http://www.nytimes.com/2004/05/30/magazine/30IDEA.html
May
30, 2004
IDEA
LAB
A Really Open Election
By
Clive Thompson
This fall, as many as 20 percent of American
voters will be able to cast their ballots on A.T.M.-style electronic voting
machines.
But to put it mildly, these machines -- where you simply touch a screen and a
computer registers your vote -- have not inspired much confidence lately. North
Carolina officials recently learned that a software glitch destroyed 436
e-ballots in early voting for the 2002 general election. In a Florida state
election this past January, 134 votes apparently weren't recorded -- and this
was in a race decided by a margin of only 12 votes. Since most of the machines
don't leave any paper trail, there's no way to determine what actually
happened. Most alarmingly, perhaps, California's secretary of state recently
charged that Diebold -- the industry leader -- had
installed uncertified voting machines and then misled state officials about it.
Electronic
voting has much to offer, but will we ever be able to trust these buggy
machines? Yes, we will -- but only if we adopt the techniques of the ''open
source'' geeks.
One
reason it's difficult to trust the voting software of companies like Diebold is that the source code remains a trade secret. A
few federally approved software experts are allowed to examine the code and
verify that it works as intended, and in some cases, states are allowed to keep
a copy in escrow. But the public has no access, and this is troublesome. When
the Diebold source code was accidentally posted
online last year, a computer-science professor looked at it and found it was dangerously hackable. Diebold may have fixed its bugs, but since the firm won't
share the code publicly, there's no way of knowing. Just trust us, the company
says.
But
is the counting of votes -- a fundamental of democracy -- something you want to
take on faith? No, this problem requires a more definitive solution: ending the
secrecy around the machines.
First
off, the government should ditch the private-sector software makers. Then it
should hire a crack team of programmers to write new code. Then -- and this is
the crucial part -- it should put the source code online publicly, where anyone
can critique or debug it. This honors the genius of the open-source movement. If you show something to a large enough group of critics, they'll
notice (and find a way to remove) almost any possible flaw. If tens of
thousands of programmers are scrutinizing the country's voting software, it's
highly unlikely a serious bug will go uncaught. The government's programming
team would then take the recommendations, incorporate them into an improved
code and put that online, too. This is how the famous programmer Linus Torvalds developed his
Linux operating system, and that's precisely why it's so rock solid -- while
Microsoft's secretly developed operating systems, Linux proponents say, crash
far more often and are easier to hack. Already, Australians have used the
open-source strategy to build voting software for a state election, and it ran
like a well-oiled Chevy. A group of civic-minded programmers known as the Open
Voting Consortium has written its own open-source code.
But
if our code were open, wouldn't cyberterrorists or other
outlaws be able to locate flaws and possibly rig an election? Well,
theoretically -- except that it's highly unlikely that they could spot an error
that escaped thousands and thousands of scrutineers.
Indeed, it may be far easier to infiltrate a private-sector company and tamper
with its software. Diebold, after all, kept quiet
about the bugs it found in its programs -- including one that subtracted more
than 16,000 votes from Al Gore in a single Florida country during the initial
vote counting in the 2000 election. Open-source enthusiasts, by contrast, are
precisely the sort of people you'd like to see inspecting the voting code;
they're often libertarian freaks, nuttily suspicious
of centralized power, and they'd scream to the high heavens if they found
anything wrong.
From
the classification of documents to the refusal to name detainees, the Bush
administration's actions show a high regard for secrecy. In essence, it's
hiding its code, too. Inside such closed systems, nasty things can happen, as we're
learning to our chagrin. Perhaps a blast of open-source candor is exactly what
America needs right now.
Clive
Thompson writes frequently for the magazine about science and technology.
Copyright
2004 The New York Times Company
FAIR USE NOTICE
This site contains
copyrighted material the use of which has not always been specifically
authorized by the copyright owner. We are making such material available in our
efforts to advance understanding of political, democracy, scientific, and
social justice issues. We believe this constitutes a 'fair use' of any such
copyrighted material as provided for in section 107 of the US Copyright Law. In
accordance with Title 17 U.S.C. Section 107, the material on this site is
distributed without profit to those who have expressed a prior interest in
receiving the included information for research and educational purposes. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use
copyrighted material from this site for purposes of your own that go beyond
'fair use', you must obtain permission from the copyright owner.