Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to Total Tech Care for a better solution by calling 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Communication Business Continuity IT Support Smartphones Miscellaneous Smartphone Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Business Management Users Phishing Windows Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Data Recovery Server Save Money Passwords Windows 10 Virtualization Social Media Saving Money Holiday Chrome Gadgets Tech Term Automation Managed IT Services Managed Service Microsoft Office Artificial Intelligence Facebook Computers Cybercrime Operating System Wi-Fi BYOD Mobile Device Management Health Networking IT Support Hacking Internet of Things Information Technology Remote Covid-19 Spam Information Managed Service Provider Office 365 Alert Telephone Systems Recovery Employer-Employee Relationship Bandwidth Router BDR Social Engineering Mobility App History Mobile Computing Password Money Application Encryption Human Resources Applications Data Breach Remote Monitoring Law Enforcement Big Data Managed IT Office Tips How To Training Apps VPN Data Storage Patch Management Blockchain Remote Computing Paperless Office Government Mobile Office Private Cloud Flexibility Wireless Marketing Bring Your Own Device Data Management WiFi Work/Life Balance Gmail IT solutions Entertainment Website Settings Budget Vulnerability Two-factor Authentication Google Drive Windows 7 Word Mouse HaaS Avoiding Downtime Servers Infrastructure Voice over Internet Protocol Data Security The Internet of Things Cleaning Lithium-ion battery Data Protection End of Support USB Firewall Physical Security Education Conferencing Safety Virtual Reality HIPAA Scam Vendor Apple Sports Redundancy Managed Services Keyboard Staff Software as a Service Display Social Telephone System Machine Learning User Error Connectivity Vendor Management Remote Work Meetings Employee/Employer Relationship RMM Risk Management Save Time Hacker Computer Accessories Samsung Fraud Data storage Automobile Remote Worker Digital Signage DDoS Value Computing Infrastructure SharePoint Cryptocurrency Spam Blocking Electronic Medical Records Going Green Printer Procurement Bluetooth Workplace Strategy Hiring/Firing Comparison Net Neutrality Customer Service Environment Battery CES Help Desk Shadow IT Printing Legal Fax Server Content Management Internet Exlporer IT Consultant Business Technology Access Control SaaS Business Intelligence Managed Services Provider PDF Virtual Assistant Humor Audit Authentication Worker Database Network Congestion IT Management Remote Workers eWaste Proactive IT Botnet Best Practice IT Plan Processor Update YouTube Black Market Unsupported Software Hard Drive Google Docs Wearable Technology Hard Drives Charger Identity Theft Retail Instant Messaging Document Management Computing Compliance Solid State Drive Wireless Technology Robot Excel OneNote Virus Computer Care How to Downtime Biometrics Current Events Unified Threat Management Virtual Desktop Telephony Augmented Reality Search Engine Root Cause Analysis Twitter Messaging Cabling Music Colocation Uninterrupted Power Supply Managing Stress HBO NIST Policy Knowledge Business Mangement Hypervisor Dark mode Smart Tech Trend Micro Trending Skype Science Data loss Addiction SMS Cameras Amazon Default App Monitor Recycling Saving Time Troubleshooting Outlook Procedure Leadership Wiring dark theme Practices Shopping Google Search Distributed Denial of Service Customer Relationship Management Start Menu Streaming Media Analyitcs Screen Mirroring Cache AI Loyalty Amazon Web Services IT Infrastructure Reputation Content Criminal Books Bing Tech Support Programming Frequently Asked Questions Safe Mode FinTech GDPR Windows 10s Hosted Computing Social Network Techology Laptop Mobile Customers Cast Wireless Internet Printer Server Online Shopping Investment Audiobook Employee/Employer Relationships Emergency Antivirus Tip of the week File Sharing Employees webinar Windows 8 Camera Windows 365 Public Cloud Inventory Employer Employee Relationship Specifications ISP Touchpad Professional Services IT service Wire Video Conferencing Assessment Evernote ROI Politics Bitcoin Advertising Travel Shortcuts Windows Server 2008 Sales Tools Tablet Printers Point of Sale Personal Millennials Cryptomining Domains Notifications Smart Office Supply Chain Management Television Wireless Charging Batteries Monitoring Virtual Private Network Windows 8.1 Digitize Workforce IaaS Maintenance Relocation Bloatware Public Computer Cables Windows Server 2008 R2 Transportation Regulations Customer relationships Tablets Project Management Email Best Practices Consultant Computer Fan Nanotechnology IT Assessment Rootkit Video Games Telecommuting Manufacturing Entrepreneur Analytics Worker Commute Cortana Workers Experience Digital Signature Managed IT Service Benefits Security Cameras Computer Tips Warranty Virtual CIO Best Available FENG OneDrive Scalability Biometric Security Shortcut Cost Management WIndows 7 HVAC Peripheral IBM Business Owner Google Apps Analysis Using Data Smart Technology NarrowBand Social Networking Flash Digital Security Cameras Administrator Devices Copiers Search 5G iPhone Software Tips Enterprise Content Management Quick Tip Supercomputer Emails Accountants Smartwatch Running Cable Sync MSP Ergonomics Memory Microchip Thought Leadership Development Credit Cards OLED Files User Password Management PCI DSS PowerPoint Password Manager Virtual Machine Windows Media Player Netflix Fiber Optics Two Factor Authentication Multi-Factor Security Employee Chromecast 2FA

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code