In October, President Bush signed into law the Help America Vote Act of 2002. Perhaps motivated by the fact that his own election fate hung in the chads for a while, the president allotted $3.9 billion to help states replace outdated voting machines. Electronic voting machines will receive some of the funding.Not everyone is happy about the new emphasis on e-voting. These systems make it easier for corrupt election officials or hackers to skew election results, complains Peter Neumann, principal scientist at SRI International, a nonprofit research institute.Unlike paper-ballot systems, it’s impossible to verify that a vote cast electronically is recorded properly. Votes displayed correctly onscreen could easily be recorded incorrectly within the system or not recorded at all, he contends.But researchers are looking into potential solutions to the problem, like an electronic system that would print out a paper copy of each voter’s ballot after submission. On the other side of the issue, voting technology experts contend that the technology is quite secure. “These systems are very reliable. They’re tested extensively, and they’re not allowed into use until their reliability and accuracy have been demonstrated,” says Brit Williams, professor emeritus of computer science and information systems at Kennesaw State University.While computer systems are vulnerable to tampering, Williams points out that absentee paper ballot scams or tried-and-true vote-buying schemes are much easier to pull off than the vast conspiracy required to manipulate an e-voting machine. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe