Critical Read

Big structural challenges face e-voting in the U.S.

Shutterstock image: ballot box.

WHAT: "Online Voting: Rewards and Risks," a report by the Atlantic Council in collaboration with McAfee that explores the challenges associated with online and mobile device-based voting.

WHY: A trustworthy, secure online voting system could increase voter participation and reduce the cost of elections. For instance, Estonia introduced a computer-based voting system in 2005 that uses two-factor authentication linked to a secure identity card. But it's not easy to translate a system that works in a country of fewer than 1 million voters to the United States, where elections are conducted at the local level and the idea of a national ID card is unpopular.

Encryption and stringent user authentication can be used effectively for financial transactions, but voting presents special challenges because of the need to keep the ballots secret. That means the kind of audit trail that allows consumers to correct unauthorized financial transactions cannot help officials recover from a hacked vote.

"Once fraud has occurred in a vote, you can prosecute the perpetrator ... but you can't fix the ballots because you don't know how those votes actually occurred," said Kent Landfield, director of standards and technology policy at McAfee, during a panel discussion about the report. "That in and of itself can be a corrupting factor."

Jim Langevin (D-R.I.) said another problem is that the officials who would have to sign off on e-voting systems would likely lack the technical ability to understand key requirements, including end-to-end verifiability to "allow auditors to confirm ballots have been counted correctly without relying on the integrity of those doing the counting." Langevin said there is a "real risk that [policymakers] will come to view different e-voting systems as Coke versus Pepsi -- slightly different versions of the same thing -- when the security of the competitors may be wildly different."

VERBATIM: "For the digital generation, unsupervised polling via mobile devices may be the 'killer app' of e-voting. For that to become a reality, device security will still need to be strengthened. Biometrics (such as fingerprint scanning) and two-factor authentication (such as when a bank requires a customer to enter both a password and a code sent to his or her mobile phone) could help solve these issues."

FULL REPORT: Click here

About the Author

Adam Mazmanian is executive editor of FCW.

Before joining the editing team, Mazmanian was an FCW staff writer covering Congress, government-wide technology policy and the Department of Veterans Affairs. Prior to joining FCW, Mazmanian was technology correspondent for National Journal and served in a variety of editorial roles at B2B news service SmartBrief. Mazmanian has contributed reviews and articles to the Washington Post, the Washington City Paper, Newsday, New York Press, Architect Magazine and other publications.

Click here for previous articles by Mazmanian. Connect with him on Twitter at @thisismaz.


  • Contracting
    8 prototypes of the border walls as tweeted by CBP San Diego

    DHS contractors face protests – on the streets

    Tech companies are facing protests internally from workers and externally from activists about doing for government amid controversial policies like "zero tolerance" for illegal immigration.

  • Workforce
    By Mark Van Scyoc Royalty-free stock photo ID: 285175268

    At OPM, Weichert pushes direct hire, pay agent changes

    Margaret Weichert, now acting director of the Office of Personnel Management, is clearing agencies to make direct hires in IT, cyber and other tech fields and is changing pay for specialized occupations.

  • Cloud
    Shutterstock ID ID: 222190471 By wk1003mike

    IBM protests JEDI cloud deal

    As the deadline to submit bids on the Pentagon's $10 billion, 10-year warfighter cloud deal draws near, IBM announced a legal protest.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.