Year: 2021
-
How lever-action voting machines really worked
Over the years I have written many articles about direct-recording electronic (DRE) voting machines, precinct-count optical-scan (PCOS) voting machines, ballot-marking devices (BMDs), and other 21st-century voting technology. But I haven’t written much about 20th-century lever machines; these machines were banned by the U.S. Congress in the Help America Vote Act and have not been used…
-
CITP is Hiring a Communications Manager
The Communications Manager at the Center for Information Technology Policy (CITP) will serve as the lead for all external and internal communications efforts of the center. This will include developing CITP’s content strategy and managing the center’s website, Freedom to Tinker blog, and social media presence. The position requires coordination and collaboration with researchers at…
-
AI Nation podcast, from CITP and WHYY
I’m excited to introduce AI Nation: a podcast about AI, everyday life, and what happens when we delegate vital decisions to machines. It’s a collaboration, born at CITP, between Princeton University and WHYY, Philadelphia’s famous NPR station. The first episode drops on April 1. Tune in, and you’ll hear a variety of voices. You’ll hear…
-
Voting Machine Hashcode Testing: Unsurprisingly insecure, and surprisingly insecure
By Andrew Appel and Susan Greenhalgh The accuracy of a voting machine is dependent on the software that runs it. If that software is corrupted or hacked, it can misreport the votes. There is a common assumption that we can check the legitimacy of the software that is installed by checking a “hash code” and…
-
Georgia’s election certification avoided an even worse nightmare that’s just waiting to happen next time
Voters in Georgia polling places, 2020, used Ballot-Marking Devices (BMDs), touchscreen computers that print out paper ballots; then voters fed those ballots into Precinct-Count Optical Scan (PCOS) voting machines for tabulation. There were many allegations about hacking of Georgia’s Presidential election. Based on the statewide audit, we can know that the PCOS machines were not…
-
Using an Old Model for New Questions on Influence Operations
Alicia Wanless, Kristen DeCaires Gall, and Jacob N. ShapiroFreedom to Tinker: https://freedom-to-tinker.com/ Expanding the knowledge base around influence operations has proven challenging, despite known threats to elections,COVID-related misinformation circulating worldwide, and recent tragic events at the U.S. Capitol fueled in part by political misinformation and conspiracy theories. Credible, replicable evidence from highly sensitive data can be difficult…
-
CITP’s Summer Fellowship Program for Training Public Interest Technologists
In 2020, CITP launched the Public Interest Technology Summer Fellowship (PIT-SF) program aimed at rising juniors and seniors interested in getting first-hand experience working on technology policy at the federal, state and local level. The program is supported by the PIT-UN network and accepts students from member universities. We pay students a stipend and cover…
-
ESS voting machine company sends threats
For over 15 years, election security experts and election integrity advocates have been communicating to their state and local election officials the dangers of touch-screen voting machines. The danger is simple: if fraudulent software is installed in the voting machine, it can steal votes in a way that a recount wouldn’t be able to detect…