Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to Indevtech for a better solution by calling (808) 529-4605.

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Hackers Business Computing Malware Google Backup Windows 10 Internet Network Security Microsoft Software Innovation Hosted Solutions Data Smartphones Mobile Devices Email Browser Hardware Productivity VoIP Tech Term Efficiency User Tips Computer Workplace Tips Ransomware Miscellaneous Business Continuity Business Disaster Recovery Cybercrime communications Android IT Services Windows Alert Data Backup Business Management Office Smartphone Server Telephone Systems Cloud Computing Network Outsourced IT Productivity Save Money Computers Automation Managed IT Services Upgrade Small Business Quick Tips Facebook Money Law Enforcement Collaboration Artificial Intelligence Communication Data Recovery Chrome Social Media Virtualization Internet of Things Cybersecurity Managed IT Services How To Social Engineering Health Applications Password Office Tips Router Passwords Windows 10 App Spam Two-factor Authentication Bandwidth Bring Your Own Device Gadgets Gmail Operating System Wi-Fi Mobile Device Management Work/Life Balance History Remote Computing Office 365 Application Recovery Hacking Data Management Data Breach VPN Flexibility Phishing Information Safety Holiday Data Security Google Drive Word Settings Mouse Managed Service Provider Apps Data Protection Entertainment Microsoft Office Scam IT Support Connectivity Marketing Networking Private Cloud Vulnerability BDR HaaS Encryption Keyboard Sports Charger Government OneNote Wearable Technology Cleaning Public Cloud Downtime IT Support Redundancy Firewall Employer-Employee Relationship Saving Money BYOD Physical Security Meetings YouTube Hiring/Firing Data storage End of Support Data Storage Avoiding Downtime PDF Comparison eWaste Patch Management IT Management The Internet of Things Identity Theft Mobility Spam Blocking USB CES Managed Service Infrastructure Paperless Office Internet Exlporer Mobile Computing Virtual Assistant Retail Training Robot IT Plan DDoS Website Legal Best Practice Content Management Black Market Windows 7 Battery Remote Monitoring Telephone System Business Intelligence User Error Managed IT Unsupported Software Voice over Internet Protocol Fraud Mobile Device Big Data Blockchain Electronic Medical Records Budget Update Accountants Laptop Wireless Frequently Asked Questions Millennials Content Cortana Wire Search Botnet Customer Relationship Management Benefits Leadership HIPAA NIST Software Tips Multi-Factor Security Chromecast Amazon Thought Leadership Video Games Solid State Drive Mobile Office Start Menu Books Current Events Save Time Authentication Notifications Augmented Reality Experience Recycling Computing Infrastructure Cast Computer Care Touchpad Excel Workforce Audiobook SaaS Google Apps Smart Office How to Travel Tech Support Customer Service Human Resources Cryptocurrency Hybrid Cloud Trending Shortcut Worker Amazon Web Services Scalability Audit Tools Warranty Social Networking Emergency Knowledge Remote Work Nanotechnology Sync Remote Worker Music Automobile Criminal Servers Smart Technology Practices Tip of the week Telecommuting IT solutions Workers Document Management Apple Root Cause Analysis Running Cable Shadow IT Fax Server Staff Safe Mode Streaming Media Rootkit Online Shopping Addiction Instant Messaging Computer Fan Printer Network Congestion Google Docs Employer Employee Relationship Netflix Smart Tech Monitor Wiring IBM HVAC Internet exploMicrosoft Users Two Factor Authentication webinar Hosted Computing Windows Server 2008 Lithium-ion battery Risk Management Assessment iPhone Information Technology HBO Specifications Evernote Cache Relocation FENG Environment Value IT Consultant Advertising Virtual Reality NarrowBand Maintenance Computer Accessories Credit Cards Reputation Windows 10s Telephony Unified Threat Management Troubleshooting Supercomputer Enterprise Content Management Conferencing Inventory Techology MSP Politics Television Password Manager Machine Learning Data loss Digital Signature Going Green Outlook Vendor Management Wireless Charging Wireless Internet Humor Uninterrupted Power Supply Transportation Samsung Password Management Worker Commute Distributed Denial of Service Wireless Technology Bluetooth Devices Customers People Skype Camera Social Programming Biometrics Emails Access Control Flash File Sharing Public Computer Business Mangement Files Education Screen Mirroring Compliance Printers Webinar Managing Stress Regulation CrashOverride Twitter WiFi IT solutions Thank You Administrator Congratulations Company Culture
QR-Code