Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to Total Tech Care for a better solution by calling 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Users Business Management Upgrade Phishing Windows Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Office Server Cloud Computing Save Money Windows 10 Passwords Saving Money Holiday Social Media Tech Term Gadgets Chrome Virtualization Automation Managed Service Managed IT Services Microsoft Office Facebook Operating System Cybercrime Artificial Intelligence Computers BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Health Wi-Fi Office 365 Telephone Systems Information Information Technology Managed Service Provider Remote Alert Covid-19 Spam Bandwidth Router BDR Recovery Employer-Employee Relationship Social Engineering Mobility Encryption Application Applications App History Law Enforcement Big Data Human Resources Data Breach Password Remote Monitoring Money Mobile Computing Blockchain Paperless Office Office Tips How To Training Government VPN Data Storage Private Cloud Patch Management Managed IT Remote Computing Mobile Office Apps Website Budget Data Security Google Drive Wireless Gmail Avoiding Downtime Infrastructure Voice over Internet Protocol Settings Vulnerability Windows 7 Two-factor Authentication Word Bring Your Own Device Flexibility Mouse Data Management Servers HaaS Work/Life Balance Marketing WiFi IT solutions Entertainment End of Support RMM USB Education Physical Security Risk Management Safety Telephone System Staff Software as a Service Hacker Sports HIPAA Machine Learning Redundancy Remote Work The Internet of Things Keyboard Connectivity Lithium-ion battery Conferencing Firewall Scam Save Time Virtual Reality Apple Vendor Data Protection Managed Services Social Display Cleaning Vendor Management User Error Meetings Employee/Employer Relationship Hard Drives Shadow IT Compliance Access Control Retail Legal Instant Messaging OneNote Computer Care Current Events Virtual Assistant Robot Computing Excel Telephony Internet Exlporer Authentication Biometrics Samsung IT Consultant Virtual Desktop PDF Value Digital Signage DDoS Humor Update Proactive IT Spam Blocking Electronic Medical Records SharePoint Best Practice Google Docs Identity Theft YouTube Hiring/Firing Black Market Procurement Net Neutrality Workplace Strategy Customer Service Environment Help Desk Augmented Reality Document Management Fax Server Printing Solid State Drive Fraud Wireless Technology How to Downtime Business Intelligence Remote Worker SaaS Virus Managed Services Provider Audit Worker Cryptocurrency Data storage IT Management Database Automobile Unified Threat Management Network Congestion Computer Accessories Botnet eWaste Remote Workers IT Plan Comparison Computing Infrastructure Going Green Processor CES Unsupported Software Printer Hard Drive Charger Bluetooth Business Technology Wearable Technology Battery Content Management Copiers Millennials Sync 5G Emails Printers Audiobook Smart Office Printer Server Quick Tip Wireless Charging Touchpad Smartwatch Running Cable Ergonomics Advertising Development Workforce Memory OLED Netflix Virtual Private Network Two Factor Authentication Politics PCI DSS Cables Virtual Machine Root Cause Analysis Notifications Employee Knowledge Music 2FA Fiber Optics HBO Messaging Telecommuting Skype Cabling Project Management Nanotechnology Policy Cortana Hypervisor Data loss Science Leadership Troubleshooting Dark mode Digital Signature Relocation Trend Micro Outlook SMS Start Menu Default App Warranty HVAC Video Games Procedure Google Apps Saving Time Screen Mirroring Loyalty Google Search Books Distributed Denial of Service Worker Commute dark theme Analysis Customer Relationship Management Shopping Frequently Asked Questions AI Mobile Analyitcs IT Infrastructure Windows 10s Administrator Experience Consultant Devices Enterprise Content Management Scalability Analytics FinTech Programming Cast Bing webinar MSP Emergency Business Owner Accountants Social Network Tip of the week Credit Cards Professional Services NarrowBand Investment Public Cloud Microchip Employer Employee Relationship Best Available Thought Leadership WIndows 7 Password Management Antivirus Search Employees Password Manager Employee/Employer Relationships Assessment Windows Server 2008 Windows 8 ISP Windows 365 iPhone Multi-Factor Security IT service Video Conferencing Tools ROI Search Engine Twitter Television NIST Sales Business Mangement Bitcoin Shortcuts Tablet Cryptomining Point of Sale Smart Tech Files Personal Trending Addiction Domains Supply Chain Management Amazon Chromecast Public Computer User PowerPoint Monitoring Recycling Windows Media Player Batteries Regulations Uninterrupted Power Supply Wiring Transportation IaaS Windows 8.1 Practices Maintenance Colocation Digitize Cache Amazon Web Services Bloatware Windows Server 2008 R2 Computer Fan Rootkit Managing Stress Safe Mode Customer relationships Criminal Monitor Tablets Manufacturing Workers GDPR Benefits Email Best Practices Hosted Computing IT Assessment Wireless Internet Cameras Online Shopping Entrepreneur FENG IBM File Sharing Computer Tips Reputation Managed IT Service Streaming Media Security Cameras OneDrive Specifications Flash Tech Support Biometric Security Camera Smart Technology Content Virtual CIO Inventory Shortcut Wire Techology Peripheral Evernote Cost Management Laptop Supercomputer Digital Security Cameras Social Networking Customers Using Data Travel Software Tips

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code