Judge throws out Ohio lawsuit over software on vote tabulation machines
Plaintiff produces no evidence to show software posed a threat to vote integrity, federal judge rules
Computerworld - A federal judge in Ohio today rejected claims by Ohio Green Party co-chairman Bob Fitrakis that software that was recently installed on vote tabulation machines in more than two-dozen counties in the state, posed a threat to the integrity of ballots cast in today's General Election.
In a 10-page ruling, federal judge Gregory Frost of the U.S. District Court for the Southern District of Ohio held that Fitrakis had produced no evidence to back his claims that the software was capable of altering election results and therefore needed to be immediately removed.
"[Fitrakis] has demonstrated zero likelihood of success based on the evidence presented to this Court," both in his motion for a temporary restraining order and at a hearing held this morning, Judge Frost wrote. "Fitrakis's alleged harm is purely speculative," Judge Frost wrote, in dismissing a lawsuit filed by Fitrakis on Monday.
"Fitrakis has not provided actual evidence that demonstrates how this harm is a realistic possibility, much less how it is actual and imminent. Having failed to show irreparable harm, Fitrakis cannot obtain the extraordinary injunctive relief he seeks."
In his complaint on Monday, Fitrakis had alleged that Ohio Secretary of State John Husted had violated state and federal laws when he installed software from Elections Systems & Software. (ES&S) on vote tabulation machines without first testing it or getting it certified. He had argued that installing such untested software in the weeks leading up to the elections presented an extraordinary risk. He had maintained that such untested software could potentially allow attackers to introduce a virus program or install a "back door" on vote tabulation systems to alter election results.
In its defense, Husted's office maintained that the ES&S' EXP software in question was designed purely to assist in the early reporting of voting results. All that ES&S' software was being used for was to reformat results that had already been counted and stored in pre-defined files.
The EXP software is not designed to, nor does it actually, count votes or have the ability to write over results already stored on county election systems, Husted's office had maintained. The newly installed software basically allows election results to be outputted to a thumb drive from where it can be immediately uploaded to the Secretary of State's system. The software is designed to cut down on the amount of information that precinct workers would have to key in by hand, the government had claimed.
Considering what it was designed to do, the software is not considered part of a certified voting system and therefore is exempt from testing and certification, Husted's office had claimed.
In agreeing with that assessment, Judge Frost noted that Fitrakis and his expert witnesses had merely speculated on the potential for the software to create harm without once showing how that might happen. He pointedly noted that neither Fitrakis nor his expert witness had actually tested the EXP software before making their claims.
"Instead of explaining to the Court how the system would be altered by the Secretary's use of the EXP software, Fitrakis instead argued that "[t]here is no objective proof that the new software will not adversely affect the existing software in an unforeseen way" and that "[t]here is no evidence that [unforeseen adverse software impact] will not happen here," Frost wrote.
The claim to injunctive relief is "based on a series of speculative assumptions about what the EXP software might do to the county vote tabulation computers and how someone might be able to use the EXP software to alter election results."
Ohio is a key swing state in the U.S. presidential election and could well determine the winner. Polls have shown President Obama with a narrow lead in the state over GOP challenger Mitt Romney.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Applications in Computerworld's Applications Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts