Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Is Election Technology Solid or Simply Antiquated

Is Election Technology Solid or Simply Antiquated

Election Day in the United States is coming up quick on November 6th. It doesn’t matter what your thoughts or opinions on U.S. politics are--the fact remains that millions of Americans will be using the technology available at polling places to cast their ballots, and if this technology isn’t secured properly, the integrity of the voting system will be at risk.

Technology Found at Most Polling Places
Most polling places in America are using technology that is quickly approaching 15 years old. To put that in perspective, let’s think about some technologies and products today that haven’t even reached ten years old yet.

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

A co-founder of a nonprofit group called Open Source Election Technology, Greg Miller, has this to say about election technology: ”You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In essence, Miller describes election technology as “...obsolete hardware [and] software that relies on a diet of spare parts.”

The other co-founder of OSET, John Sebes, takes a different approach by showing just how vulnerable the systems are to manipulation. Most polling places have a portable media device, like a CD or USB drive, that must be used to transport the results to another location for the tally. The machines that count the votes are usually outdated in terms of both hardware and software. Sebes initiated a live demonstration for a national news network to show how he could influence the results of an election between two fictional candidates named Thorfer and Varda. Thorfer won with 3,000 votes while Varda received only 100, yet Sebes was able to use malware to switch the tallies around, creating a fraudulent winner. While some computers used for this purpose are secured, others are not so much.

Furthermore, there is some inconsistency in regard to whether or not polling places keep a paper backup of the vote in the event a recount is needed. This includes some of the “battleground” or “swing” states where small numbers of votes can sway the final outcome much more than in other states.

How to Minimize the Issue
The easiest way to resolve this problem is one that is just impossible to pull off. The United States Constitution specifies that each state is responsible for maintaining its own set of electoral procedures, meaning that any attempts at consistency will be made impossible. There are other ways to make progress regarding election system security, even if some of them are more low-tech than anything else.

Temporarily Cease Online Voting
Some states allow online voting for those who are abroad or are unable to make it to the polling place for whatever reason. Some even allow for email ballots. Unfortunately, security for these methods is subpar to say the least, and it should be suspended until it can be secured properly.

Use Physical Backups
Ordinarily, we would suggest that all backups be saved to the cloud. In this case, we’re dealing with something a bit different, as digital assets can be hacked. A physically-generated paper backup of the voting records is less susceptible to being tampered with, and it allows for cross-checking any results.

Invest in Improved Voting Equipment
Since the devices used in the voting process are over a decade old, it’s clear that updating this infrastructure is not a priority. Some have suggested that Congress get involved to expedite the process, creating funding opportunities to improve machines and replace older devices, but this hasn’t happened since 2002.

What are your thoughts on the current state of election technology? Let us know in the comments.

Emerging Technologies to Keep an Eye On
Just How Important Is the Data Recovery Process?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 23 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Productivity Hosted Solutions Email Malware Privacy IT Services Network Security Hackers Internet Software Data Data Backup Outsourced IT Productivity Managed IT Services Business Computer IT Support Innovation Microsoft Data Recovery Ransomware Mobile Devices Hardware Tech Term Google Cloud Computing Small Business IT Support Business Continuity Efficiency Backup Managed Service Provider Upgrade User Tips Internet of Things Collaboration Smartphone Android Communication Business Management Phishing Paperless Office Smartphones Disaster Recovery VoIP Remote Monitoring Windows Windows 10 Save Money Artificial Intelligence Encryption Social Media Data Management Windows 10 Managed IT communications Managed IT Services Browser Server Cybersecurity Workplace Tips Facebook Mobile Device BYOD Risk Management Passwords Automation Office 365 App Mobile Device Management Holiday Quick Tips Saving Money Gmail Password Recovery Virtualization Analytics Applications Laptops Network Government Firewall Chrome Document Management Unified Threat Management Wi-Fi Employer-Employee Relationship Bandwidth Compliance Robot Bring Your Own Device Managed Service BDR Business Technology Apps Vendor Management Wireless Microsoft Office Content Filtering File Sharing Processor IT Management Big Data Help Desk Tip of the week Scam Healthcare Project Management Antivirus Money Hosted Solution Infrastructure Miscellaneous SaaS Data storage Website Telephone Systems Going Green Vulnerability Training Blockchain Information Computers Operating System Printing Storage Tablet Remote Computing Files Settings Apple Unified Communications Customer Service Users Politics Router Social Two-factor Authentication VPN Virtual Reality Work/Life Balance Downtime Customer Relationship Management Computing Data Security Regulations Data loss Office IT Service Electronic Medical Records Machine Learning Mobility Alert Mobile Security Mouse Employees Consultation Outlook Uninterrupted Power Supply Windows 7 Company Culture Sports Google Drive RMM How To Samsung Word Gadgets Business Growth Redundancy Chromebook Flexibility Avoiding Downtime Private Cloud Proactive Software as a Service Tech Support The Internet of Things Mobile Computing Hacker Spam Management WiFi Smart Technology Digital Payment Remote Monitoring and Management Upgrades YouTube Maintenance Websites Identity Theft Wireless Technology Legal Networking Twitter Net Neutrality Current Events Patch Management Licensing Remote Workers Virtual Private Network Display Administration End of Support Health Education Network Management LiFi Internet Exlporer HIPAA Budget Assessment IoT Information Technology How To Monitors IT solutions Bitcoin Server Management Access Control Cooperation Sponsor OneDrive Specifications Test Touchscreen Techology Cache Electronic Health Records VoIP Legislation IT Technicians GPS High-Speed Internet Lenovo Social Engineering USB Permissions Nanotechnology Star Wars Monitoring Conferencing Address Wireless Internet Break Fix Social Networking Windows 8 Save Time Asset Tracking Statistics Mobile Data Professional Services SharePoint Staff Digital Obstacle Marketing Manufacturing Black Friday Roanoke — Central Technology Solutions Supercomputer Identities MSP Disaster Resistance Security Cameras Unified Threat Management Hotspot Crowdsourcing Meetings Recycling Cyberattacks Transportation Mirgation Tracking Development Zero-Day Threat Superfish Safety Buisness Fraud Screen Reader G Suite History Utility Computing Consulting Search Dark Data Personal Information Taxes Google Wallet Managing Stress Instant Messaging Employer/Employee Relationships Dark Web Motherboard Google Maps OneNote Bluetooth Virtual Assistant Downloads Augmented Reality Read Only Spyware Course Hard Disk Drives Cyber Monday technology services provider IT Budget Hard Drives Google Docs Tech Terms Proactive IT Notifications Remote Worker User Error Language eWaste Migration Cables Backup and Disaster Recovery Black Market Projects Smart Tech Cabling Humor Managed Services Provider Shortcut Drones Enterprise Content Management Finance Firefox Writing Emoji Proactive Maintenance Data Warehousing Backups Employee-Employer Relationship Wasting Time Operations Network Congestion Solid State Drives Technology Assurance Group ’s 18 Solid State Drive Theft Heating/Cooling IT Consulting ROI Computing Infrastructure Point of Sale Deep Learning Computer Repair Teamwork Technology Tips Chatbots Wires Human Error Time Management Return on Investment Cybercrime Cost Management E-Commerce WannaCry Wearable Technology Telephony Alt Codes Vulnerabilities Authentication Retail Cortana Database Management Microsoft Excel Modem Sync Connectivity Hacking Physical Security Database Multi-Factor Security Enterprise Resource Planning Bookmarks Options Distributed Denial of Service Annual Convention Public Cloud Cryptocurrency WPA3 Financial Servers Data Breach 3D Printing Notes Printer Alerts Law Enforcement Shared resources Comparison Identity Botnet Permission Processors Travel Hard Drive Features Google Calendar Typing Geography Authorization GDPR Cookies Mobile Device Managment Software Tips Hacks Disaster Trending Office Tips Virtual Desktop Voice over Internet Protocol Best Practice Mobile Favorites Mail Merge Update 5G Managed IT Service San Diego Automobile Computer Care Fleet Tracking Procurement Technology Laws Unsupported Software Virus PowerPoint Gadget Regulation Motion Sickness Administrator CCTV Relocation Webcam Students Hard Disk Drive IT Consultant Printers Error Emergency CrashOverride Web Server Cameras