Get Started Today!  321-259-5500

croom new

Is Election Technology Solid or Simply Antiquated

Is Election Technology Solid or Simply Antiquated

Election Day in the United States is coming up quick on November 6th. It doesn’t matter what your thoughts or opinions on U.S. politics are--the fact remains that millions of Americans will be using the technology available at polling places to cast their ballots, and if this technology isn’t secured properly, the integrity of the voting system will be at risk.

Technology Found at Most Polling Places
Most polling places in America are using technology that is quickly approaching 15 years old. To put that in perspective, let’s think about some technologies and products today that haven’t even reached ten years old yet.

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

A co-founder of a nonprofit group called Open Source Election Technology, Greg Miller, has this to say about election technology: ”You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In essence, Miller describes election technology as “...obsolete hardware [and] software that relies on a diet of spare parts.”

The other co-founder of OSET, John Sebes, takes a different approach by showing just how vulnerable the systems are to manipulation. Most polling places have a portable media device, like a CD or USB drive, that must be used to transport the results to another location for the tally. The machines that count the votes are usually outdated in terms of both hardware and software. Sebes initiated a live demonstration for a national news network to show how he could influence the results of an election between two fictional candidates named Thorfer and Varda. Thorfer won with 3,000 votes while Varda received only 100, yet Sebes was able to use malware to switch the tallies around, creating a fraudulent winner. While some computers used for this purpose are secured, others are not so much.

Furthermore, there is some inconsistency in regard to whether or not polling places keep a paper backup of the vote in the event a recount is needed. This includes some of the “battleground” or “swing” states where small numbers of votes can sway the final outcome much more than in other states.

How to Minimize the Issue
The easiest way to resolve this problem is one that is just impossible to pull off. The United States Constitution specifies that each state is responsible for maintaining its own set of electoral procedures, meaning that any attempts at consistency will be made impossible. There are other ways to make progress regarding election system security, even if some of them are more low-tech than anything else.

Temporarily Cease Online Voting
Some states allow online voting for those who are abroad or are unable to make it to the polling place for whatever reason. Some even allow for email ballots. Unfortunately, security for these methods is subpar to say the least, and it should be suspended until it can be secured properly.

Use Physical Backups
Ordinarily, we would suggest that all backups be saved to the cloud. In this case, we’re dealing with something a bit different, as digital assets can be hacked. A physically-generated paper backup of the voting records is less susceptible to being tampered with, and it allows for cross-checking any results.

Invest in Improved Voting Equipment
Since the devices used in the voting process are over a decade old, it’s clear that updating this infrastructure is not a priority. Some have suggested that Congress get involved to expedite the process, creating funding opportunities to improve machines and replace older devices, but this hasn’t happened since 2002.

What are your thoughts on the current state of election technology? Let us know in the comments.

Tech Term: Responsive Web Design
Just How Important Is the Data Recovery Process?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, February 23 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!

 

Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Malware Business Business Computing Email Hosted Solutions Internet Productivity IT Services Computer Data Backup Network Security Mobile Devices Productivity Software Hardware Microsoft Ransomware Managed Service Provider Google User Tips Tech Term Windows 10 Efficiency Workplace Tips Smartphone Business Continuity Innovation Android Cloud Computing Disaster Recovery Small Business Social Media Business Management Data Management Server Smartphones IT Support IT Support Encryption Network Managed IT Services Browser Communication App Data Backup Outsourced IT Office 365 BYOD Facebook Data Recovery Artificial Intelligence Employer-Employee Relationship Phishing Apps Upgrade Office Paperless Office Windows Big Data Gmail Internet of Things Passwords Managed IT Services Windows 10 Government Vendor Management Mobile Device Management WiFi Save Money Holiday Remote Monitoring Hosted Solution Microsoft Office Vulnerability Alert Risk Management Firewall Wireless Technology VoIP Miscellaneous Robot Recovery Wireless Wi-Fi Collaboration Office Tips Spam Two-factor Authentication Infrastructure Quick Tips Password IT solutions Tip of the week Word Work/Life Balance Virtualization Budget Content Filtering Saving Money Bandwidth Avoiding Downtime Antivirus Social Automation Money Website Hacker Cybersecurity Customer Service Chrome Document Management How To Scam IT Management VPN Legal Downtime Tech Support Remote Computing communications Applications Information Maintenance Storage The Internet of Things Managed Service Healthcare Business Technology IT service Machine Learning Going Green Education Analytics Customer Relationship Management Unified Threat Management Data storage Virtual Reality Bring Your Own Device Apple Cybercrime Blockchain Tablet SaaS Politics Settings Computing BDR Mobile Device Hard Drives Twitter Access Control HIPAA Patch Management Identity Theft Upgrades Websites Heating/Cooling File Sharing Operating System Electronic Medical Records Training Lithium-ion battery Physical Security Hacking Router G Suite Cortana Point of Sale Chromebook Botnet Business Owner Data Security Safety Google Drive Competition YouTube Presentation Users Mobile Security Telephone Systems Taxes Monitors User Unified Communications Augmented Reality Virtual Private Network IBM eWaste Compliance Running Cable Solid State Drive Virtual Desktop Automobile User Error Cost Management How To Samsung LiFi Sports Server Management Network Management Regulations Printing Private Cloud Data loss End of Support Administration Management Business Intelligence Outlook Mouse Best Practice Health Computers Computer Care Search Laptop Alt Codes Remote Workers Professional Services Webcam 5G Humor Update Troubleshooting Co-managed IT Save Time FCC Internet Exlporer Authentication Public Speaking Marketing Networking Alerts Wires Financial Mobile Office Information Technology Statistics Distributed Denial of Service Smart Tech Printers Social Engineering Gadgets Permission Google Maps Trending Comparison Features Refrigeration Spyware Display Processors Fraud Managing Stress Halloween Typing SharePoint Wasting Time Title II Hard Drive Authorization Supercomputer 3D Printing Licensing Security Cameras Travel Disaster Managed IT Entrepreneur Google Wallet Bluetooth Managed IT Service Connectivity Bookmarks Staffing VoIP Identities Enterprise Content Management Test Error CIO Current Events Specifications Modem Social Networking Scary Stories Cryptocurrency Downloads IT Technicians Monitoring Web Server Corporate Profile Dark Data Emoji Online Cache Employees IT Budget Servers Unsupported Software Techology Cooperation ROI Motion Sickness Uninterrupted Power Supply Google Docs Help Desk Drones Break Fix IoT Favorites GPS Time Management Law Enforcement Mobile Computing Lenovo Hotspot Vulnerabilities RMM Backups Personal Information Black Friday Cookies Electronic Health Records IT Consultant Knowledge Relocation Bitcoin Multi-Factor Security Mirgation Consulting Application Cameras Fun WannaCry Mail Merge Microsoft Excel Recycling Remote Monitoring and Management Digital Payment Mobile Data Unified Threat Management Staff OneNote Notes Hard Disk Drive Environment Dark Web Star Wars Instant Messaging Tracking Gadget Superfish Language Development Tech Terms Administrator Computer Repair Cyber Monday Nanotechnology Files Cleaning Firefox Writing Notifications Experience Windows 8 Google Calendar Chatbots Managed Services Provider CCTV Black Market Address Zero-Day Threat Business Growth Printer Wearable Technology Employee-Employer Relationship Law PowerPoint Meetings Shortcut Net Neutrality Assessment Finance Touchscreen Analyitcs Computing Infrastructure Cables Theft IP Address Cabling Smart Technology Screen Reader Read Only Undo Retail Crowdsourcing iPhone Deep Learning Buisness Hacks Legislation Motherboard Identity E-Commerce Digital Network Congestion Hiring/Firing Permissions Company Culture Human Error Voice over Internet Protocol Emergency CrashOverride Regulation USB Flexibility Domains Database

      Latest Blog Entry

      When encryption is discussed, one of its high points that business professionals try to hammer home is that it’s more secure. But what does encryption really mean for businesses? Does it adequately protect data and devices? We’ll walk you through a brief rundown of how encry...

      Account Login