Computerworld - Many Americans will head to the polls for November's midterm elections with less certainty than ever about how -- or whether -- their votes will be counted.
Two years after the controversy-plagued 2004 elections, four years after HAVA (the Help America Vote Act) was passed, and six years after the Supreme Court and America romanced the hanging chad, experts are bracing for yet another wave of challenges to regional vote-counting systems.
One-third of us will use voting machines that have never before served in a general election. Legal challenges to paperless DRE (direct-recording electronic) voting technologies are proliferating across the country, and as computer scientists demonstrated earlier this year, hacking challenges to many of these machines can bear fruit even faster than demands for recounts.
It's a lot to keep up with, especially since most of us would rather be thinking about who to vote for, not how we'll do it -- and certainly not about what might go wrong. To that end, Computerworld.com presents what you need to know for each of the 50 states and the District of Columbia. You'll find out what equipment and systems are in place for voter registration and polling, any significant legal challenges to the systems, previous Computerworld coverage of individual states, selected coverage from other media, and links to government watchdog sites. We've also got concise FAQ-style information on the vendors, technologies and laws that are important to the issue. Finally, since e-voting is beginning to attract attention in the culture at large, we've asked watchdog Brad Friedman to review one of the highest-profile projects on the horizon: the HBO documentary Hacking Democracy, premiering Nov. 2.
Click the map to activate it, then select a region to find out more about e-voting in those states.
(Note: This map requires Adobe Flash Player 6 or later. Text links are below.)
Computerworld appreciates the assistance of Electionline.org, a project of the Pew Charitable Trust, in the compilation of this project. We also read closely and highly recommend the joint survey from The Century Institute, the Common Cause Education Fund and The Leadership Conference on Civil Rights Education Fund titled Voting in 2006: Have We Solved the Problems of 2004?; NYU School of Law's Brennan Center for Justice's two remarkable 2006 studies, Making the List: Database Matching and Verification Processes for Voter Registration and The Machinery of Democracy: Voting System Security, Accessibility, Usability and Cost; and Election Law @ Moritz, a project of Ohio State University's Moritz College of Law.See more about e-voting:
• Major players: The vendors
• Laws, lingo and technologies
• Review: Hacking Democracy
• Sound Off: Your comments on e-voting in 2006
• Lake states
Read more about Security in Computerworld's Security Topic Center.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!