Ex-MI6 Chief Warns Over Electronic Voting

The former head of MI6 has warned against adopting electronic voting systems owing to fears about international cyber warfare.

Sir John Sawers told the BBC that casting a ballot with pencil and paper was "actually much more secure".

He warned: "The more things that go online, the more susceptible you are to cyber-attacks."

But campaigners for electronic voting said there was "no evidence" it was more open to fraud. Electronic voting allows people to make their choices via a computer or smartphone, instead of people having to go to a polling station.

Robust Systems Needed

Sir John's warning comes after the US government accused Russia of hacking into the emails of leading Democrats and interfering in the recent presidential election.

This has increased concerns among security experts as to whether vital national electronic systems are vulnerable to malicious disruption by other countries.

Sir John, head of MI6 from 2009 until 2014, told the BBC Radio 4 documentary The New World: Axis of Power, which examines the state of international tensions between the world's leading powers: "We need to have systems which are robust."

He said: "The only trouble is, the younger generation of people expect to be able to do things remotely and through electronic devices.

"Bizarrely the stubby pencil and piece of paper that you put your cross on in the ballot box is actually much more secure than anything which is electronic."

Radical Changes

Commons Speaker John Bercow's Commission on Digital Democracy has called for secure online voting to be an option for all voters by the 2020 UK general election.

And the Electoral Commission has also been looking into making "radical changes" to the system.

Areeq Chowdhury, chief executive of WebRoots Democracy, which campaigns for electronic voting, said: "There is no evidence to show that online voting is more susceptible to fraud than the paper alternative.

"There have been more instances of fraud across the world with paper votes than electronic ones, and the recent recounts of electronic votes in the US showed no evidence of hacking."

But Sir John told BBC Radio: "One of the big problems we face with cyber is that it hasn't really been discussed internationally about what is an acceptable use of cyber powers and where are the red lines and what happens when those red lines are crossed.

"We're at a very early stage. It's a bit like with nuclear weapons back in the 1950s. We've got the capabilities, but there are no rules lined up as to how they should be used."

Ein News:              Yes, US Voting Machines Are Vulnerable To Hacking:
 

 

« Virtual Reality Is Getting Real In 2017
New Age of Digital Farming »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

Cloud Foundry Foundation (CFF)

Cloud Foundry Foundation (CFF)

Cloud Foundry supports the full application development lifecycle, from inception, through all testing stages, to deployment.

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

SecurePay

SecurePay

SecurePay is Australia's premier payment gateway, with a range of secure online payment solutions for online retailers, SMEs and enterprise businesses.

Rogue Wave Software

Rogue Wave Software

At Rogue Wave, our mission is to simplify your hardest problems, improve software quality and security, and shorten the time it takes to deliver value.

Crosscheck Networks

Crosscheck Networks

Crosscheck products allow you to test your APIs across different protocols and message formats with functional automation, performance, and security testing capabilities.

National Cyber Security Authority (NCA) - Saudi Arabia

National Cyber Security Authority (NCA) - Saudi Arabia

The NCA is the government entity in charge of cybersecurity in Saudi Arabia and serves as the national authority on its affairs.

Hack The Box

Hack The Box

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field.

Immuta

Immuta

Immuta empowers data engineering and operations teams to automate data governance, security, access control & privacy protection.

Finnish Security & Intelligence Service (SUPO)

Finnish Security & Intelligence Service (SUPO)

The Finnish Security and Intelligence Service is a government agency tasked with combating serious threats to national security in Finland.

Query.ai

Query.ai

At Query.AI, we are committed to helping companies unlock the power of their security data, so they are empowered to meet security investigation and response goals while simultaneously reducing costs.

Salem Cyber

Salem Cyber

Salem Cyber builds Artificial Intelligence (AI) solutions that work collaboratively with people to address scalability challenges in cybersecurity operations.

Borwell

Borwell

Borwell delivers software and IT solutions to the UK MoD and to UK Government departments, which are secure by design.

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.