Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Is Election Technology Solid or Simply Antiquated

Is Election Technology Solid or Simply Antiquated

Election Day in the United States is coming up quick on November 6th. It doesn’t matter what your thoughts or opinions on U.S. politics are--the fact remains that millions of Americans will be using the technology available at polling places to cast their ballots, and if this technology isn’t secured properly, the integrity of the voting system will be at risk.

Technology Found at Most Polling Places
Most polling places in America are using technology that is quickly approaching 15 years old. To put that in perspective, let’s think about some technologies and products today that haven’t even reached ten years old yet.

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

A co-founder of a nonprofit group called Open Source Election Technology, Greg Miller, has this to say about election technology: ”You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In essence, Miller describes election technology as “...obsolete hardware [and] software that relies on a diet of spare parts.”

The other co-founder of OSET, John Sebes, takes a different approach by showing just how vulnerable the systems are to manipulation. Most polling places have a portable media device, like a CD or USB drive, that must be used to transport the results to another location for the tally. The machines that count the votes are usually outdated in terms of both hardware and software. Sebes initiated a live demonstration for a national news network to show how he could influence the results of an election between two fictional candidates named Thorfer and Varda. Thorfer won with 3,000 votes while Varda received only 100, yet Sebes was able to use malware to switch the tallies around, creating a fraudulent winner. While some computers used for this purpose are secured, others are not so much.

Furthermore, there is some inconsistency in regard to whether or not polling places keep a paper backup of the vote in the event a recount is needed. This includes some of the “battleground” or “swing” states where small numbers of votes can sway the final outcome much more than in other states.

How to Minimize the Issue
The easiest way to resolve this problem is one that is just impossible to pull off. The United States Constitution specifies that each state is responsible for maintaining its own set of electoral procedures, meaning that any attempts at consistency will be made impossible. There are other ways to make progress regarding election system security, even if some of them are more low-tech than anything else.

Temporarily Cease Online Voting
Some states allow online voting for those who are abroad or are unable to make it to the polling place for whatever reason. Some even allow for email ballots. Unfortunately, security for these methods is subpar to say the least, and it should be suspended until it can be secured properly.

Use Physical Backups
Ordinarily, we would suggest that all backups be saved to the cloud. In this case, we’re dealing with something a bit different, as digital assets can be hacked. A physically-generated paper backup of the voting records is less susceptible to being tampered with, and it allows for cross-checking any results.

Invest in Improved Voting Equipment
Since the devices used in the voting process are over a decade old, it’s clear that updating this infrastructure is not a priority. Some have suggested that Congress get involved to expedite the process, creating funding opportunities to improve machines and replace older devices, but this hasn’t happened since 2002.

What are your thoughts on the current state of election technology? Let us know in the comments.

Emerging Technologies to Keep an Eye On
Just How Important Is the Data Recovery Process?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Best Practices Cloud Technology Business Computing Email Privacy Malware Hackers Hosted Solutions IT Services Internet Productivity Managed IT Services Network Security Outsourced IT IT Support Data Software Data Backup Business Mobile Devices Microsoft Tech Term Computer Ransomware Productivity Backup Innovation Data Recovery Smartphone Managed Service Provider Business Continuity Google Internet of Things Hardware Small Business Cloud Computing Windows 10 Android Disaster Recovery Data Management Remote Monitoring Managed IT User Tips Communication Browser Artificial Intelligence Efficiency Encryption Social Media Windows Paperless Office Smartphones IT Support Facebook BYOD VoIP Workplace Tips Cybersecurity Phishing App Save Money Business Management Mobile Device Risk Management Server BDR Gmail Recovery Upgrade Mobile Device Management Network Firewall Applications Government Saving Money Unified Threat Management Robot Collaboration Going Green Apps Vulnerability Vendor Management Content Filtering Passwords Password Virtualization Windows 10 Office 365 Big Data Tip of the week Holiday Chrome Wi-Fi Document Management Project Management Compliance Bandwidth Hosted Solution Money Data storage SaaS Infrastructure Bring Your Own Device Website Telephone Systems Regulations Managed Service Office IT Service Data loss Data Security Computers Training Wireless Storage Automation Analytics Remote Computing File Sharing IT Management Help Desk Files Managed IT Services Unified Communications Apple Customer Service Healthcare Virtual Reality Antivirus Politics Employer-Employee Relationship Work/Life Balance Two-factor Authentication Miscellaneous Router Computing Customer Relationship Management End of Support Health LiFi Virtual Private Network Education Licensing Budget Network Management IT solutions Monitors Information Technology IoT Information Assessment Business Technology Internet Exlporer Server Management Printing Microsoft Office Alert How To Outlook HIPAA Mouse Blockchain Sports Uninterrupted Power Supply Machine Learning Mobility Mobile Security How To Samsung Google Drive communications Settings Tablet Chromebook Word Business Growth Flexibility Avoiding Downtime Redundancy Mobile Computing Users Social Spam Hacker Quick Tips Scam WiFi YouTube Tech Support Upgrades Remote Monitoring and Management Twitter VPN Wireless Technology Legal The Internet of Things Patch Management Digital Payment Administration Maintenance Websites Identity Theft Remote Workers Smart Technology Net Neutrality Servers Data Breach Telephony WPA3 Technology Tips Chatbots Processors Sync Enterprise Resource Planning Bookmarks Hacks Law Enforcement Permission Multi-Factor Security Wearable Technology Typing Virtual Desktop Public Cloud Hard Drive Features Microsoft Excel Office Tips Modem Bitcoin Travel Geography Authorization Printer Alerts Update Disaster Trending Best Practice Botnet Distributed Denial of Service Annual Convention Unsupported Software Virus Favorites Electronic Medical Records Technology Laws Fleet Tracking Comparison Identity Mail Merge Operating System Mobile Device Managment Mobile Software Tips Techology Gadget Test Google Calendar Social Engineering USB VoIP Sponsor Automobile Cache Computer Care Electronic Health Records Cookies Touchscreen Windows 8 Save Time High-Speed Internet Employees Access Control Cooperation Star Wars Monitoring Managed IT Service San Diego Mobile Data Consultation Lenovo Company Culture Conferencing Statistics GPS Asset Tracking Specifications Address Marketing Identities Disaster Resistance Buisness MSP Legislation IT Technicians Safety Digital Obstacle Gadgets Recycling Cyberattacks Permissions Dark Data Nanotechnology Personal Information Crowdsourcing Meetings Development Zero-Day Threat SharePoint Staff Search Google Wallet Utility Computing Supercomputer Consulting Break Fix Social Networking Superfish Google Docs G Suite Managing Stress History Instant Messaging Unified Threat Management Hotspot Bluetooth Tracking OneNote Black Friday Roanoke — Central Technology Solutions Notifications Hard Drives Proactive IT Humor Taxes Proactive Mirgation Black Market Spyware Course eWaste Google Maps Read Only Fraud Screen Reader Backups Cables Downloads Augmented Reality Writing Emoji Shortcut Drones Private Cloud IT Budget Managed Services Provider Dark Web Motherboard Solid State Drive Enterprise Content Management Cabling Finance User Error Language Network Congestion Deep Learning Employee-Employer Relationship Cyber Monday technology services provider Firefox Smart Tech Computer Repair Heating/Cooling IT Consulting Downtime Current Events Software as a Service Migration Management Point of Sale Wires Human Error Operations Retail Cortana WannaCry Alt Codes Cost Management E-Commerce Data Warehousing Physical Security Time Management Networking Cryptocurrency Vulnerabilities Authentication Computing Infrastructure Display Hacking Connectivity Technology Assurance Group ’s 18 3D Printing CrashOverride Web Server Cameras Regulation Motion Sickness CCTV Administrator Relocation Webcam Backup and Disaster Recovery Hard Disk Drive IT Consultant Printers Error Cybercrime Emergency