(281) 816-6430    Get SUPPORT

SouthBridge Consulting Blog

Is Election Technology Solid or Simply Antiquated

Is Election Technology Solid or Simply Antiquated

Election Day in the United States is coming up quick on November 6th. It doesn’t matter what your thoughts or opinions on U.S. politics are--the fact remains that millions of Americans will be using the technology available at polling places to cast their ballots, and if this technology isn’t secured properly, the integrity of the voting system will be at risk.

Technology Found at Most Polling Places
Most polling places in America are using technology that is quickly approaching 15 years old. To put that in perspective, let’s think about some technologies and products today that haven’t even reached ten years old yet.

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

A co-founder of a nonprofit group called Open Source Election Technology, Greg Miller, has this to say about election technology: ”You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In essence, Miller describes election technology as “...obsolete hardware [and] software that relies on a diet of spare parts.”

The other co-founder of OSET, John Sebes, takes a different approach by showing just how vulnerable the systems are to manipulation. Most polling places have a portable media device, like a CD or USB drive, that must be used to transport the results to another location for the tally. The machines that count the votes are usually outdated in terms of both hardware and software. Sebes initiated a live demonstration for a national news network to show how he could influence the results of an election between two fictional candidates named Thorfer and Varda. Thorfer won with 3,000 votes while Varda received only 100, yet Sebes was able to use malware to switch the tallies around, creating a fraudulent winner. While some computers used for this purpose are secured, others are not so much.

Furthermore, there is some inconsistency in regard to whether or not polling places keep a paper backup of the vote in the event a recount is needed. This includes some of the “battleground” or “swing” states where small numbers of votes can sway the final outcome much more than in other states.

How to Minimize the Issue
The easiest way to resolve this problem is one that is just impossible to pull off. The United States Constitution specifies that each state is responsible for maintaining its own set of electoral procedures, meaning that any attempts at consistency will be made impossible. There are other ways to make progress regarding election system security, even if some of them are more low-tech than anything else.

Temporarily Cease Online Voting
Some states allow online voting for those who are abroad or are unable to make it to the polling place for whatever reason. Some even allow for email ballots. Unfortunately, security for these methods is subpar to say the least, and it should be suspended until it can be secured properly.

Use Physical Backups
Ordinarily, we would suggest that all backups be saved to the cloud. In this case, we’re dealing with something a bit different, as digital assets can be hacked. A physically-generated paper backup of the voting records is less susceptible to being tampered with, and it allows for cross-checking any results.

Invest in Improved Voting Equipment
Since the devices used in the voting process are over a decade old, it’s clear that updating this infrastructure is not a priority. Some have suggested that Congress get involved to expedite the process, creating funding opportunities to improve machines and replace older devices, but this hasn’t happened since 2002.

What are your thoughts on the current state of election technology? Let us know in the comments.

Tech Term: Responsive Web Design
Just How Important Is the Data Recovery Process?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, December 10 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Tech Term Technology Productivity Privacy Internet Data Business Email Data Backup Business Computing Malware Hosted Solutions Cloud Software Network Security IT Support Computer Hackers IT Services Mobile Devices Encryption Cloud Computing Data Recovery Small Business Paperless Office Browser Business Management Government Innovation Artificial Intelligence Hardware Android Outsourced IT Server Passwords Communication Blockchain Information Collaboration Bandwidth Efficiency Windows 10 Managed Service Website Workplace Tips Google BYOD Healthcare VoIP Infrastructure Two-factor Authentication Wi-Fi Vulnerability Applications Managed IT services Machine Learning Business Continuity IT Management Managed Service Provider Internet of Things Maintenance Data Management Ransomware Router Office 365 Storage Employer-Employee Relationship Gmail Managed IT Services Backup Remote Monitoring User Tips Smartphone Saving Money HIPAA Social Media Chrome Antivirus Mobile Security Document Management Microsoft Holiday Network Augmented Reality Hotspot Point of Sale Business Technology Wires Finance Cybersecurity RMM Tech Support BDR G Suite Bookmarks Zero-Day Threat Black Friday Licensing Regulations Company Culture Files SharePoint Data Security Star Wars The Internet of Things Mouse Language Chatbots Network Management E-Commerce Dark Web App Facebook Google Calendar Permissions Monitoring Electronic Medical Records Distributed Denial of Service Chromebook Favorites OneNote Human Error Customer Relationship Management Cyber Monday Cooperation Data loss Managing Stress Read Only Downloads Cost Management Tablet Identity Theft Recycling Save Money Wearable Technology Screen Reader Authentication Scam Operating System Users Managed IT Service Modem Vulnerabilities Politics How To Permission Customer Service Staff Disaster Recovery Enterprise Content Management Multi-Factor Security IT Technicians Upgrade Computing Computing Infrastructure Identity eWaste Features Printer Money Smart Tech Quick Tips Authorization Smartphones Legislation Fraud VPN Hard Drive Consulting Downtime Break Fix Virtual Reality Cookies Development Mobile Device Automation Server Management Assessment Employee-Employer Relationship Test Spam Smart Technology Social Networking Unified Communications Help Desk Wireless Comparison Alerts Patch Management Microsoft Excel Connectivity Employees Remote Computing Cache Managed Services Provider Nanotechnology Cables Instant Messaging Risk Management Mirgation Internet Exlporer Remote Workers Communications Firewall Motherboard Bring Your Own Device Office Specifications Compliance Management Electronic Health Records Access Control IoT Remote Monitoring and Management Theft Cortana Wireless Technology 5G IBM Apps Safety Productivity Financial Marketing Hacker Criminal Justice Microsoft Office Alert Gadgets Budget Hiring/Firing Competition Big Data Fun IP Address Twitter Printers Miscellaneous Mobile Office Domains Virtualization Hard Drives Windows 10 Search Mobile Device Management Regulation Public Speaking Tech Terms Presentation Lithium-ion battery