your ballot arrived in time or got counted.
But what DC officials apparently did not know is that the guys they hired are long-time anti-Internet voting advocates. After getting the contract, instead of boasting about their success, they posted an apology to their fellow anti-Internet voting groups. You can see this at http://www.trustthevote.org/dc-pilot-project-facts-vs-fictions-osdv-viewpoint
Greg Miller posted the apology. You can see him and John Sebes taking part in a panel sponsored by the anti-Internet voting Overseas Voting Foundation, at
http://www.youtube.com/user/OverseasVote#p/c/71DC2AFC2F476CBB/0/Ne0qiIsvqf8
Lo and Behold, within 36 hours from the time the DC system went online for testing, a “white hat hacker,” Alex Halderman, University of Michigan computer science prof, lead his class on a real adventure. They hacked the system. In it they found personal voter info, including names, PINs, and passwords. They changed all the votes that had been made, to favor their candidate. They set up the system so that all future votes would favor their candidate. Then they left a calling card: they installed the UM football fight song. The system was supposed to have an intruder detection and alarm function, but it did not work. DC officials only learned about the hack after receiving complaints about the song.
Of course all the anti-Internet voting extremists have had a field day with this event. Brad’s Blog and Verified Voting, for example, are full of triumphal proclamations about the complete and utter failure of Internet voting.
Not only did DC officials hire the guys who built this system, but after it was hacked they invited Halderman and a couple of professional anti-Internet voting extremists to appear before them. After giving Halderman time to crow, one of them submissively asked him if Internet voting could ever be done securely. Yes folks, she asked the fox how to protect the hen house! (See it at, http://www.youtube.com/watch?v=LaR7n5PI_aE ) Of course, he sagely informed her that it cannot be done.
However, at the same time, West Virginia has had terrific success with its professionally built Internet voting system. Secretary of State Natalie Tennant was so happy with the results of that system in this year’s primaries that she requested the state legislature to expand the program to include more overseas voters. (See http://www.statejournal.com/story.cfm?func=viewstory&storyid=81145 )
Tennant reports that the Internet voting participation was twice that of the mail-in voting participation, and that “we received no negative feedback of the pilot program.” (See
http://csrc.nist.gov/groups/ST/UOCAVA/2010/PositionPapers/ZICKAFOOSE_WestVirginiaUOCAVA.pdf )
The legislature studied the security issues and performance, and granted Tennant’s request.
Not only that, but at least eight European nations and several provinces in Canada have been conducting Internet voting trials for years without any problems. (See Electronic Elections, Hall and Alvarez, page 71.)
So, what is to be learned from the DC fiasco? First, given the degree of competence shown by DC officials, perhaps their bid for statehood should be put off a bit longer. Second, never hire anti-Internet voting extremists to set up your Internet voting system. Like one wag on Slashdot suggested, this system appears to have been “designed to fail… just to make the [anti-Internet voting] idea shine.” (See comment by “Cylix” at, http://politics.slashdot.org/story/10/10/09/1750214/DC-Internet-Voting-Trial-Attacked-2-Different-Ways#topcomment )
A third lesson is to look at all the facts about Internet voting successes, and not just this one example of all around incompetence (if not designer sabotage).
So DC hired some programmers who said they could set up an Internet voting system. This would enable the overseas voter to request an absentee ballot, vote it, and return it – all in just a few minutes. No more wasted time, or uncertainty about whether your ballot arrived in time or got counted.
But what DC officials apparently did not know is that the guys they hired are long-time anti-Internet voting advocates. After getting the contract, instead of boasting about their success, they posted an apology to their fellow anti-Internet voting groups. You can see this at http://www.trustthevote.org/dc-pilot-project-facts-vs-fictions-osdv-viewpoint
Greg Miller posted the apology. You can see him and John Sebes taking part in a panel sponsored by the anti-Internet voting Overseas Voting Foundation, at
http://www.youtube.com/user/OverseasVote#p/c/71DC2AFC2F476CBB/0/Ne0qiIsvqf8
Lo and Behold, within 36 hours from the time the DC system went online for testing, a “white hat hacker,” Alex Halderman, University of Michigan computer science prof, lead his class on a real adventure. They hacked the system. In it they found personal voter info, including names, PINs, and passwords. They changed all the votes that had been made, to favor their candidate. They set up the system so that all future votes would favor their candidate. Then they left a calling card: they installed the UM football fight song. The system was supposed to have an intruder detection and alarm function, but it did not work. DC officials only learned about the hack after receiving complaints about the song.
Of course all the anti-Internet voting extremists have had a field day with this event. Brad’s Blog and Verified Voting, for example, are full of triumphal proclamations about the complete and utter failure of Internet voting.
Not only did DC officials hire the guys who built this system, but after it was hacked they invited Halderman and a couple of professional anti-Internet voting extremists to appear before them. After giving Halderman time to crow, one of them submissively asked him if Internet voting could ever be done securely. Yes folks, she asked the fox how to protect the hen house! (See it at, http://www.youtube.com/watch?v=LaR7n5PI_aE ) Of course, he sagely informed her that it cannot be done.
However, at the same time, West Virginia has had terrific success with its professionally built Internet voting system. Secretary of State Natalie Tennant was so happy with the results of that system in this year’s primaries that she requested the state legislature to expand the program to include more overseas voters. (See http://www.statejournal.com/story.cfm?func=viewstory&storyid=81145 )
Tennant reports that the Internet voting participation was twice that of the mail-in voting participation, and that “we received no negative feedback of the pilot program.” (See
http://csrc.nist.gov/groups/ST/UOCAVA/2010/PositionPapers/ZICKAFOOSE_WestVirginiaUOCAVA.pdf )
The legislature studied the security issues and performance, and granted Tennant’s request.
Not only that, but at least eight European nations and several provinces in Canada have been conducting Internet voting trials for years without any problems. (See Electronic Elections, Hall and Alvarez, page 71.)
So, what is to be learned from the DC fiasco? First, given the degree of competence shown by DC officials, perhaps their bid for statehood should be put off a bit longer. Second, never hire anti-Internet voting extremists to set up your Internet voting system. Like one wag on Slashdot suggested, this system appears to have been “designed to fail… just to make the [anti-Internet voting] idea shine.” (See comment by “Cylix” at, http://politics.slashdot.org/story/10/10/09/1750214/DC-Internet-Voting-Trial-Attacked-2-Different-Ways#topcomment )
A third lesson is to look at all the facts about Internet voting successes, and not just this one example of all around incompetence (if not designer sabotage).
Saturday, August 7, 2010
Internet Voting can Support NONPARTISAN and COST FREE US Elections as the Framers Intended
Updated 11-25-11
See the reviews of my new book - Internet Voting Now!
Kindle edition: http://tinyurl.com/IntV-Now
In paper: http://tinyurl.com/IVNow2011
Internet Voting Now!
Here’s How. Here’s Why - So We can Kiss Citizens United Goodbye!
Now on Kindle – but coming out on paper in October, 2011
Notice the subtitle, “Here’s Why - So We can Kiss Citizens United Goodbye!”
The power of Big Money can be sidelined in all US elections. To understand how, lets look at how our politics was originally intended to work.
Chapter Two is entitled “The Original Intentions of the Framers for US Presidential Elections.” Believe it or not, the folks who wrote the Constitution envisioned that doc as a sure fire way to prevent the take over of our government by political parties. They also thought that presidential elections would be completely nonpartisan, and cost free to the candidates.
You’ll see the evidence for my claim. While the main evidence is taken from the Constitution itself, quotes from Adams, Madison, Hamilton, Washington, and Jay are provided, as well as Marshall and Jefferson. Other aspects of their original intentions were that the process would be as deliberative and orderly as a corporate personnel selection committee meeting (much like the Philadelphia Convention).
They loathed the circus-like chaos of campaigning. They uniformly agreed that such campaigning was beneath the dignity of any prospective president. (That belief prevailed until the 1890s, when William Jennings Bryan became the most active campaigner in US history up to that time.)
They also expected the presidential election process to be so inexpensive to officially conduct that no provision was made to pay for it. They envisioned that Electors in the Electoral College would defray the costs themselves.
In Chapter Three, I show the obvious – that is, how miserably the current two-party system is doing at fulfilling those original intentions. Surprisingly, these old intentions can be fulfilled by the new technology better than the two-party system has ever been able to do. In other words, Internet voting, rightly organized, is a natural fit with the aspirations of American voters and election integrity activists for truly democratic presidential elections, uncorrupted by Big Money contributors.
Chapter Four shows how this would work.
Imagine yourself watching a series of debates between presidential candidates online, or on TV. Two debaters, in a real debate, have one hour to show their merit. Then you watch a second one hour debate between two more candidates.
At the end of that debate, you turn to your PC or cell phone and log on to your county's secure election website. After it checks your registration, a ballot appears. You can then rate each debater from 0-9, not just cast one vote for one winner. Winning would depend on the ranking total.
In three evenings, the American people can sort through a dozen different candidates. Hearing all the ideas and arguments of those candidates would be far more of an education to the electorate than they now get from one Repub and one Dem.
Here is how the power of the superrich will be marginalized: Special interest advertising would have very little time or opportunity to interfere with the voter's decision making process. The voter will focus on the performance of the debaters, and base his or her ranking on that, rather than on some tricky ad that runs for weeks on TV. The voter will decide long before advertising could work its manipulative schemes. Let the corporations spend all of their shareholder's money. Internet voting, rightly organized, can neutralize all their pernicious efforts.
TV and online time for the debates can be free for the candidates. The people license the use of public air ways, and can require the time needed for debates from the broadcasting licensees. With that, the need for campaign contributions drops to nil.
Only 100 years ago the horse and carriage were the primary means of transportation in the US. The horseless carriage was an object of scorn and skepticism. Eventually, however, that new technology proved irresistible, and the car became our primary mode of transportation.
You can make the same happen with Internet voting. It can, and will, become our primary mode of voting, if you simply demand it from your local and state officials. Go to them because the Constitution gives them the authority for conducting elections.
Real democracy can be ours, if we only demand it!
William J. Kelleher, Ph.D.
Twitter: wjkno1
Internetvoting@gmail.com
Internet Voting Explained on
YouTube: http://www.youtube.com/user/WJKPhD
See the reviews of my new book - Internet Voting Now!
Kindle edition: http://tinyurl.com/IntV-Now
In paper: http://tinyurl.com/IVNow2011
Internet Voting Now!
Here’s How. Here’s Why - So We can Kiss Citizens United Goodbye!
Now on Kindle – but coming out on paper in October, 2011
Notice the subtitle, “Here’s Why - So We can Kiss Citizens United Goodbye!”
The power of Big Money can be sidelined in all US elections. To understand how, lets look at how our politics was originally intended to work.
Chapter Two is entitled “The Original Intentions of the Framers for US Presidential Elections.” Believe it or not, the folks who wrote the Constitution envisioned that doc as a sure fire way to prevent the take over of our government by political parties. They also thought that presidential elections would be completely nonpartisan, and cost free to the candidates.
You’ll see the evidence for my claim. While the main evidence is taken from the Constitution itself, quotes from Adams, Madison, Hamilton, Washington, and Jay are provided, as well as Marshall and Jefferson. Other aspects of their original intentions were that the process would be as deliberative and orderly as a corporate personnel selection committee meeting (much like the Philadelphia Convention).
They loathed the circus-like chaos of campaigning. They uniformly agreed that such campaigning was beneath the dignity of any prospective president. (That belief prevailed until the 1890s, when William Jennings Bryan became the most active campaigner in US history up to that time.)
They also expected the presidential election process to be so inexpensive to officially conduct that no provision was made to pay for it. They envisioned that Electors in the Electoral College would defray the costs themselves.
In Chapter Three, I show the obvious – that is, how miserably the current two-party system is doing at fulfilling those original intentions. Surprisingly, these old intentions can be fulfilled by the new technology better than the two-party system has ever been able to do. In other words, Internet voting, rightly organized, is a natural fit with the aspirations of American voters and election integrity activists for truly democratic presidential elections, uncorrupted by Big Money contributors.
Chapter Four shows how this would work.
Imagine yourself watching a series of debates between presidential candidates online, or on TV. Two debaters, in a real debate, have one hour to show their merit. Then you watch a second one hour debate between two more candidates.
At the end of that debate, you turn to your PC or cell phone and log on to your county's secure election website. After it checks your registration, a ballot appears. You can then rate each debater from 0-9, not just cast one vote for one winner. Winning would depend on the ranking total.
In three evenings, the American people can sort through a dozen different candidates. Hearing all the ideas and arguments of those candidates would be far more of an education to the electorate than they now get from one Repub and one Dem.
Here is how the power of the superrich will be marginalized: Special interest advertising would have very little time or opportunity to interfere with the voter's decision making process. The voter will focus on the performance of the debaters, and base his or her ranking on that, rather than on some tricky ad that runs for weeks on TV. The voter will decide long before advertising could work its manipulative schemes. Let the corporations spend all of their shareholder's money. Internet voting, rightly organized, can neutralize all their pernicious efforts.
TV and online time for the debates can be free for the candidates. The people license the use of public air ways, and can require the time needed for debates from the broadcasting licensees. With that, the need for campaign contributions drops to nil.
Only 100 years ago the horse and carriage were the primary means of transportation in the US. The horseless carriage was an object of scorn and skepticism. Eventually, however, that new technology proved irresistible, and the car became our primary mode of transportation.
You can make the same happen with Internet voting. It can, and will, become our primary mode of voting, if you simply demand it from your local and state officials. Go to them because the Constitution gives them the authority for conducting elections.
Real democracy can be ours, if we only demand it!
William J. Kelleher, Ph.D.
Twitter: wjkno1
Internetvoting@gmail.com
Internet Voting Explained on
YouTube: http://www.youtube.com/user/WJKPhD
Subscribe to:
Comments (Atom)