National

If they fear Internet privacy and security, why would they vote that way?

A new government survey highlights the consequences of Internet insecurity.  From the Washington Post: Why a staggering number of Americans have stopped using the Internet the way they used to <read>

Nearly one in two Internet users say privacy and security concerns have now stopped them from doing basic things online — such as posting to social networks, expressing opinions in forums or even buying things from websites, according to a new government survey released Friday…

The research suggests some consumers are reaching a tipping point where they feel they can no longer trust using the Internet for everyday activities…

Bloomberg Businessweek: A Decade Hacking Elections

From Bloomberg Businessweek: How to Hack an Election: <read>

Rendón, says Sepúlveda, saw that hackers could be completely integrated into a modern political operation, running attack ads, researching the opposition, and finding ways to suppress a foe’s turnout. As for Sepúlveda, his insight was to understand that voters trusted what they thought were spontaneous expressions of real people on social media more than they did experts on television and in newspapers. He knew that accounts could be faked and social media trends fabricated, all relatively cheaply. He wrote a software program, now called Social Media Predator, to manage and direct a virtual army of fake Twitter accounts
“Having a phone hacked by the opposition is not a novelty. When I work on a campaign, the assumption is that everything I talk about on the phone will be heard by the opponents.”

We note that similar issues have been raised in our current primary season. With charges and verifications that Twitter followers of at least one candidate appear to be largely fake accounts, along with unverified accusations that campaigns and their databases have been infiltrated, web access disrupted at critical times.  Given the current state of web  security, we see no reason that the same has, is, and will go on in our U.S. Elections.

It is best to be skeptical of anything you read in any media.  On the campaign trail assume the video is always on and every keystroke is captured by the opposition, media, and Government.  As always authenticity makes life simpler.

Arizona should not go away.

Certainly the officials in Arizona would like the interest in what happened in the primary to wane. It should not.  Democracy deserves better than this.

It is typically a high bar to re-run an election, maybe too high.  Typically you need to prove that enough voters would have been disenfranchised to change the result.  Sometimes as far as proving they would have voted for the looser.  Arizona’s Democratic Primary is near that bar.  In fact, if we consider the number of votes that would have awarded one more and one less delegate to either campaign its not that high a bar compared to the disenfranchisement.

Here is a video of the 5.5 hours of hearings. And comments from a Connecticut advocate.

Editorial: We didn’t “Fix this” or was it Fixed? We all lose anyway.

After the long lines in some states in 2012, President Obama said “We Have To Fix That“. Four years and a Presidential Commission later, it seems, at least Arizona is going the wrong way.

The results, entirely predictable, were endless lines akin to those that await the release of new iPhones.

We say:

  • Any disenfranchisement, disenfranchises every voter in the United States.  Our vote and democracy is distorted by the disenfranchisement of others.  We could have a different President and different party in power next January based on a distorted result.
  • Even if there was no disenfranchisement, (unlikely from what we see at this point), our democracy suffers from the lack of credibility unless the issues are investigated and effectively fully resolved.

 

Apple vs. the Government: Security and Privacy overlap

Apple is right to object to the government’s request to help open an iPhone.  Many claim it is an issue of balance between Security and Privacy. Perhaps. Yet, the Constitution talks of the the right of the people to be Secure in their effects.

To all those voices discussing this issue, we add:

  • Cracking “just one phone” and destroying the program thereafter is a myth…

While we applaud Apple’s efforts to make it impossible to crack new iPhones, such claims, in our view, are mythical.

The Iowa Caucus vs. a Primary

There are several differences between a caucus and a primary election.  These differences are glaring, especially in the case of the Iowa Democratic Presidential Caucus.  Like all elections, the rules,  eligibility, and voting methods vary from state to state. In presidential primaries and caucuses they can vary from party to party.

Here is our list of important concerns with the Iowa Democratic Caucus. All things considered, democracy would be better served by a  primary than the Iowa Caucus.

Brennan Center: Election Integrity: A Pro-Voter Agenda

Whenever we open a report with multiple recommendations we start from a skeptical point of view. We expect to agree with some proposals and disagree with others.  A new report from the Brennan Center for Justice is the exception.  We agree with every recommendation:
Election Integrity: A Pro-Voter Agenda

It starts with the right criteria, it has a great agenda, strong supporting arguments, and ends with an appropriate call to action

Twice again, Internet/online/email voting not a good idea

“You can’t control the security of the platform,”…The app you’re using, the operating system on your phone, the servers your data will cross en route to their destination—there are just too many openings for hacker interference. “But wait,” you’re entitled to object, “banks, online stores and stock markets operate electronically. Why should something as simple as recording votes be so much more difficult?”…

“As soon as large numbers of people are allowed to vote online, all of the sudden the attack surface is much greater,”…

Handing over election technology to tech companies surrenders the voting process to private, corporate control. The companies will demand trust without letting the public vet the technology, peek into the source code or see behind the curtain into the inner workings of the programs that count the ballots

Safe as an ostrich, from cyber attack.

Imagine no Internet for a few weeks. Imagine if that is because there is no power grid. CNN.Money: Cyber-Safe: How Corporate America keeps huge hacks secret

The backbone of America — banks, oil and gas suppliers, the energy grid — is under constant attack by hackers.

But the biggest cyberattacks, the ones that can blow up chemical tanks and burst dams, are kept secret by a law that shields U.S. corporations. They’re kept in the dark forever.

Book Review: Ballot Battles by Edward B. Foley

I have long been a fan of the  papers and other writings of Edward B. Foley of the Moritz College of Law.  He writes extensively on the issues associated with close elections, how they have been decided since the founding of the United States, and how the process might be improved. Last month his book on the subject, Ballot Battles:The History of Disputed Elections in the United States was released.

To me, it was a highly fascinating read that kept my interest through every page. It should be required reading for anyone interested in Election Integrity

Page 4 of 58« First...23456...102030...Last »