For Immediate Release Online Voting for Academy Awards Must Not Become a Model for Public Elections, Cyber Security and Voting Rights Experts Warn

Posted on February 14, 2013


Online Voting for the Academy Awards Must Not Become a Model for Public Elections, Cyber Security and Voting Rights Activists Warn

LOS ANGELES, CA -- A group of concerned cyber security experts and voting rights advocates released a statement today warning that Internet voting for this year's Academy Awards must not become a model for public elections. The group includes advocacy organizations Common Cause and Verified Voting and some of the most renowned figures in computer science including Ron Rivest, co-founder of RSA and Verisign and recipient of the Turing Award; [1] and Dr. Barbara Simons, former President of ACM and author of Broken Ballots: Will Your Vote Count?

"When the Academy of Motion Picture Arts and Sciences announced that it would be using an online voting system to help its members choose this year's Oscar nominees and finalists, thereby adding to the "credibility" of online voting, we found ourselves compelled to remind the general public that it is dangerous to deploy voting by email, efax, or through internet portals inpublic governmentalelections at this time," the experts said. "Public elections run by municipal, local and state governments should not be compared to elections like the one run by the Academy."

The goal behind the statement was to ensure that lawmakers and election officials do not lose sight of the real risks to election integrity that Internet voting creates for public elections, despite the fact that an entity as glamorous as the Academy is using it for aprivateelection. Private elections may be subject torules and procedures which may make it possible to mitigate or detect cyber attacks; these conditions do not exist in public elections which require state and local officials to abide by a complex set of state and federal laws such as requiring that the ballot be secret.

"Cyber security experts at the National Institute of Standards and Technology[2] and the Department of Homeland Security[3]have warned that current Internet voting technologies should not be deployed in public elections," the statement said. "Internet voting systems, including email, fax and web based voting systems in which marked ballots are cast online, cannot be properly protected and may be subject to undetectable alteration."

Internet voting has been shown time and again to be vulnerable to potentially devastating -- and undetectable -- cyber attacks. In 2004, the Department of Defense canceled a pilot Internet voting program for military personnel stationed overseas because of concerns about security. In 2010, a "red team" led by J. Alex Halderman of the University of Michigan not only penetrated a pilot election in Washington, D.C., changing votes at will, and even managed to thwart attempted hacks from as far away as Iran and China. Election officials in Washington were unaware of any of it until Professor Halderman's team disclosed its exploits. Because of the demonstrated vulnerabilities and the public's increased interest in online voting, a senior cyber security official at the Department of Homeland Security warned a group of election officials in March 2012 that Internet voting is "premature" and not advisable at this time.[4] In May 2012, the National Institute of Standards and Technology - the agency tasked with studying and developing federal voting system standards - issued a similar statement saying that secure Internet voting is not yet technologically feasible for public elections.[5]

Six states are currently considering legislation to introduce or broaden the use of Internet voting. It is imperative, the group of experts said, to make them aware of the scientific arguments against such a step.

"Financial institutions, the FBI, the White House, and the Department of Defense have all been breached," the experts said. "It is unreasonable to assume that any Internet voting system vendor today can repel a well-funded partisan operative or nation state determined to manipulate, disrupt, or violate voter privacy in an online public election."

[1]http://amturing.acm.org/

[2]http://www.nist.gov/itl/vote/uocava.cfm

[3]http://www.npr.org/blogs/itsallpolitics/2012/03/29/149634764/online-voting-premature-warns-governmentcybersecurity-expert

[4]http://www.nist.gov/itl/vote/uocava.cfm

[5]http://www.npr.org/blogs/itsallpolitics/2012/03/29/149634764/online-voting-premature-warns-governmentcybersecurity-expert

Office: Common Cause National

Issues: Voting and Elections

Tags: Registration and Voting Systems

Common Cause is a nonpartisan grassroots organization dedicated to upholding the core values of American democracy. We work to create open, honest, and accountable government that serves the public interest; promote equal rights, opportunity, and representation for all; and empower all people to make their voices heard in the political process.

Leave a Comment

Take Action

The Supreme Court gutted a key provision of the Voting Rights Act.

Tell Congress to fix the court’s bad decision!

Take action.

Donate

Give Today

Join the Community

Find Common Cause Activists in your area.

Add Me to the Map