Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to Indevtech for a better solution by calling (808) 529-4605.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, February 17 2019

Captcha Image

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Google Hackers Hosted Solutions Backup Malware Network Security Microsoft User Tips Mobile Devices Software Windows 10 Innovation Data Internet Smartphones Email Browser Business Hardware Efficiency Productivity Tech Term VoIP Disaster Recovery communications Business Continuity IT Services Smartphone Productivity Computer Ransomware Workplace Tips Data Backup Miscellaneous Cybercrime Business Management Android Cloud Computing Office Network Automation Outsourced IT Chrome Windows Data Recovery Alert Artificial Intelligence Save Money Managed IT Services Upgrade Computers Server Managed IT Services Router Internet of Things Communication Telephone Systems Windows 10 Social Media Small Business Quick Tips Cybersecurity Virtualization Health Facebook Money Law Enforcement Collaboration Applications Wi-Fi IT Support Office 365 Password Office Tips Spam Passwords How To Mobile Device App Holiday Gadgets Social Engineering Operating System Remote Computing Mobile Device Management Settings Google Drive BDR Two-factor Authentication Private Cloud Encryption Word Work/Life Balance Bandwidth Information Bring Your Own Device Gmail History Flexibility Scam Microsoft Office Voice over Internet Protocol Managed Service Vulnerability Safety Data Protection Mobility Connectivity Networking Apps Entertainment Marketing Keyboard Application Recovery Data Breach Sports HaaS Data Security Data Management Hacking Phishing VPN Mouse Managed Service Provider Managed IT Data storage CES Robot Business Intelligence End of Support Identity Theft Retail Training Infrastructure Paperless Office eWaste Unsupported Software Software as a Service Update Virtual Assistant The Internet of Things PDF OneNote Botnet Content Management Internet Exlporer Machine Learning Social Big Data Budget Best Practice Telephone System Electronic Medical Records DDoS Redundancy Legal Blockchain Fraud Charger User Error BYOD Battery Access Control Black Market Data Storage Save Time Avoiding Downtime Saving Money Firewall Employer-Employee Relationship Wearable Technology Cleaning Comparison IT Management Google Docs Government Hiring/Firing Spam Blocking Human Resources Public Cloud Downtime IT Support Servers Patch Management USB Meetings IT Plan Website Telephony Remote Monitoring Physical Security Mobile Computing YouTube Windows 7 HVAC IT Consultant Running Cable Shadow IT Outlook Smart Tech Printer Troubleshooting Supercomputer Hacker Apple Hosted Computing Maintenance Computer Accessories Streaming Media Wiring Skype Screen Mirroring Instant Messaging Conferencing Flash Evernote Cache Politics Television Monitor Enterprise Content Management Transportation Samsung Frequently Asked Questions Millennials Internet exploMicrosoft Users Credit Cards Vendor Management Lithium-ion battery Administrator Password Manager Environment Smartwatch Software Tips Multi-Factor Security iPhone Inventory Bluetooth Unified Threat Management Solid State Drive Start Menu Public Computer Shortcuts Cast Computer Care Relocation Digital Signature Programming Biometrics Emails NarrowBand MSP Information Technology Wireless Charging Wireless Internet Travel Reputation Password Management Customer Relationship Management Benefits Leadership Excel Workforce Advertising Virtual Reality Devices Content Microchip Business Mangement Books Current Events Uninterrupted Power Supply Employee Trending Camera Audit Tools Techology Experience People Vendor WiFi Humor Accountants Distributed Denial of Service Wireless Technology File Sharing Sync Going Green Cortana Wire Search Engine Root Cause Analysis Customers HIPAA NIST Customer Service Tip of the week Telecommuting Worker Commute Amazon Thought Leadership Audiobook SaaS Recycling Social Networking Emergency Knowledge Digital Signage Files Education Authentication Shortcut Worker Computer Fan Smart Office Music Automobile Mobile Office Display Search Chromecast Augmented Reality Laptop Wireless Google Apps Bing Video Games Cryptocurrency Fax Server Smart Technology Windows Server 2008 Amazon Web Services IT solutions Notifications Criminal Network Congestion Tech Support Google Search HBO Specifications Computing Infrastructure Remote Work Nanotechnology Rootkit Warranty FENG Value Workers Document Management IBM Security Cameras How to Practices Employer Employee Relationship Netflix Remote Worker Windows 10s Touchpad Help Desk Data loss Scalability Staff Safe Mode Two Factor Authentication webinar Hybrid Cloud Online Shopping Addiction Risk Management Assessment Thank You Proactive IT Congratulations Net Neutrality CrashOverride ISP Company Culture Compliance Webinar Managing Stress Printers Regulation IT solutions Twitter
QR-Code