shutterstock 4600 TEST SIZE V1 051716

 

 "IT Management that You can count on."

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to TWINTEL Solutions for a better solution by calling (888) 894-6411.

Which Browser is Best for Your Needs?
Tip of the Week: 5 Windows Tricks
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Hackers Network Security Business Computing Backup Malware Hosted Solutions Mobile Devices Google VoIP Data Microsoft Email roundup nonprofit Software bgc Disaster Recovery Business Continuity Alert Innovation Internet Managed IT Services Outsourced IT communications Business Hardware IT Services Smartphones Tech Term Browser Windows 10 Data Backup Ransomware Server Managed IT Services Computer Saving Money Android Cybercrime Cloud Computing Workplace Tips User Tips Data Recovery Computers Efficiency Small Business Internet of Things IT Support Network Office Windows BDR Passwords Miscellaneous Communication Smartphone Quick Tips Save Money Business Management Productivity Telephone Systems BYOD Applications Productivity Managed IT Recovery Cybersecurity Artificial Intelligence IT Support Mobile Device Management Money Social Engineering Windows 10 Virtualization Collaboration Social Media Vulnerability Upgrade Law Enforcement Hacking Facebook Firewall Gadgets Mobility Chrome Work/Life Balance Phishing Office 365 Health Remote Monitoring Two-factor Authentication Managed Service Provider Data Protection Microsoft Office VPN Budget Proactive IT Flexibility How To Private Cloud Router Bandwidth Compliance Bring Your Own Device Office Tips App Avoiding Downtime Wi-Fi Password Automation Holiday Redundancy Information Connectivity Safety HaaS Scam Google Drive Value Information Technology Remote Computing Data Security Mobile Device Apps History Servers Black Market Identity Theft Keyboard Sports Operating System Business Intelligence Word Mobile Computing Data Breach Wireless Technology Big Data Windows 7 Fraud Computer Care YouTube Spam CES Document Management Patch Management Unsupported Software Legal OneNote Data Storage Website Encryption Managed Service Samsung Government HIPAA Content Management Save Time PDF Risk Management Solid State Drive Computing Infrastructure Charger Settings Marketing IT Management Voice over Internet Protocol The Internet of Things Electronic Medical Records Blockchain Virtual Assistant Automobile Comparison IT Plan Worker Update USB Employer-Employee Relationship Telephone System Physical Security Data Management Unified Threat Management Spam Blocking Entertainment Infrastructure Paperless Office Battery Content Filtering SaaS Hiring/Firing Credit Cards Cleaning Business Owner End of Support Data storage Emergency Training Workers Wireless Cast Google Docs Cache Downtime Employer Employee Relationship webinar Digital Signature Going Green Public Cloud Mobile Warranty Two Factor Authentication Workforce Cryptocurrency Techology Reputation Advertising Telephony Inventory Fiber-Optic Wiring Hard Drives IBM Business Mangement HVAC Monitor Colocation Vendor Management Assessment Wireless Internet Robot Shadow IT Books Computer Accessories Conferencing Regulations Amazon Professional Services Devices Printer Instant Messaging IT Consultant Frequently Asked Questions Telecommuting Safe Mode Customers Skype Access Control Cables Relocation Supercomputer Software Tips Gmail Networking Users Best Practice Content Television CrashOverride Cortana Wire Files Hosted Solution Bluetooth Netflix Accountants Amazon Web Services MSP Audit Meetings Software as a Service Thought Leadership Mouse Search Leadership Excel Remote Work Start Menu Authentication Unified Communications Humor Politics Transportation Current Events Recycling Enterprise Content Management Virtual Reality Hacker Online Shopping File Sharing Laptop Audiobook Public Computer Google Apps Multi-Factor Security Smart Office Chromecast Loyalty Computer Fan Data loss Twitter Administrator How to Apple Tip of the week Human Resources Tools Nanotechnology Theft Camera Benefits Knowledge HBO eWaste Specifications Password Management Worker Commute Internet Exlporer Flash Practices Evernote Augmented Reality Touchpad Video Games Trending Rootkit FENG Screen Mirroring WiFi Addiction NarrowBand iPhone Troubleshooting Windows Server 2008 Staff Regulation Windows 10s Smart Tech Printers Scalability Experience Smart Technology Network Congestion Outlook Criminal Millennials NIST Sync Hosted Computing Wireless Charging Remote Worker Data Warehousing Password Manager Lifestyle Machine Learning Education User Error nonprofits Thank You GDPR Congratulations E-Commerce