Feeds

E-voting vendor succumbs to California source code demands

Worried about 'personal agendas'

The essential guide to IT transformation

Electronic voting machines vendor Election Systems & Software Inc. has finally given in to demands by California's Secretary of State office that it submit the source code used in one of its products. But it made it abundantly clear it is unhappy about the requirement.

ES&S complied with the demand in an overnight package that was received yesterday by the office of Secretary of State (SOS) Debra Bowen, about three months past due date. Of the four e-voting firms selling products to California counties, only ES&S failed to meet the deadline.

Bowen's demand for the source code used in ES&S's InkaVote Plus Voting System stems from a "top-to-bottom" review of election system certified for use in California that was announced in February. Bowen based her review on a state law that mandates the SOS "review voting systems periodically to determine if they are defective, obsolete, or otherwise unacceptable".

Lest Tuesday's overture appear to be a conciliatory gesture on ES&S's part, the Nebraska-based company wagged its finger at the whole process, questioning both its need and impartiality.

"... there are serious concerns regarding the motivations and apparent personal agendas of a number of the currently proposed examiners," ES&S exec StevenPearson wrote in a letter agreeing to turn over the source code. "Please understand that ES&S will hold not only the examiners responsible, but the SOS as well, for any prohibited disclosure or use of ES&S' trade secrets and related confidential and proprietary information."

The company noted that it had been approved by federally accredited independent testing authorities and certified for use in California.

Over the past seven years, confidence in the US election system has been challenged by hanging chads and congested polling places. In the case last year in Florida's Sarasota County - which uses ES&S machines - huge voting anomalies have called into question the accuracy of results in the race for that state's 13th Congressional district. ®

5 things you didn’t know about cloud backup

More from The Register

next story
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
EU justice chief blasts Google on 'right to be forgotten'
Don't pretend it's a freedom of speech issue – interim commish
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Detroit losing MILLIONS because it buys CHEAP BATTERIES – report
Man at hardware store was right: name brands DO last longer
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.