Velocity Technology Partners Blogs

The Voting Machine You Use May Have Serious Security Issues

The Voting Machine You Use May Have Serious Security Issues

The ability to vote is considered one of the great rights in the world, putting one’s voice and opinion into action to shape history. However, it has been demonstrated that the electronic voting machines that some states in the U.S. use simply aren’t secure enough to ensure that the democratic process is preserved.

The issues present in voting infrastructure have been known for years. By using expensive electronic voting machines, many polling places are putting themselves in the position of being stuck with old, outdated systems without the necessary funds to replace them. In fact, it was predicted that 43 states would use ten-year-old electronic voting machines, an age that is uncomfortably close to the total lifespan of the machine.

This could easily result in machine crashes and failures, potentially causing votes to be lost or--with some touch-screen machines--registered for a different candidate than the voter input. Adding to this issue is the fact that, with exclusively digital voting machine, there is no way to check the results against anything else if there needs to be an audit.

This issue was only proven further during the 2017 DefCon conference, where the unprecedented Voting Village revealed what a hacker could do to an actual voting machine. This kind of activity had never been done before because, until late 2016, it had been illegal to tamper with voting machines--even if just for research purposes. Researchers discovered that there were plenty of ways to breach voting systems through both remote access and physical tampering.

Influencing an election doesn’t even necessarily require tampering with the votes themselves, either. By slowing the systems to a crawl, or simply rendering them inoperable, hackers can easily keep many people from voting.

Lawrence Norden, of the Brennan Center for Justice, argues that going low-tech is the best way to combat this kind of interference, supplemented by the use of encryption, blockchain, and other technological solutions. According to a blog post by Norden, the voting process needs to reintroduce paper.

As he says in his blog:

“Specifically, every new voting machine in the United States should have a paper record that the voter reviews, and that can be used later to check the electronic totals that are reported.

This could be a paper ballot the voter fills out before it is scanned by a machine, or a record created by the machine on which the voter makes her selections—so long as she can review that record and make changes before casting her vote.”

According to Norden, this would eliminate the risk of an undetected change or error in software causing an undetectable change or error in the outcome of an election.

Just like your organization, having accurate data and computing infrastructure that doesn’t work against your goals is key here. When hardware and software becomes out of date, not only do you deal with the same quirks and problems that were baked in from the beginning, but you also deal with new problems and unreliability. When your data is at stake, this can be a major issue.

If your business has embraced digital filing (which we highly recommend), imagine putting the integrity of your data at risk by using an old computer. While going back to physical paper documents might be a solution, it will cost your business a lot of time and effort to accommodate, when compared to the cost of upgrading your IT. What are your thoughts? Leave them in the comments section below.

Tip of the Week: How to Better Use Your Smartphone...
Hackers May Meet Their Match With AI
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 23 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Lifestyle Unified Communications Data Privacy Credit Cards Employer-Employee Relationship Mobile Device Management Microsoft Compliance Law Enforcement Microsoft Excel Streaming Media IT support Communications Saving Money Apple Alert Spyware BDR Business Continuity Server Browser Communication Government The Internet of Things Sync Artificial Intelligence Analysis Telephone Systems Workers Tip of the Week Google Docs Spam Data Loss Wireless Internet Chrome Business Computing Big Data Best Practice Identity Identities Automation Work/Life Balance Managed IT Services Computer Forensics Smart Tech IT budget Efficiency User Tips Sports Financial Technology Email Gadgets Data Theft Network Encryption Regulation iPhone Managed Service Provider Wireless Charging IT Services Hardware Websites User Error Privacy Data Storage Comparison Windows 10 Sales Google Drive Storage Telephone HBO Google Maps Redundancy Tech Support Internet Identity Theft Congratulations Patch Management OneNote Update Cleaning Outlook Excel intranet Tech Term Cybersecurity Cast Devices Operating System Cortana Hackers Best Practices History Microsoft Word Remote Computing Blockchain Commerce Backup Two-factor Authentication Productivity Mobile Devices Adobe SaaS Passwords Managing Stress PowerPoint Computers Gamification Legislation Data Recovery Innovation Proactive Mobile Security Fraud Company Culture Virus Audit IT Support Smartphones WannaCry Small Business Windows Ink Router Managed IT services eWaste Google Data Management Internet of Things Ciminal Licensing Remote Monitoring Application Gmail Antivirus Memory Software Collaboration Cybercrime Travel Tablets Politics VPN Social Media Flexibility MSP WIndows Server 2008 Content Filter Screen Mirroring Office 365 Device Security Word Safety App Vulnerability Cloud Computing File Sharing Wireless Technology Risk Management Thank You Conferencing Bring Your Own Device Edge Personal Information Softphones Marketing Proactive IT Chromebook Holiday Financial Google Assistant Evernote WiFi Cloud IoT Phishing Business Management Printing Unsupported Software Data Security Gifts Virtualization Wi-Fi Education Technology Money Hosted Solution Monitoring Twitter Managed IT FAQ Computer Networking Legal Data Breach Hard Drive Value Social Engineering Smartphone Connectivity Hosted Solutions Content Filtering Students Apps Data Backup Charger Windows Specifications NFL Disaster Recovery Language Vendor Management Project Management Data Ransomware Business Shortcut Hybrid Cloud IT Management Software as a Service Updates App store Security VoIp Network Security Maintenance BYOD Emergency Retail Malware Data Protection IT Solutions Microsoft Office Computing Applications Outsourced IT Cost Management Android Management Mobility