Justice Department Decides To Break Up E-Voting Company

from the how-about-just-opening-the-source-code? dept

As was rumored at the end of last year, the US Justice Department has decided to break up Election Systems & Software (ES&S), the dominant e-voting provider in the country. You may recall that just a few months earlier, ES&S (who has a long and troubled history of inaccurate, buggy and insecure e-voting machines) had purchased the remains of Diebold's e-voting business for just $5 million. Of course, Diebold also had a long and troubled history of inaccurate, buggy and insecure e-voting machines, so the two made a perfect match. In both cases, the companies relied on security by stonewalling -- insisting that nothing was wrong, despite lots of proof to the contrary, and refusing to let third party security experts ever look at their machines. Rather than breaking up the companies, why don't the feds just require that any e-voting machine use open source software that can be tested by anyone?


Reader Comments (rss)

(Flattened / Threaded)

  1.  
    identicon
    Mr Big Content, Mar 9th, 2010 @ 12:55am

    Open Source For Security ...

    ... is like saying the only cure for bashfulness is nudism.

     

    reply to this | link to this | view in thread ]

  2.  
    icon
    letherial (profile), Mar 9th, 2010 @ 1:26am

    why is it that we are so willing to give up our freedoms for capitalism?

    the constitution does not mention capitalism.

     

    reply to this | link to this | view in thread ]

  3.  
    icon
    Ccomp5950 (profile), Mar 9th, 2010 @ 2:10am

    Re: Open Source For Security ...

    You have to admit though, it's kinda hard to hide a weapon when you are naked, and if you can hide a weapon while naked, you either need to lose weight or can have a nice career in porn.

     

    reply to this | link to this | view in thread ]

  4.  
    icon
    Tor (profile), Mar 9th, 2010 @ 2:13am

    Re: Open Source For Security ...

    and your interpretation is like saying that the only cure for unpopular laws being passed is to keep them secret to the public for as long as possible. Oh, wait - that's what's currently being done.

     

    reply to this | link to this | view in thread ]

  5.  
    icon
    Chargone (profile), Mar 9th, 2010 @ 2:23am

    Re:

    Greed and Idiocy. no further explanation required for in excess of 60% of stupid human decisions.

    (number totally made up on the spot because i needed one for the line, also possibly foolishness or ignorance should replace Idiocy, but it usually Looks more like Idiocy, and only listing one is snappier. I'm also not the Spanish Inquisition.)

     

    reply to this | link to this | view in thread ]

  6.  
    identicon
    Anonymous Coward, Mar 9th, 2010 @ 3:02am

    Re: Open Source For Security ...

    I can only guess that you commented out of pure ignorance, most of the top security solutions are open source(some food for thought: most people use multiple open source security algorithms and or tools on a regular basis.), because people can read the code, make sure it works properly, and is not worth the effort to crack if for no other reason than the sheer amount of time required to do so. The physical implementation of the product is just as important though.

     

    reply to this | link to this | view in thread ]

  7.  
    identicon
    Anonymous Coward, Mar 9th, 2010 @ 4:40am

    We need a cryptographic end to end user verified voting system. Anything less is child's play.

     

    reply to this | link to this | view in thread ]

  8.  
    identicon
    Anonymous Coward, Mar 9th, 2010 @ 4:41am

    Re:

    Capitalism = FREE markets = freedoms. The problem is that most proclaimed capitalists only want free markets to themselves, they want to subject the rest of the population to unjust laws.

     

    reply to this | link to this | view in thread ]

  9.  
    identicon
    Anonymous Coward, Mar 9th, 2010 @ 4:48am

    Re: Open Source For Security ...

    Clearly, the present approach did not work. Do you suggest that it be tried again ?

     

    reply to this | link to this | view in thread ]

  10.  
    icon
    Tor (profile), Mar 9th, 2010 @ 5:31am

    Re:

    What's your plan for making it both end-user verified and invulnerable to vote buying?

     

    reply to this | link to this | view in thread ]

  11.  
    identicon
    The Mighty Buzzard, Mar 9th, 2010 @ 7:34am

    Re: Re:

    No, those are Asshats. The two groups may intersect to some degree but they are by no means one and the same.

     

    reply to this | link to this | view in thread ]

  12.  
    identicon
    The Mighty Buzzard, Mar 9th, 2010 @ 7:40am

    Re:

    -1 Flamebait

    If you can't be bothered to at least explain outlandish statements, it's a waste of your time posting them and a waste of our time reading them.

     

    reply to this | link to this | view in thread ]

  13.  
    identicon
    Anonymous Coward, Mar 9th, 2010 @ 7:52am

    And don't forget this wonderful chart comparing e-voting machines to slot machines, which makes a great contrasting argument by itself.

     

    reply to this | link to this | view in thread ]

  14.  
    icon
    minijedimaster (profile), Mar 9th, 2010 @ 8:27am

    Never Trust the Government

    From the Article

    The department proposed a settlement that, if accepted, would dissolve the merger and force ES&S to sell its Premier business to a buyer approved by the Justice Department.

    Read: "A buyer that the Justice Department controls". As true and bothersome as the security issues are with these systems, this is all about the government gaining control over it's own voting system to make it easier to fix elections.

     

    reply to this | link to this | view in thread ]

  15.  
    identicon
    Anonymous Coward, Mar 9th, 2010 @ 7:56pm

    Re: Re:

    They already have that, Universities with PH.d’s in cryptography have spent years developing such systems and they’re far better than our current voting systems.

     

    reply to this | link to this | view in thread ]

  16.  
    identicon
    Anonymous Coward, Mar 9th, 2010 @ 7:59pm

    Re: Re:

    Also, the very point of a cryptographic end to end user verified voting system IS to prevent voter buying. an end to end user verified voting system that doesn’t prevent voter buying has been developed long before the cryptographic versions but the problem with the non cryptographic ones is that they do enable voter buying. The cryptographic ones do not, that is unless someone brought a camera or something inside the voting booth or something (ie: maybe a camera phone), but our current voting system is also vulnerable to such attacks just as well. End to end user verifiable voting systems are NO MORE vulnerable to voter buying than our current voting system, a camera in the booth, for instance, can be implemented to allow voter buying can be implemented with our current system just as well.

     

    reply to this | link to this | view in thread ]

  17.  
    identicon
    Anonymous Coward, Mar 9th, 2010 @ 8:01pm

    Re: Re: Re:

    err, that is cryptographic end to end user verified voting systems are not any more vulnerable to voter buying than our current system is.

     

    reply to this | link to this | view in thread ]

  18.  
    identicon
    Anonymous Coward, Mar 9th, 2010 @ 11:46pm

    Re: Never Trust the Government

    a cryptographic end to end user verified voting system will fix this and it will make it MUCH harder to fix elections than our current voting system does. End to end cryptographic voting systems also prevent vote buying, again, Ph.D's in cryptography have spent YEARS studying and researching and thinking about the issue and developing a system that does just that (that's the whole point behind the cryptography, because non cryptographic end to end user verified systems have been developed before the cryptographic ones have, so what was the whole point of spending years developing the cryptographic ones if not to prevent voter buying?). Figuring out who you voted for would require a successful cryptographic attack (and yes, our ability to crack algorithms does tend to improve over the years but even so we still have old algorithms that can, to some degree, do a pretty good job at concealing information).

    We already use cryptography when we online bank and, frankly, if you know the servers correct public key and your computer (and the servers computer) is not compromised with malware then transmitting information to the intended recipient via https is safer than doing so via the phone (being that there is no encryption via the phone and so an eavesdropper working for the phone company can potentially listen in on your conversation. Also, don't use cordless phones since they don't usually provide encryption either).

    If we use the best cryptographic algorithms we have and use the most secure keys possible (ie: largest) then I don't see them being cracked anytime soon. Perhaps 15 - 20 years from now we may need to update the algorithms (as a precaution) to a more modern and secure algorithms to ensure that future generations don't crack the current algorithm and use it against a future generation. But that's fine, we'll update the algorithm every once in a while perhaps.

     

    reply to this | link to this | view in thread ]


Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here
Get Techdirt’s Daily Email
Save me a cookie
  • Note: A CRLF will be replaced by a break tag (<br>), all other allowable HTML will remain intact
  • Allowed HTML Tags: <b> <i> <a> <em> <br> <strong> <blockquote> <hr> <tt>
Follow Techdirt
A word from our sponsors...
Essential Reading
Techdirt Reading List
Techdirt Insider Chat
A word from our sponsors...
Recent Stories
A word from our sponsors...

Close

Email This