Infracore LLC Blog

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to Infracore LLC for a better solution by calling (858) 509-1970.

Which Browser is Best for Your Needs?
Tip of the Week: 5 Windows Tricks
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, February 19 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Network Security Hosted Solutions Microsoft Data Malware User Tips Hackers Productivity Software Innovation Backup Internet Smartphones Tech Term Business Hardware Mobile Devices Windows 10 Communications Data Backup Browser IT Services Business Continuity Smartphone Email VoIP Computer Android Cloud Computing Workplace Tips Disaster Recovery Business Management Small Business Data Recovery Outsourced IT Managed IT Services Alert Efficiency Computers Chrome Artificial Intelligence Router Ransomware Miscellaneous Communication Managed IT Services Office Network Cybersecurity Law Enforcement Internet of Things IT Support Cybercrime Windows 10 Telephone Systems How To Mobile Device Social Media Holiday Gadgets Collaboration Office 365 Productivity Password Applications Money Facebook Virtualization Passwords Health Windows Private Cloud Work/Life Balance Social Engineering Server Google Drive App Automation Information Quick Tips Saving Money Word Upgrade Wi-Fi Spam Two-factor Authentication Apps Encryption Mobile Device Management Keyboard HaaS Connectivity Office Tips Phishing IT Support Scam Data Breach BDR Data Security Microsoft Office Hacking Managed Service Data Protection Mobility Vulnerability Voice over Internet Protocol Settings Bring Your Own Device Save Money Data Storage Software as a Service Firewall Networking Blockchain Identity Theft Managed Service Provider Update Marketing Government Infrastructure OneNote Save Time Employer-Employee Relationship IT Management Charger Redundancy Battery Spam Blocking Patch Management Avoiding Downtime VPN Public Cloud Human Resources IT Plan Cleaning Servers Paperless Office Fraud Access Control Operating System Remote Computing Google Docs Worker Big Data Comparison End of Support Unsupported Software Computer Care Flexibility Machine Learning Website CES History Remote Monitoring Virtual Assistant Legal Managed IT Samsung Automobile Telephony Electronic Medical Records Training Windows 7 Bandwidth Content Management PDF Telephone System Entertainment Botnet Sports Business Intelligence BYOD USB Value Data Management User Error Vendor Management Techology Users Online Shopping Smart Tech Solid State Drive Flash File Sharing Information Technology Relocation Smart Office Administrator Hosted Computing Frequently Asked Questions Emergency Public Computer Proactive IT Content eWaste Meetings Travel Bluetooth Search Millennials Troubleshooting Loyalty NIST Hacker Cache Monitor Start Menu Camera HIPAA Shortcuts Virtual Reality Evernote Audit Smart Technology Current Events Augmented Reality Instant Messaging Multi-Factor Security Document Management Microchip Credit Cards Inventory Excel Video Games Audiobook WiFi Criminal How to Workforce IT solutions Physical Security SaaS Cryptocurrency Smartwatch Password Manager Tools Trending Humor Internet Exlporer Experience Social Worker Commute Wireless Charging Devices Computer Fan Sync Two Factor Authentication Knowledge Remote Worker Search Engine Education Tip of the week Files Data loss Risk Management Black Market Accountants Hybrid Cloud Safe Mode Employee Business Mangement Data storage Downtime Hiring/Firing Wireless Internet Warranty Staff webinar Music HVAC Vendor Cortana Thought Leadership The Internet of Things Network Congestion Wiring Bing Computing Infrastructure Amazon Authentication Windows 10s Windows Server 2008 Transportation Safety Scalability Screen Mirroring Politics Rootkit Telecommuting Apple HBO Books Assessment Digital Signage Gmail Root Cause Analysis Employer Employee Relationship Wire Printer Specifications Conferencing Internet exploMicrosoft Software Tips Wearable Technology Enterprise Content Management Display Google Apps FENG IT Consultant Unified Threat Management Wireless YouTube Help Desk Amazon Web Services Nanotechnology Benefits MSP Cast Remote Work Practices iPhone Outlook Television Google Search Best Practice Recovery Recycling Computer Accessories Mouse Digital Signature Emails Advertising Password Management Security Cameras Workers Addiction Skype Leadership Mobile Computing Company Culture Congratulations Compliance Webinar Managing Stress Regulation Net Neutrality CrashOverride Printers ISP Twitter Thank You

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

JordaBale Tip of the Week: 10 Technology Practices To Improve Business As Usual
11 February 2019
Just to make your business more progressive you have to follow some techniques and tips. In this reg...
Gabrielle Kolios Microsoft Moves to Get a Piece of the Technology as a Service Market Share
08 February 2019
The company of the Microsoft has been really now understood the technology which have to be supposed...
AngusCousens Tip of the Week: How To Enable Flash In Google Chrome
06 February 2019
Google is another popular makeup brand. Ladies can get products for eye makeup also. They can use ht...
Cannedguds These 3 Industries are Being Fundamentally Changed by Smart Technology
29 January 2019
While I support the idea of automated or driverless cars in theory, at the moment they just simply m...
Joan Cameron Tip of the Week: 4 Tools that Provide Your Employees With Greater Flexibility
21 January 2019
These are very helpful tools with we can get rid from lots of unwanted efforts of work. Best essay w...