[IP] Who Tests Voting Machines?
Begin forwarded message:
From: "R. A. Hettinga" <rah@xxxxxxxxxxxxxx>
Date: May 30, 2004 10:19:12 AM EDT
To: cryptography@xxxxxxxxxxxx
Subject: Who Tests Voting Machines?
<http://www.nytimes.com/2004/05/30/opinion/30SUN1.html?
th=&pagewanted=print&position=>
The New York Times
May 30, 2004
MAKING VOTES COUNT
Who Tests Voting Machines?
henever questions are raised about the reliability of electronic voting
machines, election officials have a ready response: independent testing.
There is nothing to worry about, they insist, because the software has
been
painstakingly reviewed by independent testing authorities to make sure
it
is accurate and honest, and then certified by state election officials.
But
this process is riddled with problems, including conflicts of interest
and
a disturbing lack of transparency. Voters should demand reform, and they
should also keep demanding, as a growing number of Americans are, a
voter-verified paper record of their vote.
Experts have been warning that electronic voting in its current form
cannot
be trusted. There is a real danger that elections could be stolen by
nefarious computer code, or that accidental errors could change an
election's outcome. But state officials invariably say that the machines
are tested by federally selected laboratories. The League of Women
Voters,
in a paper dismissing calls for voter-verified paper trails, puts its
faith
in "the certification and standards process."
But there is, to begin with, a stunning lack of transparency surrounding
this process. Voters have a right to know how voting machine testing is
done. Testing companies disagree, routinely denying government officials
and the public basic information. Kevin Shelley, the California
secretary
of state, could not get two companies testing his state's machines to
answer even basic questions. One of them, Wyle Laboratories, refused to
tell us anything about how it tests, or about its testers' credentials.
"We
don't discuss our voting machine work," said Dan Reeder, a Wyle
spokesman.
Although they are called independent, these labs are selected and paid
by
the voting machine companies, not by the government. They can come under
enormous pressure to do reviews quickly, and not to find problems, which
slow things down and create additional costs. Brian Phillips, president
of
SysTest Labs, one of three companies that review voting machines,
conceded,
"There's going to be the risk of a conflict of interest when you are
being
paid by the vendor that you are qualifying product for."
It is difficult to determine what, precisely, the labs do. To ensure
there
are no flaws in the software, every line should be scrutinized, but it
is
hard to believe this is being done for voting software, which can
contain
more than a million lines. Dr. David Dill, a professor of computer
science
at Stanford University, calls it "basically an impossible task," and
doubts
it is occurring. In any case, he says, "there is no technology that can
find all of the bugs and malicious things in software."
The testing authorities are currently working off 2002 standards that
computer experts say are inadequate. One glaring flaw, notes Rebecca
Mercuri, a Harvard-affiliated computer scientist, is that the standards
do
not require examination of any commercial, off-the-shelf software used
in
voting machines, even though it can contain flaws that put the
integrity of
the whole system in doubt. A study of Maryland's voting machines earlier
this year found that they used Microsoft software that lacked critical
security updates, including one to stop remote attackers from taking
over
the machine.
If so-called independent testing were as effective as its supporters
claim,
the certified software should work flawlessly. But there have been
disturbing malfunctions. Software that will be used in Miami-Dade
County,
Fla., this year was found to have a troubling error: when it performed
an
audit of all of the votes cast, it failed to correctly match voting
machines to their corresponding vote totals.
If independent testing were taken seriously, there would be an absolute
bar
on using untested and uncertified software. But when it is expedient,
manufacturers and election officials toss aside the rules without
telling
the voters. In California, a state audit found that voters in 17
counties
cast votes last fall on machines with uncertified software. When
Georgia's
new voting machines were not working weeks before the 2002 election,
uncertified software that was not approved by any laboratory was added
to
every machine in the state.
The system requires a complete overhaul. The Election Assistance
Commission, a newly created federal body, has begun a review, but it has
been slow to start, and it is hamstrung by inadequate finances. The
commission should move rapidly to require a system that includes:
Truly independent laboratories. Government, not the voting machine
companies, must pay for the testing and oversee it.
Transparency. Voters should be told how testing is being done, and the
testers' qualifications.
Rigorous standards. These should spell out in detail how software and
hardware are to be tested, and fix deficiencies computer experts have
found.
Tough penalties for violations. Voting machine companies and election
officials who try to pass off uncertified software and hardware as
certified should face civil and criminal penalties.
Mandatory backups. Since it is extremely difficult to know that
electronic
voting machines will be certified and functional on Election Day,
election
officials should be required to have a nonelectronic system available
for
use.
None of these are substitutes for the best protection of all: a
voter-verified paper record, either a printed receipt that voters can
see
(but not take with them) for touch-screen machines, or the ballot itself
for optical scan machines. These create a hard record of people's votes
that can be compared to the machine totals to make sure the counts are
honest. It is unlikely testing and certification will ever be a complete
answer to concerns about electronic voting, but they certainly are not
now.
--
-----------------
R. A. Hettinga <mailto: rah@xxxxxxxx>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to
majordomo@xxxxxxxxxxxx
-------------------------------------
You are subscribed as roessler@xxxxxxxxxxxxxxxxxx
To manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/interesting-people/