301-571-5040    Get SUPPORT

Washington Works Blog

Is Election Technology Solid or Simply Antiquated

Is Election Technology Solid or Simply Antiquated

Election Day in the United States is coming up quick on November 6th. It doesn’t matter what your thoughts or opinions on U.S. politics are--the fact remains that millions of Americans will be using the technology available at polling places to cast their ballots, and if this technology isn’t secured properly, the integrity of the voting system will be at risk.

Technology Found at Most Polling Places
Most polling places in America are using technology that is quickly approaching 15 years old. To put that in perspective, let’s think about some technologies and products today that haven’t even reached ten years old yet.

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

A co-founder of a nonprofit group called Open Source Election Technology, Greg Miller, has this to say about election technology: ”You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In essence, Miller describes election technology as “...obsolete hardware [and] software that relies on a diet of spare parts.”

The other co-founder of OSET, John Sebes, takes a different approach by showing just how vulnerable the systems are to manipulation. Most polling places have a portable media device, like a CD or USB drive, that must be used to transport the results to another location for the tally. The machines that count the votes are usually outdated in terms of both hardware and software. Sebes initiated a live demonstration for a national news network to show how he could influence the results of an election between two fictional candidates named Thorfer and Varda. Thorfer won with 3,000 votes while Varda received only 100, yet Sebes was able to use malware to switch the tallies around, creating a fraudulent winner. While some computers used for this purpose are secured, others are not so much.

Furthermore, there is some inconsistency in regard to whether or not polling places keep a paper backup of the vote in the event a recount is needed. This includes some of the “battleground” or “swing” states where small numbers of votes can sway the final outcome much more than in other states.

How to Minimize the Issue
The easiest way to resolve this problem is one that is just impossible to pull off. The United States Constitution specifies that each state is responsible for maintaining its own set of electoral procedures, meaning that any attempts at consistency will be made impossible. There are other ways to make progress regarding election system security, even if some of them are more low-tech than anything else.

Temporarily Cease Online Voting
Some states allow online voting for those who are abroad or are unable to make it to the polling place for whatever reason. Some even allow for email ballots. Unfortunately, security for these methods is subpar to say the least, and it should be suspended until it can be secured properly.

Use Physical Backups
Ordinarily, we would suggest that all backups be saved to the cloud. In this case, we’re dealing with something a bit different, as digital assets can be hacked. A physically-generated paper backup of the voting records is less susceptible to being tampered with, and it allows for cross-checking any results.

Invest in Improved Voting Equipment
Since the devices used in the voting process are over a decade old, it’s clear that updating this infrastructure is not a priority. Some have suggested that Congress get involved to expedite the process, creating funding opportunities to improve machines and replace older devices, but this hasn’t happened since 2002.

What are your thoughts on the current state of election technology? Let us know in the comments.

Emerging Technologies to Keep an Eye On
Just How Important Is the Data Recovery Process?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, March 23 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Privacy Productivity Malware Hackers Business Email Software Network Security Hosted Solutions Tech Term Internet Data Data Backup Computer IT Support Data Recovery Mobile Devices IT Services Ransomware Google Innovation Backup User Tips Managed IT Services Efficiency Cloud Computing Business Management Microsoft Small Business Productivity Outsourced IT Workplace Tips Hardware Paperless Office Android Smartphone Encryption Business Continuity Managed Service Provider Collaboration Remote Monitoring Office 365 Social Media Windows 10 Browser Phishing Managed IT Services Upgrade Smartphones Data Management Server Windows 10 Save Money Communication Holiday Government Employer-Employee Relationship Communications Disaster Recovery VoIP Bandwidth Cybersecurity Infrastructure Tip of the week Compliance Information Apps Healthcare Scam Antivirus BYOD Vulnerability Unified Threat Management IT Management Work/Life Balance Document Management Quick Tips Saving Money Facebook Business Technology Automation Windows Artificial Intelligence Risk Management BDR Wi-Fi Internet of Things App Managed Service Passwords Blockchain Vendor Management Hosted Solution Microsoft Office Politics Office Customer Relationship Management Password Big Data File Sharing VPN Money Chromebook Maintenance Virtual Reality Word Applications Network Mobile Device How To Chrome Two-factor Authentication SaaS Electronic Medical Records Tech Support G Suite Physical Security Twitter Patch Management Computing Firewall Gmail Private Cloud Hacker Computer Care Downtime Taxes Robot Regulations Professional Services Data loss IoT Storage Management Recovery Training Social Website How To Websites Remote Computing Meetings Data Security Access Control HIPAA Analytics Botnet Server Management Wireless Virtual Private Network Mobile Security Bring Your Own Device Remote Monitoring and Management Automobile Mobile Device Management Smart Technology Employees Machine Learning Alert Identity Theft Health Tablet Remote Workers Company Culture Point of Sale Router Telephone Systems Samsung Supercomputer Spyware Address Language Internet Exlporer Geography Instant Messaging ROI Comparison Monitors Connectivity Managing Stress Help Desk IBM Financial Avoiding Downtime Multi-Factor Security Mirgation Fleet Tracking Operating System GPS Personal Information Managed IT Service Modem Electronic Health Records The Internet of Things Motion Sickness Update User Error Backup and Disaster Recovery Database Monitoring IT Budget Legal Computing Infrastructure Value High-Speed Internet Finance Gadgets Budget Disaster Notes Heating/Cooling Specifications Permissions Enterprise Content Management Bookmarks Web Server Procurement Time Management Google Calendar Asset Tracking Tech Terms Office Tips Tracking Break Fix Cookies Cyberattacks Networking Printer Wearable Technology MSP Human Error Error Notifications Voice over Internet Protocol USB Consulting Digital Payment Sports Alerts Development Authentication Users IT Consultant IT Solutions Uninterrupted Power Supply PowerPoint Servers Black Friday Social Networking Computer Repair YouTube Fraud Star Wars Unified Communications Favorites Customer Service Cameras Virtualization Security Cameras Network Management Legislation Chatbots OneNote Theft Dark Web Nanotechnology Enterprise Resource Planning Files Proactive Permission Staffing Net Neutrality Managed IT Dongle Managed Services Provider Cybercrime Search Licensing Cables Authorization Upgrades Processors Virtual Assistant Cyber Monday Motherboard Settings Cost Management Project Management Law Enforcement Spam CCTV IT Support Printing Touchscreen Mouse Identity Employee-Employer Relationship Administrator Microsoft Excel Screen Reader Mobile Read Only Webcam Google Drive SharePoint Test Corporate Profile Windows 7 Outlook Service Level Agreement E-Commerce Lenovo Cooperation Wires Education Solid State Drive Software as a Service Statistics Digital Mail Merge Hotspot Assessment Vulnerabilities Conferencing Gadget Cortana Black Market Cabling Remote Worker Smart Tech Emoji VoIP Techology Downloads IT Technicians WPA3 RMM WiFi Crowdsourcing WannaCry Shortcut Distributed Denial of Service Utility Computing Features Travel Augmented Reality Firefox Superfish Unified Threat Management Staff Zero-Day Threat Relocation Cleaning Hard Disk Drive Wasting Time Bluetooth Wireless Technology 5G Hiring/Firing Safety Regulation Marketing Fun CrashOverride Competition IP Address Emergency Miscellaneous Hard Drives Mobile Office Domains Public Speaking Presentation Printers Lithium-ion battery