Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to Indevtech for a better solution by calling (808) 529-4605.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, December 12 2018

Captcha Image

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Hackers Business Computing Google Hosted Solutions Malware Microsoft Backup Software Network Security Windows 10 Innovation Internet User Tips Data Smartphones Mobile Devices Email Browser Business Hardware Efficiency Business Continuity Productivity Computer VoIP Tech Term Ransomware Data Backup Workplace Tips Miscellaneous Disaster Recovery IT Services communications Smartphone Android Cybercrime Business Management Productivity Network Alert Chrome Data Recovery Outsourced IT Cloud Computing Windows Office Automation Managed IT Services Save Money Upgrade Server Computers Managed IT Services Telephone Systems Money Social Media Law Enforcement Small Business Artificial Intelligence Quick Tips Communication Virtualization Facebook Internet of Things Collaboration Office 365 Applications How To Cybersecurity Spam Office Tips Passwords Password App Health Router Windows 10 IT Support Social Engineering Information Operating System Mobile Device Management BDR Wi-Fi Google Drive Word Two-factor Authentication Holiday Work/Life Balance Bandwidth History Gadgets Bring Your Own Device Gmail Remote Computing Networking Settings Managed Service Keyboard Flexibility Application Safety Data Protection Entertainment Data Security Connectivity Marketing Recovery Data Breach Apps Encryption Sports Phishing Data Management Voice over Internet Protocol Private Cloud Vulnerability VPN Mobile Device Mouse Managed Service Provider HaaS Microsoft Office Scam Hacking Redundancy Downtime IT Support Software as a Service eWaste BYOD Identity Theft Big Data CES The Internet of Things Physical Security End of Support Infrastructure Paperless Office Internet Exlporer Data storage Budget Data Storage Electronic Medical Records Charger Avoiding Downtime Virtual Assistant Comparison Best Practice PDF Content Management DDoS Spam Blocking Mobility IT Management Google Docs Saving Money User Error Firewall Employer-Employee Relationship Telephone System Fraud Blockchain Website Telephony Legal IT Plan Hiring/Firing Battery Windows 7 Wearable Technology Cleaning Black Market Remote Monitoring Business Intelligence Patch Management Managed IT Unsupported Software USB Mobile Computing Update Robot Government Training Meetings Retail OneNote Human Resources Public Cloud Servers YouTube Practices Computing Infrastructure Politics Television Workers Document Management Running Cable Shadow IT Cast Computer Care Conferencing How to Excel Vendor Management Workforce Online Shopping Addiction Touchpad Transportation Travel Samsung Administrator Staff Safe Mode Streaming Media Scalability Bluetooth Trending Smart Tech Hybrid Cloud Audit Tools Unified Threat Management HVAC Social Hosted Computing Lithium-ion battery Programming Biometrics Sync Public Computer MSP WiFi Emails Shortcuts Customer Relationship Management Apple Content Tip of the week Telecommuting Evernote Cache Environment Root Cause Analysis Benefits Leadership Microchip Instant Messaging Credit Cards Computer Fan Books Current Events Camera Enterprise Content Management NarrowBand Inventory Internet exploMicrosoft Users Experience File Sharing Password Manager Machine Learning Monitor Save Time Customer Service iPhone Audiobook Windows Server 2008 SaaS Wireless Charging Wireless Internet Uninterrupted Power Supply Search Engine Digital Signature Social Networking Relocation HBO Worker Specifications Devices People Shortcut Information Technology FENG Emergency Value Knowledge Password Management Distributed Denial of Service Wireless Technology Access Control Advertising Virtual Reality Windows 10s Music Automobile Augmented Reality Business Mangement Reputation Fax Server Cortana Wire IT solutions Techology Data loss Smart Technology Bing Accountants Humor Outlook Rootkit Amazon Thought Leadership Mobile Office Going Green Network Congestion Warranty HIPAA NIST Chromecast Employer Employee Relationship Netflix Authentication Notifications Worker Commute Skype IBM Remote Worker Recycling Customers Files Education Risk Management Flash Assessment Google Apps Smart Office Tech Support Screen Mirroring Two Factor Authentication webinar Help Desk Search Frequently Asked Questions Millennials Amazon Web Services Laptop Wireless Botnet IT Consultant Printer Cryptocurrency Software Tips Computer Accessories Multi-Factor Security Remote Work Nanotechnology Maintenance Solid State Drive Troubleshooting Start Menu Supercomputer Wiring Criminal Video Games Congratulations CrashOverride Webinar Printers IT solutions Company Culture Compliance Managing Stress Regulation Thank You Twitter
QR-Code