International concerns with Internet voting

We note two articles this week, from Canada and Switzerland with citizen/scientists’ concerns with Internet voting.

We note two articles this week, from Canada <read> and Switzerland <read> with citizen/scientists’ concerns with Internet voting.

From our neighbors to the north:

In a letter to the chief electoral officer of Canada, Hallman laid out his concerns with online voting. Many are the same concerns he had with Huntsville’s voting method. The concerns include the loss of ballot verifiability and the ability to recount the ballots, the possibility of electronic tampering, loss of privacy when voting, lack of oversight by scrutineers and returning officers, loss of transparency, vote tracking through the use of personal identification numbers, vote buying, multiple votes, and software system bugs. Hallman argued that while commercial software suppliers who run electronic voting systems go to great lengths to guarantee the security of their systems, they cannot know if their systems have been compromised. And such a method intrinsically requires the use of unsecured computers by the voter, he said.

And from Switzerland, where they know something about keeping identities secret:

Swiss e-voting systems lack transparency and are vulnerable to attack by malevolent software, a study has found. The authorities are looking for solutions but officials point out that there is no such thing as absolute security, even with the traditional ballot paper vote. With the systems used so far in electronic voting trials “citizens cannot verify if their vote has been registered and counted correctly. They are obliged to trust the administration and authorities completely,” Eric Dubuis, information technology professor at the Bern University of Applied Sciences, told swissinfo.ch. Under the mandate of the Federal Chancellery, Dubuis co-authored a study on verifiable e-voting systems – systems that allow the voter to trace all the steps of his or her vote and to check that there has been no manipulation and that the vote has been duly counted.

The Bern researchers came up with a project system that allows each individual to verify the process from A to Z, without compromising voting secrecy. Thanks to a special autonomous “electoral machine” with an integrated camera as well as a personal voting card with a chip, the system set up by the researchers also eliminates the risk connected to malevolent software – or malware.

They are correct that all systems are vulnerable, yet paper ballot systems voted in person are less vulnerable than unverifiable electronic systems without paper records. We have seen schemes before for voter verifiable electronic systems, but are skeptical of systems close to impossible for the average voter to understand, requiring skill, and time to verify individual votes.

For all our posts on Internet voting <CTVotersCount Index>

Basics you need to know about election integrity in fifteen minutes

Kevin O’Neill, Capitol Thinking, interviews the authors of Broken Ballots – Will Your Vote Count, Prof Doug Jones and Dr. Barbara Simons <podcast> When it comes to elections and verifiability, Doug Jones and Barbara Simons are true experts that everyone can understand.

Kevin O’Neill, Capitol Thinking, interviews the authors of Broken Ballots – Will Your Vote Count, Prof Doug Jones and Dr. Barbara Simons <podcast>

When it comes to elections and verifiability, Doug Jones and Barbara Simons are true experts that everyone can understand.

They discuss the basics of election verification, pre-election testing, election auditing, and internet voting. They also offer graphic examples of what went wrong in recent elections in Iowa and Florida, that were corrected based on paper ballots and post-election audits.

Broken Ballots was released Apr 15, even thought Amazon and Barnes & Noble still list it as available May 15th. Look for a book review here in the near future.

The Times and Internet Voting they are not a changing

Once again the New York Times ignores science and the evidence. While scientists once again, refute the Times.

Voting, alas, has unique characteristics that make internet implementations all but impossible given current technology. The big problem is that we make two demands of it that cannot be met simultaneously. We want voting to be very, very secure. And we want it to be very, very anonymous.

In late 2010 the New York Times ran an article States Move to Allow Overseas and Military Voters to Cast Ballots by Internet <read> which touted risky Internet voting. I was well refuted by Representative Rush Holt in a letter to the Times. <read>

Here we go again a very small article by Matt Bai Double-Click the Vote <read>

It’s amazing to think that I just renewed my car registration and paid my taxes online, but in November I’ll still have to wait in line to vote. The best argument against Internet voting is that it stacks the system against old and poor people who can’t afford or use computers, but the same could be said about cars. For decades, volunteers have showed up at retirement homes with rented vans. Isn’t it time they came with laptops?

What is amazing is actually that the paper of record prints such things that defy science and all the evidence <CTVoterCount Internet Voting Index>

Tech.pinions refutes Bai’s arguments, yet I suspect will reach much fewer than the flawed Bai piece: Internet Voting Is Years Away, And Maybe Always Will Be <read>

They do a great job of explaining the challenge of anonymity:

…If only it were so simple.

Voting, alas, has unique characteristics that make internet implementations all but impossible given current technology. The big problem is that we make two demands of it that cannot be met simultaneously. We want voting to be very, very secure. And we want it to be very, very anonymous.

Internet security is difficult under the best of conditions. But voting has the additional complication that it is very difficult, if not impossible, to remedy a breach. Most of the time, all that is at stake is money, and we know how to fix that. Identity theft is more complex but still there are remedies. A stolen vote is gone forever.

Anonymity complicated the problem immensely. The usual way to secure an internet transaction to to make certain that both the server and the person at the other end and who or what they claim to be. To cast a ballot at a poling place or vote an absentee ballot, you have to produce identification or, at a minimum, a signature that matches one on file. It’s not perfect. but it’s generally better than we can do on the internet. Then you are given a ballot or a card that activates an electronic voting machine, but there is no link between the ballot and your identity, guaranteeing anonymity. This is really, really hard to simulate online. The more that is done to assure your identity, the harder it is to separate that identity from the vote that is cast…

We will see more trials in this year’s voting. But widespread internet voting is still waiting for a day that may never come.

 

***********

Bonus: Alex Haldeman <video>

DHS Expert: Internet voting not secure

I had a front row seat last Thursday in Santa Fe, to hear Bruce McConnell from the Department of Homeland Security discuss Internet Voting.

Some people think online voting is bound to happen, though, once the kinks are worked out. But as McConnell’s comments show, those who worry a lot about cybersecurity believe that time is a long way away.

I had a front row seat last Thursday in Santa Fe, to hear Bruce McConnell from the Department of Homeland Security discuss Internet Voting. From NPR: Online Voting ‘Premature,’ Warns Government Cybersecurity Expert <read>

He ended his talk with a light lesson in Government-Speak reading several snippets warning of risks or inadequate technology which use nuanced words understating reality, hence the description of internet voting technology as ‘Premature’.

Warnings about the dangers of Internet voting have been growing as the 2012 election nears, and an especially noteworthy one came Thursday from a top cybersecurity official at the U.S. Department of Homeland Security.

Bruce McConnell told a group of election officials, academics and advocacy groups meeting in Santa Fe, N.M., that he believes “it’s premature to deploy Internet voting in real elections at this time.”

McConnell said voting systems are vulnerable and, “when you connect them to the Internet, that vulnerability increases.” He called security around Internet voting “immature and underresourced.”

McConnell’s comments echo those of a number of computer scientists who say there’s no way to protect votes cast over the Internet from outside manipulation.

Some, particularly Bob Carey, say it is a trade-off between security and convenience.

Some election officials say it’s a trade-off between security and convenience.

Bob Carey, director of FVAP, told a group of bloggers in October that there are risks to online voting, but also “inherent security risks with the current system,” such as people not getting their ballots on time and losing the opportunity to vote.

Carey added that “there’s not going to be any electronic voting system that’s ever going to be 100 percent secure, but also the current paper-based system is not 100 percent reliable either.”…

Some people think online voting is bound to happen, though, once the kinks are worked out. But as McConnell’s comments show, those who worry a lot about cybersecurity believe that time is a long way away.

We do not have to trade risk for convenience. States that follow the MOVE Act and provide express return of ballots and absentee ballot applications in a single envelope have shown that military and overseas voters can be served effectively, and much more economically than risky, costly internet voting schemes.

For more, see: <CTVC Internet Voting Index>

Online voting vendor, Scytl’s system worries experts in Canada

Vendor touted in CT and on NPR by West Virginia Secretary of the State comes under fire after Canadian election disrupted by hackers.

Last October, former University mascot and news reporter, West Virginia Secretary of State, Virginia Tennant came to Connecticut to tout her pilot online voting project, yet to be endorsed by her state for further use. Later we saw her endorse that system on NPR along with a vendor executive from Scytl. Her wild west claims of being ambushed in Connecticut and down home wild west getup shown on NPR had resonance with some.

Cutting through the chaff and technical jargon. Online voting is not safe according to experts and experience. Now we have a new problem for online voting, simple denial of service attacks (DOS) experienced in a Canadian election.

From the Halifax Herold: NDP vote disruption worries experts – E-voting found to be open to problems <read>

Although many people are attached at the hip to their laptops, few are conversant in software coding and even fewer are familiar with heavy encryption.

Combine computers with the intricacies of elections, and that leaves only a handful of specialists worldwide who can claim to understand online voting.

Questions about e-voting were raised after the NDP leadership convention was disrupted by a cyber attack.

Not all of them have been answered satisfactorily, say software experts, despite reassurances from Scytl, the software company that handled the NDP election process, and from Halifax Regional Municipality, which has committed to use the company’s services in October’s municipal election.

“Multibillion-dollar (software developers) like Windows, you know, Microsoft . . . can’t have their software bug-free. So I don’t think Scytl is able to do that,” said Daniel Sokolov, a Halifax information technology expert.

Sokolov has examined several European elections that used e-voting and found at least three with troubling results.

One problem with online voting software is its complexity, he said, explaining no municipality could hope to vet hundreds of thousands of lines of computer code.

“It’s a farce. It’s a joke,” said Sokolov. “You need a big team of people to do that, and it’ll take years.”

Other problems include the challenge of auditing votes and vote tallies after the fact, the risk posed by cyber attacks and — perhaps the biggest issue — the difficulty of ensuring secret ballots, said Sokolov and other computer experts who spoke to The Chronicle Herald.

The vendor and Government provides a defense:

Some of these concerns have been tackled by Halifax Regional Municipality more thoroughly than critics imagine, said municipal clerk Cathy Mellett, who noted that 25 per cent of voters chose to vote electronically in the 2008 municipal election.

Mellett said the city will use a third-party auditor, most likely Ernst &Young, which will hire software experts to look over Scytl’s code.

Mellett said the city is committed to Scytl, after it successfully completed a 60-day testing window earlier this month.

Mellett also listed two other safeguards designed to ensure Scytl’s soundness.

First, although it does not open its coding to the public, citing trade secrets, it has opened it a few times to clients for advanced examination, said Mellett.

Unfortunately, no auditor, not matter how prestigious can audit a system without records showing how voters actually voted on their own computer screens.  And as was clear in the Connecticut Symposium Scytl has never agreed to let experts evaluate and publicly report on their code.

How All the votes were lost in D.C.

Within 48 hours of the system going live, we had gained near complete control of the election server. We successfully changed every vote and revealed almost every secret ballot. Election officials did not detect our intrusion for nearly two business days—and might have remained unaware for far longer had we not deliberately left a prominent clue.

In a new paper the University of Michigan ethical hackers describe how all the votes were changed/stolen in the Washington, D. C. test: Attacking the Washington, D.C. Internet Voting System <read>

The paper is a good read. Recommended especially for election officials and those that believe Internet voting is a good, safe idea. From the abstract:

This paper describes our experience participating in this trial. Within 48 hours of the system going live, we had gained near complete control of the election server. We successfully changed every vote and revealed almost every secret ballot. Election officials did not detect our intrusion for nearly two business days—and might have remained unaware for far longer had we not deliberately left a prominent clue. This case study—the first (to our knowledge) to analyze the security of a government Internet voting system from the perspective of an attacker in a realistic pre-election deployment—attempts to illuminate the practical challenges of securing online voting as practiced today by a growing number of jurisdictions.

I would add:

  1. It took the officials a while to detect the hack, even with the Michigan Fight song playing. Imagine if the team had only changed or added 10% or 20% of the vote and cast them for candidates actually on the ballot! What if it was a real election and the officials were not certain that several groups were likely trying to hack in!!!
  2. We pay significant attention to outsider attacks, but insider attacks aremuch easier, require less expertise, and are much less likely to be detected.emember online voting is about as auditable as a paperless DRE, just more globally vulnerable.
  3. Was the West Virginia Pilot hacked? How would anyone know? Maybe not, it was not a very valuable target since so few votes were involved.

 

Internet Voting, more problems beyond the News Hour report

Last week there was a PBS News Hour report on Internet Voting. It was fair and balanced as far as it went, but maybe a bit too fair to non-scientists and vendors touting Internet Voting. At Brad Blog, Earnest A Canning has an excellent piece pointing out some additional information not covered in the short News Hour segment.

Last week there was a PBS News Hour report on Internet Voting. It was fair and balanced as far as it went, but maybe a bit too fair to non-scientists and vendors touting Internet Voting. We wished it was more like the symposium in Connecticut where both pro and con members of the panel had adequate time to counter each others’ statements. At Brad Blog, Earnest A Canning has an excellent piece pointing out some additional information not covered in the short News Hour segment PBS News Hour Report Exposes Madness of Internet Voting, Officials Who Push For It Anyway <read>

Disturbingly, the new PBS documentary also reveals that, despite the spectacular failure and warnings from virtually every computer science and security expert, election and Pentagon officials are still pressing forward with what MIT Prof. of Electrical Engineering and Computer Science Ronald L. Rivest describes, as seen in the short PBS report, as an “oxytopian” solution. “‘Secure Internet voting,'” Rivest charges, “is a bit like the phrase ‘safe cigarettes'”…

 The Revolving Door

In some instances, like that of Paul Stenbjorn, the former Executive Director of the D.C. Board of Elections and Ethics who first pushed for the live D.C. Internet vote experiment and was then embarrassed by the D.C. Internet Voting Hack, the persistent effort to damn the science, the scientists and the extraordinary failures to move ahead with Internet Voting anyway, might be explained by the fact that he subsequently became the Director of US Operations at SCYTL, a manufacturer of online voting and election systems…

 Reliance upon technology that does not exist

Where, in the PBS report, West Virginia Secretary of State Natalie Tennant (D) expresses certainty — with no evidence to back it up — that there has been “no breach in our votes,” U.C. Berkley Computer Science Prof. David Wagner, who examined the SCYTL system, reported that there “is no known way to audit Internet voting.”

If there is no way to audit the voting, there is no way to know whether the votes have been “breached” and accurately recorded as per the voters’ intent.

Where Stenbjorn advanced the unscientific prediction that a secure system will be developed in the near future, Wagner, in the same report, noted: “It is not technologically feasible today to make Internet Voting safe against attack.”…

 No security against insider threat

One shortfall of the otherwise excellent PBS report — which includes interviews with a number of computer scientists The BRAD BLOG has turned to for years for their invaluable expertise on these issues — is that it only examined the concerns of system security from the perspective of an outsider attack, like the one that occurred in the D.C. Internet Voting Hack.

Even assuming that it were technologically feasible to prevent an outside attack, this does not begin to address the far more immediate threat that, whenever there is a lack of transparency in how votes are counted, there is a risk that the count can be manipulated by insiders with access to any e-voting system, be it Internet, Direct Recording Electronic (usually touchscreen) voting machines or paper-based computer optical scan systems.

As acknowledged by virtually all computer scientists and security experts, and even confirmed by the highly compromised, GOP-operative-created Baker/Carter National Election Reform Commission years ago, the greatest threat to all such electoral systems comes from insiders. As even the phony Baker/Carter commission noted: “There is no reason to trust insiders in the election industry any more than in other industries.” Thus, there is almost nothing that can be done to protect against such exploits…

Convenience is no substitute for democracy

During the PBS report, Bob Carey, the Director of the Pentagon’s Federal Voting Assistance Program not only expresses the unscientific belief that a foolproof Internet Voting system will be developed within five to six years, but he also downplays the risks identified by computer scientists as “unfair to military voters.”

“Military Grade Security” for elections is a non sequitur

Who should we believe? Vendors selling internet voting or computer scientists and government intelligence experts? We point out that the greatest danger to internet voting is insider manipulation, even easier for a single rogue election official or network insider. No need to steal paper ballots and fill them out. No risk of being caught in an audit or recount of voter verified paper ballots. UPDATE: Videos

Andrew Gumbel, author of Steal This Vote, op-ed in the LA Times: Stealing Oscar – The Academy of Motion Picture Arts and Sciences’ plan to allow voting by computer is an open invitation for cyber attacks and raises the risk of a fraudulent outcome. <read>

The academy said the software developed by the San Diego-based computer voting company Everyone Counts would incorporate “multiple layers of security” and “military-grade encryption techniques” to ensure that nothing untoward or underhanded could occur before PricewaterhouseCoopers, its accountancy firm, captured the votes from the Internet ether.

Unfortunately, leading computer scientists around the world who have looked at Internet voting systems do not share the academy’s confidence. On the contrary, they say the technology is vulnerable to a variety of cyber attacks — no matter how many layers of encryption there are — and risks producing a fraudulent outcome without anyone necessarily realizing it.

Who should we believe? Vendors selling internet voting or computer scientists?

Everyone Counts is certainly savvier than some of the computer voting machine manufacturers who emerged a decade ago. Chief Executive Lori Steele understands that clean elections are about accountability from end to end, not just some miracle machine that does all the work by itself.

She also did not contest the objections voiced by Dill and the other computer scientists. Rather, she argued that, whatever the flaws, carefully encrypted computers are far more reliable than paper ballots, which can potentially be manipulated by a single rogue election official. Everyone Counts puts its machines through a rigorous auditing process, she said, and even interrupted a recent election in Australia to conduct a surprise audit in the middle of the ballot count.

That argument might have been good enough for the academy and for PricewaterhouseCoopers, but it still alarms many software experts. “A surprise audit in the middle is interesting, but I don’t think that’s adequate for the job because there are still multiple ways to defeat it,” Dill said.

We point out that the greatest danger to internet voting is insider manipulation, even easier for a single rogue election official or network insider. No need to steal paper ballots and fill them out. No risk of being caught in an audit or recount of voter verified paper ballots.

Who should we believe? Vendors selling internet voting or computer scientists and government intelligence experts?

See this story from the New York Times: Traveling Light in a Time of Digital Thievery <read>

He leaves his cellphone and laptop at home and instead brings “loaner” devices, which he erases before he leaves the United States and wipes clean the minute he returns. In China, he disables Bluetooth and Wi-Fi, never lets his phone out of his sight and, in meetings, not only turns off his phone but also removes the battery, for fear his microphone could be turned on remotely. He connects to the Internet only through an encrypted, password-protected channel, and copies and pastes his password from a USB thumb drive. He never types in a password directly, because, he said, “the Chinese are very good at installing key-logging software on your laptop.”

What might have once sounded like the behavior of a paranoid is now standard operating procedure for officials at American government agencies, research groups and companies that do business in China and Russia — like Google, the State Department and the Internet security giant McAfee. Digital espionage in these countries, security experts say, is a real and growing threat — whether in pursuit of confidential government information or corporate trade secrets.

“If a company has significant intellectual property that the Chinese and Russians are interested in, and you go over there with mobile devices, your devices will get penetrated,” said Joel F. Brenner, formerly the top counterintelligence official in the office of the director of national intelligence…
Targets of hack attacks are reluctant to discuss them and statistics are scarce. Most breaches go unreported, security experts say, because corporate victims fear what disclosure might mean for their stock price, or because those affected never knew they were hacked in the first place. But the scope of the problem is illustrated by an incident at the United States Chamber of Commerce in 2010.

The chamber did not learn that it — and its member organizations — were the victims of a cybertheft that had lasted for months until the Federal Bureau of Investigation told the group that servers in China were stealing information from four of its Asia policy experts, who frequent China. By the time the chamber secured its network, hackers had pilfered at least six weeks worth of e-mails with its member organizations, which include most of the nation’s largest corporations. Later still, the chamber discovered that its office printer and even a thermostat in one of its corporate apartments were still communicating with an Internet address in China…

Last week, James R. Clapper, the director of national intelligence, warned in testimony before the Senate Intelligence Committee about theft of trade secrets by “entities” within China and Russia. And Mike McConnell, a former director of national intelligence, and now a private consultant, said in an interview, “In looking at computer systems of consequence — in government, Congress, at the Department of Defense, aerospace, companies with valuable trade secrets — we’ve not examined one yet that has not been infected by an advanced persistent threat.

Finally we have the case of army private Bradley Manning, where it is alleged that a single low level insider, located overseas, had access to and the ability to steal almost unlimited volumes of confidential documents from multiple federal agencies.

Military grade “security”, a non sequitur if there ever was one!

Update:  Videos:

  • Andrew Gumbel provides the same information and some additional information <video>
  • CEO of Everyone Counts. Little if any information beyond the above story <video>

Doug Chapin: New Pew Report Details Progress on Military, Overseas Voting

It really is remarkable how far this issue has come in about three years; Pew’s election team and its huge coalition of partners including OVF, the Pentagon’s Federal Voting Assistance Program and the Uniform Law Commission (whose Uniform Military and Overseas Voting Act is one ongoing vehicle for state and local reform) should be deeply gratified at everything they have accomplished.

Doug Chapin, Program for Excellence in Election Administration, New Pew Report Details Progress on Military, Overseas Voting <read>

Democracy from Afar finds that “47 states and the District of Columbia enacted laws to protect the voting rights of military and overseas citizens”. More specifically, Pew found that “many states have implemented changes to their laws or administrative codes,” including –

+ Enough time to vote: 38 states and the District have laws or rules meeting or exceeding federal requirements to send ballots to military and overseas voters at least 45 days before an election AND 8 additional states changed their primary dates to accommodate the requirement;

+ Electronic transmission of unvoted ballots: All states and the District allow military and overseas voters to receive blank ballots electronically;

+ Eliminating requirements for notarization or witnesses: 46 states and the District do not call for either for military and overseas voters; and

+ Expanded use of Federal Write-in Absentee Ballots (FWABs): 34 states and the District mandate FWABs be used as a backup ballot for all elections, including state and local.

All of these changes are summarized state-by-state in a typically handy-dandy Pew chart on page 5 of the report.

It really is remarkable how far this issue has come in about three years; Pew’s election team and its huge coalition of partners including OVF, the Pentagon’s Federal Voting Assistance Program and the Uniform Law Commission (whose Uniform Military and Overseas Voting Act is one ongoing vehicle for state and local reform) should be deeply gratified at everything they have accomplished.

Looking at the state summary report on page 5, we Connecticut meets all four of the major criteria.  We would go farther in web convenience: Better web information accessible to overseas voters; ballot selection on the web based on polling place look up for each.

All of these changes are summarized state-by-state in a typically handy-dandy Pew chart on page 5 of the report.

It really is remarkable how far this issue has come in about three years; Pew’s election team and its huge coalition of partners including OVF, the Pentagon’s Federal Voting Assistance Program and the Uniform Law Commission (whose Uniform Military and Overseas Voting Act is one ongoing vehicle for state and local reform) should be deeply gratified at everything they have accomplished.

Looking at the state by state summary on page 5 of the report, we see that Connecticut scores well, employing all the items used to compare states. We could go further following the states with best practices: Providing better web information, more conveniently and web ballot access and printing based on voter registration information.

Overall, one more reason not to employ risky, expensive online voting. Conventional, less flashy, methods are just as convenient and effective while being safe and more economical.

Patriocracy: A lesson in information and misinformation

Duncan Buell points out that non-science nonsense slips into the movie Patriocracy. It is an ever present danger. Our minds are easily tricked.

Verified Voting Blog:  Patriocracy Overlooks Internet Voting Security Concerns  by Duncan Buell <read>

Duncan Buell points out that non-science nonsense slips into the movie Patriocracy. It is an ever present danger. Our minds are easily tricked:

If one were doing a film about cures for cancer, and time were given to someone explaining theories of the arrangement of crystals around the patient, the science would be called into question. If one were doing a film about nuclear energy and time were given to someone explaining that the answer lay in extending the half life of uranium by a factor of four to six, the science would be called into question…the judgement of the filmmaker would be called into question in permitting a bogus argument like that to be included in what was purported to be a legitimate film

However, as is so often the case, the film did not find it necessary to call into question the science (or lack) of internet security. So I asked Malone the question of who his computer security experts were, and what their credentials were, that would have led him to include a technical statement about internet voting in his film about political matters. He declined to directly answer my question, saying instead that he wanted to give different parties the right to express their different views of how to fix the situation, as if all possible discussions of nontechnical solutions of a technical problem needed to be presented to an uninformed public. But the the fact that Ackerman’s flawed analogy is left entirely unexamined calls the validity of the rest of the film into question. Whatever benefit it might offer on the debate about compromise and civility I think that benefit is more than undermined by including bogus statements about internet voting without substantiation, making the overall effect of the film on American democracy to be negative.

One of the high points of the film is a series of close-ups of former Senator Alan Simpson arguing that most people will recognize “bullshit” (Simpson’s word) when it is presented to them, and thus that the problem of the American political process can largely be fixed by ensuring that citizens are presented with the “bullshit” that comprises many of the current political arguments. Unfortunately, Senator Simpson’s conclusion has to be considered invalid, because the producer of the film amply demonstrates that the premise is incorrect.

[emphasis by CTVotersCount]