crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Election Technology Solid or Simply Antiquated

Election Day in the United States is coming up quick on November 6th. It doesn’t matter what your thoughts or opinions on U.S. politics are--the fact remains that millions of Americans will be using the technology available at polling places to cast their ballots, and if this technology isn’t secured properly, the integrity of the voting system will be at risk.

Technology Found at Most Polling Places
Most polling places in America are using technology that is quickly approaching 15 years old. To put that in perspective, let’s think about some technologies and products today that haven’t even reached ten years old yet.

  • Google Chrome
  • Airbnb
  • Spotify
  • Kickstarter
  • 4G
  • Mobile GPS
  • Instagram
  • The iPad

A co-founder of a nonprofit group called Open Source Election Technology, Greg Miller, has this to say about election technology: ”You have equipment that was introduced in 2005. In that time frame, how many times have you changed your mobile phone? And how many times have we replaced our laptops?” In essence, Miller describes election technology as “...obsolete hardware [and] software that relies on a diet of spare parts.”

The other co-founder of OSET, John Sebes, takes a different approach by showing just how vulnerable the systems are to manipulation. Most polling places have a portable media device, like a CD or USB drive, that must be used to transport the results to another location for the tally. The machines that count the votes are usually outdated in terms of both hardware and software. Sebes initiated a live demonstration for a national news network to show how he could influence the results of an election between two fictional candidates named Thorfer and Varda. Thorfer won with 3,000 votes while Varda received only 100, yet Sebes was able to use malware to switch the tallies around, creating a fraudulent winner. While some computers used for this purpose are secured, others are not so much.

Furthermore, there is some inconsistency in regard to whether or not polling places keep a paper backup of the vote in the event a recount is needed. This includes some of the “battleground” or “swing” states where small numbers of votes can sway the final outcome much more than in other states.

How to Minimize the Issue
The easiest way to resolve this problem is one that is just impossible to pull off. The United States Constitution specifies that each state is responsible for maintaining its own set of electoral procedures, meaning that any attempts at consistency will be made impossible. There are other ways to make progress regarding election system security, even if some of them are more low-tech than anything else.

Temporarily Cease Online Voting
Some states allow online voting for those who are abroad or are unable to make it to the polling place for whatever reason. Some even allow for email ballots. Unfortunately, security for these methods is subpar to say the least, and it should be suspended until it can be secured properly.

Use Physical Backups
Ordinarily, we would suggest that all backups be saved to the cloud. In this case, we’re dealing with something a bit different, as digital assets can be hacked. A physically-generated paper backup of the voting records is less susceptible to being tampered with, and it allows for cross-checking any results.

Invest in Improved Voting Equipment
Since the devices used in the voting process are over a decade old, it’s clear that updating this infrastructure is not a priority. Some have suggested that Congress get involved to expedite the process, creating funding opportunities to improve machines and replace older devices, but this hasn’t happened since 2002.

What are your thoughts on the current state of election technology? Let us know in the comments.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 20 November 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Business Computing Best Practices Microsoft Saving Money Productivity Workplace Tips Hosted Solutions IT Services Hackers Backup Email Malware Business Software Mobile Devices Data IT Support Hardware Small Business Network Communication Server Smartphones VoIP Computer Business Continuity Upgrade Innovation Google Windows Efficiency Mobile Device Management Data Backup Disaster Recovery Virtualization Microsoft Office Outsourced IT Miscellaneous Mobile Office Vendor Management Tech Term Network Security Holiday Gadgets Social Media BYOD Productivity Quick Tips Passwords User Tips Android Smartphone Browser Mobile Computing WiFi Bring Your Own Device Windows 10 Internet of Things Data Recovery Managed IT services Ransomware Spam Best Practice Users Remote Monitoring The Internet of Things Apple Remote Computing Artificial Intelligence Alert Collaboration Data Management Wireless Technology Save Money Trending Operating System Content Filtering Going Green History Gmail Firewall Customer Relationship Management Unified Threat Management Office Encryption Printer Tech Support Information Technology Current Events Cloud Computing Managed IT Maintenance App Big Data IT Support Analytics IT Solutions Lithium-ion Battery Facebook Router IT Consultant Antivirus Humor Phishing Bandwidth Document Management Saving Time Mobile Device Paperless Office Avoiding Downtime Wi-Fi Employer-Employee Relationship Website Hard Drives Customer Service Applications Two-factor Authentication Windows 8 Managed IT Services Automation Office Tips Retail Project Management Cybersecurity IT service Apps Digital Payment Application Chrome Business Growth Virus VPN Risk Management Fax Server Hacking Outlook Computers Health Phone System Government Marketing Excel Compliance Managed Service Proactive IT Computer Repair BDR Regulations Point of Sale Mouse Files Recovery Money Net Neutrality Running Cable Social Licensing Wireless File Sharing Training PowerPoint Social Networking Unified Communications Help Desk Tablet User Error Data Security Office 365 Co-Managed IT Password iPhone Infrastructure Healthcare Administration Presentation Augmented Reality Vulnerability Budget Inbound Marketing Sports HIPAA Hacker User Programming Redundancy Company Culture Analyitcs Twitter Education Machine Learning Safety Specifications IBM Internet Exlporer Settings Flexibility Hosted Solution Cost Management Remote Monitoring and Management Storage Mobility Smart Technology Data storage Save Time Mobile Security Cybercrime communications Wearable Technology Robot Conferencing IoT Hiring/Firing Windows 10 Printing Display Alerts End of Support Tip of the week LiFi Computing Statistics Intranet Competition Business Intelligence Network Congestion Recycling eWaste Downtime Remote Workers Search USB Piracy Virtual Desktop Business Owner Information Scam Data loss Blockchain Scheduling Computer Accessories Virtual Private Network Telephony Technology Laws Heating/Cooling Alt Codes Consumers Monitoring Crowdfunding Nanotechnology Instant Messaging Comparison Enterprise Resource Planning How To Permissions YouTube MSP IT Technicians Unified Threat Management Typing Identity Theft Black Friday IP Address Google Drive Screen Reader Finance Mobile Assessment Fraud How To Cryptocurrency Disaster Proactive Touchscreen Mirgation Consulting Access Control Refrigeration Cyber Monday Google Docs Smart Tech Authentication Managing Stress IT Management Bitcoin Digital Signature Business Technology Managed Services Provider Private Cloud SharePoint Memory Connectivity Authorization Enterprise Content Management Network Management Laptop Macro Hacks WPA3 Migration E-Commerce Public Cloud Downloads Distributed Denial of Service Documents Employees Vulnerabilities Hotspot Halloween Networking Entrepreneur Undo Fleet Tracking Chatbots Features PC Care Sync Multi-Factor Security Software Tips Managed IT Service 5G Gaming Console PDF Value People Star Wars Zero-Day Threat Geography eBay Language Scary Stories Virtual Reality Asset Tracking Remote Support Identity Electronic Health Records Leadership Mobile Device Managment Google Calendar New Additions Break Fix Monitors Skype Streaming Media Utility Computing Backup and Disaster Recovery Print Server High-Speed Internet Text Messaging Server Management Computing Infrastructure SaaS Techology Deep Learning Domains Google Wallet OneNote Work Station Cyberattacks Legislation Congratulations Dark Web Fun Writing LinkedIn Human Error Law Firm IT Development Video Surveillance Cooperation Chromebook Disaster Resistance Word Public Speaking Drones Adminstration Windows 8.1 Update Employee-Employer Relationship Motherboard Read Only G Suite Data Warehousing Cortana Social Engineering 3D Best Available Buisness Hard Drive Permission Cables Patch Management Staff IT Consulting Identities Backups Modem Bookmarks Travel Software as a Service Microsoft Excel Knowledge Environment CIO Cache Test Bluetooth Wires Operations Politics Data Breach Solid State Drive Legal Online Currency Samsung Cookies Favorites Meetings Technology Tips Experience Troubleshooting Debate Management

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...