Feeds

New criminal investigation into Ohio elections

Those voting machines, what a hoot

Providing a secure and efficient Helpdesk

A criminal investigation is to be launched into the way the November 2006 elections were run in Cleveland, Ohio, according to reports.

The new probe has been sparked by a report compiled by election board public monitor CSU's Candice Hoke. County Prosecutor Bill Mason read the report and said there were several "worrying" things within.

In Cuyahoga County officials were given special dispensation to scan early postal votes. They were specifically prohibited from counting the votes, however, until the polls had closed.

But, according to Mason, Hoke's report suggests that a clock on the computer controlling the election seemed to be changed several times in the two days prior to the election in November.

"There is a possibility that there were some totals that were run during that 48-hour period, that's a concern," Mason told a local Fox news station. He says there is no evidence that anyone tampered with the result, but that it looks as though someone had access to the system.

Other security blunders include allowing people with access to the election computer to share the same password. Keys to the tabulation room were kept in an unlocked box, and a cable to the computer controlling the election was apparently left plugged in all night on the evening of the election.

Now Bill Mason has appointed special prosecutor Kevin Baxter to investigate. Baxter was the man behind the investigations that led to last week's conviction of two election workers for rigging the recount in the 2004 presidential elections. There is no suggestion they were trying to alter the outcome: merely that they wanted to avoid a more thorough review of the count.

Bob Bennett, head of the elections board, says Mason is criminalising honest mistakes, but Mason says all he wants is for people to do their jobs. If they did, he argues, "then there'd be nothing to worry about".

Newly elected Secretary of State Jennifer Brunner says she is prepared to fire all four board officials for the 2004 fiasco if they don't resign. Two have already fallen on their swords, but the remaining pair look ready to fight it out. A removal hearing is expected to begin on 2 April. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Scrapping the Human Rights Act: What about privacy and freedom of expression?
Justice minister's attack to destroy ability to challenge state
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
4chan outraged by Emma Watson nudie photo leak SCAM
In the immortal words of Shaggy, it wasn't me us ... amirite?
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.