Computerworld - Many Americans will head to the polls for November's midterm elections with less certainty than ever about how -- or whether -- their votes will be counted.
Two years after the controversy-plagued 2004 elections, four years after HAVA (the Help America Vote Act) was passed, and six years after the Supreme Court and America romanced the hanging chad, experts are bracing for yet another wave of challenges to regional vote-counting systems.
One-third of us will use voting machines that have never before served in a general election. Legal challenges to paperless DRE (direct-recording electronic) voting technologies are proliferating across the country, and as computer scientists demonstrated earlier this year, hacking challenges to many of these machines can bear fruit even faster than demands for recounts.
It's a lot to keep up with, especially since most of us would rather be thinking about who to vote for, not how we'll do it -- and certainly not about what might go wrong. To that end, Computerworld.com presents what you need to know for each of the 50 states and the District of Columbia. You'll find out what equipment and systems are in place for voter registration and polling, any significant legal challenges to the systems, previous Computerworld coverage of individual states, selected coverage from other media, and links to government watchdog sites. We've also got concise FAQ-style information on the vendors, technologies and laws that are important to the issue. Finally, since e-voting is beginning to attract attention in the culture at large, we've asked watchdog Brad Friedman to review one of the highest-profile projects on the horizon: the HBO documentary Hacking Democracy, premiering Nov. 2.
Click the map to activate it, then select a region to find out more about e-voting in those states.
(Note: This map requires Adobe Flash Player 6 or later. Text links are below.)
Computerworld appreciates the assistance of Electionline.org, a project of the Pew Charitable Trust, in the compilation of this project. We also read closely and highly recommend the joint survey from The Century Institute, the Common Cause Education Fund and The Leadership Conference on Civil Rights Education Fund titled Voting in 2006: Have We Solved the Problems of 2004?; NYU School of Law's Brennan Center for Justice's two remarkable 2006 studies, Making the List: Database Matching and Verification Processes for Voter Registration and The Machinery of Democracy: Voting System Security, Accessibility, Usability and Cost; and Election Law @ Moritz, a project of Ohio State University's Moritz College of Law.See more about e-voting:
• Major players: The vendors
• Laws, lingo and technologies
• Review: Hacking Democracy
• Sound Off: Your comments on e-voting in 2006
• Lake states
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts