Ruling expected shortly in Ohio e-voting lawsuit
Green Party co-chair claims software installed on vote tabulation machines poses security risk
Computerworld - A ruling is expected shortly on a motion for a temporary restraining order filed by Ohio Green Party co-chair Bob Fitrakis seeking the removal of software that was installed on central vote tabulation machines in over two dozen Ohio counties.
Fitrakis contends in the complaint that state and federal laws were broken because the software wasn't tested and certified before being installed on the vote tabulation systems.
The lawsuit, filed Monday in U.S. District Court for the Southern District of Ohio, calls on the court to order Ohio Secretary of State Jon Husted to remove the allegedly infringing software from the vote tabulation machines.
The state contends that the software cited in the suit is simply vote tabulation communication software that doesn't directly communicate with voting or ballot counting activities. The state maintains that the software is "experimental" and therefore not subject to the state and federal testing and certification requirements.
Ohio is a key swing state in the U.S. presidential election and experts have said the results could well determine the winner. The latest polls mostly show President Barack Obama with a narrow lead in the state over GOP challenger Mitt Romney.
Fitrakis told Computerworld today that his side argued at a hearing this morning that untested software of the sort installed on the vote tabulation machine presents a significant security risk.
Fitrakis claims that the software in question is available for free download on the Internet. There is no reason why the state should have installed the software on so many systems, he contends.
Fitrakis said that because voting is well underway at this point, he has asked the court to approve an "absolutely random" hand count of at least 5% of the votes cast in each of the counties in which the software was used.
Husted's office did not respond to a request for comment on the lawsuit and the software in question.
In the hearing today, the state argued that "there is no constitutional right involved" because the software doesn't interfere with anyone's right to vote.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
- NYC wants its old mechanical-lever voting machines back
- Twitter a big winner in 2012 presidential election
- E-voting machine swaps Obama vote for Romney; taken offline
- Ruling expected shortly in Ohio e-voting lawsuit
- Update: Lawsuit filed in Ohio over software updates to vote tabulation machines
- States rebut RNC complaints about e-voting systems
- Despite e-voting improvements, audits still needed for ballot integrity
- Obama, Romney cite Apple, tech issues in debate
- Twitter becomes new debate spin room
- IT offshoring: Romney vs. Obama
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts