Infracore LLC Blog

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to Infracore LLC for a better solution by calling (858) 509-1970.

Which Browser is Best for Your Needs?
Tip of the Week: 5 Windows Tricks
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, December 11 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business computing Network Security Google Microsoft Hosted Solutions Hackers Malware Innovation Software Data Business Hardware Internet Smartphones Backup User Tips Tech Term Business Continuity Browser Email Windows 10 Data Backup Computer Android Mobile Devices VoIP Communications Data Recovery Business Management Smartphone IT Services Cloud Computing Productivity Outsourced IT Managed IT Services Alert Small Business Workplace Tips Miscellaneous Chrome Managed IT Services Office Efficiency Ransomware Computers Disaster Recovery Network Communication Artificial Intelligence Cybercrime Law Enforcement Collaboration Cybersecurity IT Support Productivity Router Money Passwords Windows 10 Social Media Office 365 How To Internet of Things Password Applications Telephone Systems Facebook Virtualization Windows Quick Tips Saving Money Work/Life Balance Upgrade Word Information Server App Health Spam Social Engineering Gadgets Google Drive Holiday Keyboard Data Protection Apps Mobile Device Phishing Voice over Internet Protocol Data Security HaaS Office Tips Scam Data Breach Two-factor Authentication IT Support Managed Service Vulnerability Connectivity Microsoft Office Hacking Private Cloud Wi-Fi Bring Your Own Device Mobile Device Management BDR Save Money Automation Charger IT Plan End of Support Marketing Operating System Patch Management Content Management Servers History Cleaning Business Intelligence Paperless Office Battery Unsupported Software Blockchain Remote Monitoring Worker Big Data Identity Theft Managed IT Update Computer Care Encryption PDF Telephony Infrastructure Remote Computing Windows 7 Virtual Assistant Settings Flexibility BYOD Samsung VPN Managed Service Provider Electronic Medical Records Training Human Resources Government Sports Bandwidth Telephone System Legal Data Storage Fraud Mobility Automobile Entertainment Google Docs USB Value Software as a Service OneNote Comparison Public Cloud Redundancy Firewall Networking IT Management Spam Blocking Data Management Avoiding Downtime Website CES Employer-Employee Relationship Specifications Document Management Hybrid Cloud Microchip Computer Fan Sync Smart Technology Current Events Google Apps Data storage Content Search Tip of the week Amazon Web Services Nanotechnology Cryptocurrency Data loss Instant Messaging SaaS Remote Work Practices Virtual Reality Downtime Recovery Recycling Remote Worker Experience Digital Signature Apple Search Engine The Internet of Things Two Factor Authentication Knowledge Workers Addiction Video Games Audiobook webinar Wireless Internet Internet exploMicrosoft Warranty How to Windows 10s Windows Server 2008 Online Shopping Smart Tech Safe Mode Screen Mirroring Risk Management HBO Hosted Computing HVAC Worker Commute Root Cause Analysis Hiring/Firing eWaste Wiring Software Tips Music Millennials iPhone Machine Learning Bing Education FENG Network Congestion Cache Conferencing Rootkit Multi-Factor Security HIPAA Wire Advertising Printer Black Market Transportation Safety Evernote Cast Politics Unified Threat Management Outlook Books Assessment Credit Cards Inventory Enterprise Content Management Botnet Employer Employee Relationship WiFi Criminal Relocation User Error Emails Wearable Technology Workforce YouTube Help Desk Computing Infrastructure Skype IT Consultant Password Manager MSP Scalability Trending Mouse Solid State Drive Flash Benefits Wireless Charging Devices Monitor Mobile Computing Wireless Frequently Asked Questions Television Access Control Password Management Meetings Travel Computer Accessories Accountants Start Menu Leadership Business Mangement File Sharing Vendor Management Staff Smart Office Administrator Audit Cortana Thought Leadership Best Practice Humor Internet Exlporer Camera Excel Emergency Public Computer Amazon Authentication NIST Bluetooth Information Technology IT solutions Physical Security Troubleshooting Loyalty Telecommuting Shortcuts Techology Users Tools Save Time Gmail Files Augmented Reality Twitter Regulation Printers Thank You Congratulations Webinar Company Culture Compliance Managing Stress CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Phillip Bond A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016
11 December 2018
A checklist of the components is done for the widening of the elements. The scope of the check list ...
Erickson Ferry Tip of the Week: Useful Shortcuts for Google
30 November 2018
Your blog was too good. I was exceptionally satisfied to discover this site. I needed to thank you f...
Alex Ling Would Your Users be Tricked by Social Engineering?
27 November 2018
I came to know about the user that was tricked by the users in this community this was all on social...
Daniel Mcmahon Ancient Greek Computer in Serious Need of Firmware Update
23 November 2018
Computers which are imported from the Greek now want to update the all software that is firmware tra...
Cameran Moon Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
22 November 2018
Infra core was the heart of IT they told us that if we download a wrong application it will infect o...