The Voting News Daily: The Strange Career of Voter Suppression, Oscar voting by computer invites cyber attacks – Academy’s plan to allow voting by computer is an open invitation for cyber attacks and fraudulent outcome
The 2012 general election campaign is likely to be a fight for every last vote, which means that it will also be a fight over who gets to cast one. Partisan skirmishing over election procedures has been going on in state legislatures across the country for several years. Republicans have called for cutbacks in early voting, an end to same-day registration, higher hurdles for ex-felons, the presentation of proof-of-citizenship documents and regulations discouraging registration drives. The centerpiece of this effort has been a national campaign to require voters to present particular photo ID documents at the polls. Characterized as innocuous reforms to preserve election integrity, beefed-up ID requirements have passed in more than a dozen states since 2005 and are still being considered in more than 20 others. Opponents of the laws, mostly Democrats, claim that they are intended to reduce the participation of the young, of the poor and of minorities, who are most likely to lack government-issued IDs — and also most likely to vote Democratic. Read More
It’s often been said that Oscar season reflects the broader splendors and dysfunctions of American public life. The Academy of Motion Picture Arts and Sciences’ ideals of scrupulous fair play have been under constant challenge in recent years, on such issues as the promotional pull of A-list stars, the power of big-studio money and negative advertising campaigns designed to undermine the competition.
Now, though, the academy may be committing a blunder of its own making. It recently announced that it would be ditching its current all-mail secret ballot system, and that its more than 5,000 members would be voting through their own computers, starting next year. The academy said the software developed by the San Diego-based computer voting company Everyone Counts would incorporate “multiple layers of security” and “military-grade encryption techniques” to ensure that nothing untoward or underhanded could occur before PricewaterhouseCoopers, its accountancy firm, captured the votes from the Internet ether. Unfortunately, leading computer scientists around the world who have looked at Internet voting systems do not share the academy’s confidence. On the contrary, they say the technology is vulnerable to a variety of cyber attacks — no matter how many layers of encryption there are — and risks producing a fraudulent outcome without anyone necessarily realizing it. Read More

