Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Is Election Technology Solid or Simply Antiquated

Is Election Technology Solid or Simply Antiquated

Election Day in the United States is coming up quick on November 6th. It doesn’t matter what your thoughts or opinions on U.S. politics are--the fact remains that millions of Americans will be using the technology available at polling places to cast their ballots, and if this technology isn’t secured properly, the integrity of the voting system will be at risk.

Technology Found at Most Polling Places
Most polling places in America are using technology that is quickly approaching 15 years old. To put that in perspective, let’s think about some technologies and products today that haven’t even reached ten years old yet.

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

A co-founder of a nonprofit group called Open Source Election Technology, Greg Miller, has this to say about election technology: ”You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In essence, Miller describes election technology as “...obsolete hardware [and] software that relies on a diet of spare parts.”

The other co-founder of OSET, John Sebes, takes a different approach by showing just how vulnerable the systems are to manipulation. Most polling places have a portable media device, like a CD or USB drive, that must be used to transport the results to another location for the tally. The machines that count the votes are usually outdated in terms of both hardware and software. Sebes initiated a live demonstration for a national news network to show how he could influence the results of an election between two fictional candidates named Thorfer and Varda. Thorfer won with 3,000 votes while Varda received only 100, yet Sebes was able to use malware to switch the tallies around, creating a fraudulent winner. While some computers used for this purpose are secured, others are not so much.

Furthermore, there is some inconsistency in regard to whether or not polling places keep a paper backup of the vote in the event a recount is needed. This includes some of the “battleground” or “swing” states where small numbers of votes can sway the final outcome much more than in other states.

How to Minimize the Issue
The easiest way to resolve this problem is one that is just impossible to pull off. The United States Constitution specifies that each state is responsible for maintaining its own set of electoral procedures, meaning that any attempts at consistency will be made impossible. There are other ways to make progress regarding election system security, even if some of them are more low-tech than anything else.

Temporarily Cease Online Voting
Some states allow online voting for those who are abroad or are unable to make it to the polling place for whatever reason. Some even allow for email ballots. Unfortunately, security for these methods is subpar to say the least, and it should be suspended until it can be secured properly.

Use Physical Backups
Ordinarily, we would suggest that all backups be saved to the cloud. In this case, we’re dealing with something a bit different, as digital assets can be hacked. A physically-generated paper backup of the voting records is less susceptible to being tampered with, and it allows for cross-checking any results.

Invest in Improved Voting Equipment
Since the devices used in the voting process are over a decade old, it’s clear that updating this infrastructure is not a priority. Some have suggested that Congress get involved to expedite the process, creating funding opportunities to improve machines and replace older devices, but this hasn’t happened since 2002.

What are your thoughts on the current state of election technology? Let us know in the comments.

Emerging Technologies to Keep an Eye On
Just How Important Is the Data Recovery Process?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, March 22 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Malware Privacy Hosted Solutions Hackers IT Services Internet Data Network Security Productivity Outsourced IT Managed IT Services Software Productivity Data Backup Business IT Support Innovation Mobile Devices Computer Ransomware Tech Term Data Recovery Hardware Microsoft Cloud Computing Small Business Google Backup Business Continuity Internet of Things Smartphone Managed Service Provider Efficiency Remote Monitoring Android Upgrade Business Management Social Media VoIP Data Management Windows 10 Smartphones Paperless Office IT Support User Tips Encryption Disaster Recovery Workplace Tips Phishing Windows Managed IT Browser Communication Artificial Intelligence Collaboration Risk Management BYOD Cybersecurity Facebook Windows 10 Save Money Saving Money Mobile Device Server App communications Mobile Device Management Holiday Wi-Fi Document Management Unified Threat Management Bandwidth Employer-Employee Relationship Robot Compliance Bring Your Own Device Apps BDR Passwords Gmail Vendor Management Office 365 Automation Recovery Network Applications Managed IT Services Government Firewall Healthcare Scam Antivirus Project Management Hosted Solution Website Infrastructure Money Telephone Systems SaaS Data storage Going Green Vulnerability Managed Service Information Business Technology Content Filtering Wireless Microsoft Office Password Analytics Virtualization Big Data IT Management Chrome Tip of the week Customer Service Apple Quick Tips Two-factor Authentication Politics Router Social Work/Life Balance VPN Virtual Reality Miscellaneous Customer Relationship Management Computing Data loss Data Security Regulations Training Office IT Service Blockchain Printing Computers Storage File Sharing Tablet Remote Computing Files Unified Communications Help Desk YouTube Mobile Computing Software as a Service Tech Support WiFi The Internet of Things Hacker Downtime Maintenance Management Smart Technology Digital Payment Remote Monitoring and Management Upgrades Patch Management Websites Identity Theft Wireless Technology Administration Legal Twitter Net Neutrality Remote Workers Education Licensing LiFi Virtual Private Network End of Support Health IT solutions Network Management Internet Exlporer IoT HIPAA Budget Assessment Access Control Information Technology How To Monitors Server Management Mobile Security Electronic Medical Records Machine Learning Mobility Sports Operating System Alert Outlook Uninterrupted Power Supply Mouse Employees Company Culture Google Drive How To Samsung Word Settings Flexibility Users Business Growth Redundancy Chromebook Avoiding Downtime Private Cloud Spam Cabling Humor Managed Services Provider Shortcut Migration Cables Backup and Disaster Recovery Black Market Smart Tech Wasting Time Operations Drones Enterprise Content Management Finance Firefox Writing Emoji Data Warehousing Backups Employee-Employer Relationship ROI Computing Infrastructure Point of Sale Deep Learning Network Congestion Technology Assurance Group ’s 18 Solid State Drive Theft Heating/Cooling IT Consulting Current Events Cost Management E-Commerce WannaCry Computer Repair Technology Tips Chatbots Wires Human Error Time Management Networking Hacking Physical Security Database Multi-Factor Security Wearable Technology Telephony Alt Codes Vulnerabilities Authentication Retail Cortana Microsoft Excel Modem Sync Connectivity Notes Printer Alerts Law Enforcement Virtual Desktop Enterprise Resource Planning Bookmarks Display Distributed Denial of Service Annual Convention Public Cloud Cryptocurrency WPA3 Financial Servers Data Breach 3D Printing Travel Hard Drive Features Comparison Identity Botnet Permission Processors Disaster Trending Office Tips Voice over Internet Protocol Google Calendar Typing Geography Authorization Cookies Mobile Device Managment Software Tips Hacks Unsupported Software Virus PowerPoint Cooperation Gadget Best Practice Mobile Favorites Mail Merge Update Managed IT Service San Diego Automobile Computer Care Bitcoin Fleet Tracking Procurement Technology Laws Cache Electronic Health Records VoIP Sponsor Specifications Test Touchscreen Techology Star Wars Monitoring Windows 7 Legislation IT Technicians GPS Marketing High-Speed Internet Consultation Lenovo Social Engineering USB Permissions Nanotechnology Mobile Data Professional Services SharePoint Staff Gadgets Conferencing Address Break Fix Social Networking Buisness Windows 8 Save Time Asset Tracking Statistics Unified Threat Management Hotspot Crowdsourcing Meetings Recycling Cyberattacks Digital Obstacle Black Friday Roanoke — Central Technology Solutions Supercomputer Identities MSP RMM Disaster Resistance Security Cameras Utility Computing Consulting Search Dark Data Personal Information Mirgation Tracking Development Zero-Day Threat Superfish Safety Fraud Screen Reader G Suite History Bluetooth Virtual Assistant Downloads Augmented Reality Taxes Google Wallet Managing Stress Instant Messaging Dark Web Motherboard Google Maps OneNote User Error Language eWaste Read Only Spyware Course Cyber Monday technology services provider IT Budget Hard Drives Google Docs Proactive Tech Terms Proactive IT Notifications Remote Worker Hard Disk Drive IT Consultant Printers Error Cybercrime Emergency Web Server CrashOverride Cameras Motion Sickness Regulation CCTV Administrator Relocation Webcam