Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
4Activity
0 of .
Results for:
No results containing your search query
P. 1
Introduction to Audit 2012

Introduction to Audit 2012

Ratings: (0)|Views: 986 |Likes:
Published by Defend the Vote

More info:

Categories:Types, Research, Law
Published by: Defend the Vote on Mar 17, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/29/2013

pdf

text

original

 
 
WE ARE EXPANDING OUR AUDIT TO INCLUDE THE REST OF ILLINOIS - We need your help!
Election security should be transparent and open to the public’s review. Don’t be afraid to ask!
Greetings from Defend the Vote,
Does your vote really count?
 
It’s easy to assume the answer to that question is yes—
we certainly did before
digging deeper into Illinois’ election procedures! But the closer we looked, the more concerned we became about
the system put in place that is supposed to keep our ballot tamper-free.
Whatever your vote is, and for whatever party, candidate, or issue it must to be fairly counted!
Defend the Vote is a non-partisan, not-for-profit corporation that was founded to improve ballot integrity inIllinois. Our approach is quite different, in that we seek to prevent electoral fraud by improving the system, ratherthan fanning out on Election Day to catch crooks after the fact (which has historically never worked to any greatdegree).In 2012 we conducted the first citizen empowered audit of 239 precincts in Chicago. We found that 139 timeselection personnel failed to secure the ballot box in these precincts. Along with other sobering facts discoveredduring the audit, this information was summarized into a report that was peer reviewed and published in Argonne
National Laboratory’s
Journal of Physical Security. According to Dr. Roger
 
G. Johnston, Ph.D., CPP, (head of theVulnerability Assessment Team (VAT) at Argonne National Laboratory) our investigation proved security protocolscurrently in place were not followed and therefore failed to ensure a tamper-resistant voting environment.
Dr.Johnston found these protocols to be
 
“deficient and wholly inadequate” 
in securing the vote.
We took this audit report to Chicago and the Illinois State Board of Elections. The results are stunning! At theFebruary 28
th
Board meeting, the Chicago Commissioners reported that effective immediately, Chicago re-vampedtheir security procedures to include significant changes from suggestions made by Defend the Vote and Dr.Johnston. The following changes were made as a direct result of our 2011 audit.All Early Voting locations in Chicago now have a Republican and Democrat Judge presentImplementation of new employment verification and I-9 proceduresAll employees operating Early Voting in Chicago will be registered votersImplementation of new polling place procedures for securing election equipmentNew seal protocols from suggestions by Defend the Vote, and Dr. Roger Johnston  Implementation of new warehouse security procedures
MOST importantly, the Chicago Board of Election Commissioners and the Illinois State Board of Elections agreedto work with Defend the Vote's experts to assess security protocols for electronic voting.
Electronic votingmachines are widely suspected to be vulnerable to electronic tampering, but no one in Illinois has scientificallyinvestigated the issue (
Until now 
)!
Are you aware the electronic early vote has never been audited in Illinois?
 We are deeply involved in researching electronic voting and are dedicated to investigating electronic vulnerabilities
to enhance security of your vote before November’s elections

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->