shutterstock 99713225 TEST SIZE V8 051016


 "Only the Client can define Quality."

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to TWINTEL Solutions for a better solution by calling (888) 894-6411.

Which Browser is Best for Your Needs?
Tip of the Week: 5 Windows Tricks


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Hackers Network Security Hosted Solutions Backup Malware Mobile Devices Google Data VoIP Microsoft Business Disaster Recovery Email bgc Internet roundup Software communications nonprofit Business Continuity Outsourced IT Alert IT Services Innovation User Tips Managed IT Services Hardware Smartphones Tech Term Data Backup Productivity Managed IT Services Browser Windows 10 Computer Data Recovery Smartphone Ransomware Efficiency Cloud Computing Server Saving Money Cybercrime IT Support Android Workplace Tips Internet of Things Network BDR Communication Computers Small Business Business Management IT Support Office Windows Cybersecurity Miscellaneous Passwords Quick Tips Artificial Intelligence Save Money Productivity Mobility Telephone Systems BYOD Holiday Recovery Chrome Applications Router Gadgets Money Mobile Device Management Windows 10 Social Engineering Managed IT Mobile Device Social Media Work/Life Balance Wi-Fi Upgrade Law Enforcement Hacking Office 365 Proactive IT Virtualization Facebook Collaboration Phishing Private Cloud Automation Health Firewall Vulnerability Managed Service Provider App Microsoft Office Data Protection How To VPN Password Google Drive Compliance Remote Monitoring Bandwidth Bring Your Own Device Office Tips Information Avoiding Downtime Two-factor Authentication Flexibility Budget Word Settings Scam Safety Spam Keyboard Value Information Technology Voice over Internet Protocol Remote Computing History Software as a Service Black Market Data Security Servers HaaS Identity Theft Save Time Data Breach Operating System Sports Connectivity Business Intelligence Encryption Mobile Computing Managed Service Redundancy Apps Charger YouTube Windows 7 Fraud Data Management Google Docs USB Blockchain Virtual Assistant Unsupported Software Government Battery Content Filtering Telephony PDF Entertainment Electronic Medical Records Computing Infrastructure Data Storage Website Solid State Drive Business Owner Human Resources Telephone System Marketing Worker Emergency Employer-Employee Relationship Unified Threat Management Spam Blocking Infrastructure The Internet of Things Paperless Office Hacker IT Management Big Data Document Management Comparison SaaS Physical Security Hiring/Firing Cleaning Machine Learning Legal IT Plan Training Workers Update HIPAA CES Risk Management Computer Care End of Support Data storage Credit Cards Automobile Patch Management WiFi OneNote Content Management Samsung Wireless Technology Access Control Cortana Wire Monitor Colocation Social Supercomputer Accountants MSP Cast How to Hard Drives Thought Leadership Mouse Robot Workforce Worker Commute Microchip Television CrashOverride Mobile Bluetooth Netflix Audit Recycling Enterprise Content Management Customers Video Games Fiber-Optic Employee Leadership Authentication Google Apps Smart Office Regulations Amazon Vendor Transportation Current Events File Sharing Relocation Troubleshooting Twitter Administrator Frequently Asked Questions Files Telecommuting Search Engine Public Computer Professional Services Scalability Experience Software Tips Education Loyalty Computer Fan eWaste Password Management Skype Cables Digital Signage Nanotechnology Camera Amazon Web Services Display Benefits Knowledge Practices Augmented Reality Humor Rootkit Addiction Excel Techology Remote Work Bing Staff Regulation Meetings Apple FENG Criminal Chromecast NIST Start Menu Unified Communications Google Search Smart Tech Laptop Printers Windows 10s Password Manager Internet Exlporer Online Shopping Security Cameras Smart Technology Network Congestion Hosted Computing Remote Worker Multi-Factor Security Shadow IT Books Cache Tip of the week Help Desk Digital Signature Data loss Instant Messaging Warranty HBO iPhone Specifications Users Cryptocurrency Tools Theft Net Neutrality Employer Employee Relationship webinar Touchpad Public Cloud Business Mangement NarrowBand HVAC Flash Best Practice Evernote Content Botnet Two Factor Authentication Inventory Wiring Trending Hosted Solution Vendor Management Wireless Internet Windows Server 2008 User Error Shortcuts IBM Screen Mirroring Search Devices Printer Downtime Outlook Millennials Virtual Reality Assessment Safe Mode Wireless Politics ISP Computer Accessories Conferencing Gmail Networking Reputation Sync Advertising Wireless Charging Audiobook Smartwatch IT Consultant Going Green Data Warehousing Lifestyle E-Commerce Thank You Congratulations nonprofits GDPR