The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November/December (2003 vol.7)
pp: 4-6
Published by the IEEE Computer Society
Robert E. Filman , Research Institute for Advanced Computer Science/NASA Ames
ABSTRACT
<p>What is the right way to make an electronic voting system? After the Florida debacle, Caltech and MIT formed a project to look at the problem. Their most important conclusions were the need to have a physically readable and auditable record of the vote, countable independently of the machine that presents the choices and records the votes. This echoes Rebecca Mercuri's 2000 University of Pennsylvania dissertation, in which she argued for a voter-checkable paper record of the vote that could be preserved for audit.</p>
"As long as I count the votes, what are you going to do about it?"
—William Marcy "Boss" Tweed
I write this in Menlo Park, California, on 5 October 2003, when it's still unclear whether the citizens of this state will choose to have the American governor with the best pectoral muscles, despite his seeming to have the same trouble with the multiple meanings of "respect for women" that Bill Clinton had with "sex." If they do, well, at least our governor will be able to beat up anyone who has been your governor, unless you're from Minnesota.
Elections are curious, both in a scientific and political science way. Scientists, when performing an experiment that takes five million Boolean data points and finds them equally divided to one part in 10,000, declare the result to be below experimental error, yielding no meaningful result. Scientists know that really small differences don't mean anything, unless you're counting a sample size that gives a result like 5 to 4.
Socially (and fortunately limited by the Bill of Rights), we in the US believe in the tyranny of the majority — that although might doesn't make right, 50.001 percent of the electorate does. This is in the face of a system with a large experimental error — one that lost four to six million votes from the 2000 Presidential election, an election in which the difference in popular vote between the top-finishing candidates was only half a million votes.
SO WHERE IS THE ENGINEERING IN ALL THIS?
American elections have been, and continue to be, increasingly automated. In the 19th century, they were cast by paper ballot. Since then, we've seen mechanical voting machines, punch-card ballots (genesis of the famous "hanging chad"), optical mark readers, and most recently, "electronic voting." This consists of giving the voter some form of touch screen and a computer to drive the interface, record the selections, and transmit the results.
Our European readers, who still cast paper ballots, might wonder if this is evidence of an unhealthy American fascination with things artificial. In practice, it's a reflection of the American political system's complexity. I have a friend who tells me that when he lived in England, he voted only for his Member of Parliament and city councilor. I, on the other hand, vote for (and this is just off the top of my head): presidential electors, national senators, national representatives, state governor, state senators, state assemblypersons, various state executives like the attorney general and insurance commissioner, county boards of supervisors, various county officials like the assessor and coroner, the city council (which elects its own mayor), various judges at the state and county levels, boards of education at the elementary, high school, community college, and county levels, and commissioners for districts such as fire, sewer, water, open space, and the county harbor. That's not to mention citizen votes on initiative laws (at the state, county, and city levels), bond issues, tax increases, constitutional amendments, and the occasional recall. And while these offices rarely attract the 135 candidates looking to replace Gray Davis, it's still enough to make anyone responsible for counting the votes (in my case, the San Mateo county clerk recorder — itself an elected position) yearn for as much automation as possible.
So the design of vote-counting systems is an engineering process. The casual engineer might think it easy — after all, it's just counting, not rocket science. You almost never have to decide if a vote is in Imperial or metric units, solve partial differential equations, or look for critical time interactions between candidate selections.
However, the problem is harder than that in practice (though still not as hard as rocket science). There are several desirable features of a voting system. First, it should be open — that is, the process should be inspectable and understandable by human observers. Part of openness is the ability to audit, which implies having redundant ways of checking the results. We want secure systems, ones in which it is difficult to tamper with the process and result. Tampering includes administrators using privileges to change vote tallies, programmers obscuring incorrect behavior in tangled code, and voters employing manipulated credentials to vote repeatedly. We also want anonymity: it should not be possible to tell how any individual voted. This serves not only to prevent coercion, but also to deter against bribing voters.
It worries many people that the current generation of electronic voting devices doesn't meet these criteria. Most of the new generation of these machines are closed systems, built by private manufacturers that regard their internal workings as trade secrets. The outputs of these systems is vote counts; nothing else tracks the actual votes. Unfortunately, the court system has backed up the trade-secrets claims and allowed such systems. An attempt to consecrate the current poor practices as an IEEE standard has recently been beaten back ( www.eff.org/Activism/E-voting/IEEE/), but we can expect to see continuing efforts by voting-machine manufacturers to avoid public scrutiny.
Kohno, Stubblefield, Rubin, and Wallach performed an analysis of one such system, using what seemed to be the leaked source code for a version of Diebold's commercial product. 1 They found an insecure system, easy to cheat by administrators, system developers, and voters, built around a complex environment (Windows CE) and displaying no understanding of cryptography or physical or network threats. To add insult to injury, the authors also criticized the quality of the system's software engineering.
DOING ANYTHING TO WIN (EXCEPT GETTING THE MOST VOTES)
Although it's possible to steal an election by physically stuffing ballot boxes, it's far more efficient to do so by making minor centralized software changes. Could an unscrupulous election official or machine manufacturer produce a manipulated result? Several writers have noted that Chuck Hagel was elected Senator from Nebraska in 1996 — pulling off surprise upsets in both the primary and the election — only a few months after he resigned from the presidency of the company that manufactured the machines that recorded most of the votes. 2 Senator Hagel initially hid his connection to that company.
What is the right way to make an electronic voting system? After the Florida debacle, Caltech and MIT formed a project to look at the problem. Their most important conclusions were the need to have a physically readable and auditable record of the vote, countable independently of the machine that presents the choices and records the votes. (Further details are available in their report. 3) This echoes (though suggests further automation of) Rebecca Mercuri's 2000 University of Pennsylvania dissertation, in which she argued for a voter-checkable paper record of the vote that could be preserved for audit. 4
If you'd like to be more involved with election engineering, consider checking out the Electronic Freedom Foundation ( www.eff.org) or working on project 1583 of the IEEE Standards Coordinating Committee SCC 38 (although the manufacturers might persist in trying to keep the committee limited). You could also visit www.verifiedvoting.org — the home of an organization founded by David Dill (of the Stanford Computer Science Department) to press for political requirements for auditable and secure technologies.
Hasta la vista.

References

54 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool