I have written often on the need for transparency requirements for IT security controls and often how one might apply them to e-voting systems. I have specifically written about how this problem applies and is not solved in Momentum. I had a discussion today and recalled the voting results for Momentum’s Democracy Review e-consultation, in particular the vote on CLP governance issues where over 40 votes arrived in the dying hours of the vote, changing the result which up to that time, had been an important yet sectarian contest between “stop the purge” and “Labour against the witch hunt” as to who’s definition of fair expulsions should become momentum’s view. For clarity, I voted for the “stop the purge” proposal but, either of these positions would have embarrassed Momentum’s leadership, as from their actions, they seem quite prepared to use the exclusion mechanisms against political opponents and also the disciplinary rules even against former allies with a very limited support of natural justice.

This is important today as Momentum propose to change their OMOV systems for their central committee but voted not to appoint independent scrutineers. Whether what I saw is true and whether my suspicions are true is not the central test, Momentum cannot prove that the system is safe from an insider attack.

Since the private pages are not archived to the wayback machine, I have taken a screen shot of the final result as at 28th July 2019, showing the final results and posted it below/overleaf. … 

Momentum, Democracy & IT Controls
Tagged on:             

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: