Study recommends reporting e-voting machine defects to national database
NYU's Brennan Center says many problems can be traced to lack of vendor accountability
Computerworld - The Brennan Center for Justice at the New York University School of Law is calling on the federal government to create a national, searchable database for reporting and recording information on defects in electronic voting systems.
In a 70-page report on voting system failures, the nonpartisan public policy and law institute also recommended the creation of a federal statute that would require manufacturers of e-voting machines to publicly report any known defects in their products under penalty of law.
The Brennan center released the report, Voting System Failures: A Database Solution (download PDF), this week -- at the same time that problems with electronic voting machines were reported at several polling locations across New York state as voters attempted to cast ballots in the state's primary election.
Lawrence Norden, senior counsel at the Brennan Center and author of the report, said a study by the center found a relative lack of vendor accountability today for problems caused by defective voting machines.
He noted that numerous instances of problems caused by defective e-voting systems in recent years haven't prompted state and federal governments to create rules for their use. Thus, voting system vendors have often failed to provide timely and full information on defects that are known or should be known.
Norden noted that vendors often blame problems on errors by poll workers or on administrative issues rather than admit to product defects. "When we spoke to election officials, many times we found that vendors were aware of problems with their systems or should have known about them," he said.
The Brennan Center examines 14 separate incidents where e-voting machine defects caused considerable problems during an election.
For instance, election officials in Ohio discovered that some 1,000 votes in the 2008 Presidential primary election were not counted in nine counties that used touchscreen or optical scan systems manufactured by Diebold Election Systems, which was later sold to Election Systems and Software.
According to the report, Diebold initially blamed the problems on human error and the state's installation of an antivirus product on the voting systems. After being prompted by state officials to conduct a more thorough investigation, the company later acknowledged that the problem in fact resulted from a programming error in the proprietary operating system that ran the machine.
The same problem was found to have occurred in the same systems during a 2004 election in DuPage County, Ill., indicating that Diebold had been aware of the issue.
In another instance cited in the report, election officials in Humboldt County, Calif., discovered during a post-election audit that the county's Premier Election Solutions voting machines did not count some 200 votes. A subsequent investigation revealed that the e-voting machines failed to maintain required logs of important system events, causing the generation of inaccurate data and time stamps that led operators to delete crucial audit logs.
- IDC ranks IBM #1 in market share for enterprise social software IDC ranks IBM #1 in worldwide market share for 3 consecutive years. IDC also shares its Social Software 2013 - 2017 market forecast....
- The Social Business: Unlocking the collective knowledge of people Five years ago, IBM observed the planet was becoming instrumented, interconnected and intelligent. 20,000 engagements later, here's what we know and believe about...
- Hiring the Right Talent Since Human Resources (HR) departments want to hire quality candidates, they have no room for error during job interviews. What can Human Resources...
- Onboarding New Employees Read this paper to understand the difference between training and socialization in employee onboarding.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Gov't Legislation/Regulation White Papers | Webcasts