XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to XFER for a better solution by calling 734-927-6666 / 800-Get-XFER.

Planning for Failing Technology Keeps You in Busin...
Tip of the Week: 5 Windows Tricks
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, December 14 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Managed Service Provider Business Computing Hosted Solutions Hackers Data Small Business Hardware Google Productivity Mobile Devices Mobile Office VoIP Email Gadgets Malware Quick Tips Efficiency Network Security Network IT Support Innovation Social Media Business Management Business IT Services Business Continuity Smartphones Server Miscellaneous Upgrade Virtualization Communication Windows User Tips Disaster Recovery Data Backup Communications Computer Microsoft Office Managed IT Services Users Mobile Device Management Browser Data Recovery Passwords Android Smartphone WiFi Holiday Save Money Marketing Ransomware Outsourced IT Alert Mobile Computing Cybercrime Tech Term BDR Vendor Management Internet of Things Chrome Operating System Remote Monitoring Cloud Computing Windows 10 BYOD Computers Information Technology Avoiding Downtime Bring Your Own Device Apple History IT Solutions Going Green Best Practice The Internet of Things Managed IT Services Artificial Intelligence Automation VPN Cybersecurity Firewall Telephone Systems Spam Big Data Current Events Remote Computing Router Application Trending Collaboration Hacking Printer Facebook Social Engineering Phone System Employer-Employee Relationship Wireless Technology Health IT Consultant Excel App Bandwidth Money Proactive IT Office Lithium-ion Battery Budget Maintenance IT Support Windows 8 Recovery Unified Threat Management Networking How To iPhone Mouse Productivity Business Managament Business Intelligence Content Filtering Windows 10 Fax Server Two-factor Authentication Office 365 Mobility Applications Analytics Information Mobile Device Apps Data Protection Blockchain PowerPoint Word Google Drive Managed IT Data Security User Error Sports Website Value Humor Customer Relationship Management Hard Drives Training Outlook Gmail Private Cloud Tutorials Virus Redundancy Law Enforcement Antivirus Phishing Encryption Software as a Service Analysis Network Congestion Downtime Digital Payment Social Networking File Sharing Memory Vulnerability Tech Support Computer Repair Managed Service Scam Conferencing Save Time Connectivity Administrator Identity Theft Search Office Tips Tablet Twitter Compliance Document Management Voice over Internet Protocol Streaming Media Risk Management Flexibility Inbound Marketing Entertainment IT Management Data Management Servers Retail Settings Human Resources Saving Time Administration Wearable Technology Content Management IT service Unsupported Software Hacker Cleaning Password OneNote Infrastructure Wireless Physical Security Public Cloud Video Surveillance SaaS Best Available Update Data Storage Paperless Office Keyboard Bluetooth USB People Piracy Telephony Robot IBM Data storage Work/Life Balance Data Breach Comparison Samsung Windows 7 Leadership Google Docs Workers Virtual Assistant Internet Exlporer eWaste PDF Computer Accessories Online Currency HaaS Point of Sale End of Support Recycling Safety Wi-Fi Government Credit Cards Telephone System YouTube Education Data loss Statistics Meetings Social Spam Blocking Access Control Instant Messaging DDoS Skype Fraud Smart Tech Webinar Environment Programming CES Solid State Drive Touchscreen IT Plan Machine Learning Help Desk Running Cable Biometrics Augmented Reality Black Market Intranet Distributed Denial of Service Files LinkedIn Tip of the week Amazon Insurance Virtual Reality Chromecast Charger Cast Smart Office WIndows 7 Telecommuting Safe Mode Hiring/Firing Tools Storage Printer Server Shortcut Net Neutrality HIPAA HVAC User Notifications Sync Cables Nanotechnology Remote Worker Worker Commute Windows 8.1 Update Managing Stress Domains Colocation Hosted Solution Windows Server 2008 Amazon Web Services Practices Bloatware Laptop Display Computer Care Search Engine Software Tips Remote Work Accountants Business Technology Science Shadow IT Debate Password Manager Addiction Virtual Private Network SharePoint Webcam Enterprise Content Management Hybrid Cloud Audit Unified Communications Wiring Macro IaaS Computing Infrastructure Netflix Online Shopping Hosted Computing Proactive Co-managed IT Entrepreneur Touchpad Staff Students Bing Tablets PC Care Legal Botnet Root Cause Analysis Business Mangement Cache Project Management Relocation Password Management Hiring/Firing 3D Start Menu Computer Fan Theft Devices GDPR Windows Media Player Virtual Desktop Scheduling Monitor Data Warehousing Supercomputer Specifications eBay Regulations Evernote Inventory Remote Monitoring and Maintenance Cost Management Digital Signature Healthcare Shortcuts HBO IoT Upgrades Analyitcs IT Security Alerts Travel Criminal Wireless Internet Warranty NIST Print Server Mobile FENG Cortana Thought Leadership E-Commerce Customer Service Reputation Knowledge Millennials Consultant nternet Internet exploMicrosoft Crowdfunding Text Messaging Patch Management Wireless Charging Line of Business Remote Support Multi-Factor Security Strategy Electronic Health Records Gaming Console 360 Frequently Asked Questions Emails NarrowBand Work Station Screen Mirroring Wire Microchip Cryptocurrency Uninterrupted Power Supply Law Firm IT Electronic Medical Records Professional Services Google Apps Content Filter Camera Cameras Customers Company Culture Workforce Licensing Advertising Flash Windows 10s Fiber-Optic Authentication MSP Business Owner Lifestyle Troubleshooting Webinar Scalability Utility Computing Thank You Printers Benefits Automobile Public Computer IT solutions How to Congratulations Techology Employer Employee Relationship CrashOverride Smart Technology Books Loyalty Experience Two Factor Authentication Content Emergency Music Worker Audiobook Battery Assessment eCommerce Regulation Video Games Rootkit Politics Transportation Television

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *