Infracore LLC Blog

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to Infracore LLC for a better solution by calling (858) 509-1970.

Which Browser is Best for Your Needs?
Tip of the Week: 5 Windows Tricks


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 16 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business computing Network Security Hackers Google Malware Microsoft Software Innovation Internet Data Tech Term Backup Smartphones Hosted Solutions Hardware Email Browser Windows 10 Business Continuity Business Mobile Devices Computer Android VoIP Managed IT Services Data Backup User Tips Alert IT Services Small Business Miscellaneous Smartphone Business Management Office Workplace Tips Communications Cloud Computing Productivity Computers Disaster Recovery Ransomware Outsourced IT Cybercrime Data Recovery Efficiency Communication Artificial Intelligence Law Enforcement How To Password Applications Internet of Things Collaboration Cybersecurity Facebook Virtualization Productivity Chrome Money Windows Passwords Network Social Media Managed IT Services Router Windows 10 Telephone Systems Office 365 Upgrade Health Work/Life Balance Gadgets Social Engineering App Saving Money Quick Tips Holiday Information Wi-Fi Mobile Device Management Phishing Apps Scam Data Breach Data Protection IT Support Data Security Word HaaS Office Tips Private Cloud Server IT Support Two-factor Authentication Vulnerability Microsoft Office Google Drive Bring Your Own Device Spam Automation Save Money Connectivity Hacking Legal VPN End of Support Paperless Office Employer-Employee Relationship History OneNote Mobility Automobile IT Management Fraud Keyboard Charger Redundancy Avoiding Downtime BDR Managed Service Spam Blocking Patch Management Comparison Virtual Assistant Data Management IT Plan Cleaning Website CES PDF Mobile Device Worker Operating System Telephone System Marketing Big Data Sports Managed Service Provider Unsupported Software Computer Care Content Management Remote Monitoring Battery Government Business Intelligence Managed IT Electronic Medical Records Samsung Blockchain Remote Computing Identity Theft Training Windows 7 Update Public Cloud Bandwidth Encryption Entertainment Settings Infrastructure BYOD USB Value Flexibility Data Storage Firewall Networking Meetings Travel Workforce Bluetooth Frequently Asked Questions Password Manager Emergency Public Computer Save Time Safe Mode Wireless Wireless Charging Devices Troubleshooting Loyalty Wireless Internet Warranty Start Menu Trending Human Resources HVAC Access Control Wiring Audit Google Docs Apple Smart Technology Current Events Best Practice Accountants Excel Business Mangement Internet exploMicrosoft Machine Learning Staff IT solutions Physical Security Cortana Thought Leadership SaaS Wire Tools Two Factor Authentication Knowledge Enterprise Content Management Information Technology Amazon Authentication Experience Unified Threat Management Computer Fan Sync Techology Users iPhone Data loss Content Telecommuting Risk Management MSP Tip of the week Gmail Advertising YouTube Specifications Hiring/Firing Search Google Apps Relocation User Error Downtime Network Congestion Password Management webinar Instant Messaging Amazon Web Services Nanotechnology Music Mobile Computing The Internet of Things Virtual Reality Voice over Internet Protocol Screen Mirroring Video Games Audiobook Remote Work Practices Monitor Politics Rootkit File Sharing Windows 10s Windows Server 2008 Recovery Recycling Transportation Safety Digital Signature Employer Employee Relationship HBO How to Workers Addiction Books Assessment Smart Office Root Cause Analysis IT Consultant NIST Conferencing Software Tips Online Shopping Smart Tech Wearable Technology Camera FENG Telephony Worker Commute Cast Hosted Computing Augmented Reality Education eWaste Benefits Millennials Computer Accessories Outlook Black Market Cache Humor Internet Exlporer Television Document Management Botnet Leadership Cryptocurrency Emails Evernote Files Skype Multi-Factor Security HIPAA Servers Scalability Credit Cards Inventory Data storage Vendor Management Remote Worker Solid State Drive Flash Computing Infrastructure Criminal Hybrid Cloud Webinar Thank You Printer CrashOverride Congratulations Twitter Mouse Company Culture Compliance Managing Stress Regulation Printers WiFi

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Isla Tait It Pays to Outsource Your IT
15 October 2018
New IT project that show us a new outcome that has been to prepare this setup that was god to know o...
ClarenceEHaynes 11 Ways to Enhance Android Security
15 October 2018
I really impressed from your working, after reading this 11 ways to enhance android security and dis...
technicalsupport VoIP Delivers Benefits That a Traditional Phone System Can’t
13 October 2018
http://Www.Office.Com/Setup | Microsoft http://Office.Com/Setup :- Office setup suite is an importan...
technicalsupport VoIP Delivers Benefits That a Traditional Phone System Can’t
13 October 2018
Office Support Helpline - http://Www.Office.Com/ Setup :- Get started with your Microsoft Office Ins...
technicalsupport VoIP Delivers Benefits That a Traditional Phone System Can’t
13 October 2018
http://Office.Com/Setup | Office Com Setup :- We offer technical support for Microsoft office setup....