Skip to content
Search

Latest Stories

Top Stories

Iowa results will be compiled over the internet, hacking threat aside

Hacker on smartphone
xijian/Getty Images

The first votes of the presidential election will be tabulated after the Iowa caucuses next month using the sort of internet-connected system that worries election security experts. They say preventing the sort of interference that sullied the 2016 election should be more of a priority than speed in compiling the returns.

But the Iowa Democratic Party plans to deploy a smartphone app to officials running the caucuses across the state for use in calculating and transmitting the results the night of Feb. 3. Putting such vote totals into cyberspace makes them readily vulnerable to nefarious hacking.

Party leaders say they are aware of the potential problems but believe their system will repel them. If that doesn't happen, the opening round of the intense contest for the Democratic nomination will be condemned to global ridicule.


The aim of the new app is to get the caucus results to the public quicker, Troy Price, the chairman of the state party, told Iowa Public Radio. He declined to detail how the app was designed, or by who, or what has been done to guarantee security.

He said the state party worked with the national party's cybersecurity team, and with Harvard University's Defending Digital Democracy project. But Price declined to say whether any third party has investigated the app for vulnerabilities, as many cybersecurity experts recommend.

Sign up for The Fulcrum newsletter

Unlike many states in which local and state officials oversee presidential primaries, in Iowa the responsibility for administering, staffing and funding the caucuses rests with the state party, which in turn relies mainly on unpaid volunteers.

The Iowa Democrats' plan is for caucus leaders to compile the results from the in-person gatherings and send them to party headquarters in Des Moines using their smartphone apps — assuming the software works and the network does not become overwhelmed or compromised. In the past, making a telephone call was the default method, and phones will still be used as a backup this time.

Because caucusing and the climactic vote counting in hundreds of locations are open to the public, it's highly unlikely a hack to alter the results would go unnoticed. But the damage to the public confidence in the 2020 elections would likely be catastrophic.

Read More

Following Jefferson: Promoting Intergenerational Understanding Through Constitution-Making

An illustration depicting the U.S. Constitution and Government.

Getty Images, Douglas Rissing

Following Jefferson: Promoting Intergenerational Understanding Through Constitution-Making

Towards the end of his life, Thomas Jefferson became fatalistic. The prince and poet of the American Revolution brooded—about the future of the country he birthed, to be sure; but also about his health, his finances, his farm, his family, and, perhaps most poignantly, his legacy. “[W]hen all our faculties have left…” he wrote to John Adams in 1822, “[when] every avenue of pleasing sensation is closed, and athumy, debility, and malaise [is] left in their places, when the friends of our youth are all gone, and a generation is risen around us whom we know not, is death an evil?”

The question was rhetorical, of course. But it revealed something about his character. Jefferson was aware that Adams and he—the “North and South poles of the Revolution”—were practically the only survivors of the Revolutionary era, and that a new generation was now in charge of America’s destiny.

Keep ReadingShow less
The Hidden Moral Cost of America’s Tariff Crisis

Small business owner attaching permanent close sign on the shop door.

Getty Images, Kannika Paison

The Hidden Moral Cost of America’s Tariff Crisis

In the spring of 2025, as American families struggle with unprecedented consumer costs, we find ourselves at a point of "moral reckoning." The latest data from the Yale Budget Lab reveals that tariff policies have driven consumer prices up by 2.9% in the short term. In comparison, the Penn Wharton Budget Model projects a staggering 6% reduction in long-term GDP and a 5% decline in wages. But these numbers, stark as they are, tell only part of the story.

The actual narrative is one of moral choice and democratic values. Eddie Glaude describes this way in his book “Democracy in Black”: Our economic policies must be viewed through the lens of ethical significance—not just market efficiency. When we examine the tariff regime's impact on American communities, we see economic data points and a fundamental challenge to our democratic principles of equity and justice.

Keep ReadingShow less
Balance – The Golden Mean

Old empty scales in brass colour against grey background.

Getty Images, OsakaWayne Studios

Balance – The Golden Mean

“Next to love, balance is the most important thing.” ~ John Wooden

Would John Wooden, UCLA’s winningest basketball coach, who took his team to ten national championships in 12 years and was named the “Coach of the Century” by ESPN, speak so of “love” and “balance” if they were not absolutely critical to a winning formula?

Keep ReadingShow less
Understanding The Freedom Of Information Act (FOIA)

Judge gavel and book on the laptop

Getty Images/Stock

Understanding The Freedom Of Information Act (FOIA)

Background

In November 2024, Elon Musk posted on social media, “There should be no need for [Freedom of Information Act] requests. All government data should be default public for maximum transparency.” His statement reignited discussions on the Freedom of Information Act, or FOIA, a federal law enacted in 1966 that requires federal executive branch agencies to disclose information in specific ways. Since its original passage in 1966, FOIA has been updated three times to tighten agency compliance, account for digital records, and allow citizens to request records online. Under FOIA, government agencies must disclose information by:

FOIA includes nine exemptions to protect against harms that might result from divulging certain records; these exemptions include cases like invasion of personal privacy, information related to national security, and information that would interfere with law enforcement proceedings.

Keep ReadingShow less