Sidebar: Skeptics Create System to Monitor E-voting
Computerworld - A group of technology experts concerned about the fate of electronic voting machines on Nov. 2 used some tools of the trade -- the Web and open-source technologies -- to create a system to monitor e-voting on election day.
The new technology, dubbed the Election Incident Reporting System (EIRS), was developed by technologists from the Verified Voting Foundation and Computer Professionals for Social Responsibility (CPSR). The system will be used by the Election Protection Coalition, which consists of a variety of organizations, to identify and fix problems with DRE machines on Nov. 2.
Work on EIRS started about four months ago, according to Will Doherty, Verified Voting's executive director. Since then, a team of 30 to 35 people -- mostly volunteers -- has worked to ready the system by Election Day.
The team includes five core developers, five testers, three user-interface specialists and a four-member architecture team responsible for security and hardware, said Erik Nilsson, chairman of the CPSR working group on voting technology.
The team gained an advantage from using open-source tool kits, such as PHP Surveyor, to create online surveying instruments and manage the results, he said.
Other open-source software used in the EIRS project includes AdvoKit, which manages tasks, campaigns and volunteers, and MapServer, which produces clickable maps that can show the locations of past problems.
Doherty said the developers are working on a final feature that will offer more detail about election incidents at a specific site. Currently, when a user clicks on a map to view incidents in a specific location, only the number of incidents is displayed. The upgrade will provide far more details of particular incidents, Doherty said.
If all works as planned on Election Day, incidents reported via EIRS will prompt the timely dispatch of experts to problem locations. The team includes some 1,300 TechWatch volunteers recruited by Verified Voting to monitor the DREs.
"We're placing big bets on this," said Nilsson.
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Cybercrime and Hacking White Papers | Webcasts