In today’s world, we do almost everything online because it’s convenient—shopping, banking, and even dating. So, why don’t we vote online? Let’s explore this intriguing question.
Back in 1999, then-President Bill Clinton asked the National Science Foundation to investigate the possibility of online voting. The findings were clear: internet voting systems pose significant risks. Unlike buying a book online, voting requires a much higher level of security.
Fast forward to today, and it’s still not safe to vote online. While your personal safety isn’t at risk, your vote could be. Cybersecurity is still vulnerable, and there’s no guarantee that online elections wouldn’t be tampered with. Even if we discovered interference, it would be too late to fix that election.
You might wonder, if we can bank and shop online, why can’t we vote online? Unfortunately, online transactions aren’t as secure as they seem. Banks and retailers lose billions annually to online fraud. They often absorb these losses or pass them on to consumers through fees and higher prices.
Fraudsters often start by stealing personal information like your name and credit card details, sometimes using malware. A notorious example is the Zeus malware, which waits for you to connect to your bank and then uses your credentials to steal money. Even with a secure connection, if malware is on your computer, it can still cause harm.
In 2014, the FBI disrupted the GameOver Zeus botnet, but not before $100 million was stolen worldwide. If hackers can do this, they could potentially interfere with online voting. Malware could change your vote or vote on your behalf. According to McAfee, 89% of online security breaches are financially or politically motivated.
Despite these concerns, one country successfully uses online voting: Estonia. They use a government ID with a chip, a PIN code, and a card reader. Voters can track their votes with an app, and parts of the software are open for public inspection. Estonians can vote multiple times, but only the last vote counts, reducing the risk of coercion.
While Estonia claims their system is secure, some experts disagree. Studies by Verified Voting and the University of Michigan found vulnerabilities in voter privacy and server security. The University of Michigan report highlighted significant security gaps, making the system susceptible to cyberattacks.
Why can’t larger countries like the U.S. adopt Estonia’s system? For one, Estonia uses a national ID card, which the U.S. doesn’t have. Additionally, the U.S. has over 225 million eligible voters compared to Estonia’s 1 million. U.S. elections are also more closely watched, making security more complex.
Moreover, voting needs to be anonymous, and current technology can’t ensure the integrity of anonymous online ballots. For now, traditional voting methods remain the most secure option.
While online voting isn’t feasible yet, it’s crucial to participate in elections. Your vote matters, and it’s a vital part of democracy. So, make sure to vote when you have the chance!
If you have more questions about voting or the science behind it, feel free to ask. And remember, every vote counts!
Research the advantages and disadvantages of online voting. Form two groups and prepare for a debate. One group will argue in favor of online voting, while the other will present the risks and challenges. This will help you understand the complexities and different perspectives on the issue.
Design a campaign to educate your peers about the importance of cybersecurity, especially in the context of online voting. Use posters, social media posts, or a short video to highlight potential threats and how to protect against them. This activity will enhance your understanding of cybersecurity issues.
Analyze Estonia’s online voting system by examining its strengths and weaknesses. Write a report or create a presentation that discusses how Estonia manages online voting and the criticisms it faces. This will give you insights into how online voting can be implemented and the challenges involved.
Work in small groups to design a secure voting system prototype. Consider factors like voter authentication, vote anonymity, and data integrity. Present your system to the class and discuss how it addresses the security concerns mentioned in the article. This activity will encourage creative problem-solving and technical thinking.
Arrange an interview with a cybersecurity expert to discuss the feasibility of online voting and the latest advancements in cybersecurity. Prepare questions in advance and share your findings with the class. This will provide you with real-world insights and deepen your understanding of the topic.
Here’s a sanitized version of the YouTube transcript:
—
We do almost everything online these days because it’s more convenient: shopping, banking, and even dating. So why don’t we vote online? Hey DNews, Jackie here! In 1999, then-President Bill Clinton asked the National Science Foundation to look into the viability of online ballots. The committee found that internet voting systems pose significant risks and that e-voting requires a much greater level of security than e-commerce—it’s not like buying a book over the Internet.
Now, 17 years later, it’s still just not safe. No, your life isn’t in danger by voting online, but your vote is. Because cybersecurity is still so fallible, there’s no way to be certain that our elections haven’t been tampered with if we vote online. Even if we eventually figure out that someone did interfere, by that time it’ll be too late for that election!
If you bank online and buy things online, aren’t those transactions safe? Unfortunately, no. Banks, credit card companies, and online retailers lose billions of dollars a year due to online fraud, but you rarely hear about it because if consumers believed that their data wasn’t secure, the online market would collapse. Instead, the company either absorbs the loss itself or passes it down to you via fees and maybe higher prices.
Fraud online often starts with pulling your name, credit card info, and other personal information. One way they do this is with malware. One of the most famous recent cases comes from the malware named Zeus. The program is designed to wait until you connect with your bank and then use those credentials to transfer money out of your account. It doesn’t matter if you have a secure connection because the malware is already inside the computer.
In 2014, the FBI announced that it had disrupted the GameOver Zeus botnet, but not before $100 million was stolen from accounts around the world. If they can do that, it’s not hard to think that hackers could do the same thing when it comes to voting! Malware could vote on your behalf or even change your vote. McAfee, the security and antivirus company, notes that financial or espionage motives were involved in 89% of online security breaches. They believe that the hackers are usually criminals looking to profit personally or on behalf of nation-states seeking political leverage.
That is exactly what security experts fear the most: an inability to truly control an online voting system where elections could be determined by someone other than the voters. That being said, there is one country that relies on online voting: Estonia! They succeed by using a government ID with a chip, an associated PIN code, and a card reader for your PC. Voters can track their vote with an app, and parts of the software are available for public inspection. Estonians can also vote as often as they want, but only their last vote will count. This minimizes the chance that somebody forced their vote.
Estonia believes their system hasn’t been compromised, but security experts argue that just because their system hasn’t been interfered with yet doesn’t mean that it can’t or won’t be in the future. Independent assessments of Estonia’s online voting system, done in 2011 by the organization Verified Voting and in 2014 by researchers at the University of Michigan, found that voters’ privacy as well as the servers used were vulnerable to attack from anyone or anywhere. The UMich report said there were staggering gaps in procedural and operational security, and the architecture of the system leaves it open to cyberattacks from foreign powers.
While the Estonian government disputes this, it still makes a lot of people nervous. But why can’t we just copy their system? Estonia also uses a national ID card, something the US doesn’t have. Estonia has about 1 million eligible voters, while the US has over 225 million eligible voters. And to be frank, elections in the U.S. are more closely watched around the world—both by citizens and hackers. Security for a US election would obviously be much more complicated, to say the least.
On top of that, voting is supposed to be anonymous. Right now, we don’t have the technology to track the integrity of anonymous ballots. In the end, it seems like the system we have now is the one that works best and appears to be the most secure. Here’s hoping we never have a repeat of those hanging chads from 2000. If you don’t know what that is, just look it up.
But does your vote actually matter? Our sister network Seeker Daily tackles that question right here. What other questions about voting or the science of voting can we break down for you? Or are you just tired of the election? Let us know down in the comments, and don’t forget to like and subscribe for more DNews. Also, go vote! Right now!
—
This version removes any inappropriate language and maintains the core message while ensuring clarity and professionalism.
Online – Connected to or available through the internet. – Students can access a wide range of educational resources online to enhance their learning experience.
Voting – The act of expressing a choice or decision in an election or meeting. – Online voting systems are being explored to increase participation in government elections.
Cybersecurity – The practice of protecting systems, networks, and programs from digital attacks. – The government invests heavily in cybersecurity to safeguard national data from hackers.
Fraud – Wrongful or criminal deception intended to result in financial or personal gain. – Cybersecurity measures are crucial to prevent fraud in online transactions and government databases.
Malware – Software that is specifically designed to disrupt, damage, or gain unauthorized access to computer systems. – Government agencies must protect their networks from malware to ensure the integrity of sensitive information.
Elections – Formal and organized processes of selecting individuals for public office. – Technology plays a significant role in modern elections, from electronic voting machines to online voter registration.
Security – The state of being free from danger or threat, especially in the context of information technology. – Implementing strong security protocols is essential for protecting government databases from cyber threats.
Privacy – The right of individuals to keep their personal information secure and free from unauthorized access. – Governments must balance national security needs with citizens’ privacy rights when implementing surveillance technologies.
Government – The governing body of a nation, state, or community. – The government is responsible for creating policies that regulate the use of technology in public and private sectors.
Democracy – A system of government by the whole population, typically through elected representatives. – In a democracy, technology can enhance transparency and citizen engagement in the political process.