window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to TaylorWorks for a better solution by calling 407-478-6600.

Planning for Failing Technology Keeps You in Busin...
Tip of the Week: 5 Windows Tricks


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, December 15 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Privacy Business Computing Managed IT Services Data Backup Hackers Hosted Solutions Data Recovery Email Malware Mobile Devices VoIP Data Outsourced IT Innovation User Tips Tech Term Microsoft Google Backup Business Continuity Hardware Internet Cloud Computing BDR Saving Money Business Internet of Things Software Ransomware Cybersecurity Efficiency Communications IT Services IT Support Smartphones Managed IT Services Cybercrime Communication Small Business Android Browser Productivity Smartphone Network IT Support Disaster Recovery Applications Artificial Intelligence Chrome Workplace Tips Router Business Management Windows 10 Computer Law Enforcement Managed IT How To Gadgets Virtualization Office 365 Server Data Security Money Data Protection Information Spam Mobile Device Management Mobility BYOD Two-factor Authentication Collaboration Windows Phishing Blockchain Word Avoiding Downtime Business Intelligence Save Money Computers Miscellaneous IT Management Upgrade Redundancy Connectivity Social Media Telephone Systems Bandwidth Alert Proactive IT Holiday Voice over Internet Protocol Encryption Software as a Service Document Management Managed Service Mobile Device Social Engineering Compliance Vulnerability Identity Theft Passwords Apps Firewall Training Remote Monitoring Analysis Productivity App Servers Facebook Data Breach Solid State Drive Telephone System Flexibility Information Technology VPN Big Data Password Infrastructure Fraud Private Cloud Data loss Website Spam Blocking Automation Mobile Computing Google Docs Business Owner Value Operating System CES Sports Education Bring Your Own Device File Sharing IT Plan Keyboard Machine Learning Windows 7 Content Management Networking Wi-Fi Unified Threat Management Comparison Telephony Workers Unsupported Software Work/Life Balance Data Storage Paperless Office Access Control Settings OneNote Employer-Employee Relationship Smart Tech Virtual Assistant Google Drive Update Credit Cards Human Resources Microsoft Office Scam Budget Wireless Internet Start Menu Wireless Charging Warranty Black Market Content Filtering Insurance Cryptocurrency Emails Physical Security Lifestyle eWaste E-Commerce Instant Messaging Hard Drives Conferencing Data Warehousing WiFi Hacking Content Filter Flash Staff Healthcare Network Congestion Travel Search Engine Worker Commute Fiber-Optic Nanotechnology Samsung Tip of the week Workforce Users Line of Business HIPAA Criminal Wire Downtime Mobile Printer Battery Practices Safe Mode Charger Legal Entertainment Computing Infrastructure Camera USB Accountants HVAC Password Manager Storage Computer Fan Amazon Public Cloud Digital Signature Electronic Health Records Electronic Medical Records IT Consultant Screen Mirroring Bing Cables Windows Server 2008 Telecommuting MSP Remote Computing Professional Services Mouse Wireless Cortana Hosted Computing HBO Amazon Web Services Recovery Enterprise Content Management Windows 10 Data Management Business Mangement FENG Sync Managed Service Provider Leadership Cast Help Desk Unified Communications Devices Windows 10s Remote Work Remote Worker Smart Office Tools Administrator Inventory Netflix Outlook End of Support Online Shopping Virtual Private Network IoT Password Management Multi-Factor Security Business Technology Gmail Addiction PDF Strategy YouTube Government Shortcuts Augmented Reality Save Time Health Office Tips Theft Thought Leadership SaaS Regulations Wiring Current Events Root Cause Analysis Wireless Technology Microchip Patch Management Technology Tips Cleaning Frequently Asked Questions Specifications Proactive Risk Management Skype Evernote Project Management NIST Software Tips Trending HaaS Recycling Cache Marketing GDPR Hacker webinar The Internet of Things Google Apps Streaming Media Audit Students Knowledge Meetings Botnet Virtual Reality Authentication Computer Care Excel Millennials Remote Monitoring and Maintenance CrashOverride Competition Vendor Management Customer Relationship Management Audiobook Colocation IP Address Wearable Technology Managing Stress Bluetooth History Assessment Search Transportation Relocation Video Games Books Webinar Regulation Customer Service Mobile Office How to Automobile Techology Television Domains Benefits Humor IT solutions Best Practice Internet Exlporer Printers Troubleshooting Worker User Error Twitter Public Computer Scalability Hybrid Cloud Public Speaking Smart Technology Loyalty Presentation Emergency Lithium-ion battery Shadow IT Hosted Solution Hiring/Firing Rootkit Experience Employer Employee Relationship Fun Internet exploMicrosoft 5G Quick Tips Tech Support Safety IBM Content Music Company Culture Computer Accessories eCommerce Files Advertising Two Factor Authentication Utility Computing Office Politics

Mobile? Grab this Article!

QR-Code dieser Seite