Skip to content
Search

Latest Stories

Top Stories

Iowa results will be compiled over the internet, hacking threat aside

Hacker on smartphone
xijian/Getty Images

The first votes of the presidential election will be tabulated after the Iowa caucuses next month using the sort of internet-connected system that worries election security experts. They say preventing the sort of interference that sullied the 2016 election should be more of a priority than speed in compiling the returns.

But the Iowa Democratic Party plans to deploy a smartphone app to officials running the caucuses across the state for use in calculating and transmitting the results the night of Feb. 3. Putting such vote totals into cyberspace makes them readily vulnerable to nefarious hacking.

Party leaders say they are aware of the potential problems but believe their system will repel them. If that doesn't happen, the opening round of the intense contest for the Democratic nomination will be condemned to global ridicule.


The aim of the new app is to get the caucus results to the public quicker, Troy Price, the chairman of the state party, told Iowa Public Radio. He declined to detail how the app was designed, or by who, or what has been done to guarantee security.

He said the state party worked with the national party's cybersecurity team, and with Harvard University's Defending Digital Democracy project. But Price declined to say whether any third party has investigated the app for vulnerabilities, as many cybersecurity experts recommend.

Sign up for The Fulcrum newsletter

Unlike many states in which local and state officials oversee presidential primaries, in Iowa the responsibility for administering, staffing and funding the caucuses rests with the state party, which in turn relies mainly on unpaid volunteers.

The Iowa Democrats' plan is for caucus leaders to compile the results from the in-person gatherings and send them to party headquarters in Des Moines using their smartphone apps — assuming the software works and the network does not become overwhelmed or compromised. In the past, making a telephone call was the default method, and phones will still be used as a backup this time.

Because caucusing and the climactic vote counting in hundreds of locations are open to the public, it's highly unlikely a hack to alter the results would go unnoticed. But the damage to the public confidence in the 2020 elections would likely be catastrophic.

Read More

Senior older, depressed woman sitting alone in bedroom at home
Kiwis/Getty Images

Older adults need protection from financial abuse by family members

A mentor once told me that we take better care of our pets than we do older victims of mistreatment. As a researcher, I have sat across from people, including grown men, crying while recounting harrowing experiences of discovering and confronting elder financial exploitation within their families — by siblings, sons and daughters, nieces and nephews, girlfriends and neighbors. Intervening and helping victimized older people comes at a tremendous cost to caring family members. Currently, no caregiving or other policy rewards them for the time, labor, or emotional and relationship toll that results from helping to unravel financial abuse.
Keep ReadingShow less
Woman holding her head in her hands in front of her computer

A woman watches Vice President Kamala Harris' concession speech on Nov. 6 after Donald Trump secured enough voters to win a second term in the White House.

Andrew Lichtenstein/Corbis via Getty Images

Political grief: A U.S. epidemic stimulated by Project 2025

When most people think about grief, they associate it with the death of a loved one. They reflect on past memories, shared experiences and precious moments of life. It is natural for one to yearn for the past, the comfort and safety of familiar times and stability. Now, with the promise of a second term for Donald Trump and the suggested implementation of Project 2025, thousands of U.S. citizens are anticipating a state of oppression driven by the proposition of drastic, authoritarian political policies.
Keep ReadingShow less
Underwater cable model

A model of an internet cable that is laid along the seabed to transmit high-voltage electricity and the Internet via fiberglass.

Serg Myshkovsky/Getty Images

We need bipartisan cooperation to protect the internet

Your internet access is dependent on the security and resiliency of garden-hose-sized underwater cables. More than 800,000 miles of these cables criss-cross the oceans and seas. When just one of these cables breaks, which occurs about every other day, you may not notice much of a change to your internet speed. When several break, which is increasingly possible, the resulting delay in internet connectivity can disrupt a nation’s economy, news and government.

If there were ever a bipartisan issue it’s this: protecting our undersea cable system.

Keep ReadingShow less
Woman's hand showing red thumbs up and blue thumbs down on illustrated green background
PM Images/Getty Images

Why a loyal opposition is essential to democracy

When I was the U.S. ambassador to Equatorial Guinea, a small, African nation, the long-serving dictator there routinely praised members of the “loyal opposition.” Serving in the two houses of parliament, they belonged to pseudo-opposition parties that voted in lock-step with the ruling party. Their only “loyalty” was to the country’s brutal dictator, who remains in power. He and his cronies rig elections, so these “opposition” politicians never have to fear being voted out of office.

In contrast, the only truly independent party in the country is regularly denounced by the dictator and his ruling party as the “radical opposition.” Its leaders and members are harassed, often imprisoned on false charges and barred from government employment. This genuine opposition party has no representatives at either the national or local level despite considerable popular support. In dictatorships, there can be no loyal opposition.

Keep ReadingShow less