window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to TaylorWorks for a better solution by calling 407-478-6600.

Planning for Failing Technology Keeps You in Busin...
Tip of the Week: 5 Windows Tricks
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Data Backup Privacy Hosted Solutions Managed IT Services Hackers Data Recovery Malware VoIP Mobile Devices Email Data Google User Tips Outsourced IT Innovation Tech Term Internet of Things Microsoft Cloud Computing Productivity Communications Backup Internet Business Continuity IT Services Hardware Software BDR Efficiency Cybersecurity Artificial Intelligence Saving Money Business Communication Ransomware Small Business Smartphones Smartphone IT Support Router Disaster Recovery IT Support Managed IT Services Cybercrime Android Workplace Tips Chrome Network Gadgets Browser Applications Business Management Windows 10 Phishing Computer How To Collaboration Mobile Device Law Enforcement Managed IT Virtualization Save Money Two-factor Authentication Computers Data Security Training Server Information Data Protection Money BYOD Holiday Office 365 Mobility Word Encryption Proactive IT Business Intelligence Windows Avoiding Downtime Spam Mobile Device Management Blockchain Access Control Wi-Fi Vulnerability Analysis Settings Passwords Private Cloud IT Management Redundancy Apps Voice over Internet Protocol Productivity Alert Software as a Service Managed Service Telephone Systems Automation Connectivity File Sharing Identity Theft Miscellaneous Document Management Social Engineering Machine Learning Bandwidth Upgrade Social Media Servers Compliance Remote Monitoring App Firewall Facebook Smart Tech Solid State Drive Data loss Flexibility Information Technology Mobile Computing Scam Password Human Resources OneNote Google Docs VPN Infrastructure Healthcare Data Breach IT Plan Hacker Windows 7 Microsoft Office Budget Comparison Business Owner Spam Blocking Unsupported Software Education Bring Your Own Device Big Data Telephony Business Technology Website CES Sports Data Storage Keyboard Value Operating System Health Virtual Assistant Update Credit Cards Work/Life Balance Content Management Employer-Employee Relationship Save Time Botnet Telephone System Google Drive Networking Unified Threat Management Paperless Office Workers Fraud Line of Business File Versioning NIST Tip of the week Workforce Search Engine Recycling Cache SaaS Travel Employee Hard Drives Current Events Virtual Reality Printer Google Apps Streaming Media Cleaning Mobile Students Black Market Camera Content Filtering Authentication Augmented Reality Amazon Vendor Instant Messaging MSP Multiple Versions Insurance Cryptocurrency Wireless Technology webinar Windows Server 2008 Telecommuting Hacking Bing eWaste Wireless Internet Computing Infrastructure Screen Mirroring Audit HIPAA Digital Signage Knowledge HBO Worker Commute Mouse Content Filter Computer Care Professional Services Staff Marketing Public Cloud Battery Fiber-Optic Nanotechnology The Internet of Things Emails Sync Amazon Web Services Legal Entertainment Display Remote Worker USB Restore Data Practices Cortana Safe Mode Conferencing Remote Work Help Desk Criminal Wire Cast Remote Computing Google Search Accountants HVAC Network Congestion Outlook Administrator Password Manager Storage Samsung Tools Digital Signature Managed Service Provider Electronic Health Records Downtime Multi-Factor Security Virtual Private Network Cables Charger Online Shopping Security Cameras Computer Fan Government Recovery Wiring Backup and Disaster Recovery Hosted Computing Regulations Data Management Shortcuts Users End of Support Proactive Enterprise Content Management Electronic Medical Records IT Consultant Frequently Asked Questions Specifications Microchip Business Mangement Root Cause Analysis Employee/Employer Relationship PDF Software Tips Trending Project Management Unified Communications Devices Office Tips Skype Evernote FENG GDPR Inventory Technology Tips eCommerce Smart Office Remote Monitoring and Maintenance IoT Password Management Leadership Excel Wireless Millennials Gmail Addiction Meetings HaaS Windows 10s Risk Management Smartwatch Strategy YouTube Physical Security Lifestyle Warranty Patch Management Theft Thought Leadership Windows 10 Netflix Start Menu Wireless Charging Data Warehousing WiFi E-Commerce Flash Social Music Employer Employee Relationship Presentation Colocation Regulation Politics Company Culture Lithium-ion battery History Search Relocation Audiobook Wearable Technology Computer Accessories 5G Tech Support Video Games Managing Stress Two Factor Authentication Safety Transportation IBM Techology CrashOverride Printers Books Humor Vendor Management How to Bluetooth Automobile Internet Exlporer Assessment Competition Benefits User Error Customer Relationship Management Hybrid Cloud IP Address Webinar Best Practice Troubleshooting Television Scalability Net Neutrality Hiring/Firing Smart Technology Twitter Customer Service Mobile Office Emergency IT solutions Internet exploMicrosoft Public Computer Shadow IT Hosted Solution Worker Domains Quick Tips Fun Experience ISP Utility Computing Loyalty Files Advertising Office Rootkit Public Speaking Content

Mobile? Grab this Article!

QR-Code dieser Seite