k_Street Consulting, LLC Blog

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to k_Street Consulting, LLC for a better solution by calling (202) 640-2737.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, February 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Television Mouse Collaboration Conferencing Black Market Windows Hiring/Firing Managed Service Spam Blocking Domains Audit Outsourced IT Content Filtering Access Control Document Management Employee/Employer Relationship Analysis Virus Social Engineering Lifestyle Sports Scam Safety Virtual Private Network Scalability Blockchain Administrator Password Manager Cleaning Software Emergency Worker Commute Multi-Factor Security Project Management Hring/Firing Microsoft Office Information Best Practices Users Laptop Memory Artificial Intelligence Legal Electronic Medical Records Excel Files Apple Cast SaaS Augmented Reality Remote Computing BYOD MSP Devices IaaS Upgrade Content Recycling Bandwidth Customer Service Big data webinar Techology IT Support Wireless Charging Amazon Robot IT solutions Lithium-ion battery Application Current Events Reputation Wiring Tip of the Week Training Professional Services Managed IT Services Social Networking Privacy Budget NarrowBand Machine Learning Servers Cloud Two-factor Authentication Comparison HVAC Mobile Device Management malware Business Continuity Disaster Recovery Samsung Archive Data loss Bloatware Telephone Systems Wireless Internet Notifications Netflix eWaste Intranet Google Docs Smartwatch Experience Smart Office Workplace Tips Gmail Music ISP Read Benefits Risk Management Operating Systems Rootkit Phishing Utility Computing Smartphone Webinar Healthcare Social Media Voice over Internet Protocol Business Technology Remote Worker Windows 7 Tech Support Automation VoIP Passwords Administration Start Menu Remote Monitoring IT Solutions Business Intelligence Mobile Product Reviews Hardware Technology Employee Data Recovery Search Engine Thought Leadership Knowledge Office 365 Entrepreneur Camera Analyitcs Enterprise Content Management Business Management Miscellaneous Frequently Asked Questions Android IoT Bing analytics Encryption Computer Managed IT Help Desk Hosted Solutions Printer IT Plan Recovery HIPAA Facebook Vendor Management Sync Network Security Internet Exlporer Shadow IT Save Time OneNote Online Shopping Customers Tools Analytic App Online Currency Fraud Server Gadgets Twitter Data Protection Humor IBM Root Cause Analysis Chrome File Versioning Computer Fan Apps PDF Evernote Regulation Thank You Hackers IT Support Email Tablet Relocation Content Filter Best Practice Point of Sale Data Storage Restore Data Google Drive Office Tips WIndows 7 Innovation BDR Digital Signature Staff Electronic Health Records Books Cybersecurity File Sharing Windows Server 2008 Holiday Hosted Computing Ransomware Retail Computer Care Proactive IT DDoS Office Applications IT Management VPN Strategy Small Business Politics Mobile Device YouTube Workforce Infrastructure Customer Relationship Management Screen Mirroring Audiobook Multiple Versions avoiding downtime Printer Server Video Games Programming Millennials Backup Environment Employer-Employee Relationship Computing Infrastructure Data Breach USB travel Google Search Vendor Windows 10 Tech Term Internet of Things Unified Threat Management WiFi Authentication Education Shortcuts communications Password Management User Saving Money Addiction Virtualization Update Business Computing Cloud Computing Hard Drives Flash Advertising Company Culture Entertainment Meetings Internet Unified Communications Gaming Console Running Cable Network Data Backup Mobile Devices Saving Time Going Green Credit Cards Security Colocation Fiber-Optic Mobility Content Management Communication Maintenance Worker Hacker Fax Server FENG Windows 10s Computer Repair Two Factor Authentication Phone System Health Uninterrupted Power Supply User Tips Regulations Public Cloud Alert Best Available Outlook Telephone System Browser Work/Life Balance Hybrid Cloud Tablets Human Resources Paperless Office Productivity Network Congestion SharePoint Printers IT service Chromecast LinkedIn Wireless Technology CES Congratulations Backup and Disaster Recovery Wireless Pain Points Virtual Desktop Botnet Virtual Assistant Monitor Supercomputer Solid State Drive Cache Charger End of Support Mobile Computing Search Unsupported Software Practices Managed IT Services Business Mangement Distributed Denial of Service Software Tips Workers Wire Transportation HBO Connectivity Downtime Nanotechnology Specifications Flexibility IT Consultant Password Vulnerability Students Theft Bring Your Own Device Insurance Google Apps Storage Business Trending Computer Accessories Virtual Reality Data Warehousing Google Patch Management Net Neutrality Cables Wearable Technology Router PowerPoint History Cameras Windows 10 Skype Safe Mode Hacking User Error Remote Monitoring and Maintenance Data Security Smart Tech Troubleshooting Loyalty E-Commerce Value Redundancy Remote Work Cryptocurrency Telephony Data Digital Payment Amazon Web Services Operating System Battery Hosted Solution eCommerce Shortcut Firewall NIST People Physical Security Emails Managing Stress IT Services Microsoft Productivity Cost Management Streaming Media Managed Service Provider Business Owner Computers iphone Efficiency Software as a Service Instant Messaging Public Computer Marketing Compliance Assessment Employer Employee Relationship Statistics How to Information Technology Warranty Law Enforcement HaaS Science Proactive Line of Business Website CrashOverride Display Tip of the week Internet exploMicrosoft Networking Spam Telecommuting Identity Theft Cybercrime Biometrics Inventory Security Cameras Microchip Accountants Private Cloud Automobile Wi-Fi Keyboard Leadership Touchpad GDPR Save Money Consultant Social Digital Signage Smart Technology Government How To Bluetooth Mobile Office Settings Smartphones Antivirus Windows 8 Criminal Quick Tips Windows Media Player Touchscreen Word The Internet of Things Money Data Management Cortana Data storage

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *