Philadelphia is poised to choose a vulnerable barcode voting system after a “Blue Ribbon Commission” hid its criticism of such systems in the endnotes of its election-security report. Meanwhile, the Pennsylvania auditor general has opened a probe into Philadelphia’s selection process, which appears designed to favor one vendor.
Passage of Amendment 4 restored voting rights to more than a million Floridians, but advocates of election integrity want to see more accountability from election administrators in the Sunshine State before 2020.
A new report shows that the 2018 South Carolina primary and midterm elections had errors in both the software and the voting machine hardware, leading to hundreds of wrong votes.
Georgia officials may ignore the recommendation of independent cybersecurity experts in their selection of new voting equipment for the state.
During the midterms this year we focused on one of the most bizarre elections in the country. A race for governor where conflict of interest, voter suppression, and partisan shenanigans were just another day in Georgia.
Election transparency advocates have long asserted that ES&S digital scanner voting machines connect to the internet to send results to election department central computers. That connectivity raises security concerns, but state officials say the machines are islands. Now, one advocate has proof they’re wrong.
America’s voting system is hazardous to national security — and must be recognized as such. We can’t wait until it is too late.
Antiquated voting machines, voter roll purges, and absentee ballots may present problems for Ohio voters this election, potentially disenfranchising some voters.
Defying state officials, who are resisting all efforts to instill accountability into Georgia’s elections, one county — on its own — has decided to conduct a two-part audit of the midterms.
Georgia voters, some of them spurred by WhoWhatWhy’s reporting on the high rejection rate of absentee ballots, braved long lines to cast their votes as election officials were surprised by heavy early turnouts.
A federal judge has ruled that Georgia’s vulnerable electronic voting machines must stay in place for the November elections, striking down the plaintiffs’ motion to immediately replace them with paper ballots.
Computers are like a black box — we don’t really know what they’re up to inside. A series of recently discovered vulnerabilities only drives home the point, and further calls into question the US’s reliance on electronic voting systems.
While the media focuses on Russian interference, there are bigger threats to our upcoming midterm elections.
The Ohio primaries are Tuesday, but two of its most populous counties are set to discard their electronic ballot images, which are used to count the votes. A lawsuit brought about by election transparency activists is trying to stop that from happening.
Like so many important subjects, the future battle over improving our election system is about technical issues. Don’t let the geek factor throw you off: whether we emphasize accessibility for the disabled or a reliable paper trail is a very big deal for us all. The question is: Can we have it all?
Americans have been told that they can trust the election system and that recounts of paper ballots are one way to ensure its integrity. But how valuable are recounts really when officials and courts at all levels throw up roadblocks that prevent an accurate count?
It doesn’t take much skill to hack a voting machine.
Despite technological advances in nearly all areas of life, our elections are still safest when paper ballots are used, the distinguished cybersecurity scholar Jonathan Katz tells WhoWhatWhy. In our weekly podcast, he points out the vulnerabilities of all other types of voting and makes the case against Internet voting at this time.
When people think of election theft, many assume that means individuals taking measures up to and including the moment that votes are cast. However, experts agree that thanks to the increasing reliance on electronic voting and vote-counting, the very infrastructure itself is also vulnerable — to attacks from the outside. This could include foreign powers pursuing their own agenda.