Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Finance
Security
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 
Computerworld 2007Subscribe to Computerworld
40 years of the most authoritative source of news and information for IT leaders.

E-voting state by state: What you need to know

 

Sign up to receive Security Resource Alerts

November 01, 2006 (Computerworld) -- Many Americans will head to the polls for November's midterm elections with less certainty than ever about how -- or whether -- their votes will be counted.

Two years after the controversy-plagued 2004 elections, four years after HAVA (the Help America Vote Act) was passed, and six years after the Supreme Court and America romanced the hanging chad, experts are bracing for yet another wave of challenges to regional vote-counting systems.

One-third of us will use voting machines that have never before served in a general election. Legal challenges to paperless DRE (direct-recording electronic) voting technologies are proliferating across the country, and as computer scientists demonstrated earlier this year, hacking challenges to many of these machines can bear fruit even faster than demands for recounts.


eVoting 2006
Election-reform watchdog groups haven't kept pace with the massive funding influx and official support that the move to electronic voting has experienced. (Nor, critics say, have they enjoyed the close relationships that exist between many of the e-voting suppliers and government officials in charge of framing the rules for the acquisition of such machines.) But watchdogs and critics have made good use of available resources, especially the Web and the blogosphere, to discuss their findings and keep the issue alive as HAVA implementation has lurched into place.

It's a lot to keep up with, especially since most of us would rather be thinking about who to vote for, not how we'll do it -- and certainly not about what might go wrong. To that end, Computerworld.com presents what you need to know for each of the 50 states and the District of Columbia. You'll find out what equipment and systems are in place for voter registration and polling, any significant legal challenges to the systems, previous Computerworld coverage of individual states, selected coverage from other media, and links to government watchdog sites. We've also got concise FAQ-style information on the vendors, technologies and laws that are important to the issue. Finally, since e-voting is beginning to attract attention in the culture at large, we've asked watchdog Brad Friedman to review one of the highest-profile projects on the horizon: the HBO documentary Hacking Democracy, premiering Nov. 2.


 Click the map to activate it, then select a region to find out more about e-voting in those states.
 (Note: This map requires Adobe Flash Player 6 or later. Text links are below.)


 

Computerworld appreciates the assistance of Electionline.org, a project of the Pew Charitable Trust, in the compilation of this project. We also read closely and highly recommend the joint survey from The Century Institute, the Common Cause Education Fund and The Leadership Conference on Civil Rights Education Fund titled Voting in 2006: Have We Solved the Problems of 2004?;  NYU School of Law's Brennan Center for Justice's two remarkable 2006 studies, Making the List: Database Matching and Verification Processes for Voter Registration and The Machinery of Democracy: Voting System Security, Accessibility, Usability and Cost; and Election Law @ Moritz, a project of Ohio State University's Moritz College of Law.

See more about e-voting:

  •  Major players: The vendors
  •  Laws, lingo and technologies
  •  Review: Hacking Democracy
  •  Sound Off: Your comments on e-voting in 2006

Regional pages:

  •  Northeast
  •  Southeast
  •  Lake states
  •  Midwest
  •  Southwest
  •  West




Print this Story Send Us Feedback E-mail this Story Digg! Digg this Story Slashdot this Story
"Dear me. Just because I recently talked about Windows XP SP3's virtues and vices, some people seem to think I've..." Read more...
"Your Kevin Mitnicks, your Frank Abagnales, your Jerome Kerviels -- what are we supposed to do with our hackers, especially..." Read more...
Read more Security posts or See all Blogs
Hackers hijack a half-million sites in latest attack
HP in talks to buy EDS for up to $13B
Microsoft faults OEMs for some XP SP3 endless reboots
More top stories...
Mozilla slates Firefox 3.0 RC1 for late May
IPhone out of stock 'companywide,' say Apple sales reps
Cisco data center chief steps down
A role on an IT help desk is what you make of it, tech pros say — just don't get too comfy.
Web-based e-mail may be exposing you to privacy and security dangers you didn't sign up for.
Ever been tempted to replace the mechanical hard drive in your laptop with a shiny new solid-state disk? Our expert did so, and here's what he found.
PARC showed erasable paper and other technologies that adds intelligence to documents with raw text.
Reviews, analyses, how-tos, visual tours, hot issues and predictions about Microsoft's new OS.
Four years from now, the IT field will be a vastly different place. Will you be ready?
All Zones
Application Performance Zone
Enterprise-Class Security Zone
Enterprise Solutions Zone
The File Data Management Zone
Grid Computing on Windows Zone
Security Management Zone
ITIL Best Practices Zone
The SAS Zone
Storage Virtualization Zone
The Data Center Management Zone

Ads by TechWords

See your link here
Long Tail Supplier Collaboration - What's In It For You?
Long Tail Supplier Collaboration - What's In It For You?
Download this webcast, free, compliments of Sterling Commerce
Go to the webcast 
Computerworld Executive Bulletin: Building a Robust Antivirus Defense
Download this Executive Bulletin (a $49.95 value) for free, compliments of MessageLabs.
(Source: MessageLabs) Antivirus software alone isn't enough to prevent today's speedy, sophisticated virus attacks. Security managers should consider multitiered approaches that include behavior scanning, appliances that check e-mail for worms, and restricting user access to dangerous Web sites. Download this Executive Bulletin (a $49.95 value) for free, compliments of MessageLabs, to learn more.
Download this executive briefing download
Eliminate SPAM, Gain Productivity
Get this white paper now!
(Source: MessageLabs) Learn all about the dangers and the costs of spam in all its forms - from stock-touting to spreadsheet. Also, understand the drawbacks of traditional hardware- and software-based defenses - and the unique benefits of MessageLabs multi-layered, managed Anti-Spam solution; as illustrated by a real-world case study where MessageLabs stopped spam cold.
Download this white paper go
White Papers
Read up on the latest ideas and technologies from companies that sell hardware, software and services.
New Fujitsu High-End Itanium Windows- and Linux-Based PRIMEQUEST Servers Offer the Utmost in High Availability
New Fujitsu High-End Itanium-Based PRIMEQUEST Servers Offer Industry-Leading System Management for Linux and Windows
Symantec State of the Data Center Report 2007
View more whitepapers 
Layered Security Solutions
Although basic network security issues have changed very little over the past decade, the network security landscape has changed dramatically. Today's IT professionals still have the primary responsibility of protecting the confidentiality of corporate information, preventing unauthorized access, and defending the network against attacks. Security experts and analysts agree that a security solution comprised of multiple layers is the best defense against today's increasingly sophisticated attacks.

Download this white paper 
Universal Threat Management - Because Conventional UTM is Not Enough!
This white paper, written by Mark Bouchard of Missing Link Security Services, examines the challenges confronting today's enterprises with respect to managing threats on a network. It also discusses the need for "Universal Threat Management", which is a security solution approach for all physical locations within an enterprise that require threat protection.

Download this white paper 
Selecting the Right Threat Management Solution
This short demo will guide you through key considerations for selecting a solution to manage threats on a network. Learn about the popularity of Unified Threat Management (UTM), and how it fits into an overall security solution. Explore critical elements of a network-wide solution for multisite and large network-size deployments and identify the four key features of a threat management solution.

View this demo