Video  

The State of Redistricting and the 2022 Elections

We are in the midst of one of the most rancorous redistricting sessions in our country’s history. Partisan officials – mostly but not only in conservative legislatures – are using the drawing of new congressional, state and local election districts to amass disproportionate power for themselves. How successfully can this be resisted? Meanwhile, the many independent/nonpartisan commissions established in states in recent years were meant to help avoid this problem. Are they working to do so? If so, which ones are, which ones aren’t, where and why?

Join the Ash Center and Equal Democracy Project at Harvard Law School to learn about the state of redistricting in this moment, litigation that is occurring under a dramatically weakened Voting Rights Act, and how different redistricting commissions are faring, with:

Ben Schneer, Assistant Professor of Public Policy at the Harvard Kennedy School
Mitchell Brown, Counsel, Voting Rights, Southern Coalition for Social Justice
Colleen Mathis, former Chair of the Independent Redistricting Commission of Arizona
Cathy Duvall, Managing Consultant, Fair Representation in Redistricting

Moderated by: Nick Stephanopoulos, Harvard Law School

More from this Program

Terms of Engagement – Episode One
Terms of Engagement

Podcast

Terms of Engagement – Episode One

From rank-choice voting to reconciliation, American democracy is headline news. Let’s talk about it.

In Appearance Before Congress, Bruce Schneier Raises Concerns about DOGE Data Handling Practices
Cyber image of a lock on a computer screen

Commentary

In Appearance Before Congress, Bruce Schneier Raises Concerns about DOGE Data Handling Practices

In a warning to lawmakers, cybersecurity expert Bruce Schneier testified before the House Committee on Oversight and Government Reform, sharply criticizing the Department of Government Efficiency’s (DOGE) handling of federal data. Describing DOGE’s security protocols as dangerously inadequate, Schneier warned that the agency’s practices have put sensitive government and citizen information at risk of exploitation by foreign adversaries and criminal networks.