Computer Scientist who prefers paper. That is how the American magazine The Atlantic described her earlier this year. Having worked at IBM for long, Barbara Simons (76) is among the pioneers in computer science. When, therefore, she began saying that electronic voting was not safe, people took her to be a ‘crank’. But undeterred, Simons became one of the founders of American organization Verified Voters, which has been in the forefront of the movement to replace machines with paper ballots in American elections.
The idea that software can be manipulated to rig elections is still neither popular nor widely accepted. But the election of Donald Trump in 2016 as the US President and the cloud cast by allegations of Russian interference in the electoral process, has overnight changed the usually cold reception that Simons was used to from public officials and citizens alike. People are now more curious to hear her and more willing to accept that she may actually be talking sense.
US Department of Homeland Security reported Russian attempts to meddle with the electoral process in 21 states. It also reported successful attempts to hack computer systems at Sony, US Office of Personnel Management and Equifax. The attacks underlined the vulnerability of all computerised systems, very few of which are said to be truly secure.
But Simons does not seem to grudge the ignorance and pig-headedness of officials for whom the vulnerability of electronic voting machines was a fringe occupation. “They didn’t know what they were talking about,” she told The Atlantic, “but (and) I did.”
In late July 2017, she addressed hackers assembled at an annual event in Las Vegas. The hackers were there to stage an attack on voting machines while the voting took place. Four different types of voting machines, three still in use in the United States, had been placed before them and as the voting was staged, the hackers were to try and manipulate the machines. “I lose sleep over this; I hope you will too,” she told them.
“One team of hackers used radio signals to eavesdrop on a machine as it recorded votes. Another found a master password online. Within hours of getting their hands on the machines, the hackers had discovered vulnerabilities in all four,” reported The Atlantic.
Everything that was happening in front of their eyes at the hackers’conference, she told the media, would have been done by groups intent on undermining the integrity of the American electoral system.
Because of sustained efforts and campaigning by Verified Voters and Simons,
The Atlantic report quoted her as saying, “It’s not that I don’t like computing or I don’t like computers. I mean, I am a computer scientist,” she said. “Many of the leading opponents of paperless voting machines were, and still are, computer scientists, because we understand the vulnerability of voting equipment in a way most election officials don’t. The problem with cybersecurity is that you have to protect against everything, but your opponent only has to find one vulnerability.”
Simons is skeptical about steps taken by tech companies to enhance cyber security. Pointing out that all 50 states in the USA use computerised scanners for vote counting, she claimed that few states had a system of post-editing auditing to detect manipulation. “Mandatory audits, in the form of hand counts of randomized samplings of ballots, are essential to protect against invisible vote theft,” Simons said, adding, “in an unaudited system, malicious code could easily go unnoticed. “It’s not rocket science,” she said. “Any halfway-decent programmer could do it.”
“In 2002, Congress passed the Help America Vote Act, and states were awash in money to invest in new systems ... Security was a secondary concern—even though many of the new machines had wireless features and left no paper trail. They were viewed as easier to use, and seemed to have little downside. Each state “wanted to get the newest and greatest shiny object,” said Simons. It was “a gold-rush mentality.”
The secret ballot presents a paradox: How can the validity of each vote be confirmed without being traceable to any individual voter? Ballots must be “anonymous and yet verifiable, secret and yet accountable,” says Eric Hodge of CyberScout, a security-services company.
“Paper, Simons said, is the best answer to this riddle. Marked clearly and correctly, it’s a portable and transparent record of voter intent, one that voters themselves can verify, at least while the ballot is still in their possession. It’s also a permanent record, unlike computer memory, which can always be overwritten. “There’s no malware that can attack paper,” Simons said. “We can solve this. We know how to do it.”
“The technical community has a responsibility to inform policy makers of the limitations as well as the benefits of technology,” she said. “That is part of engineering.”
It is not just Simons who is critical of voting machines. Cyber security experts in the United States say not enough is being done to secure the machines, ensure manufacturers follow security norms and to conduct a proper post-election audit. The weekly newsletter of Verified Voters reported the following and many more developments around security of voting machines. A sampling will give an idea of the intense debate on the question in the United States. Not enough is happening evidently in India.
Published: undefined
Follow us on: Facebook, Twitter, Google News, Instagram
Join our official telegram channel (@nationalherald) and stay updated with the latest headlines
Published: undefined