Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Is Election Technology Solid or Simply Antiquated

Is Election Technology Solid or Simply Antiquated

Election Day in the United States is coming up quick on November 6th. It doesn’t matter what your thoughts or opinions on U.S. politics are--the fact remains that millions of Americans will be using the technology available at polling places to cast their ballots, and if this technology isn’t secured properly, the integrity of the voting system will be at risk.

Technology Found at Most Polling Places
Most polling places in America are using technology that is quickly approaching 15 years old. To put that in perspective, let’s think about some technologies and products today that haven’t even reached ten years old yet.

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

A co-founder of a nonprofit group called Open Source Election Technology, Greg Miller, has this to say about election technology: ”You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In essence, Miller describes election technology as “...obsolete hardware [and] software that relies on a diet of spare parts.”

The other co-founder of OSET, John Sebes, takes a different approach by showing just how vulnerable the systems are to manipulation. Most polling places have a portable media device, like a CD or USB drive, that must be used to transport the results to another location for the tally. The machines that count the votes are usually outdated in terms of both hardware and software. Sebes initiated a live demonstration for a national news network to show how he could influence the results of an election between two fictional candidates named Thorfer and Varda. Thorfer won with 3,000 votes while Varda received only 100, yet Sebes was able to use malware to switch the tallies around, creating a fraudulent winner. While some computers used for this purpose are secured, others are not so much.

Furthermore, there is some inconsistency in regard to whether or not polling places keep a paper backup of the vote in the event a recount is needed. This includes some of the “battleground” or “swing” states where small numbers of votes can sway the final outcome much more than in other states.

How to Minimize the Issue
The easiest way to resolve this problem is one that is just impossible to pull off. The United States Constitution specifies that each state is responsible for maintaining its own set of electoral procedures, meaning that any attempts at consistency will be made impossible. There are other ways to make progress regarding election system security, even if some of them are more low-tech than anything else.

Temporarily Cease Online Voting
Some states allow online voting for those who are abroad or are unable to make it to the polling place for whatever reason. Some even allow for email ballots. Unfortunately, security for these methods is subpar to say the least, and it should be suspended until it can be secured properly.

Use Physical Backups
Ordinarily, we would suggest that all backups be saved to the cloud. In this case, we’re dealing with something a bit different, as digital assets can be hacked. A physically-generated paper backup of the voting records is less susceptible to being tampered with, and it allows for cross-checking any results.

Invest in Improved Voting Equipment
Since the devices used in the voting process are over a decade old, it’s clear that updating this infrastructure is not a priority. Some have suggested that Congress get involved to expedite the process, creating funding opportunities to improve machines and replace older devices, but this hasn’t happened since 2002.

What are your thoughts on the current state of election technology? Let us know in the comments.

Emerging Technologies to Keep an Eye On
Just How Important Is the Data Recovery Process?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, January 21 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Malware Privacy Email Hosted Solutions Hackers Internet IT Services Network Security Productivity Outsourced IT Managed IT Services Software Data IT Support Data Backup Business Productivity Mobile Devices Ransomware Innovation Tech Term Computer Hardware Microsoft Data Recovery Backup Small Business Google Cloud Computing Internet of Things Smartphone Managed Service Provider Business Continuity Disaster Recovery Smartphones Android Efficiency Data Management Remote Monitoring Social Media Windows 10 Managed IT Artificial Intelligence User Tips Communication Browser VoIP Encryption Paperless Office Windows Business Management Save Money Facebook BYOD IT Support Upgrade Holiday App Collaboration Mobile Device Cybersecurity Windows 10 Risk Management Workplace Tips Mobile Device Management Phishing Firewall Government Unified Threat Management Applications communications Wi-Fi Network Server Robot Bring Your Own Device Saving Money Bandwidth BDR Managed IT Services Employer-Employee Relationship Passwords Gmail Recovery Infrastructure Virtualization Document Management Vulnerability Healthcare Big Data Chrome Money Compliance Data storage Going Green Telephone Systems SaaS IT Management Hosted Solution Vendor Management Wireless Tip of the week Website Password Scam Antivirus Project Management Apps Office 365 Content Filtering Customer Relationship Management Data loss Apple Data Security Help Desk Politics Social Customer Service Work/Life Balance Virtual Reality Unified Communications Router Computing Two-factor Authentication Miscellaneous Managed Service Training Information Regulations Printing Office IT Service Quick Tips File Sharing Blockchain Computers Microsoft Office Storage Analytics Remote Computing Automation Files Business Growth How To Samsung Private Cloud Virtual Private Network Sports Flexibility Mobile Computing Chromebook Network Management Tech Support Avoiding Downtime Hacker Assessment Business Technology Digital Payment How To Server Management Websites Identity Theft Remote Monitoring and Management Wireless Technology Legal Upgrades Uninterrupted Power Supply The Internet of Things Users Licensing Spam Remote Workers Twitter Maintenance WiFi Smart Technology YouTube Word Budget Downtime End of Support Health Information Technology Redundancy IoT Machine Learning Mobility Administration Operating System Outlook Internet Exlporer Education Monitors Mouse LiFi Tablet Employees Electronic Medical Records HIPAA Alert Company Culture VPN Access Control IT solutions Google Drive Patch Management Mobile Security Settings Hacking Permissions Nanotechnology Google Maps Development Zero-Day Threat Google Wallet Legislation IT Technicians Taxes Utility Computing Consulting IT Budget Managing Stress Instant Messaging Dark Data Personal Information SharePoint Staff OneNote Safety Hard Drives Google Docs Servers Data Breach Break Fix Social Networking eWaste Read Only Humor Unified Threat Management Hotspot Marketing Cabling Proactive Tech Terms Black Friday Roanoke — Central Technology Solutions Notifications Backups Disaster Trending Fraud Screen Reader Gadgets Cables Backup and Disaster Recovery Drones Mirgation Buisness Managed Services Provider Security Cameras Enterprise Content Management Finance Deep Learning Mail Merge Downloads Augmented Reality Point of Sale Employee-Employer Relationship Solid State Drive Black Market Technology Laws Dark Web Motherboard Management Current Events VoIP Sponsor User Error Language Theft Writing Emoji Touchscreen Techology Cyber Monday technology services provider Smart Tech Sync Wires Human Error Network Congestion Alt Codes Consultation Lenovo Software as a Service Migration Telephony Cost Management E-Commerce Remote Worker Public Cloud Vulnerabilities Authentication Computer Repair Address Operations Law Enforcement Connectivity Cryptocurrency Statistics Data Warehousing Botnet Enterprise Resource Planning Bookmarks Physical Security Digital Obstacle Computing Infrastructure Travel WPA3 Financial Retail Cortana Disaster Resistance Technology Assurance Group ’s 18 3D Printing Hacks Search Net Neutrality Mobile Device Managment Software Tips Permission Display Typing Superfish Technology Tips Chatbots Hard Drive Features Microsoft Excel Modem ROI Automobile Computer Care Geography Authorization Best Practice Multi-Factor Security Wearable Technology Gadget Bitcoin Processors Bluetooth Mobile Favorites Office Tips Spyware Course Printer Alerts Fleet Tracking Procurement Proactive IT Distributed Denial of Service Annual Convention Unsupported Software Virus Shortcut Test Update Comparison Identity GPS Cache Electronic Health Records Cookies Virtual Desktop High-Speed Internet Firefox Google Calendar Star Wars Monitoring Windows 8 Save Time Supercomputer Conferencing Cooperation Crowdsourcing Meetings Asset Tracking Social Engineering Identities USB Heating/Cooling IT Consulting Managed IT Service San Diego Recycling Cyberattacks Mobile Data WannaCry G Suite History MSP RMM Time Management Networking Specifications Tracking Emergency CrashOverride Webcam IT Consultant Error Printers Cybercrime Web Server Cameras Motion Sickness Hard Disk Drive Regulation Notes Administrator CCTV Relocation