Ex-MI6 Chief Warns Over Electronic Voting

The former head of MI6 has warned against adopting electronic voting systems owing to fears about international cyber warfare.

Sir John Sawers told the BBC that casting a ballot with pencil and paper was "actually much more secure".

He warned: "The more things that go online, the more susceptible you are to cyber-attacks."

But campaigners for electronic voting said there was "no evidence" it was more open to fraud. Electronic voting allows people to make their choices via a computer or smartphone, instead of people having to go to a polling station.

Robust Systems Needed

Sir John's warning comes after the US government accused Russia of hacking into the emails of leading Democrats and interfering in the recent presidential election.

This has increased concerns among security experts as to whether vital national electronic systems are vulnerable to malicious disruption by other countries.

Sir John, head of MI6 from 2009 until 2014, told the BBC Radio 4 documentary The New World: Axis of Power, which examines the state of international tensions between the world's leading powers: "We need to have systems which are robust."

He said: "The only trouble is, the younger generation of people expect to be able to do things remotely and through electronic devices.

"Bizarrely the stubby pencil and piece of paper that you put your cross on in the ballot box is actually much more secure than anything which is electronic."

Radical Changes

Commons Speaker John Bercow's Commission on Digital Democracy has called for secure online voting to be an option for all voters by the 2020 UK general election.

And the Electoral Commission has also been looking into making "radical changes" to the system.

Areeq Chowdhury, chief executive of WebRoots Democracy, which campaigns for electronic voting, said: "There is no evidence to show that online voting is more susceptible to fraud than the paper alternative.

"There have been more instances of fraud across the world with paper votes than electronic ones, and the recent recounts of electronic votes in the US showed no evidence of hacking."

But Sir John told BBC Radio: "One of the big problems we face with cyber is that it hasn't really been discussed internationally about what is an acceptable use of cyber powers and where are the red lines and what happens when those red lines are crossed.

"We're at a very early stage. It's a bit like with nuclear weapons back in the 1950s. We've got the capabilities, but there are no rules lined up as to how they should be used."

Ein News:              Yes, US Voting Machines Are Vulnerable To Hacking:
 

 

« Virtual Reality Is Getting Real In 2017
New Age of Digital Farming »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BruCON

BruCON

Brucon is Belgiums premium security and hacking conference.

Lawley Insurance

Lawley Insurance

Lawley is a full-service, independent insurance agency. Specialty insurance products include Cyber Security.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

SearchInform

SearchInform

SearchInform is a leading risk management product developer, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

InGuardians

InGuardians

InGuardians is an independent information security consulting firm specializing in penetration testing, threat hunting, and hardware hacking.

Neosecure

Neosecure

NeoSecure is a specialist Cybersecurity Solutions and Managed Services provider in Latin America.

CENSUS

CENSUS

CENSUS is a Cybersecurity services provider offering services to multiple industries worldwide such as Security Testing, Code Auditing, Secure SDLC, Vulnerability Research and Consulting Services.

Cygenta

Cygenta

Cygenta brings a new approach to cybersecurity. We understand that true security means having digital, human and physical security working in harmony.

FastNetMon

FastNetMon

FastNetMon is a very high performance DDoS detection and mitigation tool which could detect malicious traffic in your network and immediately block it.

We Hack Purple

We Hack Purple

We Hack Purple is a Canadian company dedicated to helping anyone and everyone create secure software.

SEALSQ

SEALSQ

For the last 25 years, SEALSQ have been developing secure semiconductor chips, secure embedded firmware, and tested hardware provisioning services to serve the vision of a safer connected world.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

Baselime

Baselime

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems.

Socket

Socket

Socket protects software applications and critical services from malware and security threats originating in open source code.