301-571-5040    Get SUPPORT

Washington Works Blog

Is Election Technology Solid or Simply Antiquated

Is Election Technology Solid or Simply Antiquated

Election Day in the United States is coming up quick on November 6th. It doesn’t matter what your thoughts or opinions on U.S. politics are--the fact remains that millions of Americans will be using the technology available at polling places to cast their ballots, and if this technology isn’t secured properly, the integrity of the voting system will be at risk.

Technology Found at Most Polling Places
Most polling places in America are using technology that is quickly approaching 15 years old. To put that in perspective, let’s think about some technologies and products today that haven’t even reached ten years old yet.

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

A co-founder of a nonprofit group called Open Source Election Technology, Greg Miller, has this to say about election technology: ”You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In essence, Miller describes election technology as “...obsolete hardware [and] software that relies on a diet of spare parts.”

The other co-founder of OSET, John Sebes, takes a different approach by showing just how vulnerable the systems are to manipulation. Most polling places have a portable media device, like a CD or USB drive, that must be used to transport the results to another location for the tally. The machines that count the votes are usually outdated in terms of both hardware and software. Sebes initiated a live demonstration for a national news network to show how he could influence the results of an election between two fictional candidates named Thorfer and Varda. Thorfer won with 3,000 votes while Varda received only 100, yet Sebes was able to use malware to switch the tallies around, creating a fraudulent winner. While some computers used for this purpose are secured, others are not so much.

Furthermore, there is some inconsistency in regard to whether or not polling places keep a paper backup of the vote in the event a recount is needed. This includes some of the “battleground” or “swing” states where small numbers of votes can sway the final outcome much more than in other states.

How to Minimize the Issue
The easiest way to resolve this problem is one that is just impossible to pull off. The United States Constitution specifies that each state is responsible for maintaining its own set of electoral procedures, meaning that any attempts at consistency will be made impossible. There are other ways to make progress regarding election system security, even if some of them are more low-tech than anything else.

Temporarily Cease Online Voting
Some states allow online voting for those who are abroad or are unable to make it to the polling place for whatever reason. Some even allow for email ballots. Unfortunately, security for these methods is subpar to say the least, and it should be suspended until it can be secured properly.

Use Physical Backups
Ordinarily, we would suggest that all backups be saved to the cloud. In this case, we’re dealing with something a bit different, as digital assets can be hacked. A physically-generated paper backup of the voting records is less susceptible to being tampered with, and it allows for cross-checking any results.

Invest in Improved Voting Equipment
Since the devices used in the voting process are over a decade old, it’s clear that updating this infrastructure is not a priority. Some have suggested that Congress get involved to expedite the process, creating funding opportunities to improve machines and replace older devices, but this hasn’t happened since 2002.

What are your thoughts on the current state of election technology? Let us know in the comments.

Emerging Technologies to Keep an Eye On
Just How Important Is the Data Recovery Process?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, November 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Privacy Business Computing Malware Hackers Email Business Network Security Tech Term Software Internet Productivity Hosted Solutions Computer Managed IT Services Mobile Devices Data Data Backup Backup Microsoft IT Support Ransomware User Tips Data Recovery Productivity Google Outsourced IT Efficiency Managed Service Provider IT Services Smartphone Cloud Computing Workplace Tips Android Innovation Encryption Business Continuity Windows 10 Hardware Data Management Communication Business Management Small Business Paperless Office Browser Office 365 Social Media Server Disaster Recovery Bandwidth Save Money Collaboration Government Remote Monitoring Windows 10 BDR Infrastructure Tip of the week App Cybersecurity Vulnerability Managed IT Services BYOD Unified Threat Management Phishing Artificial Intelligence Work/Life Balance Facebook Smartphones Virtual Reality Applications VoIP Risk Management How To Two-factor Authentication Network Wi-Fi Windows Internet of Things Mobile Device Antivirus Passwords SaaS Compliance Apps Holiday IT Management Managed Service Hosted Solution Customer Relationship Management Office Politics Maintenance Employer-Employee Relationship Healthcare Password Big Data Word Money Saving Money File Sharing Chromebook Document Management Chrome Communications Mobile Security Meetings Botnet Automation Smart Technology Automobile Alert Machine Learning Patch Management Health Remote Monitoring and Management Router Identity Theft Vendor Management Scam Remote Workers Tech Support Samsung Point of Sale Data loss Physical Security Twitter Blockchain Telephone Systems G Suite Computing Hacker Gmail Information Regulations How To Storage Computer Care VPN Robot IoT Firewall Taxes Quick Tips Data Security Server Management Recovery Business Technology Website Training Virtual Private Network Remote Computing HIPAA Websites Cabling Search OneNote Spam Mouse Identity Staffing Digital Upgrades Mail Merge Processors Unified Communications Favorites Wireless Cost Management SharePoint WannaCry Shortcut Enterprise Resource Planning Files Mobile Device Management Microsoft Excel Screen Reader Cybercrime VoIP Techology Proactive Permission Hard Disk Drive Bluetooth Dongle Managed Services Provider Administrator Firefox Superfish Cables Authorization Cooperation Law Enforcement CCTV Employee-Employer Relationship Tablet Spyware Address Bring Your Own Device Project Management Hotspot Assessment Webcam Test Downloads IT Technicians Education Monitors Cortana Black Market Mobile Read Only Smart Tech Avoiding Downtime Emoji Service Level Agreement E-Commerce Distributed Denial of Service Crowdsourcing Wires Employees Unified Threat Management Augmented Reality Staff Gadget Disaster Heating/Cooling Comparison WiFi Vulnerabilities Conferencing Language Internet Exlporer WPA3 IBM Multi-Factor Security Mirgation Relocation Cleaning Company Culture Connectivity Travel Time Management Electronic Medical Records Utility Computing Features Managed IT Service Modem Supercomputer Personal Information Networking Zero-Day Threat The Internet of Things User Error Uninterrupted Power Supply Servers Update Gadgets Budget Specifications GPS Geography Instant Messaging Microsoft Office Computing Infrastructure Value Legal Fleet Tracking Google Calendar Private Cloud YouTube Managing Stress Help Desk Permissions Motion Sickness Network Management Wearable Technology Managed IT Electronic Health Records Break Fix Cookies Downtime IT Budget Printer Professional Services Monitoring Users Black Friday Social Networking Office Tips Tracking Analytics Social Notifications High-Speed Internet Finance Alerts Web Server Touchscreen Sports Asset Tracking Customer Service Legislation Chatbots Error Settings IT Solutions Enterprise Content Management Bookmarks Fraud Star Wars IT Support Upgrade Access Control IT Consultant Corporate Profile Virtualization Outlook Management Cyberattacks Dark Web Nanotechnology Digital Payment Google Drive Computer Repair MSP Human Error Solid State Drive Statistics USB Consulting Cyber Monday Motherboard Lenovo Development Authentication Licensing Cameras Public Speaking Presentation Lithium-ion battery CrashOverride Wireless Technology 5G RMM Printers Safety Hiring/Firing Marketing Emergency Competition Fun IP Address Regulation Backup and Disaster Recovery Miscellaneous Mobile Office Hard Drives Domains