Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to Total Tech Care for a better solution by calling 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Upgrade Phishing Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Cloud Computing Data Recovery Office Passwords Windows 10 Gadgets Chrome Virtualization Social Media Tech Term Saving Money Holiday Microsoft Office Automation Managed Service Managed IT Services Artificial Intelligence Operating System Facebook Computers Cybercrime IT Support Wi-Fi Hacking Health BYOD Mobile Device Management Internet of Things Networking Spam Alert Remote Managed Service Provider Office 365 Telephone Systems Information Technology Covid-19 Information Social Engineering Mobility Recovery Employer-Employee Relationship Router BDR Bandwidth Remote Monitoring Big Data Password Money App History Encryption Applications Data Breach Mobile Computing Human Resources Application Law Enforcement How To Managed IT Apps Office Tips Data Storage Blockchain Patch Management Paperless Office Training VPN Government Remote Computing Private Cloud Mobile Office Bring Your Own Device Data Management Work/Life Balance Wireless Vulnerability Windows 7 Flexibility Word Gmail Marketing Google Drive WiFi Settings Servers IT solutions Infrastructure Entertainment Website Voice over Internet Protocol Budget Two-factor Authentication Avoiding Downtime Data Security Mouse HaaS User Error Save Time Meetings Cleaning Risk Management Hacker Vendor Conferencing Managed Services End of Support Telephone System Staff The Internet of Things Software as a Service Display Education Physical Security Lithium-ion battery Scam Machine Learning Safety Connectivity Remote Work Sports HIPAA Redundancy Employee/Employer Relationship RMM Vendor Management Firewall Keyboard USB Virtual Reality Apple Social Data Protection Procurement Value Workplace Strategy Data storage Comparison Net Neutrality Electronic Medical Records Wearable Technology Automobile Spam Blocking Retail CES Hard Drives Help Desk Printing Instant Messaging Excel Hiring/Firing Robot Computing Infrastructure Business Technology Content Management Going Green Access Control Biometrics Managed Services Provider Virtual Desktop Virtual Assistant Battery Authentication Virus Database Shadow IT DDoS Legal Business Intelligence Remote Workers Unified Threat Management SharePoint Computer Accessories Processor Internet Exlporer Worker Audit IT Management Update Hard Drive Botnet Customer Service PDF IT Plan Environment Google Docs Printer Identity Theft Proactive IT Bluetooth Fax Server Unsupported Software Computing Best Practice YouTube Charger SaaS Augmented Reality Black Market Compliance Fraud OneNote Computer Care IT Consultant Remote Worker Network Congestion Current Events Digital Signage eWaste Document Management Telephony Cryptocurrency Solid State Drive Humor Wireless Technology Samsung How to Downtime Amazon Web Services IT Infrastructure Skype Cache AI Files Safe Mode FinTech Shortcut Data loss Criminal Chromecast Bing GDPR Outlook Consultant Hosted Computing Social Network Cost Management Leadership Troubleshooting Online Shopping Investment Uninterrupted Power Supply Start Menu Wireless Internet Social Networking Colocation Analytics File Sharing Employees Screen Mirroring Employee/Employer Relationships Loyalty Camera Windows 365 Frequently Asked Questions Best Available Inventory Monitor Specifications ISP Books Evernote ROI Running Cable Mobile WIndows 7 Wire Video Conferencing Windows 10s Sales Cast Bitcoin Memory Travel Shortcuts Printers Point of Sale Tip of the week Personal Reputation webinar Millennials Cryptomining Streaming Media Emergency Wireless Charging Tech Support Employer Employee Relationship Content Professional Services Smart Office Supply Chain Management Public Cloud Monitoring Techology Batteries Laptop Assessment Virtual Private Network Windows 8.1 Windows Server 2008 Digitize Customers Workforce Cables Windows Server 2008 R2 Science Windows Media Player Audiobook Tools User PowerPoint Customer relationships Touchpad Television Project Management Email Best Practices Nanotechnology IT Assessment Telecommuting Manufacturing Cortana Distributed Denial of Service Politics Managing Stress Customer Relationship Management Advertising Computer Tips Digital Signature Managed IT Service Analyitcs Public Computer Security Cameras Warranty Virtual CIO Regulations OneDrive Programming Cameras Biometric Security Notifications Transportation Google Apps Rootkit HVAC Peripheral Computer Fan Digital Security Cameras Analysis Using Data Administrator Antivirus Devices Copiers Relocation Workers 5G Benefits Windows 8 Enterprise Content Management Quick Tip FENG MSP Ergonomics IT service Video Games Accountants IBM Smartwatch Microchip Worker Commute Flash Thought Leadership Development Printer Server Credit Cards OLED Smart Technology Password Manager Virtual Machine Tablet Experience Password Management PCI DSS 2FA Domains Scalability Software Tips Fiber Optics Supercomputer Multi-Factor Security Employee Search Engine Business Owner Sync Twitter Messaging Emails Cabling NIST Policy Maintenance Business Mangement Hypervisor NarrowBand IaaS Dark mode Search Smart Tech Trend Micro Bloatware Trending Amazon Default App Two Factor Authentication Addiction SMS iPhone Netflix Procedure Root Cause Analysis Recycling Saving Time Tablets Wiring dark theme HBO Practices Shopping Entrepreneur Knowledge Google Search Music

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code