Ruling expected shortly in Ohio e-voting lawsuit
Green Party co-chair claims software installed on vote tabulation machines poses security risk
Computerworld - A ruling is expected shortly on a motion for a temporary restraining order filed by Ohio Green Party co-chair Bob Fitrakis seeking the removal of software that was installed on central vote tabulation machines in over two dozen Ohio counties.
Fitrakis contends in the complaint that state and federal laws were broken because the software wasn't tested and certified before being installed on the vote tabulation systems.
The lawsuit, filed Monday in U.S. District Court for the Southern District of Ohio, calls on the court to order Ohio Secretary of State Jon Husted to remove the allegedly infringing software from the vote tabulation machines.
The state contends that the software cited in the suit is simply vote tabulation communication software that doesn't directly communicate with voting or ballot counting activities. The state maintains that the software is "experimental" and therefore not subject to the state and federal testing and certification requirements.
Ohio is a key swing state in the U.S. presidential election and experts have said the results could well determine the winner. The latest polls mostly show President Barack Obama with a narrow lead in the state over GOP challenger Mitt Romney.
Fitrakis told Computerworld today that his side argued at a hearing this morning that untested software of the sort installed on the vote tabulation machine presents a significant security risk.
Fitrakis claims that the software in question is available for free download on the Internet. There is no reason why the state should have installed the software on so many systems, he contends.
Fitrakis said that because voting is well underway at this point, he has asked the court to approve an "absolutely random" hand count of at least 5% of the votes cast in each of the counties in which the software was used.
Husted's office did not respond to a request for comment on the lawsuit and the software in question.
In the hearing today, the state argued that "there is no constitutional right involved" because the software doesn't interfere with anyone's right to vote.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
- NYC wants its old mechanical-lever voting machines back
- Twitter a big winner in 2012 presidential election
- E-voting machine swaps Obama vote for Romney; taken offline
- Ruling expected shortly in Ohio e-voting lawsuit
- Update: Lawsuit filed in Ohio over software updates to vote tabulation machines
- States rebut RNC complaints about e-voting systems
- Despite e-voting improvements, audits still needed for ballot integrity
- Obama, Romney cite Apple, tech issues in debate
- Twitter becomes new debate spin room
- IT offshoring: Romney vs. Obama
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts