window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORTLunch & Learn

TaylorWorks Blog

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to TaylorWorks for a better solution by calling 407-478-6600.

Planning for Failing Technology Keeps You in Busin...
Tip of the Week: 5 Windows Tricks
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, May 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Privacy Data Backup Hosted Solutions Managed IT Services Email Hackers Malware Data Recovery Internet Productivity Mobile Devices VoIP Data Innovation User Tips Google Microsoft Outsourced IT Communications Internet of Things Tech Term Efficiency IT Services Hardware Cloud Computing Software Cybersecurity Backup Business Communication Business Continuity Smartphones BDR Small Business Android Workplace Tips IT Support Artificial Intelligence Business Management Saving Money Smartphone Gadgets Ransomware Disaster Recovery Managed IT Services Windows 10 Phishing Mobile Device Cybercrime IT Support Network Router Chrome Collaboration Applications Server Browser Spam Training Encryption How To Computer Windows Law Enforcement Managed IT BYOD Social Media Holiday Avoiding Downtime Word Mobility Mobile Device Management Virtualization Two-factor Authentication Business Intelligence Passwords Access Control Blockchain Money Save Money Data Security Information Computers Proactive IT Data Protection Office 365 Users Telephone Systems Vulnerability Connectivity Settings Identity Theft File Sharing Manufacturing Education App Remote Monitoring Machine Learning Facebook Document Management Wi-Fi Servers Compliance Private Cloud Paperless Office Automation Firewall Apps Analysis Productivity Operating System Alert Redundancy IT Management Bandwidth Managed Service Voice over Internet Protocol Miscellaneous Social Engineering Software as a Service Business Technology Upgrade Remote Computing Telephony Cables Business Owner Unsupported Software Employer-Employee Relationship Wireless Bring Your Own Device Data Storage Government CES Virtual Assistant Sports OneNote Google Drive Keyboard Solid State Drive Credit Cards Flexibility Update Content Management Telephone System Data Breach Password Meetings Botnet Work/Life Balance Information Technology Augmented Reality Save Time Spam Blocking Fraud Smart Tech Data loss Hacker Mobile Computing Human Resources Value Microsoft Office Virtual Reality Scam Budget Google Docs Cryptocurrency Display VPN Big Data Infrastructure Help Desk Staff Healthcare Website IT Plan Windows 7 Virtual Private Network Networking Unified Threat Management Comparison Health Workers Digital Signature Proactive Electronic Health Records Net Neutrality SaaS Technology Tips Quick Tips Online Shopping Microchip Multi-Factor Security Cleaning Regulations Hosted Computing Project Management Current Events HaaS Employee/Employer Relationship Frequently Asked Questions Specifications GDPR Enterprise Content Management Cryptomining Recovery Windows 10 Root Cause Analysis Business Mangement eCommerce Data Management Remote Monitoring and Maintenance ISP Audit Skype Evernote Unified Communications Devices webinar Software Tips Trending Computer Care Inventory Warranty Biometric Security Knowledge Smart Office Smartwatch Excel Millennials IoT E-Commerce Password Management Database Gmail Addiction Social Vendor Management Emails Hard Drives Strategy Line of Business YouTube File Versioning Start Menu Wireless Charging Theft Thought Leadership Search Engine Conferencing Physical Security Lifestyle Employee Samsung Risk Management Wireless Technology 5G Flash Printer OLED Network Congestion Patch Management Computing Infrastructure Data Warehousing WiFi Tip of the week Workforce Camera NIST Downtime Travel Recycling Cache Vendor Charger MSP Multiple Versions Computer Fan The Internet of Things Mobile Google Apps Streaming Media Bing Public Cloud Marketing Students Digital Signage Cortana Amazon Authentication Mouse Cabling Electronic Medical Records IT Consultant Windows Server 2008 Telecommuting Insurance Distribution Black Market Content Filtering Screen Mirroring eWaste Wireless Internet Remote Worker Restore Data Instant Messaging FENG Professional Services Content Filter Hacking Managed Service Provider HBO Google Search HIPAA Windows 10s Sync Amazon Web Services Fiber-Optic Nanotechnology Administrator Default App Worker Commute Leadership End of Support Remote Work Practices Safe Mode Logistics Battery Cast Criminal Wire Security Cameras Legal Entertainment Netflix Accountants Wiring HVAC Backup and Disaster Recovery USB Office Tips Tools Password Manager Storage Shortcuts PDF Outlook Domains Employer Employee Relationship Benefits Fun Internet exploMicrosoft Best Practice Troubleshooting Files Twitter Scalability Office Public Speaking Utility Computing Computer Accessories Smart Technology Advertising Presentation Two Factor Authentication Emergency Colocation Shadow IT Hosted Solution CrashOverride History Lithium-ion battery Assessment Experience Relocation Bluetooth Search Tech Support Regulation Safety Analytics Techology IBM Content Webinar Company Culture Television Music Humor Politics Internet Exlporer Competition Printers User Error Customer Relationship Management Audiobook IT solutions Managing Stress Public Computer Wearable Technology Worker Hybrid Cloud IP Address Video Games Loyalty Transportation Hiring/Firing Books Customer Service How to Rootkit Automobile Mobile Office

Mobile? Grab this Article!

QR-Code dieser Seite