094 90 48200     Get SUPPORT

Aniar IT Services Blog

Are American Voting Systems Secure?

Are American Voting Systems Secure?

Election Day for the United States is November 6th, and regardless of your feelings regarding U.S. politics, the fact of the matter is that millions of Americans will soon go to the polls and cast their ballots. Unfortunately, what many of them don’t realize is how insecure their voting machines actually are, and how they are potentially putting their vote at risk.

What Most Polling Places Have
The majority of American polling places are operating with equipment that is fast approaching 15 years old. For reference, here’s a brief list of products and technologies that haven’t even been around for ten years yet:

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

One cofounder of nonprofit group Open Source Election Technology, Greg Miller, puts it this way: "You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In short, the American voting system is reliant on, as Miller described it,”... obsolete hardware [and] software that relies on a diet of spare parts.”

The other cofounder of the nonprofit OSET, John Sebes, has demonstrated just how vulnerable these systems could potentially be to manipulation.

Most polling places collect all of the voting data onto a piece of portable media, like a CD or a USB drive, and bring it to a separate location to be tallied. Unfortunately, the machines used here are also usually outdated, as is the software used to process the results of the vote.

In a live demonstration on a national news network, Sebes used one of these machines to tally votes for two fictional candidates, Thorfer and Varda. In the example, Thorfer had won in a landslide with over 3,000 votes, the opposing Varda only receiving 100. However, with a very simple malware, Sebes was able to just switch the tallies, making “Varda” a fraudulent winner - and while access to these tallying computers is secured, some may not be secured as well as others are.

Furthermore, many polling places maintain a paper backup of the vote, just in case there needs to be a recount, but there are also many who have no paper backup at all. This includes some states known as “battleground” or “swing” states, where a much smaller number of votes can potentially have a significant impact on the final outcome.

How to Minimize the Issue
Unfortunately, the easiest solution to this problem is also impossible. One would think that there would be a singular set of standards for all polling places to abide by - but since the American Constitution specifies that each state is in control of its own electoral procedures, this consistency is effectively made impossible.

However, there are other ways that have been suggested to protect voting technology… some of which are decidedly lower-tech.

Temporarily Eliminate Online Voting
Some states have made online voting available, primarily to service members or other citizens who may be abroad, and many allow email ballots to be submitted. However, until security is improved for these methods, it has been suggested that they are suspended.

Utilize Physical Backups
Yes, we know. We generally say that all of your backups should be saved to the cloud, but in this case, that would be counterproductive. After all, a physically-generated paper backup that records each vote isn’t hackable (unlike a digital system) and could easily be used to cross-check any contested results.

Invest in Improved Voting Equipment
As one might imagine upon hearing that most American voting machines are over a decade old, updating the infrastructure that enables the prime responsibility of democracy is clearly not a priority for those dispersing the funds. It has been suggested that Congress get involved, funding research into improving these machines and replacing the problematic older machines, as was last done in 2002.

Americans view the right to vote as a basic human right, so it seems especially bad that their infrastructure can get in the way of their doing so. Don’t let your business technology do the same to your employees and their work. Reach out to Aniar IT Services for a better solution by calling 094 90 48200 .

Which Browser is Best for Your Needs?
Tip of the Week: 5 Windows Tricks


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, May 23 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy User Tips Cloud Productivity Google Tech Term Internet Email Microsoft Innovation Data Network Security Data Backup Hosted Solutions Hardware Data Recovery Mobile Devices Workplace Tips VoIP Cloud Computing Android Communication Windows 10 Smartphone Hackers Communications Malware Efficiency Smartphones Business IT Support IT Services Managed IT Services Network Business Management Mobile Device Artificial Intelligence Internet of Things Small Business Software Gadgets Browser Backup Collaboration Spam Router Cybersecurity Chrome How To Server Windows Saving Money Information Word Cybercrime Computer BDR Applications Outsourced IT Computers Business Continuity Office 365 Social Media Vulnerability Phishing Data Protection Mobile Device Management Ransomware Operating System Holiday Managed Service BYOD Paperless Office Two-factor Authentication Money Passwords Connectivity Facebook Settings Encryption Data Security Users Miscellaneous Upgrade Blockchain Social Engineering Spam Blocking Avoiding Downtime Automation Bring Your Own Device Virtual Assistant Comparison IT Management App Wi-Fi Google Docs Meetings Save Money Identity Theft Law Enforcement Google Drive Augmented Reality Telephony Managed IT Scam Telephone System Apps Access Control Update Remote Monitoring Sports Business Intelligence Private Cloud IT Plan OneNote CES Fraud Botnet Machine Learning Microsoft Office Virtualization Unsupported Software Infrastructure Windows 7 Cryptocurrency Display Human Resources Disaster Recovery Keyboard Government Software as a Service Content Management Managed IT services Data Storage Training VPN Website Redundancy Voice over Internet Protocol Password Telephone Systems Staff Charger Frequently Asked Questions Hosted Computing Recovery Networking Shortcuts Start Menu Wireless Internet Education Remote Worker Database Amazon Web Services Accountants FENG Microchip Legal Sync Multi-Factor Security Cortana Alert Save Time Cables Document Management Camera Wireless Password Manager Nanotechnology WiFi Smartwatch Millennials Wiring Business Technology Wireless Charging Excel Inventory Enterprise Content Management Mobility HIPAA USB OLED Search Engine Criminal Proactive IT Workforce Default App Solid State Drive Business Mangement Flash Smart Tech Health Digital Signature Value Firewall Google Apps Tip of the week Downtime Password Management Social Electronic Medical Records Wire Specifications Biometric Security Windows 10s Online Shopping Servers Bing Addiction Trending Screen Mirroring MSP Net Neutrality Credit Cards PDF Audit Physical Security Entertainment Warranty 5G Gmail HaaS Employer-Employee Relationship Employee Unified Threat Management Workers Windows Server 2008 Root Cause Analysis NIST Vendor Data Management Manufacturing Hacker Evernote HBO Cleaning HVAC Help Desk The Internet of Things Cast File Sharing ISP Telecommuting Printer Recycling Devices Digital Signage Public Cloud Mobile Computing Authentication Computer Care Virtual Reality Outlook Practices Big Data Skype Cache Cryptomining Amazon Travel Remote Work Computer Fan YouTube Mouse eWaste Thought Leadership Data loss Google Search Cabling Software Tips Smart Office Quick Tips Patch Management Bandwidth Safe Mode Security Cameras Tools Work/Life Balance Mobile Office CrashOverride Company Culture Domains Managed Service Provider Windows 10 Managing Stress Public Speaking Twitter Printers Presentation Hiring/Firing Lithium-ion battery Fun Wireless Technology Tech Support Safety IBM Marketing Productivity Compliance Budget Competition Hard Drives Customer Relationship Management Emergency IP Address Search Regulation Customer Service