k_Street Consulting, LLC Blog

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to k_Street Consulting, LLC for a better solution by calling (202) 640-2737.

Planning for Failing Technology Keeps You in Busin...
Tip of the Week: 5 Windows Tricks


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, May 27 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Applications Windows 7 ISP Vendor Management Smart Technology Video Games Best Available Password Management Education Digital Signage Holiday Shadow IT Project Management Alert PowerPoint CES Redundancy Risk Management Default App Servers Camera Unified Threat Management Net Neutrality Office Benefits Augmented Reality SharePoint Quick Tips Data Storage USB Thought Leadership Credit Cards Employee/Employer Relationship How to Windows End of Support Best Practice History Conferencing Restore Data IT Support Security Cameras analytics The Internet of Things VPN Lifestyle Compliance Automobile Managed IT Services Microsoft Cast Server Internet exploMicrosoft Mobile Device Management Monitor Worker Commute Technology Touchscreen Tools Criminal Product Reviews Mobile Devices Wireless Charging Mouse IT Solutions IBM Cost Management Smartwatch Excel Streaming Media IoT Google Screen Mirroring File Sharing Managed IT iphone Cache Storage Apple Politics Public Computer Running Cable Hosted Solutions IT Management Hackers Phishing Meetings Scalability Virtual Reality Chrome Unified Communications Best Practices Managed Service Unsupported Software Hardware Apps Display Fiber-Optic How To Computing Infrastructure Hosted Computing Archive Books Business Intelligence Router Database Gmail Trending Charger Business Technology Cortana travel Printers Content Management Content Notifications Bing Facebook Two-factor Authentication Black Market Battery HVAC Vulnerability Netflix Productivity Audiobook Small Business Colocation Upgrade Transportation Network Identity Theft Proactive Company Culture Intranet Worker Connectivity Wireless Technology Instant Messaging Productivity Virtualization Social Networking HaaS Wireless Internet Network Congestion Scam GDPR Twitter Google Drive Reputation Staff Advertising Physical Security Mobile Device Statistics Work/Life Balance Content Filtering Internet Data Warehousing Computer Repair Millennials Data Backup Browser Virtual Assistant HIPAA FENG Firewall Telecommuting Private Cloud Smart Tech Supercomputer Application Computer Care Humor Paperless Office Analysis Administrator Health Data loss Botnet Managed IT Services Fax Server Customer Service Regulations Laptop Lithium-ion battery Data Protection Wi-Fi Data Password Manager Settings Recycling Samsung Line of Business Enterprise Content Management HBO IT Plan Remote Monitoring Amazon malware VoIP Automation Read Programming Wireless Computer Fan Devices Current Events Windows Server 2008 Social Media Wiring Cryptocurrency Gadgets Keyboard Chromecast Analytic Miscellaneous Touchpad Science Bluetooth Smart Office Voice over Internet Protocol Innovation Cloud Computing Distributed Denial of Service Insurance Amazon Web Services Warranty Business Owner Communication Virus Employer-Employee Relationship Managed Service Provider Mobility Business Accountants Logistics Thank You Printer Server Tech Support Sync Search Engine Machine Learning Workplace Tips Privacy Government Hacker Bloatware Business Mangement BYOD Music Hosted Solution Search MSP Cybercrime Evernote Practices Operating System Strategy Professional Services Frequently Asked Questions People Digital Signature Computers Marketing Point of Sale Knowledge Information Audit Security Administration Outsourced IT Antivirus Root Cause Analysis Emergency Efficiency User Error avoiding downtime Business Management Hiring/Firing Hybrid Cloud Artificial Intelligence Analyitcs Consultant 5G WIndows 7 Law Enforcement Data Recovery Virtual Desktop Biometric Security SaaS Hring/Firing Networking Inventory Data Breach IaaS IT Consultant Cabling Telephony Proactive IT Nanotechnology Saving Money Spam Blocking Blockchain Internet Exlporer Solid State Drive E-Commerce Save Time Shortcut Sports Flash Memory Update Troubleshooting Big data Smartphones Ransomware IT Support Addiction Robot Gaming Console Uninterrupted Power Supply Remote Computing Tip of the week Online Shopping Biometrics Bring Your Own Device Files Legal Google Docs Shortcuts Remote Worker Access Control Computer Accessories Downtime Specifications Tech Term Data Security Healthcare Leadership Windows 10 Congratulations Encryption Environment Content Filter IT solutions Experience User Skype Relocation Human Resources Hacking Social Engineering Maintenance Virtual Private Network Windows 8 eWaste Mobile Bandwidth IT Services communications NIST Fraud Help Desk Backup and Disaster Recovery Remote Work Hard Drives Windows Media Player Software Budget Microchip Document Management Saving Time Regulation Software Tips Assessment Password Workers Emails Employer Employee Relationship Patch Management Office 365 Tip of the Week Printer Social Google Apps Tablet DDoS Digital Payment Workforce File Versioning Business Computing Multiple Versions Multi-Factor Security Website Customer Relationship Management Users Cameras Cables Two Factor Authentication Entertainment Recovery Infrastructure eCommerce Theft User Tips Internet of Things YouTube Vendor Customers Employee BDR Rootkit Loyalty Phone System Wire Google Search Disaster Recovery Remote Monitoring and Maintenance OneNote NarrowBand Mobile Office Microsoft Office Tablets Money Utility Computing Television Save Money Entrepreneur Managing Stress Cleaning Collaboration Manufacturing Start Menu Domains Cryptomining Cloud Electronic Medical Records Smartphone IT service webinar Computer Passwords Online Currency Operating Systems Distribution LinkedIn Cybersecurity Safety Wearable Technology Business Continuity WiFi Safe Mode Email PDF Authentication Outlook Word Telephone System Pain Points Office Tips Electronic Health Records OLED Training Going Green Windows 10s Information Technology Mobile Computing Software as a Service Retail Network Security Value Android App Students Spam Telephone Systems Data Management CrashOverride Techology Data storage Backup Webinar Windows 10 Public Cloud Comparison Flexibility

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *