Publisher: North China Economic Time
HOME >> Business

Kansas Election Security Policies Under Scrutiny After Audit Reveals Gaps

A recent audit of Kansas county election security policies has revealed potential vulnerabilities and a lack of comprehensive guidance from the state level. The report, the second this year from the Kansas Legislature's auditing office, highlights inconsistencies in security practices across different counties, particularly regarding post-election voting machine testing and security measures against unauthorized access.

The audit, conducted amidst ongoing and unsubstantiated election conspiracy theories, focused on procedural aspects rather than addressing specific fraud claims. Auditors examined 15 of the state's 105 counties, finding none with truly comprehensive security policies. The discrepancies were particularly noticeable between more populous counties, which generally adhered closer to federal Election Assistance Commission best practices, and rural counties, which often lagged behind.

While some officials, like state Sen. Caryn Tyson, acknowledge the need for improvement, others, like state elections director Bryan Caskey, emphasize the diverse nature of election administration across the state's many counties. Caskey pointed out the absence of a single, universally applicable set of security best practices, making guidance an ongoing challenge.

Kansas state Rep. Kristey Williams

Secretary of State Scott Schwab's office defended its current training programs for election officials, stating they already address security issues and that more standardized policies and forms are in development. They also highlighted their role in disseminating guidance from various federal agencies. However, Rep. Kristey Williams argued for a more unified list of best practices to avoid overwhelming county clerks, especially those newly elected or in smaller counties.

Sen. Ethan Corson cautioned against imposing mandates without providing the necessary funding, particularly for rural counties, acknowledging the complexities of balancing security requirements with resource constraints.