Sunday, November 29, 2009

Online Voting: Deliberation

This will unfortunately be my last "official" weekly post for the autumn quarter. I may continue updating my blog, but it won’t be occurring as a weekly routine. In this post, I will focus on the implications of online voting for deliberation in voting. Though voting in general incorporates collaboration by using votes (outputs) in order to decide on a particular candidate, voting also incorporates key elements of deliberation as well. In attempting to incorporate these deliberative elements in online voting systems, we must consider the possibility of backfire and the steps we can take to prevent it.


In his article “Why Internet Voting”(2001), Loyola Law School Professor John T. Nockleby argues that Internet voting may at best promote formal political equality (as opposed to substantive social or economic equality) by increasing voter accessibility and participation. This formal political equality in the election process seems to directly mirror one of Beth Simone Noveck’s foundational criterion for a deliberative process: “procedural uniformity and the equality of inputs” (Wiki Government, 39).

Nevertheless, deliberation also “debates problems on an abstract level before implementation”(Wiki Government, 39). However, Internet Voting, according to Nockleby, privatizes connections between people: voters are at home, sitting in front their computers as opposed to standing in line at the polls. Is there some intrinsic, deliberative value in standing in line at the polls as opposed to sitting alone, staring at a computer monitor? I’m not entirely sure if there is an extremely obvious negative implication here. Voters can still engage in deliberation on the Internet: forums and online polls allow voters to discuss election issues prior to actually casting their ballots.



I think the greater problem, however, may lie in the backfiring of increasing voter accessibility through easy-to-use online voting technology. If an online voting system drastically speeds up and simplifies the voting process, voters may act impulsively rather than debate and refine their views prior to voting. However, there really is no set brink for how much additional efficiency or implication will result in these impulsive decisions, let alone the proof of a causal relation between these factors and impulsiveness. But even if we do assume that efficiency and simplification need to be constrained in order to prevent citizens from voting impulsively, what steps are sufficient? Are a set of identification forms prior to accessing the online ballot enough? Should voters be required to spend a set amount of time in a chat room/online forum with other voters before finally casting their ballots (what I’d call an online caucus)?


I think what’s missing in the discussion of online voting is that criticisms of online voting often lack alternative ways or approaches to tackle the very problems they criticize. Creating such approaches are important, precisely because if online voting does become prevalent in elections, sheer criticism will not aid in solving its weaknesses.

Sunday, November 15, 2009

Promotional Discourse: A Facade for Security Concerns

This past May, the citizens of Honolulu participated in an all-digital online and telephone local election using the E1C online voting system. In his Huffington Post article “America’s Newest State Holds America’s Newest Election, Aaron Contorer, Chief of Products and Partnerships at Everyone Counts, Inc. (the city of Honolulu used this company’s E1C voting system in its election) argues that online voting promotes democratic values, increases voter convenience, and "is the best method ever invented for securely delivering information and decisions." While I will concede that online voting is a convenient voting method (especially since voters don’t have to go to polls), Contorer’s positive illustration of security in online voting should not be accepted at face value.

The hyperbole that online voting is the “best method ever invented for securely delivering information” is not a sufficient justification for its widespread use. Although Contorer points out that online voting in Hawaii ensured that “all of [its citizens’] votes are being secured using military-grade encryption technology,” such a phrase is mere selling point for the E1C voting system. It does not sufficiently address the scope and magnitude of security issues associated with online voting. According to Barbara Simons, a member of the Board of Advisors of the U.S. Election Assistance Commission, “encryption is only a secondary part of any electronic security. It does nothing at all to protect against insider attacks, denial of service attacks, various forms of spoofing, viruses, or many kinds of ordinary software bugs.” Although there are a host of technical security issues involved, I do not want to focus on them. Instead, I want to focus my criticism on the use of promotional discourse in policymaking. Brief promotional descriptions such as “military-grade encryption technology” do not discuss what the security problems are and how effective encryption technology is at solving them. Consequently, such promotional descriptions distract attention from constructive discussion about reasonable security concerns.

Next, Contorer argues that “we have been banking online and shopping online for over a decade” and that we should be able to rely on the security of online voting as a result. However, this claim misunderstands that reason that online banking/shopping are secure is because such mediums have systems in place that allow police, bank officials, etc. to potentially detect fraudulent activities through transaction between people. By contrast, Simons argues that online voting cannot legally allow state officials to determine how people vote because doing so would be a violation of voter privacy. As a result, online voting presents a double-bind between the values of security and democratic procedure. Either a) we can verify if fraudulent activities have occurred in elections by tying the votes to their individual voters and thereby violating the voters’ right to a private ballot on a mass scale or b) we can protect voter anonymity, but jeopardize security.


Contorer, Aaron. “America’s Newest State Holds America’s Newest Election.” The Huffington Post. 14 May 2009. Accessed 15 November 09.
http://www.huffingtonpost.com/aaron-contorer/americas-newest-state-hol_b_203639.html

Simons, Barbara. Justin Moore. “The Internet and Voting: Worth Doing Right.” Verifiedhttp://www.verifiedvotingfoundation.org/article.php?id=6695. The Huffington Post. 2 June 2009. Accessed 15 November 09.
http://www.huffingtonpost.com/barbara-simons/the-internet-and-voting-w_b_210554.html

Monday, November 9, 2009

Reforming, Transforming, and Reconsidering: An Evaluation of Dr. William J. Kelleher's Model for a Direct Election System Based on Online Voting

Dr. William J. Kelleher, a social science researcher on Internet Voting, kindly shared his own blog and articles about online voting with me, so I thought I would take the liberty of using this post to evaluate his article “How to Organize the Direct Election of US Presidents in a Way which Will Restore Reason and Eliminate Costs to the Candidates, Based on Internet Voting.”


As a brief summary, the article advocates for the deconstruction of the two-party system into a more direct electoral procedure in which anyone eligible to run for office can do so at an equal footing via public funding. The procedure advocates for a series of debates between candidates in various states, regional areas, and a final presidential debate. In order to adjudicate which candidates move up in the debate hierarchy, voters use Internet Voting in order to preferentially rank candidates’ performance in debates on a 0-9 scale (voting will be open for 24 hours following the final debate in each series).


While I will concede that online voting systems can be more efficient than current paper ballot counting, the potential benefits and disadvantages of these systems for democratic procedure are highly dependent on the election structure that they are being used to support. Online voting is one tool for a larger project; if the end project itself has inherent shortfalls, can the tool be used to fix them?


The integration of online voting with the proposition for structuring elections around a series of candidate debates is an interesting attempt at responding to this question. From one perspective, Dr. Kelleher argues that candidate debates seem to grant those interested in running for president a comparatively more competitive opportunity to participate than the status quo does. However, are debates a sufficient for allowing the public to make informed decisions about the candidates they choose? Answering this question is crucial to the integration of online voting with this election structure because in all likelihood, a voter would value their justifications for voting for a candidate prior to the system they use to vote for that candidate. While Dr. Kelleher’s article criticizes the media for its “name conditioning”(14) of candidates, unrestricted media can also play a role as a watchdog on certain substantive and credential issues regarding candidates that debates cannot convey (e.g. the candidate’s level of education, occupations, political experience, actions, etc.). Lastly, even if the debate-centered election structure does prove to promote more direct democratic procedure, how feasible is it? Even if Dr. Kelleher’s model as a prescriptive one, it needs to take into account pragmatic considerations in order to have meaningful real-world applications.


The ranking system in Dr. Kelleher’s proposal brings up some important considerations inherent to the online voting medium. Are the ranking systems entirely objective? There are a host of issues that the ranking system may take into account: How sound were the candidates’ arguments? How charismatic were they? How intelligent did they sound? All of these factors carry different weight for voters and a 0-9 ranking system seems to arbitrarily amalgamate these various questions into one numerical system. Moreover, the numbers can carry different meanings. For instance, a nine for one voter could be a synonym for the “perfect” candidate while a nine for another voter could indicate that a particular candidate is comparatively the best one. Because these numerical rankings control the magnitude of a voters preference for a particular candidate, the rankings systems may indeed contain numerous inconsistencies.


Though Dr. Kelleher has previously referred to security problems associated with online voting as “The Great Security Scare,” I would argue that potential security concerns are reasonable in that voters have a right to know if their votes count. Dr. Kelleher says, “One secure method of registration would be to have each voter appear once for biometric registration. Thereafter, all changes of address or other communication with state elections officials can be conducted online.” If biometrics is a field used for recognizing humans, what are the specific forms of biometric registration that can adequately secure the online voting system? Moreover, if individual state officials are the ones controlling election commissioning, how feasible is it to establish consistent security measures for all fifty states? One such security concern is voter verification. Although Dr. Kelleher argues that “the voter can use the vote number to verify that his or her vote has been counted,” how does the system account for malicious programs that may tell the users that their votes have been counted when, in fact, they have not?


In order to ensure that people are actually selected their leaders through democratic procedure, it is imperative to ensure that people’s votes count. I therefore am not considering security issues out of mere fear or paranoia; security is inextricably-linked with democratic procedure. If a project has room for security lapses or inconsistencies in design, it is pivotal to evaluate the problems inherent to the project before using tools to build the project.


Works Cited:

Kelleher, William J. “How to Organize the Direct Election of US Presidents in a Way which Will Restore Reason and Eliminate Costs to the Candidates, Based on Internet Voting.” The Empathic Science Institute. 4 August 2009. Accessed 9 November 2009.

Sunday, November 1, 2009

Regina, Canada: Is Online Voting the Solution to Poor Voter Turnout?

This past Wednesday, only twenty-five percent of registered voters in the city of Regina, Canada cast ballots for the local election. In an effort to increase voter turnout for future elections, government officials in Regina are considering implementing an online voting system. Though these officials have begun painting a pretty picture of the implications of such a system on election accessibility, they have hastily overlooked the potential for adverse effects as well as the possibility that it may not be the appropriate remedy for substantive problems inherent to Regina’s elections.


In my previous posts, I highlighted a host of security concerns associated with online voting. Though questions of security are always relevant to the implementation of online voting systems, let’s make the hypothetical assumption that Regina can use systems perfectly secure from malacious hackers, viruses, and other possible ways to tamper with the systems. Viewing Regina’s consideration of using online voting under this assumption will allow for a more specific, critical evaluation of the specific implications of online voting for voter accessibility and democratic procedure.


Regarding voter accessibility, CBC News claims that Regina began its consideration of implementing an online voting system the Friday after the election. If this is true, why did city officials immediately turn to online voting as a potential solution for low voter turnout? Pinning elected officials on this question is a crucial one; absent any proof from elected officials on how exactly online voting would increase accessibility in elections, constituents of Regina would be blindly allowing their leaders to transform electoral procedures without any guarantee of solvency for low voter turnout. Even if elected officials do somehow provide a clear and accurate proof of how an online voting system will increase accessibility in future elections, will it do so fairly? Requiring elected officials to answer this question is imperative because otherwise, they can use online voting as tool for targeting specific demographics that are more likely to keep them in power.


Though Joni Swidnicki, the Regina city clerk, states that the city should continue its consideration of online voting “so that folks might have the opportunity to vote anytime, anywhere,” such a political hyperbole paints an exaggerated, idealistic picture of the reach of online voting. Poor constituents who cannot afford computers cannot “have the opportunity to vote anytime, anywhere,” and neither can older voters who do not have as much knowledge of computer use as younger ones. Because an online voting system has the potential to unequally increase accessibility across demographic lines (e.g. poor and middle-class/rich, old and young, etc.), elected officials may be dangerously tempted to analyze which particular demographics will have greater access to online voting, determine if those demographics tend to support them, and then position themselves on the online voting discussion based on whether or not their supporters will gain access to online voting. Without considering these corruption concerns, an online voting system may not be the appropriate solution for low voter turnout.


One particular consideration that Regina’s officials should make is whether online voting targets the root cause of low voter turnout. Without attacking the root cause of a problem, a proposed treatment cannot effectively solve the problem. For the city of Regina, election accessibility doesn’t seem to play the most significant role in causing low voter turnout. According to CBC, “three years ago, the turnout in Regina was 36 percent,” eleven percent higher than this year’s twenty-five percent. Because no significant structural changes in voting procedures have occurred in the past three years that have blocked accessibility, politicians cannot reasonably attribute the drop in voter turnout to accessibility. Proposing an alternative causal mechanism for low voter turnout, Don Ravis, a spokesman for Lead Saskatoon Futures Inc., notes in his interview with CBC News that “Fringe candidates don’t help the process…we had examples of many making a mockery of the system.”As a result, “Ravis laid some of the blame for the poor turnout on the quality of people standing for election.” Though it’s worth noting that the views of a single spokesman cannot be reasonably extrapolated to claim that all registered voters felt that most of the candidates in Regina’s election were not particularly great, there’s a possibility that registered voters may have intentionally opted out of partaking in this election due to the lack of strong candidates. If this is true, then online voting is an ineffective solution; it only alters the way in which constituents vote for those ineffective candidates. Without considering the root causes of election problems, politicians cannot make an educated justification for why online voting is essential.

"Regina Considers Online Voting." CBC News. 30 October, 2009. Accessed: 1 November, 2009.
http://www.cbc.ca/canada/saskatchewan/story/2009/10/30/sk-regina-saskatoon-election-turnout.html

Sunday, October 25, 2009

T-Systems Online Voting System: Mistakes and Revisions

T-Voting

The T-Systems Online Voting Project observed mistakes with its architecture of its 2001 voting protocol and has taken steps to revise it. The revision process asks us to consider how online voting systems can be improved to become more secure and democratic.


The 2001 T-Systems Protocol used different servers for online voting registration (called the Validator) and the online ballot box. According to researchers from T-Systems, an implication of this arbitrary divide was “redundant data management” and “inconsistency of communication problems.” But more importantly, we can analyze that the separation of servers tears the voter’s identity apart from the vote (the Validator knows the voter’s identity, but the ballot box does not). Consequently, hackers that tamper with the ballot box can distort votes and election commissioners will have no way to verify where the votes came from; a further implication is that it is virtually impossible to recover voting data in case of attacks. Remarkably, T-Systems evaluated the shortcomings of its voting system and decided to take steps to improve it.


Learning that separation between voter identity and and votes was not feasibly secure, T-Systems opted for a more centralized database called The Bulletin Board. According to T-Systems:

“The Bulletin Board:

· is a consistent data base for all participants

· plays an absolutely passive role and is not able to communicate with the other players.

· It has the function as a placard, because after the election the public has the possibility to check if certain votes are counted and if they are counted in a correct manner.”



Although the addition of the Bulletin Board cannot fully eliminate threats from hackers, its role as a centralized database allows for efficient and complete recovery of voting information. However, we can evaluate that an obvious security oversight is that the Bulletin Board lacks a way to determine when attacks have occurred on its system; election officials will have to constantly check for consistency between voter identity and ballot box information, both of which are contained in the Bulletin Board.

Moreover, the Bulletin Board’s use as a placard imbues the system with a strong sense of vertical accountability since citizens can verify if their votes are actually counted. Because vertical accountability is essential for ensuring that governments adhere to the will of the public, the Bulletin Board is breakthrough technology that strengthens the potential link between online voting and democratic procedure. However, the greater lesson manifested in T-System's production of the Bulletin Board is that it both reflected on its mistakes and took innovative measures to rectify them.


Works Cited:

Diehl, Klaus. Weddeling, Sonia."New Developments in the Voting System and Consequently Implemented Improvements in the Representation of Legal Principles." Online Voting Project. T-Systems. August 2006.

Sunday, October 18, 2009

Fairness and Security?: Online Voting in Arizona


During the 2008 General Election, the Arizona Department of State opened the option for voting online (election commissioning is a subset of each state’s state department as opposed to a federal responsibility). Despite the Pentagon’s decision to abandon its online voting system for military personnel, the Arizona Department of State became the first state to offer Internet voting in a general election to overseas and civilian families. This poses the question of whether or not individual states ought to possess the power to allow their constituents to use online voting systems in a national election when a) citizens in other states are not permitted to do so and b) when the federal government has not verified the security of the state’s voting system.

Is it fair for citizens of one state to have access to online voting in a national election while those others do not? On one hand, Arizona’s implementation of an online voting system sets a precedent for other states to make voting more accessible for military personnel. Because military personnel are risking their lives under the orders of the executive branch, should they not be entitled to decide on the leaders responsible for those orders? On the other hand, allowing military personnel and overseas citizens from one state to have access to online voting is not considered by the electoral differences between states. That is, even though the Arizona State Department provided overseas citizens and military personnel with voting access and thereby expanding its voting base, the federal government never increased Arizona’s number of electoral votes.

If large security concerns regarding online voting exist, should an individual state be allowed to use an online voting system in a national election while others are not? After all, security lapses will not simply affect votes in Arizona, but in a close general election fraudulent activity could potentially tip the vote in one direction or another. Moreover, because “national news does not cover a lot about what is happening at the state level regarding voting,” there are only few media watchdogs that can scrutinize any irregularities and fraudulent activities in state-run online voting procedures. However, the Arizona Department of State tried to check security issues in a way that even questions whether or not Arizona’s conception of online voting should actually be considered online voting. According to Kevin Poulsen from WIRED,

“In the Arizona system, voters could request an early ballot through a Secretary of State website, and receive it though snail mail. If there’s no time for the postal service, though, the voter gets a PDF of the ballot in e-mail. This is where it gets a little clunky. You can’t fill out the ballot on your computer — you have to print it out, then use your scanner to scan the completed and signed ballot back onto your PC. Then you upload the scanned ballot to the aforementioned “secured system” (it uses SSL).”

Because Arizona’s online voting system is a hybrid of internet and paper use, it is questionable to actually refer to Arizona’s voting system as true internet voting. Poulsen describes how, “Stender, and director of elections Amy Bjelland, said the system wasn’t true internet voting, because you couldn’t just go to a website and click on some radio boxes to choose the next president.” Regardless of what we call the voting system, the fact that it included an online aspect brings into question whether or not the Arizona Department of State can securely implement its voting procedure. Though voters’ handwriting on the PDF provides the department with a way to identify individual voters, there is no solution for the chance that malacious hackers write “a bot that infects unpatched PCs en masse, watches for interactions with the voting website, then changes the votes in the PDF to whatever the malware writer wants.” Consequently, Arizona’s combination of absentee-style paper ballots and online voting serves as a potential way to decrease hacking in online voting, but not to prevent it from occurring on a categorical level.

Works Cited:
Poulsen, Kevin. "Is Internet Voting Safe? Vote Here." Wired. 04 June 09. Accessed 19 October 2009. http://www.wired.com/threatlevel/2009/06/cfp-evote/

Saturday, October 10, 2009

The Case of Estonia: The First Country to Use Online Voting for a National Election

A nation striving to diverge from its Soviet past, Estonia allowed online voting for its 2005 local elections and its 2007 Parliamentary Elections. According to John Bordland,

“With his online vote for parliament, the entrepreneur helped make a bit of elections history. This small Baltic country is in the midst of its first -- and the world's first -- national election featuring internet balloting open to all voters”

The real-world implementation of a revolutionary voting medium on a national scale asks us to question whether or not the system is actually consistent with democratic procedure; if a voting system does not accurately account for the will of the people through poor implementation (e.g. security lapses), then it fails to be democratic.

Even prior to the election, computer scientists in more developed countries such as the United States have shown skepticism toward Estonia’s plan to implement online voting. Bordland describes,

“Critics worry that voting systems using ordinary Windows PCs and the open internet could be hacked by unscrupulous outsiders, or subverted insiders. A high-profile United States Defense Department system called SERVE, or Secure Electronic Registration and Voting Experiment, aimed at allowing overseas military personnel to vote was canceled after a 2004 review by computer security experts said it presented an easy target for hackers. Those same concerns apply to Estonia's system, some security experts warn.”

The online voting system, though intended to make voting more accessible for the general public, may just be a little too "accessible." If malicious stakeholders such as power-hungry politicians, special interest groups, and exploitative nations who find it beneficial to rig elections in favor of one candidate or another for economic or national security reasons hack the online voting system, could Estonia justifiably claim that its elections represent the will of the people? If current technology is so susceptible to attack, how can Estonia justifiably rely on it? According to the Estonian National Electoral Committee,

“Besides the main functional tasks the iVote system management is largely focused on the security. The system is only online during ballots and the secrecy of votes is guaranteed by advanced encryption technologies as well as by special operational means…The results of the study concerning the parliamentary elections in March 2007 will be available later this year.”

The National Electoral Committee’s “guarantee” of the secrecy of votes and vague “special operational means” seems mind-boggling, considering that the committee simultaneously admits that the results of its parliamentary elections are not even available; the parliamentary election occurred in 2007 and a legitimate evaluation of the election’s security lapses has not been publically released yet. How can the Estonian government justifiably guarantee the security of online voting when the 2007 election was the very first time any government has ever implemented the voting procedure? Can a government that claims that the implementation of its voting procedure was “successful” without making the security issues of its election transparent to its constituents be trusted with online voting?

Works Cited:

Bordland, John. "Online Voting Clicks in Estonia." Politics: Security. 2 March 07. WIRED. 11 October 09. http://www.wired.com/politics/security/news/2007/03/72846.

Maaten Epp (Estonian National Electoral Committee Vice Chair). "Internet Voting in Estonia." 01 July 2009. National Electoral Committee. http://www.epractice.eu/en/cases/ivote.