MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Voting Machine You Use May Have Serious Security Issues

The Voting Machine You Use May Have Serious Security Issues

The ability to vote is considered one of the great rights in the world, putting one’s voice and opinion into action to shape history. However, it has been demonstrated that the electronic voting machines that some states in the U.S. use simply aren’t secure enough to ensure that the democratic process is preserved.

The issues present in voting infrastructure have been known for years. By using expensive electronic voting machines, many polling places are putting themselves in the position of being stuck with old, outdated systems without the necessary funds to replace them. In fact, it was predicted that 43 states would use ten-year-old electronic voting machines, an age that is uncomfortably close to the total lifespan of the machine.

This could easily result in machine crashes and failures, potentially causing votes to be lost or--with some touch-screen machines--registered for a different candidate than the voter input. Adding to this issue is the fact that, with exclusively digital voting machine, there is no way to check the results against anything else if there needs to be an audit.

This issue was only proven further during the 2017 DefCon conference, where the unprecedented Voting Village revealed what a hacker could do to an actual voting machine. This kind of activity had never been done before because, until late 2016, it had been illegal to tamper with voting machines--even if just for research purposes. Researchers discovered that there were plenty of ways to breach voting systems through both remote access and physical tampering.

Influencing an election doesn’t even necessarily require tampering with the votes themselves, either. By slowing the systems to a crawl, or simply rendering them inoperable, hackers can easily keep many people from voting.

Lawrence Norden, of the Brennan Center for Justice, argues that going low-tech is the best way to combat this kind of interference, supplemented by the use of encryption, blockchain, and other technological solutions. According to a blog post by Norden, the voting process needs to reintroduce paper.

As he says in his blog:

“Specifically, every new voting machine in the United States should have a paper record that the voter reviews, and that can be used later to check the electronic totals that are reported.

This could be a paper ballot the voter fills out before it is scanned by a machine, or a record created by the machine on which the voter makes her selections—so long as she can review that record and make changes before casting her vote.”

According to Norden, this would eliminate the risk of an undetected change or error in software causing an undetectable change or error in the outcome of an election.

Just like your organization, having accurate data and computing infrastructure that doesn’t work against your goals is key here. When hardware and software becomes out of date, not only do you deal with the same quirks and problems that were baked in from the beginning, but you also deal with new problems and unreliability. When your data is at stake, this can be a major issue.

If your business has embraced digital filing (which we highly recommend), imagine putting the integrity of your data at risk by using an old computer. While going back to physical paper documents might be a solution, it will cost your business a lot of time and effort to accommodate, when compared to the cost of upgrading your IT. What are your thoughts? Leave them in the comments section below. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 22 November 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Best Practices Business Computing Hackers Malware Software Hosted Solutions Backup Network Security google Internet Productivity Microsoft Disaster Recovery Computer Managed IT Services Business Continuity Business Windows 10 IT Support VoIP Innovation Outsourced IT IT Services User Tips Business Management Hardware Mobile Devices communications Managed IT Mobility Windows Mobile Device Management Productivity Ransomware Efficiency Email Smartphone Cybercrime Saving Money Telephone Systems Small Business Server Save Money Operating System Hosted Solution Quick Tips Android Virtualization Data Backup Apps Cybersecurity Law Enforcement Recovery Data Recovery VPN Passwords Microsoft Office browser BYOD Data Password BDR Money Information Technology Chrome Communication Budget Smartphones Office 365 Data Management Facebook Government Wireless Google Drive Hacking Avoiding Downtime Unsupported Software Health Miscellaneous Cloud Computing Managed Service Provider Computers Work/Life Balance upgrade Social Current Events Audit Personal Information Politics Phishing Managed IT Services USB Save Time Gadgets Automation Risk Management Workplace Tips Telephony Alert Holiday Data Security Office tips Applications Private Cloud Shortcut Proactive IT Social Media Best Practice Wi-Fi Firewall Application search App Humor Commerce Disaster Content Filtering Battery HaaS Employer-Employee Relationship Compliance Windows 10 User Error Network Sports Vulnerability Automobile Spam Hacker Solid State Drive Saving Time Internet Exlporer Gmail Cleaning Data Storage Wireless Technology Office Computer Care Phone System Update iPhone IT solutions Mobile Computing Users Encryption DDoS Transportation Identity Theft Robot Television Artificial Intelligence Flexibility Google Docs Social Engineering History End of Support Remote Computing Streaming Media Apple Cost Management Data Protection WiFi SaaS IT Support Internet of Things Going Green Bandwidth The Internet of Things Samsung Antivirus remote Storage Unified Threat Management WIndows Server 2008 Hard Disk Drive eWaste Yahoo Tablets Data storage Training Root Cause Analysis Entertainment Running Cable Server 2008 Cortana Upgrades Electronic Medical Records Patch Management Chromecast Point of Sale Ali Rowghani Administration NFL Company Culture Augmented Reality HIPAA Trending Touchscreen Black Market Lifestyle Consultant Business Intelligence Outlook Smart Technology Colocation Avoid Downtime Hard Drives Word Value Tech Support Shadow IT server installation dvd "cannot install required files" Legislation Two-factor Authentication Managed IT Service Files Excel Administrator iOS Lithium-ion battery Document Management stock Windows Ink Experience Comparison Regulation Access Computer Fan tweet Relocation Video Games Google Maps OneNote Data Breach Virtual Reality calculator Specifications Screen Mirroring Sync Scam Dark Web Twitter Legal PDF control Software as a Service Meetings Music Emails Sales Cast Adobe Employer Employee Relationship WSJ Text Messaging Exchange Data Loss Settings Analytics Keyboard Marketing Instant Messaging Distributed Denial of Service altivista Retail Licensing Computer Accessories Worker Commute SBS Mobile Device Big Data Webinar Managing Stress compaq HBO Mobile Scalability Wearable Technology Microsoft Excel Laptop Uninterrupted Power Supply Books Hiring/Firing IT solutions Education hp Professional Services Vendor Management Collaboration Router How To domain File Sharing Touchpad IT Management Benefits Windows 10s Reputation Advertising Travel Nanotechnology Safety Emergency Thank You CrashOverride Congratulations Worker WannaCry Cache Monitors Remote Monitoring

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...