Voting has been particularly confusing in battleground states

A sign shows voters the poling place in Scranton. A sign shows voters the poling place in Scranton. Matt Slocum/AP

A new Pennsylvania voter-identification law requiring all voters to provide photo IDs is causing confusion at the polls, even though it is not yet in effect.

Pennsylvania passed the tough new voter-ID law requiring all voters to provide photo IDs with an expiration date, but a Pennsylvania court blocked implementation of the law until after the 2012 election. Only first-time voters are currently required to show identification.

But Allegheny County officials received a complaint early Tuesday morning that Republicans outside a polling station on Maple Street in Homestead, Pa., were stopping voters outside the polls and demanding identification. A county judge ordered a halt to partisan electioneering outside polling stations, according to Pittsburgh's Tribune-Review.

Meanwhile, The Philadelphia Inquirer reported confusion at polling stations across the metro area. At a site in South Philadelphia, a poll worker began asking for IDs after she was asked by a visitor why she was not instructing voters to provide them.

Voters in Harrisburg reportedly received mailers instructing them incorrectly that they must provide state-approved identification to vote, according to The Philadelphia Daily News. The mailers were produced by the Pennsylvania State Department and sent out in September, before the Oct. 2 ruling. 

A Pennsylvania voter on Tuesday morning posted a video on Youtube in which his vote for President Obama was repeatedly changed into one for GOP candidate Mitt Romney, NBC News confirmed. The machine was taken out of service.

Other problems are cropping up, particularly -- no surprise -- in Pennsylvania and battleground states:

  • Earlier in Pennsylvania, a judge issued an order to reinstate Republican election officials across Philadelphia who were allegedly ejected from the polls. 
  • An hour after polls opened in Florida, hundreds -- perhaps thousands -- of voters received robocalls from the Pinellas County Supervisor of Elections office mistakenly telling them that they had until 7 p.m. on Wednesday to vote. Polls actually close at 7 p.m. on Tuesday. The calls went out because of a glitch with the office’s phone system, according to The Tampa Bay Times.
  • Many New Jersey voters whose polling places were displaced because of Superstorm Sandy are reporting problems via Facebook and Twitter. Voters were instructed to send applications by fax or e-mail to their county clerk’s office, and were supposed to receive ballots back once their applications were approved. But according to NJ.com, many voters reported never receiving a ballot.
  • In Ohio, a judge will rule later on Tuesday on an election-eve lawsuit alleging that voting software used at election boards in 25 of Ohio’s most populous counties could leave equipment vulnerable to ballot manipulation. The software was made by Omaha-based Elections Systems and Software, according to the Associated Press.
  • In Ross County, Ohio, elections officials told The Columbus Dispatch that a small group of people was reported to be knocking on doors claiming to be from the Board of Elections.
  • Voters across North Carolina have reported frustrations with touch-screen voting machines, saying they tried to vote for one candidate, but the ballot was cast instead for someone else. In Greensboro, the Raleigh Telegram reports that one voter tried to vote for Romney three times, but the machine changed the ballot to a vote for Obama.
Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.