GOP lawmakers say ‘thousands’ of military votes will not be counted

U.S. Army soldier member of the NATO-led peacekeeping force in Kosovo walks by a poster urging soldiers to vote Nov. 2. U.S. Army soldier member of the NATO-led peacekeeping force in Kosovo walks by a poster urging soldiers to vote Nov. 2. Visar Kryeziu/AP

Several Republican lawmakers have voiced concern about the system members of the military use to vote, claiming the slow mail process will cause thousands of ballots to not be counted.

Sens. John Cornyn, R-Texas, Kelly Ayotte, R-N.H., John McCain, R-Ariz., Rob Portman, R-Ohio, and Marco Rubio, R-Fla., sent a letter to Defense Department Secretary Leon Panetta on the eve of the election, saying military mail can take between 14 and 50 days to process and ballots will therefore arrive at their intended destinations well after the election.  

“We write to express concerns over another serious failure by the Department of Defense to safeguard the voting rights of our overseas military service members, which we believe could result in the imminent disenfranchisement of thousands,” the letter said.

The lawmakers said the solution to the issue is to modernize military mail delivery by centralizing mail redirection.

The Pentagon’s own inspector general recently criticized Defense Department efforts to improve the voting process for members of the military, when its investigation concluded installation voting assistance offices had not yet been adequately instituted.

While the senators acknowledged the problem cannot be fixed in time for Tuesday’s election, they called for a solution to be instituted in time for the next election cycle.  
Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.