More e-voting tests slated in contested Fla. voting district
Officials are still probing an 18,000-vote undercount in a 2006 race
Computerworld - A U.S. House of Representatives task force has voted to authorize additional testing of e-voting hardware in Florida's 13th Congressional District to try to determine whether problems with the machines could have contributed to an 18,000-vote undercount in the 2006 U.S. House race.
In a unanimous vote Tuesday, the Committee on House Administration's Election Task Force adopted three additional testing scenarios for the e-voting machines, which were proposed in a report from the Government Accountability Office (GAO). The task force had asked the GAO to look at the e-voting hardware in the contested election and report back with its recommendations.
In its 27-page report (download PDF)," the GAO said that previous testing of some of the e-voting machines did not include a large enough sample to provide accurate results.
The 18,000 undervotes -- or votes that were not cast at all in the Congressional race by voters who turned out for the overall election -- occurred in Sarasota County, Fla. The losing candidate in the race, Democrat Christine Jennings, and other e-voting critics, argued that the undercount was too large to have occurred naturally and blamed problems with the e-voting machines. The 1,499 e-voting machines used in the election were direct-recording iVotronic systems made by Election Systems & Software (ES&S) of Omaha.
Jennings lost the election by 369 votes out of 238,249 votes counted. Republican Vern Buchanan was certified as the winner in the race.
"We found that some of the prior tests and reviews provide assurance that the voting systems in Sarasota County functioned correctly, but they are not enough to provide reasonable assurance that the iVotronic DRE voting systems did not contribute to the undervote," the GAO report said.
Rep. Charlie Gonzalez, (D-Texas), chairman of the task force, said in a statement that "the results of the GAO's testing will play an essential role in determining whether the machines did or did not contribute to the undervote in the contested election. The testing and its results are crucial; in their absence, we cannot answer this question with the confidence and assurance that is necessary."
The task force voted to pursue the three key tests proposed by the GAO report:
- Firmware testing to verify that the firmware in the iVotronic machines used in Sarasota County matched the certified version of the firmware approved by election officials.
- Ballot testing of the iVotronic machines using more than 112 scenarios, including casting votes, changing votes, changing votes again and other combinations, to confirm correct operation of the units.
- Miscalibrating the iVotronic units to see if that has any effect on the undervote counts.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts