Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to Total Tech Care for a better solution by calling 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Business Management Users Phishing Windows Upgrade Managed IT Services Ransomware Data Backup Outsourced IT Windows 10 Data Recovery Cloud Computing Office Server Save Money Windows 10 Passwords Chrome Virtualization Gadgets Social Media Saving Money Holiday Tech Term Microsoft Office Managed IT Services Automation Managed Service Facebook Computers Artificial Intelligence Cybercrime Operating System Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Health Networking IT Support Office 365 Telephone Systems Remote Information Technology Alert Covid-19 Information Spam Managed Service Provider Mobility BDR Recovery Employer-Employee Relationship Bandwidth Social Engineering Router Law Enforcement App History Mobile Computing Password Application Human Resources Money Encryption Applications Remote Monitoring Data Breach Big Data Government Office Tips Private Cloud Training How To Managed IT VPN Blockchain Paperless Office Apps Data Storage Patch Management Remote Computing Mobile Office Avoiding Downtime Data Security Flexibility Wireless Marketing WiFi IT solutions Gmail Entertainment Website Bring Your Own Device Budget Data Management Settings Work/Life Balance Two-factor Authentication Vulnerability Windows 7 Word Mouse Infrastructure Voice over Internet Protocol HaaS Google Drive Servers Data Protection Risk Management Hacker The Internet of Things Save Time Lithium-ion battery Vendor Managed Services USB Cleaning Staff Display Software as a Service Firewall Telephone System Machine Learning Virtual Reality Connectivity Conferencing Remote Work Apple End of Support Employee/Employer Relationship Education Physical Security Scam Social RMM Safety Sports User Error HIPAA Redundancy Meetings Vendor Management Keyboard Hard Drives Remote Worker Unsupported Software Digital Signage Retail Instant Messaging Best Practice Charger YouTube Robot Excel Cryptocurrency Black Market Virus Biometrics Compliance Computer Care Unified Threat Management Virtual Desktop OneNote Procurement Current Events Net Neutrality Comparison Computer Accessories Workplace Strategy Telephony Document Management CES Samsung Wireless Technology Help Desk DDoS Solid State Drive How to Printing Downtime SharePoint Content Management Value Business Technology Access Control Data storage Printer Automobile Bluetooth Spam Blocking Managed Services Provider Electronic Medical Records Customer Service Virtual Assistant Environment Authentication Database Computing Infrastructure Hiring/Firing Remote Workers Going Green Fax Server IT Consultant Processor Update SaaS Battery Shadow IT Hard Drive Humor Legal Google Docs Business Intelligence Identity Theft Network Congestion Internet Exlporer eWaste Audit Worker IT Management Computing Botnet PDF Augmented Reality IT Plan Fraud Proactive IT Wearable Technology Video Games Trend Micro Smart Tech IBM Trending Dark mode Flash Worker Commute SMS Addiction Default App Amazon Smart Technology Recycling Running Cable Experience Procedure Saving Time Memory Wiring Software Tips Scalability Shopping Practices Supercomputer Google Search dark theme Windows Media Player Sync Business Owner AI Cache User Emails IT Infrastructure Amazon Web Services PowerPoint Criminal NarrowBand Bing FinTech Safe Mode GDPR Search Social Network Hosted Computing Wireless Internet Managing Stress Netflix iPhone Investment Online Shopping Two Factor Authentication Employees Science File Sharing Root Cause Analysis Employee/Employer Relationships Camera HBO Inventory Knowledge ISP Specifications Cameras Music Windows 365 Skype Video Conferencing Wire Files ROI Evernote Chromecast Shortcuts Travel Distributed Denial of Service Customer Relationship Management Sales Data loss Bitcoin Analyitcs Printers Outlook Personal Leadership Cryptomining Millennials Troubleshooting Point of Sale Programming Start Menu Supply Chain Management Smart Office Colocation Wireless Charging Uninterrupted Power Supply Loyalty Monitoring Screen Mirroring Batteries Windows 8.1 Virtual Private Network Frequently Asked Questions Digitize Monitor Workforce Printer Server Books Antivirus Mobile Windows 10s Windows Server 2008 R2 Cables Customer relationships Windows 8 Cast Email Best Practices Project Management Tip of the week IT Assessment Nanotechnology webinar Reputation Manufacturing Telecommuting Emergency Streaming Media IT service Tech Support Professional Services Content Public Cloud Cortana Employer Employee Relationship Techology Managed IT Service Digital Signature Assessment Laptop Security Cameras Computer Tips Tablet Virtual CIO Warranty Windows Server 2008 OneDrive Customers Biometric Security Domains Tools Audiobook Peripheral HVAC Google Apps Using Data Analysis Television Touchpad IaaS Maintenance Digital Security Cameras Bloatware Administrator Copiers Devices 5G Politics Quick Tip Enterprise Content Management Advertising Accountants Consultant Public Computer Smartwatch Ergonomics Tablets MSP Entrepreneur Microchip Regulations Development Thought Leadership OLED Credit Cards Analytics Transportation Notifications Rootkit PCI DSS Password Management Computer Fan Virtual Machine Password Manager Fiber Optics Best Available Employee Multi-Factor Security Shortcut 2FA Cost Management Search Engine Messaging Twitter WIndows 7 Workers Relocation Cabling Benefits Business Mangement Social Networking Policy NIST FENG Hypervisor

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code