Special Programming: Public Affairs
Reports coming in from people voting at the Multnomah Country Elections Office at SE 11th and SE Morrison
- Title: Early Evening Voting at Multnomah Country Elections Office
- Length: 1:35 minutes (1.45 MB)
- Format: MP3 Stereo 48kHz 128Kbps (CBR)
Rhys Scholes spokesperson for Ted Wheeler discusses local races
Nathan Jimenez from the Democratic electoral party
Francisco Lopez, measure 58 update
Andy Seaton talks with Jeana Frazzini from Basic Rights Oregon
Rhys Scholes continues
Report from Obama party at Pioneer Square
Gael Murphy and Medea Benjamin founders of Code Pink phone in from Washington D.C.
Sarah Kilpatrick Obama supporter who attended Grant Park rally in Chicago
Spencer checks in from Washington D.C.
Rhys Scholes updates local races
Ending of KBOO Election Special
Report from SE Portland Election Center
Rountable discussion continues with Per, Lisa, Theresa and Henry
One of the largest concerns of the Oregon Voter’s Rights Coalition is the lack of independent testing and review of the state’s voting systems. When trying to raise their concerns with John Lindback, Oregon’s Director of Elections, he assured the group that he is confident in the voting systems used.
But last Fall, Ohio did something different. Their Secretary of State Jennifer Brunner commissioned Project EVEREST: a comprehensive security review of the electronic voting technology used in her state.
The project contracted several academic teams to examine the election procedures, equipment, and source code used in that state. The aim was to identify any problems that could make elections vulnerable to tampering.
The ten-week project examined in detail the touch-screen, optical scan, and election management technology from e-voting vendors ES&S, Hart InterCivic, and Premier Election Systems (formerly Diebold). Penn led the analysis of the ES&S system source code, which is also used by voters in 42 other U.S. states besides Ohio.
Matt Blaze and Sandy Clark outlined the team's findings at the Hackers on Planet Earth conference earlier this year, where they discovered exploitable security vulnerabilities in almost every hardware and software component of the ES&S systems. Some of these flaws could allow a single malicious voter or poll worker to alter countywide election results, possibly without detection.