Get Started Today!  321-259-5500

croom new

Is Election Technology Solid or Simply Antiquated

Is Election Technology Solid or Simply Antiquated

Election Day in the United States is coming up quick on November 6th. It doesn’t matter what your thoughts or opinions on U.S. politics are--the fact remains that millions of Americans will be using the technology available at polling places to cast their ballots, and if this technology isn’t secured properly, the integrity of the voting system will be at risk.

Technology Found at Most Polling Places
Most polling places in America are using technology that is quickly approaching 15 years old. To put that in perspective, let’s think about some technologies and products today that haven’t even reached ten years old yet.

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

A co-founder of a nonprofit group called Open Source Election Technology, Greg Miller, has this to say about election technology: ”You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In essence, Miller describes election technology as “...obsolete hardware [and] software that relies on a diet of spare parts.”

The other co-founder of OSET, John Sebes, takes a different approach by showing just how vulnerable the systems are to manipulation. Most polling places have a portable media device, like a CD or USB drive, that must be used to transport the results to another location for the tally. The machines that count the votes are usually outdated in terms of both hardware and software. Sebes initiated a live demonstration for a national news network to show how he could influence the results of an election between two fictional candidates named Thorfer and Varda. Thorfer won with 3,000 votes while Varda received only 100, yet Sebes was able to use malware to switch the tallies around, creating a fraudulent winner. While some computers used for this purpose are secured, others are not so much.

Furthermore, there is some inconsistency in regard to whether or not polling places keep a paper backup of the vote in the event a recount is needed. This includes some of the “battleground” or “swing” states where small numbers of votes can sway the final outcome much more than in other states.

How to Minimize the Issue
The easiest way to resolve this problem is one that is just impossible to pull off. The United States Constitution specifies that each state is responsible for maintaining its own set of electoral procedures, meaning that any attempts at consistency will be made impossible. There are other ways to make progress regarding election system security, even if some of them are more low-tech than anything else.

Temporarily Cease Online Voting
Some states allow online voting for those who are abroad or are unable to make it to the polling place for whatever reason. Some even allow for email ballots. Unfortunately, security for these methods is subpar to say the least, and it should be suspended until it can be secured properly.

Use Physical Backups
Ordinarily, we would suggest that all backups be saved to the cloud. In this case, we’re dealing with something a bit different, as digital assets can be hacked. A physically-generated paper backup of the voting records is less susceptible to being tampered with, and it allows for cross-checking any results.

Invest in Improved Voting Equipment
Since the devices used in the voting process are over a decade old, it’s clear that updating this infrastructure is not a priority. Some have suggested that Congress get involved to expedite the process, creating funding opportunities to improve machines and replace older devices, but this hasn’t happened since 2002.

What are your thoughts on the current state of election technology? Let us know in the comments.

Tech Term: Responsive Web Design
Just How Important Is the Data Recovery Process?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, May 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!

 

Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Business Malware Hosted Solutions Internet Email IT Services Productivity Network Security Data Computer Productivity Backup Mobile Devices Microsoft Software Hardware Ransomware Google Workplace Tips User Tips Efficiency Managed Service Provider Windows 10 Tech Term Android Smartphone Innovation Business Continuity Server Disaster Recovery Small Business Cloud Computing Communication Business Management Smartphones Upgrade IT Support Data Management IT Support Social Media Encryption Browser Managed IT Services Data Backup Network App Phishing BYOD Outsourced IT Office 365 Data Recovery Facebook Paperless Office Windows Artificial Intelligence Windows 10 Big Data Passwords Employer-Employee Relationship Gmail Office Internet of Things Collaboration Apps Holiday Government Mobile Device Management Vendor Management VoIP Save Money Remote Monitoring Managed IT Services Microsoft Office Hosted Solution WiFi communications Virtualization Firewall Wireless Technology Spam Risk Management Alert Recovery Wireless Cybersecurity Vulnerability Wi-Fi Saving Money Robot Chrome Two-factor Authentication Office Tips Miscellaneous How To Password Tip of the week Word Managed Service Mobile Device IT solutions Budget Content Filtering Avoiding Downtime Bandwidth Scam Work/Life Balance Analytics Website Hacker Money Customer Service Automation Document Management IT Management VPN Business Technology Settings Social Quick Tips Antivirus Infrastructure Politics Tech Support SaaS Downtime The Internet of Things Information Maintenance Twitter Remote Computing Cybercrime Healthcare Blockchain Storage Customer Relationship Management Going Green Unified Threat Management Machine Learning Education Compliance Tablet Bring Your Own Device Applications IT service BDR Data storage Virtual Reality Hard Drives Computing Apple Legal File Sharing G Suite Router Outlook Health Point of Sale Presentation Cortana Safety Taxes Upgrades Websites Telephone Systems YouTube IBM Operating System Electronic Medical Records Augmented Reality Net Neutrality Physical Security Unified Communications Cost Management How To Botnet Virtual Desktop Automobile Chromebook Lithium-ion battery Server Management Google Drive Solid State Drive Gadgets Monitors User Error Network Management Hacking Patch Management LiFi Access Control HIPAA Business Owner Networking Sports Users Management Business Intelligence Competition Data loss Samsung Printing User Computers Computer Care Administration Best Practice Data Security Running Cable Regulations Mouse eWaste Mobile Security Search Identity Theft Virtual Private Network End of Support Training Private Cloud Heating/Cooling Cooperation Spyware Black Friday Managing Stress Permission Co-managed IT Save Time Google Maps Environment Lenovo Hotspot Features Laptop Alt Codes Refrigeration Hard Drive Authorization OneDrive Retail Crowdsourcing Information Technology Supercomputer Mail Merge Microsoft Excel Wasting Time Multi-Factor Security Mirgation Voice over Internet Protocol Network Congestion Trending Staffing VoIP Dark Web Security Cameras Travel Disaster Unified Threat Management Staff Connectivity Bookmarks Analyitcs Cyber Monday Enterprise Content Management Test Error Superfish Language Modem Humor Update Halloween Typing Cache Employees Manufacturing Social Engineering Google Wallet IT Budget Servers Address Monitoring Identities Web Server Corporate Profile iPhone Google Calendar Chatbots Windows 7 Display Processors CIO Current Events GPS Time Management Shortcut ROI Motion Sickness Uninterrupted Power Supply Printer Wearable Technology IoT Favorites IT Consultant Marketing Smart Technology Vulnerabilities RMM 3D Printing Troubleshooting Computing Infrastructure Cookies Electronic Health Records Scary Stories Cryptocurrency Legislation Identity Recycling Remote Monitoring and Management Hard Disk Drives Drones Digital Payment Permissions Consulting Managed IT Mobile Computing Application Fun Cameras WannaCry Tracking FCC OneNote Notes Knowledge Hard Disk Drive Star Wars Instant Messaging Bitcoin Cleaning Firefox Statistics Distributed Denial of Service Development Tech Terms Unsupported Software Administrator Alerts Nanotechnology Files Dark Data Emoji Comparison Zero-Day Threat Solid State Drives Law Enforcement Entrepreneur Fraud Managed Services Provider Google Docs Help Desk CCTV Finance Teamwork Touchscreen Title II Employee-Employer Relationship PowerPoint Backups Personal Information Experience Law Meetings SharePoint Assessment Windows 8 Undo Bluetooth Managed IT Service Cables Theft Mobile Data Relocation IP Address Cabling Licensing Screen Reader Read Only Specifications Social Networking Company Culture Human Error Gadget Motherboard E-Commerce Business Growth Digital Internet Exlporer Authentication Shared resources Writing Notifications Public Speaking Online Remote Workers Professional Services Computer Repair Deep Learning 5G Webcam Downloads IT Technicians Black Market Buisness Hacks Break Fix Wires Financial Hiring/Firing Mobile Office Techology Smart Tech Printers Database CrashOverride Regulation Students Emergency Domains USB Wireless Internet Flexibility

      Latest Blog Entry

      Subscription-based solutions are quite popular these days, and Microsoft Office 365 is perhaps one of the most important ones on the market. However, the services provided by Office 365 are contingent upon successfully renewing the subscription, making it critical that the u...

      Account Login