Al Kolwicz, Colorado Voter Group

Total Page:16

File Type:pdf, Size:1020Kb

Al Kolwicz, Colorado Voter Group May 14, 2015; Page 001 MEMO TO: Colorado Department of State [email protected] FROM: Colorado Voter Group DATE: May 13, 2015 SUBJECT: Response to your request, “Help Shape Colorado’s Election Rules, May 8, 2015” Documents copied here for your information: 1. Verified Voting opposition to House Bill 1130 (p. 2–3) 2. Security Considerations for Remote Electronic UOCAVA Voting (NISTIR 7770; p. 4–74) 3. Security Best Practices for the Electronic Transmission of Election Materials for UOCAVA Voters (NISTIR 7711; p. 75–147) 4. Information System Security Best Practices for UOCAVA Supporting Systems (NISTIR 7682; p. 148– 191) 5. A Threat Analysis on UOCAVA Voting Systems (NISTIR 7551; p. 192–269) 6. Risks of Internet Voting, by Barbara Simons (p. 270–271) 7. Hazards of Email Voting, by David Jefferson (p. 272–276) 8. Dynamic Authentication: Smarter Security to Protect User Authentication (IDC 1777; p. 277–282) Colorado Voter Group thanks you for the invitation to help shape Colorado’s election rules. Please include our response and the documents copied here into the list of publicly provided responses. To achieve your stated objectives, you will need a much more robust rule than that referenced in your May 8th request. The development of such a robust rule would necessarily require an improved process designed to fully exploit the knowledge and experience of the public, and that would place CDOS administrators and staff in a position to defend the proposed rule. One illustration of this need is proposed rule 16.2.1(c), concerning electronic transmission. The Secretary of State is the executive office that is legally accountable for ensuring the purity of elections. The adoption of proposed rule 16.2.1(c) can, and most probably would, result in the contamination rather than the purification of future elections. We ask that you promptly disclose and publicly defend your written rebuttals to each of the enclosed written arguments against Internet voting, and your evidence proving that adopting this rule would not contaminate future elections. Without such evidence, peer reviewed and publicly defended, it would be irresponsible for the department to proceed with adoption of this rule. We ask that you negotiate with the public to develop an improved rulemaking process that would achieve the above stated objectives. We are available to participate in such a public debate. Al Kolwicz Colorado Voter Group www.ColoradoVoterGroup.org http://coloradovoter.blogspot.com CVG Response to SOS Request for Public Input on Election Rules May 14, 2015; Page 002 March 23, 2015 Senator Bill Cadman Senator Mark Scheffel Senator Morgan Carroll Senator Rollie Heath Honorable Senators: We write today to express our opposition to House Bill 1130, a bill that as amended would expand the practice in Colorado of return of voted ballots by electronic transmission over the Internet. Verified Voting is a national, non-partisan, nonprofit committed to safeguarding democracy in the digital age, with many Colorado supporters. We advocate for voting technology and policies that promote and improve transparency, accessibility, security and auditability in the election process. There is a common misconception that returning voted ballots via email as PDF attachments and printing them for scanning at a central scanner is not Internet voting, and somehow does not introduce the security risks of “Internet voting.” This is misleading. Marked or “voted” ballots returned by electronic means (including but not limited to email in the form of PDF attachments) are vulnerable to tampering, manipulation, deletion, and eavesdropping as they travel the Internet, before they can be printed at the elections office. It is not merely the tabulation of votes that must be protected from the risks of the Internet, but the votes themselves even before they can arrive to be tabulated. The National Institute of Standards and Technology (NIST) is the federal agency tasked with researching the security considerations of voting technology including for remote electronic UOCAVA voting. In examining the email return of voted ballots NIST found that voted ballots returned by email are vulnerable to privacy violations and malicious tampering at countless points as they travel over unsecured networks and email servers.i NIST also warned that voter’s computers may be infected with malicious code or “malware” that could modify ballots before they are emailed to the election official. Malware could also infect the election computer system and modify ballots before they are printed. In either case, even if the malware was discovered before Election Day, election officials have no way to identify affected ballots.ii This sort of attack, they warn, could be orchestrated by updating malware on already infected computers to recognize and attack ballots and therefore could have large-scale impact.iii NIST also points out email ballot transmission is “significantly easier to intercept and modify in transit than other forms of communication.” iv This is borne out by other experts: Brian Hancock of the U.S. Election Assistance Commission states: “Email is about the least secure method of ballot delivery.”v Earlier this year researchers at Galois, a defense contractor and computer security firm, published a technical paper detailing an example of an attack on ballots returned by email.vi The solution is as a Federal Voting Assistance Program (FVAP) report to Congress states: “Electronic delivery of a blank ballot, when combined with the postal return of the voted ballot, remains the most responsible method for moving forward until such time applicable Federal security guidelines are adopted by the [U.S. Election Assistance Commission].” FVAP is responsible for assisting military and overseas voters to ensure their ability to participate effectively in elections. Colorado permits the insecure practice of electronic return of voted ballots by email return for UOCAVA voters—but in limited circumstances. CO Rev. Stat. 1-8.3-113 states this can happen, for voters who requested their ballots electronically: (1) (a) In circumstances where another more secure method, such as returning the ballot by mail, is not available or feasible, as specified in rules promulgated by the secretary of state; or (b) If the ballot is for a recall election conducted under article 12 of this code. CVG Response to SOS Request for Public Input on Election Rules May 14, 2015; Page 003 Thus far, we have been unable to find any guidance or rule the Secretary of State may have promulgated to ensure that the more secure method of returning voted ballots is used (cf. Election Rules 8 CCR 1501-1 16). Given the forgoing guidance, postal mail return should trump email ballot return. In agreement with the Military and Overseas Voter Empowerment (MOVE) Act and the Uniform Law Commission’s Uniform Military and Overseas Voter Act (UMOVA), Colorado provides blank ballots electronically and 45 days before an election to military and overseas voters. Colorado also wisely allows military ballots to be counted as long as they are postmarked on Election Day and received up to eight days after the election. Military voters are entitled to expedited postal mail return of voted ballots at no cost, which are returned to election officials within 5.2 days on average. These are significant steps that ease and facilitate the voting process for military and overseas voter and we commend you for those provisions. In addition, we strongly believe all ballots, including those of our men and women in uniform, deserve to be transmitted securely and privately. We oppose the provision in HB 1130, which we understand was added in Committee after introduction, that therein expands online return of voted ballots. We have no position on the other provisions of the bill. We also urge the legislature, in light of daily revelations of the comprehensive lack of security of the Internet for any purpose as important as the transmittal of votes, to consider repealing the return of voted ballots by electronic means, before the inevitable corrupted election occurs. Until then, we will work with the Secretary of State to develop clear and specific rules governing the return of voted ballots in agreement with Colorado statute 1-8.3-113. Thank you very much for your consideration and attention to this matter. Very truly yours, Pamela Smith, President VerifiedVoting.org Cc: Senator Leroy Garcia Kjersten Forseth i NIST IR 7551 “A Threat Analysis of UOCAVA Voting systems” http://www.nist.gov/itl/vote/upload/uocava-threatanalysis- final.pdf ii Ibid. iii NIST IR 7700 “Security Considerations for Remote Electronic UOCAVA Voting.” “While each successful attack on the client can only impact one vote or voter (or potentially a small number of voters if a computer is shared), attackers have demonstrated an ability to infect a large number of clients, and thus client-side attacks have the ability to have a large-scale impact.” iv NIST IR 7551 v “Internet Voting – Not Ready for Prime Time?” National Conference of State Legislatures, The Canvass, Feb 2013 http://www.ncsl.org/Documents/legismgt/elect/Canvass_Feb_2013_no_37.pdf vi https://galois.com/blog/2014/11/hacking-internet-voting-via-ballot-tampering/ CVG Response to SOS Request for Public Input on Election Rules May 14, 2015; Page 004 NISTIR 7770 Security Considerations for Remote Electronic UOCAVA Voting Nelson Hastings Rene Peralta Stefan Popoveniuc Andrew Regenscheid CVG Response to SOS Request for Public Input on Election Rules May 14, 2015; Page 005 [This page intentionally left blank. ] CVG Response to SOS Request for Public Input on Election Rules May 14, 2015; Page 006 NISTIR 7770 Security Considerations for Remote Electronic UOCAVA Voting Nelson Hastings Rene Peralta Stefan Popoveniuc Andrew Regenscheid Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 February 2011 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Patrick D.
Recommended publications
  • What's Wrong with Bush V. Gore and Why We Need to Amend the Constitution to Ensure It Never Happens Again Jamin B
    Maryland Law Review Volume 61 | Issue 3 Article 7 What's Wrong with Bush v. Gore and Why We Need to Amend the Constitution to Ensure it Never Happens Again Jamin B. Rasking Follow this and additional works at: http://digitalcommons.law.umaryland.edu/mlr Part of the Politics Commons Recommended Citation Jamin B. Rasking, What's Wrong with Bush v. Gore and Why We Need to Amend the Constitution to Ensure it Never Happens Again, 61 Md. L. Rev. 652 (2002) Available at: http://digitalcommons.law.umaryland.edu/mlr/vol61/iss3/7 This Conference is brought to you for free and open access by the Academic Journals at DigitalCommons@UM Carey Law. It has been accepted for inclusion in Maryland Law Review by an authorized administrator of DigitalCommons@UM Carey Law. For more information, please contact [email protected]. WHAT'S WRONG WITH BUSH V. GORE AND WHY WE NEED TO AMEND THE CONSTITUTION TO ENSURE IT NEVER HAPPENS AGAIN JAMIN B. RASKIN* I. Disenfranchisement as Remedy, Vote-Counting as H arm ................................................... 652 A. A Political Question Raised By a Candidate Without Standing ............................................ 653 B. And If It Had Been Gore v. Bush? ................... 660 C. Bush v. Gore: Hypocrisy and Reaction; Moral Expressivism and Legal Realism .................... 668 1. Moral Realism and Moral Expressivism ......... 670 2. Moral Realism and Legal Realism at Odds ...... 673 3. Hypocrites or Reactionaries ..................... 676 II. The People's Missing Right to Vote ..................... 679 A. The Missing Right to Vote in House and Senate Elections: Disenfranchisement in the District ....... 682 B. Territorial Subjects: The People of Puerto Rico, American Samoa, Virgin Islands, Guam ............
    [Show full text]
  • Security Considerations for Remote Electronic UOCAVA Voting
    NISTIR 7770 Security Considerations for Remote Electronic UOCAVA Voting Nelson Hastings Rene Peralta Stefan Popoveniuc Andrew Regenscheid [This page intentionally left blank. ] NISTIR 7770 Security Considerations for Remote Electronic UOCAVA Voting Nelson Hastings Rene Peralta Stefan Popoveniuc Andrew Regenscheid Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 February 2011 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Director [This page intentionally left blank. ] This document has been prepared by the National Institute of Standards and Technology (NIST) and describes research in support military and overseas voting for the Election Assistance Commission and the Technical Guidelines Development Committee. It does not represent a consensus view or recommendation from NIST, nor does it represent any policy positions of NIST. Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by organizations even before the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, organizations may wish to closely follow the development of these new publications by NIST.
    [Show full text]
  • Sorting and the Split-Ticket: Evidence from Presidential and Subpresidential Elections
    Polit Behav (2016) 38:337–354 DOI 10.1007/s11109-015-9315-7 ORIGINAL PAPER Sorting and the Split-Ticket: Evidence from Presidential and Subpresidential Elections 1 2 Nicholas T. Davis • Lilliana Mason Published online: 28 August 2015 Ó Springer Science+Business Media New York 2015 Abstract Although prior research demonstrates that strong partisans are less likely to cast a split-ticket, recent scholarly work hints that partisan-ideological sorting— the matching of an individual’s partisan and ideological identities—may play a comparatively stronger role in shaping this voting behavior. Simply, if a high degree of congruence between identities underscores psychological orientations that pre- vent association with an out-group, then highly-sorted voters should be less likely to cross-party lines within the voting booth. Using the 1972–2012 ANES Time-Series and 2010 CCES surveys, we provide evidence that demonstrates that a high degree of partisan-ideological sorting produces the strongest negative effect on split-ticket voting among a variety of alternative explanations at both the national and subna- tional levels. We then supplement these analyses with 1992–1996 ANES panel data to demonstrate how changes in sorting over time affect this voting behavior. Our results indicate that although an increase in partisan strength alone is insufficient to reduce an individual’s propensity to cast a split-ticket, an increase in identity sorting over time has a strong negative effect on split-ticket voting. We conclude with a brief discussion about the consequences of identity convergence; namely, that sorting fosters a unique form of electoral ‘‘polarization.’’ Keywords Sorting Á Ticket-splitting Á Electoral polarization Electronic supplementary material The online version of this article (doi:10.1007/s11109-015-9315-7) contains supplementary material, which is available to authorized users.
    [Show full text]
  • The Other Election Controversy of Y2K: Core First Amendment Values and High-Tech Political Coalitions
    Washington University Law Review Volume 82 Issue 1 2004 The Other Election Controversy of Y2K: Core First Amendment Values and High-Tech Political Coalitions Marc John Randazza Follow this and additional works at: https://openscholarship.wustl.edu/law_lawreview Part of the Constitutional Law Commons, Election Law Commons, First Amendment Commons, Law and Politics Commons, and the President/Executive Department Commons Recommended Citation Marc John Randazza, The Other Election Controversy of Y2K: Core First Amendment Values and High- Tech Political Coalitions, 82 WASH. U. L. Q. 143 (2004). Available at: https://openscholarship.wustl.edu/law_lawreview/vol82/iss1/4 This Article is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Law Review by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. THE OTHER ELECTION CONTROVERSY OF Y2K: CORE FIRST AMENDMENT VALUES AND HIGH-TECH POLITICAL COALITIONS MARC JOHN RANDAZZA, ESQ.∗ TABLE OF CONTENTS I. INTRODUCTION .................................................................................... 145 A. The Issue.................................................................................. 145 B. Research Questions................................................................. 153 C. Research Methodology............................................................ 154 D. Part Outline............................................................................
    [Show full text]
  • Modeling Canadian Federal Electoral Reforms
    Modeling Canadian Federal Electoral Reforms by Eric Koch B.A. (Political Science), Simon Fraser University, 2009 Project Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts in the Department of Political Science Faculty of Arts and Social Sciences © Eric Koch SIMON FRASER UNIVERSITY Spring 2017 Copyright in this work rests with the author. Please ensure that any reproduction or re-use is done in accordance with the relevant national copyright legislation. APPROVAL Name: Eric Koch Degree: Master of Arts (Political Science) Title of Project: Modeling Canadian Federal Electoral Reforms Examining Committee: Chair: Genevieve Fuji Johnson, Professor David Laycock Senior Supervisor Professor Rémi Léger Supervisor Assistant Professor Andrew Heard Internal Examiner Professor Date Defended/Approved: April 10, 2017 ii ABSTRACT This research project is focused on developing an exploratory model that can help explain the factors that affect the political desire for electoral reform. The model, premised on institutional and rational actor theories, develops a set of “endogenous” and “exogenous” factors that allow for evaluation of electoral reform discourse. While some attention is paid to the major reforms that the electoral system has undergone since Confederation, detailed analysis is reserved to the post- 1980 period. Data was collected from party manifestos and Speeches from the Throne. Because the federal government has not made any structural changes to its electoral system, provincial and international electoral reforms are considered for the potential influence by “contagion”. Institutional barriers to reform are also factored into the model. Lastly, the model introduces the element of developing web-based technologies such as social media that are changing how the electorate is exerting its influence on the federal parties.
    [Show full text]
  • Is It Ever Safe to Vote Strategically? Tech
    Is it ever safe to vote strategically? Arkadii Slinko and Shaun White The University of Auckland, New Zealand Abstract There are many situations in which mis-coordinated strategic voting can leave strategic voters worse off than they would have been had they not tried to strategize. We analyse the simplest of such scenarios, in which the set of strategic voters all have the same sincere preferences and all cast the same strategic vote, while all other voters vote sincerely. Most mis-coordinations in this framework can be classified as instances of either strategic overshoot- ing (too many voted strategically) or strategic undershooting (too few). If mis-coordination can result in strategic voters ending up worse off than they would have been had they all just voted sincerely, we call the relevant strate- gic vote unsafe. We show that under every onto and non-dictatorial social choice rule there exist circumstances where a voter has an incentive to cast a safe strategic vote. We extend the Gibbard-Satterthwaite Theorem by prov- ing that every onto and non-dictatorial social choice rule can be individually manipulated by a voter casting a safe strategic vote. Keywords: Social choice function, strategic voting, Gibbard-Satterthwaite theorem, manipulation, safe strategic vote. arXiv:1301.1420v1 [cs.GT] 8 Jan 2013 Preprint submitted to ArXiv.org October 31, 2018 1. Introduction 1.1. Overview In this paper we consider strategic behaviour of voters when one candi- date must be chosen from a set of candidates and voters’ preferences with re- spect to those candidates are expressed as strict linear orders.
    [Show full text]
  • The Supreme Court V. the American People
    Book Review Overruling Democracy: The Supreme Court v. The American People By Jamin B. Raskin. New York: Taylor and Francis Books, Inc., 2003. BRIAN P. MARRON I. INTRODUCTION In Overruling Democracy, Professor Jamin Raskin discusses how the Supreme Court has failed to enforce basic political rights by subordinating democratic principles inherent in the Constitution.1 The Court tolerates the usurpation of popular sovereignty through the manipulation of the electoral process. The Court also fails to protect the functioning of democratic principles in our everyday lives in cases dealing with schools and corporations. Throughout the book, Raskin offers several solutions to the democracy deficit, including several proposed constitutional amendments to clearly enshrine democratic rights. However, the issues are presented in such a manner that may undermine the book’s effectiveness as a tool for building support for a democracy reform movement. II. MANIPULATION OF THE ELECTORAL PROCESS A. Bush v. Gore’s Twister Take on Democracy Raskin begins with a discussion of Bush v. Gore as a recent and blatant example of the Court’s (mainly the conservative justices’) hostility to democratic principles. He states that “the Court’s decision expressed perfectly its paramount commitment to the political rights of conservative majority-white factions in each state, its hostility to potential electoral majorities comprised of African Americans and Hispanics, its perplexing eagerness to show favoritism towards certain political parties over others, and its readiness in the crunch to substitute 1 JAMIN B. RASKIN, OVERRULING DEMOCRACY: THE SUPREME COURT V. THE AMERICAN PEOPLE (2003). 158 CONN. PUB. INT. L.J. [Vol. 3, No.
    [Show full text]
  • Legislative Process
    South Carolina's Legislative Process By Sandra K. McKinney, Clerk S.C. House ofRepresentatives SOUTH CAROLINA'S LEGISLATIVE PROCESS ( , . s. t' c ~ r:.~R.I).RV r·····tt r:. .HJV 1 " 19.9.0I ~ Jr" n HISTORY ~J ;\' !:, L n order to understand what happens in the legis­ lative process, it's necessary to know a few basic facts about the lawmaking body. The Legislature I of South Carolina (called the General Assembly) consists of two parts, the Senate and House of Repre­ sentatives. There are 170 Members- 46 Senators and 124 Representatives representing districts based on population. To be eligible to be a Representative, a person must be at least 21 years old. Senators must be 25, qualified voters and live in their districts. Members are legally immune while attending and traveling to and from the General Assembly during the session and for ten days before and ten days after adjournment. This immunity applies except for a Mem­ ber charged with treason, felony or breach of the peace. The House can punish its Members for disorderly behavior and if two-thirds of the members agree, can expel a Member from the session, but cannot do so a second time for the same reason. Members of the House serve for two years; Senators serve for four years. The terms of office begin on the Monday following the General Election, held in even numbered years on the first Tuesday after the first Monday in November. The Members of the House meet on the first Tues­ day following certification of the election for a maximum of three days to organize.
    [Show full text]
  • Overruling Democracy: the Supreme Court Vs. the American People
    Overruling Democracy Overruling Democracy The Supreme Court vs. The American People Jamin B.Raskin Routledge NEW YORK AND LONDON Published in 2003 by Routledge 29 West 35th Street New York, NY 10001 www.routledge-ny.com Published in Great Britain by Routledge 11 New Fetter Lane London EC4P 4EE www.routledge.co.uk Copyright © 2003 by Taylor & Francis Books, Inc. Design and typography: Jack Donner Routledge is an imprint of the Taylor & Francis Group. This edition published in the Taylor & Francis e-Library, 2005. “To purchase your own copy of this or any of Taylor & Francis or Routledge’s collection of thousands of eBooks please go to www.eBookstore.tandf.co.uk.” All rights reserved. No part of this book may be reprinted or reproduced or utilized in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. Library of Congress Cataloging-in-Publication Data Raskin, Jamin B. Overruling democracy: the Supreme Court versus the American people/ By Jamin B.Raskin. p. cm. Includes bibliographical references and index. ISBN 0-415-93439-7 (hbk.) 1. United States. Supreme Court. 2. Political questions and judicial power— United States. I. Title. KF8748 .R33 2002 347.73'26—dc21 2002011222 ISBN 0-203-50921-8 Master e-book ISBN ISBN 0-203-57541-5 (Adobe eReader Format) To my mother and father CONTENTS Acknowledgments vi CHAPTER ONE The Supreme Court and America’s 1 Democracy Deficit CHAPTER TWO The Court Supreme 11 Bush v.
    [Show full text]
  • SUBMISSION to Working Group on Unification Referendums on the Island of Ireland from the DE BORDA INSTITUTE
    SUBMISSION TO Working Group on Unification Referendums on the Island of Ireland from THE DE BORDA INSTITUTE www.deborda.org www.debordavote.org “If the problem ain’t binary, don’t use a binary vote.” “The truth of an [electorate’s] decisions depends as much on the form by which they are reached as on the enlightenment of its members.” Le Marquis de Condorcet, (McLean and Urken 1995: 113). “In blunt words, by not publicising what can go wrong [with different voting systems]… expect to experience societal consequences that are significant and serious.” Donald Saari. (Saari 2008: 217.) In the Belfast Agreement, {Constitutional Issues, para 1 (ii)}, the two governments: Quote I recognise that it is for the people of the island of Ireland… to exercise their right of self-determination on the basis of consent, freely and concurrently given, North and South… subject to the… consent of a majority of the people of Northern Ireland; and in para 1 (iii), Quote II acknowledge that while a substantial section of the people in Northern Ireland share the legitimate wish of a majority of the people of the island of Ireland for a united Ireland, the present wish of a majority of the people of Northern Ireland… is to maintain the Union… and that it would be wrong to make any change in the status of Northern Ireland save with the consent of a majority of its people. 1 INTRODUCTION The Agreement is riddled with the word majority1 (my emphases), due no doubt to the widely held notion that a majority opinion can be identified in a binary procedure, a (simple, weighted or consociational) majority vote.
    [Show full text]
  • Vote Reassignment & Parliamentary Voting
    VOTE REASSIGNMENT & PARLIAMENTARY VOTING PROCEDURES UNDER PPR123 PPR123, by fulfilling its promise to “Make Every Vote Count—Always!”, presents exciting new possibilities for consideration. This should be the subject of future academic analysis and broad discussion. Here’s a preliminary list of some of the issues and possibilities. 1. Absentee voting. o With digital technology, it should be possible for MPs to vote securely from any location. o It’s suggested this should be subject to approval by the party whip. 2. Vote verification and vote security. o Voting procedures, records and responsibilities would be carefully established and continually monitored by technical experts. o Voting would be initiated by the Speaker, through the party whips, sending an ‘invitation to cast a vote on a particular issue’ (i.e. a ‘voting transaction’ or online ballot) to the registered voting devices (cell phone or tablet computer) of each MP. o Each MP would respond by casting a vote, to be sent to the vote servers (i.e. networked computers) controlled by the Speaker and each party whip. o The Speaker’s vote server would issue a vote confirmation message to each MP. o Every MP and party whip would be responsible to report any inconsistencies or problems to the Speaker. o The overall security of the voting process and voting records would be ensured through security procedures and controls, authorization, verification, replication of data, and transparency. o Potentially each MP’s digital device could be enabled to record all votes by all MPs. o Potentially the media might also be authorized to immediately receive voting summaries.
    [Show full text]
  • Legislative Flg&~§~ ·Qy
    Jouthfi~j Legislative flg&~§~ ·qy STATE DOCUMENTS BY SANDRA K. MCKINNEY, CLERK S.C. HOUSE OF REPRESENTATIVES SouTH CAROLINA's LEGISLATIVE PROCESS HISTORY n order to understand what happens in the legislative process, it's necessary to know a few basic facts about the lawmaking body. I The Legislature of South Carolina (called the General Assembly) consists of two parts, the Senate and House of Representatives. There are 170 Members - 46 Senators and 124 Representatives rep­ resenting districts based on population. To be eligible to be a Representative, a person must be at least 21 years old. Senators must be 25, qualified voters and live in their districts. Members are legally immune while attending and traveling to and from the General Assembly during the session and for ten days before and ten days after adjournment. This immunity applies except for a Member charged with treason, felony or breach of the peace. The House can punish its Members for disorderly behavior and if two-thirds of the members agree, can expel a Member from the session, but cannot do so a second time for the same reason. Members of the House serve for two years; Sena­ tors serve for four years. The terms of office begin on the Monday following the General Election, held in even numbered years on the first Tuesday after the first Monday in November. The Members of the House meet on the first Tues­ day following certification of the election for a maxi­ mum of three days to organize. The business at this organizational session includes: election of officers, appointment of standing committees, adoption of rules, assignment of desks and other housekeeping de­ tails.
    [Show full text]