Ex-MI6 Chief Warns Over Electronic Voting

The former head of MI6 has warned against adopting electronic voting systems owing to fears about international cyber warfare.

Sir John Sawers told the BBC that casting a ballot with pencil and paper was "actually much more secure".

He warned: "The more things that go online, the more susceptible you are to cyber-attacks."

But campaigners for electronic voting said there was "no evidence" it was more open to fraud. Electronic voting allows people to make their choices via a computer or smartphone, instead of people having to go to a polling station.

Robust Systems Needed

Sir John's warning comes after the US government accused Russia of hacking into the emails of leading Democrats and interfering in the recent presidential election.

This has increased concerns among security experts as to whether vital national electronic systems are vulnerable to malicious disruption by other countries.

Sir John, head of MI6 from 2009 until 2014, told the BBC Radio 4 documentary The New World: Axis of Power, which examines the state of international tensions between the world's leading powers: "We need to have systems which are robust."

He said: "The only trouble is, the younger generation of people expect to be able to do things remotely and through electronic devices.

"Bizarrely the stubby pencil and piece of paper that you put your cross on in the ballot box is actually much more secure than anything which is electronic."

Radical Changes

Commons Speaker John Bercow's Commission on Digital Democracy has called for secure online voting to be an option for all voters by the 2020 UK general election.

And the Electoral Commission has also been looking into making "radical changes" to the system.

Areeq Chowdhury, chief executive of WebRoots Democracy, which campaigns for electronic voting, said: "There is no evidence to show that online voting is more susceptible to fraud than the paper alternative.

"There have been more instances of fraud across the world with paper votes than electronic ones, and the recent recounts of electronic votes in the US showed no evidence of hacking."

But Sir John told BBC Radio: "One of the big problems we face with cyber is that it hasn't really been discussed internationally about what is an acceptable use of cyber powers and where are the red lines and what happens when those red lines are crossed.

"We're at a very early stage. It's a bit like with nuclear weapons back in the 1950s. We've got the capabilities, but there are no rules lined up as to how they should be used."

Ein News:              Yes, US Voting Machines Are Vulnerable To Hacking:
 

 

« Virtual Reality Is Getting Real In 2017
New Age of Digital Farming »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Techmeme

Techmeme

Techmeme is an online news curation service focused on leading edge technology, including cyber security.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

EclecticIQ

EclecticIQ

EclecticIQ is a global provider of threat intelligence, hunting and response technology and services.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

vdiscovery

vdiscovery

vdiscovery is a provider of proprietary and best-in-breed solutions in computer forensics, document review, and electronic discovery.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

Police CyberAlarm

Police CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning.

Protexxa

Protexxa

Protexxa is a B2B SaaS cybersecurity platform that leverages Artificial Intelligence to rapidly identify, evaluate, predict, and resolve cyber issues for employees.

Cloudflare

Cloudflare

Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.

Marlink

Marlink

Marlink smartly integrates hybrid, future-ready network solutions so you can benefit from the best available connectivity and IT to accelerate your digitalisation and empower your remote operations.

Doherty Associates

Doherty Associates

Drawing on our deep industry knowledge and business insight, Doherty deliver intelligent IT solutions and services that help people work more securely, more productively and more creatively.

Vantor

Vantor

Vantor is a Managed Security Services Provider (MSSP) that specializes in providing outsourced, managed cybersecurity services.

Post-Quantum Cryptography Alliance (PQCA)

Post-Quantum Cryptography Alliance (PQCA)

The alliance seeks to address cryptographic security challenges posed by quantum computing by producing high-assurance software implementations of standardized algorithms.