Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Symmetric Engineering Group Blogs

Is Election Technology Solid or Simply Antiquated

Is Election Technology Solid or Simply Antiquated

Election Day in the United States is coming up quick on November 6th. It doesn’t matter what your thoughts or opinions on U.S. politics are--the fact remains that millions of Americans will be using the technology available at polling places to cast their ballots, and if this technology isn’t secured properly, the integrity of the voting system will be at risk.

Technology Found at Most Polling Places
Most polling places in America are using technology that is quickly approaching 15 years old. To put that in perspective, let’s think about some technologies and products today that haven’t even reached ten years old yet.

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

A co-founder of a nonprofit group called Open Source Election Technology, Greg Miller, has this to say about election technology: ”You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In essence, Miller describes election technology as “...obsolete hardware [and] software that relies on a diet of spare parts.”

The other co-founder of OSET, John Sebes, takes a different approach by showing just how vulnerable the systems are to manipulation. Most polling places have a portable media device, like a CD or USB drive, that must be used to transport the results to another location for the tally. The machines that count the votes are usually outdated in terms of both hardware and software. Sebes initiated a live demonstration for a national news network to show how he could influence the results of an election between two fictional candidates named Thorfer and Varda. Thorfer won with 3,000 votes while Varda received only 100, yet Sebes was able to use malware to switch the tallies around, creating a fraudulent winner. While some computers used for this purpose are secured, others are not so much.

Furthermore, there is some inconsistency in regard to whether or not polling places keep a paper backup of the vote in the event a recount is needed. This includes some of the “battleground” or “swing” states where small numbers of votes can sway the final outcome much more than in other states.

How to Minimize the Issue
The easiest way to resolve this problem is one that is just impossible to pull off. The United States Constitution specifies that each state is responsible for maintaining its own set of electoral procedures, meaning that any attempts at consistency will be made impossible. There are other ways to make progress regarding election system security, even if some of them are more low-tech than anything else.

Temporarily Cease Online Voting
Some states allow online voting for those who are abroad or are unable to make it to the polling place for whatever reason. Some even allow for email ballots. Unfortunately, security for these methods is subpar to say the least, and it should be suspended until it can be secured properly.

Use Physical Backups
Ordinarily, we would suggest that all backups be saved to the cloud. In this case, we’re dealing with something a bit different, as digital assets can be hacked. A physically-generated paper backup of the voting records is less susceptible to being tampered with, and it allows for cross-checking any results.

Invest in Improved Voting Equipment
Since the devices used in the voting process are over a decade old, it’s clear that updating this infrastructure is not a priority. Some have suggested that Congress get involved to expedite the process, creating funding opportunities to improve machines and replace older devices, but this hasn’t happened since 2002.

What are your thoughts on the current state of election technology? Let us know in the comments.

Emerging Technologies to Keep an Eye On
Just How Important Is the Data Recovery Process?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, March 20 2019

Captcha Image

Search

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Best Practices Technology Managed IT Services Business Computing Cloud Email Privacy Hackers Malware Hosted Solutions IT Infrastructure Management Business Continuity Internet Business IT Companies in Tampa Productivity Data Data Backup Business Mobility Software IT Support Services Business IT Solutions Outsourced IT I.T. Management Network Security Microsoft Managed Service Provider Computer Productivity IT Professional Services Custom Business Solutions Mobile Devices Data Recovery IT Management Tech Term Ransomware Innovation Business Applications IT Business Solutions Cloud Computing Technology Consultants Google Android Windows 10 Internet of Things Workplace Tips Windows Managed IT Service in Florida Managed IT Service Hardware Business IT Support Upgrade Managed IT User Tips Disaster Recovery Managed Services in Florida I.T. Support Remote Monitoring Business Management Small Business IT Support Browser Collaboration Backup Encryption Dynamic Solutions I.T. Services Efficiency IT Support Services in Tampa IT Risk Management Communication IT Services in Florida Smartphones Data Management Holiday Server Smartphone Microsoft Office Phishing IT Outsourcing in Tampa Paperless Office Cybersecurity Save Money Managed Services Windows 10 Artificial Intelligence VoIP Network Gmail IT Service Social Media IT Support in Tampa Mobile Device Management Managed IT Services Managed Services in Tampa Bay Vendor Management Passwords BYOD App communications IT Managed Services Mobile Device Office 365 Firewall Customer Relationship Management Tampa IT Support Bandwidth Risk Management Tech Companies in Tampa Antivirus Employer-Employee Relationship Operating System BDR Applications Unified Threat Management Website Automation IT Services in Tampa Bring Your Own Device Compliance Vulnerability IT Outsourcing Business IT Support Services Apple Saving Money Business Technology Small Business IT Solutions Facebook Infrastructure Managed Service in Tampa Analytics Healthcare Computer Networking Tip of the week IT Outsourcing in Florida Government Wi-Fi Chrome Managed Service IT Service Management Information Data Computer Services IT Company Business Plan Document Management Word Two-factor Authentication IT Vendor Management Content Filtering Project Management Scam Unified Communications Storage Regulations Tablet Apps Help Desk Miscellaneous IT Management Services Settings Telephone Systems The Internet of Things Big Data Remote Computing Maintenance IT Company Data Security Blockchain VPN Robot Wireless Mobile Computing Money Router Computer Hardware Repair Wireless Technology SaaS Retail Quick Tips WiFi Customer Service Hosted Solution Net Neutrality Office Data loss Data storage IT solutions Monitors Users Spam Budget User Error Alert Files IT Consulting Mobile Security Virtual Private Network Solid State Drive Managed IT Outsourcing Assessment IT Support Helpdesk LiFi Smart Technology Network Congestion Recovery IT Companies in Florida Business Continuity Services Presentation Virtual Reality Politics Information Technology Mobility Microsoft Virtual Server Hosting in Tampa and Florida Augmented Reality Remote Monitoring and Management Management IT Management Service IBM Laptop Administration Remote Workers Printing Google Drive Uninterrupted Power Supply End of Support Licensing Computer Support Downtime Machine Learning Computer Network Services Mouse Training Outlook I.T. Company Business Application Computer Networking Services Redundancy Social Virtual Desktop Flexibility Patch Management Office Tips IoT How To YouTube Access Control HIPAA Search Software as a Service File Sharing Computing Employees Digital Payment Server Management Internet Exlporer Virtualization Company Culture Network Management Digital Signature MSP Hard Drives RMM Identities Data Warehousing Intranet Recycling Cyberattacks Computer Care Firefox Microsoft Affiliate Program SharePoint IT Technicians IT Support and Solutions Private Cloud Backups Technology Tips Nanotechnology Managed Service Providers Bitcoin Star Wars Consulting Public Speaking VoIP Data Breach Cooperation Managed Services in Floirda Google Wallet Disaster Development Avoiding Downtime Zero-Day Threat Statistics Specifications Social Networking Network Support in Florida USB Mobile Device Managment Business Continuity Service Providers OneNote Remote Worker Writing Sports Virtual Assistant Computer Repair Networking Technology Consulting Firms Current Events Managing Stress Heating/Cooling Instant Messaging Touchscreen Server Hosting in Florida Legal Proactive Tech Terms Cabling Microsoft Excel eWaste Read Only Microsoft Business Solutions Safety Marketing Downloads Mirgation IT Managed Service in Tampa Information Technology Consulting Bluetooth Cortana Screen Reader Tech Company in Tampa Meetings Windows 8 Professional Service Utility Computing Programming Managed Services Provider Digital Dark Data Technology Laws Staff IT Company in Tampa Websites Drones Gadgets Cables Backup and Disaster Recovery Google Maps Black Friday Motherboard Employee-Employer Relationship ROI Social Engineering Wasting Time Hotspot Going Green Enterprise Content Management Finance Tampa IT Services Education IT Consulting Services Cost Management Theft Mail Merge Careers Alt Codes Top IT Outsourcing Company Consultation Multi-Factor Security Migration Help Desk Support in Tampa Health Care IT Services Knowledge Distributed Denial of Service Smart Tech IT Managed Service Provider Tech Support E-Commerce Spyware Consulting Services Unified Threat Management Operations Managed Service in Florida Wires Human Error Cyber Monday G Suite IT Consulting Service Health Corporate Profile Buisness Database Techology Language Vulnerabilities Authentication Outsourced Computer Support Fun Automobile WPA3 Financial Address IT Service in Tampa Jobs Notes Typing Lenovo Permissions Server Hosting in Tampa Enterprise Resource Planning Password Bookmarks Google Calendar Chatbots Help Desk Support Permission Shortcut Computers Business IT Solutions Experience Deep Learning Break Fix Connectivity Point of Sale Hard Drive Features Service IT Hacker Printer Wearable Technology Hacking Modem WannaCry Trending Voice over Internet Protocol Disaster Resistance Computing Infrastructure Geography Authorization Servers Google Docs Fleet Tracking Undo Procurement Hard Disk Drive Electronic Medical Records Halloween PowerPoint Superfish Fraud Mobile Favorites Time Management Co-managed IT Legislation Identity Test Software Tips Display Full Service IT Dark Web Samsung Healthcare IT Cache Electronic Health Records IT Solutions for Small Business IT Support Companies in Tampa Save Time Cookies Managed it Services in Tampa Travel Application Cryptocurrency Humor Monitoring Domains CIO Windows 7 Proactive IT Alerts Chromebook History High-Speed Internet User IT Vendor Management in Tampa Sync Business Growth Asset Tracking Competition Security Cameras Data Technology Scary Stories Professional Services Server Hosting IT Tech Support Hacks Best Practice Conferencing Identity Theft Comparison Notifications Unsupported Software Mobile Office Physical Security Hiring/Firing Motion Sickness Cameras Lithium-ion Battery Emergency Gadget IT Consultant Refrigeration Personal Information Staffing Mobile Data Error CCTV How To Cybercrime Thank You Crowdsourcing Printers GPS Public Cloud Twitter Webcam Taxes Upgrades Botnet Telephony Supercomputer Saving Time Running Cable Congratulations I.T. Managament Tracking Processors Virus CrashOverride 3D Printing Emoji Black Market Update IT Budget Business Appplications Administrator Managed Servers Work/Life Balance 5G Regulation Web Server Cleaning IP Address Relocation Law Enforcement

Latest Blog Entry

Phishing attacks have been in the social consciousness now for a while, and for good reason: it is the predominant way that hackers gain access to secured networks and data. Unfortunately, awareness to an issue doesn’t always result in positive outcomes. In this case, hacker...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login