window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to TaylorWorks for a better solution by calling 407-478-6600.

Planning for Failing Technology Keeps You in Busin...
Tip of the Week: 5 Windows Tricks


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, October 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Managed IT Services Privacy Business Computing Hackers Data Backup Malware Email VoIP Data Recovery Outsourced IT Mobile Devices Data Hosted Solutions Tech Term Internet Microsoft Google Innovation Backup Internet of Things Cloud Computing Software Business Continuity Saving Money Hardware IT Services Ransomware Communications Android Communication Small Business BDR IT Support Cybersecurity User Tips Smartphones Efficiency Cybercrime Artificial Intelligence Browser Applications Disaster Recovery Windows 10 Law Enforcement Managed IT Workplace Tips Computer How To Gadgets Productivity Network Router Managed IT Services Business Mobile Device Management Data Protection Phishing Two-factor Authentication Save Money Chrome Computers Avoiding Downtime Virtualization Smartphone Business Intelligence IT Support Money Data Security Collaboration BYOD Business Management Windows Compliance Social Engineering Information Firewall Vulnerability Training Connectivity Passwords Remote Monitoring App Apps Identity Theft Facebook Productivity Word Telephone Systems Server Blockchain Office 365 Miscellaneous Mobility Bandwidth Analysis Alert Upgrade Proactive IT Document Management Social Media Redundancy Spam IT Management Networking VPN Unified Threat Management Infrastructure Workers Wi-Fi IT Plan Windows 7 Settings OneNote Comparison Employer-Employee Relationship Scam Sports Unsupported Software Managed Service File Sharing CES Data Storage Data Breach Encryption Machine Learning Solid State Drive Flexibility Content Management Information Technology Microsoft Office Password Budget Private Cloud Virtual Assistant Servers Credit Cards Spam Blocking Update Automation Big Data Business Owner Paperless Office Holiday Website Access Control Education Bring Your Own Device Telephone System Smart Tech Fraud Value Operating System Keyboard Data loss Mobile Computing Mobile Device Work/Life Balance End of Support Windows Server 2008 Telecommuting Windows 10 Netflix Camera Content Filter Screen Mirroring Save Time Staff Healthcare HBO Risk Management MSP Fiber-Optic Nanotechnology Professional Services Patch Management Voice over Internet Protocol PDF Practices Safe Mode Sync Amazon Web Services Health Office Tips SaaS Mouse Criminal Wire Current Events Accountants HVAC Remote Work Technology Tips Cleaning Password Manager Storage Cast Software as a Service Digital Signature Electronic Health Records Outlook Augmented Reality Remote Worker Cables Tools Virtual Reality HaaS Multi-Factor Security Google Drive Wireless Technology webinar Hosted Computing Telephony Online Shopping Black Market Content Filtering Audit Knowledge Business Technology Enterprise Content Management Regulations Instant Messaging Computer Care Virtual Private Network Business Mangement Government Hacking Marketing Hacker Frequently Asked Questions Specifications HIPAA The Internet of Things Emails Wiring Unified Communications Devices Root Cause Analysis Worker Commute Smart Office Software Tips Trending Legal Entertainment Hard Drives Conferencing Proactive Inventory Skype Evernote Battery Network Congestion IoT Password Management USB Samsung Project Management Gmail Addiction Downtime Strategy YouTube Excel Millennials Remote Computing Charger GDPR Theft Thought Leadership Meetings Botnet Computing Infrastructure Physical Security Lifestyle Remote Monitoring and Maintenance Start Menu Wireless Charging Users Computer Fan Public Cloud Electronic Medical Records IT Consultant NIST Flash Recovery Warranty Recycling Cache Data Warehousing Data Management Tip of the week Workforce Cortana E-Commerce Google Apps Streaming Media Travel FENG Human Resources Students Line of Business Authentication Mobile Managed Service Provider Wireless Leadership Insurance Cryptocurrency Amazon Windows 10s Printer eWaste Wireless Internet Google Docs Managing Stress Experience Hiring/Firing Public Speaking Rootkit Content Presentation Employer Employee Relationship Fun Internet exploMicrosoft Lithium-ion battery Music Quick Tips Printers Politics Audiobook 5G Computer Accessories Files Tech Support Advertising Safety Two Factor Authentication Wearable Technology Office IBM Twitter CrashOverride Video Games Vendor Management Transportation Colocation Bluetooth Books History Assessment Search Competition How to Relocation Customer Relationship Management Automobile IP Address Webinar Benefits Best Practice Techology Television Troubleshooting Humor Customer Service WiFi Mobile Office Company Culture Scalability IT solutions Smart Technology Internet Exlporer Public Computer Domains Worker Emergency User Error Hybrid Cloud Regulation Shadow IT Hosted Solution Loyalty

Mobile? Grab this Article!

QR-Code dieser Seite