November 01, 2006 (Computerworld) -- Many Americans will head to the polls for November's midterm elections with less certainty than ever about how -- or whether -- their votes will be counted.
Two years after the controversy-plagued 2004 elections, four years after HAVA (the Help America Vote Act) was passed, and six years after the Supreme Court and America romanced the hanging chad, experts are bracing for yet another wave of challenges to regional vote-counting systems.
One-third of us will use voting machines that have never before served in a general election. Legal challenges to paperless DRE (direct-recording electronic) voting technologies are proliferating across the country, and as computer scientists demonstrated earlier this year, hacking challenges to many of these machines can bear fruit even faster than demands for recounts.
Election-reform watchdog groups haven't kept pace with the massive funding influx and official support that the move to electronic voting has experienced. (Nor, critics say, have they enjoyed the close relationships that exist between many of the e-voting suppliers and government officials in charge of framing the rules for the acquisition of such machines.) But watchdogs and critics have made good use of available resources, especially the Web and the blogosphere, to discuss their findings and keep the issue alive as HAVA implementation has lurched into place.
It's a lot to keep up with, especially since most of us would rather be thinking about who to vote for, not how we'll do it -- and certainly not about what might go wrong. To that end, Computerworld.com presents what you need to know for each of the 50 states and the District of Columbia. You'll find out what equipment and systems are in place for voter registration and polling, any significant legal challenges to the systems, previous Computerworld coverage of individual states, selected coverage from other media, and links to government watchdog sites. We've also got concise FAQ-style information on the vendors, technologies and laws that are important to the issue. Finally, since e-voting is beginning to attract attention in the culture at large, we've asked watchdog Brad Friedman to review one of the highest-profile projects on the horizon: the HBO documentary Hacking Democracy, premiering Nov. 2.
Click the map to activate it, then select a region to find out more about e-voting in those states.
(Note: This map requires Adobe Flash Player 6 or later. Text links are below.)
"Dear me. Just because I recently talked about Windows XP SP3's virtues and vices, some people seem to think I've..."
Read more...
"Your Kevin Mitnicks, your Frank Abagnales, your Jerome Kerviels -- what are we supposed to do with our hackers, especially..."
Read more... Read more Security posts or See all Blogs
Long Tail Supplier Collaboration - What's In It For You?
Long Tail Supplier Collaboration - What's In It For You?
Download this webcast, free, compliments of Sterling Commerce
Go to the webcast
Computerworld Executive Bulletin: Building a Robust Antivirus Defense
Download this Executive Bulletin (a $49.95 value) for free, compliments of MessageLabs. (Source: MessageLabs) Antivirus software alone isn't enough to prevent today's speedy, sophisticated virus attacks. Security managers should consider multitiered approaches that include behavior scanning, appliances that check e-mail for worms, and restricting user access to dangerous Web sites. Download this Executive Bulletin (a $49.95 value) for free, compliments of MessageLabs, to learn more.
Download this executive briefing
Eliminate SPAM, Gain Productivity
Get this white paper now! (Source: MessageLabs) Learn all about the dangers and the costs of spam in all its forms - from stock-touting to spreadsheet. Also, understand the drawbacks of traditional hardware- and software-based defenses - and the unique benefits of MessageLabs multi-layered, managed Anti-Spam solution; as illustrated by a real-world case study where MessageLabs stopped spam cold.
Download this white paper
White Papers
Read up on the latest ideas and technologies from companies that sell hardware, software and services.
Security Management Zone
Security management is the process of developing a comprehensive data protection plan. It takes into account all potential threats, the existing network environment, the future needs of the organization, and lays out a multi-tiered blueprint to integrate the security technology needed to combat these threats. CDW can help keep your network and data secure.
Visit the CDW Security Management Zone nowSee All Zones
Fired up about IT? Join Sharkbait and share your true tales of IT. SharkBait is the place for you to sound off about everything IT the good, the bad, and the rest of the weird stuff you deal with every day.
New baits
Computerworld Technology Briefing: An open-source path to optimal virtualization Looking for a virtualization strategy that offers both the flexibility and reliability to meet the demands of mixed-source environments? Look no further than the fast-emerging open virtualization approach backed by some of the biggest names in enterprise computing. Together they are pointing the way toward higher data center performance without higher costs. Download this briefing
In Security There's plenty of talk about how to behave during a Customs search of your computer and gear, but Jon Espenschied's got tips for securing your data (and privacy) before you reach the border.
Click here to read the latest column by Jon Espenschied
Layered Security Solutions
Although basic network security issues have changed very little over the past decade, the
network security landscape has changed dramatically. Today's IT professionals still have the
primary responsibility of protecting the confidentiality of corporate information, preventing
unauthorized access, and defending the network against attacks. Security experts and analysts agree that a security solution comprised of multiple layers is the best defense against today's increasingly sophisticated attacks.
Universal Threat Management - Because Conventional UTM is Not Enough!
This white paper, written by Mark Bouchard of Missing Link Security Services, examines the challenges confronting today's enterprises with respect to managing threats on a network. It also discusses the need for "Universal Threat Management", which is a security solution approach for all physical locations within an enterprise that require threat protection.
This short demo will guide you through key considerations for selecting a solution to manage threats on a network. Learn about the popularity of Unified Threat Management (UTM), and how it fits into an overall security solution. Explore critical elements of a network-wide solution for multisite and large network-size deployments and identify the four key features of a threat management solution.