How vulnerable are US voting machines to foreign hackers?

Aug 10, 2016

How vulnerable are US voting machines to foreign hackers?

The recent hack of Democratic National Committee computers, attributed by authorities to Russia, has many Americans worried about foreign influence swaying the upcoming presidential election.

The DNC breach provides an excellent example of political doxing. This co-opted 1990s hacker revenge technique employs extra-legal methods to acquire and publish an individual's personal information on the internet, computer security expert Bruce Schneier explained in an article for Motherboard. What's more, according to Schneier​, political doxing is trending among cybercriminals.

Following the initial theft of DNC emails and opposition research on Republican Presidential Nominee Donald J. Trump, anti-secrecy website WikiLeaks issued approximately 20,000 internal DNC emails, Rebecca Hersher reported for NPR.

The emails, along with subsequently released stolen voicemails, indicated that high-level DNC staff actively favored Hillary Clinton during the primary election, Tom LoBianco and David Wright reported for CNN. In the wake of this leak, DNC Chairwoman Debbie Wasserman Schultz offered her resignation, an embarrassment on the eve of the Democratic National Convention where Clinton accepted the party's presidential nomination.

Fears that the Russian government may use cybercrime to ensure a Trump presidency are swirling after Trump's suggestion that Russian intelligence should similarly acquire missing emails from Clinton's tenure as Secretary of State, LoBianco and Wright reported. Trump later claimed the comment was sarcastic, and Russian authorities deny any involvement in the DNC hack. However, many still raise the question of whether Russia might look to cyberattacks to influence the 2016 U.S. presidential election.

Electronic voting technology

Political doxing represents an eye-catching weak point in the American electoral system, but a quieter risk to ballot security lies in the age of voting machines. While electronic voting technology is hardly a new concept - the 2002 Help America Vote Act mandated that each county make a minimum of two electronic ballot boxes available to residents - most people might expect to find the most up-to-date technology when they head to the polls.

However, the reality disappoints. A 2015 report by the Brennan Center for Justice warned that modern voting machines differ from their predecessors in that they are not intended to function for decades. According to the report, equipment purchased after 2000 is expected to last between 10 and 20 years. Most electronic ballot boxes that debuted at the turn of the century were designed in the 1990s, creating several problems: Chiefly, the report asserted, as of 2016 43 states are using machines 10 or more years old, and 14 states are using machines at least 15 years old.

Not only is the technology more than a decade behind current innovations, but because of the equipment's age, finding replacements for damaged or worn-out parts can be difficult, the Brennan Center report noted. As the technology nears the end of its life expectancy, voting machines are at increasing risk of crashing.

Such errors can affect elections, Richard Forno reported in a recent Government Technology article. Forno noted that in 2004 North Carolina voting machines deleted 4,438 votes, for which there was no backup record. In the end, fewer than 2,000 votes determined the results of that same election, Cory Bennett noted in a 2014 article for The Hill.

Yet another trouble that surrounds electronic ballot boxes is the lack of funding for states to purchase updated technology. As the functionality of electronic voting machines begins to deteriorate across the country, the Brennan Center reported, 22 out of 31 states seeking to purchase new equipment in the next five years reported lacking the necessary funds. The national cost of replacing all outdated voting machines may be upward of $1 billion, the Brennan Center calculated.

What else could go wrong?

Beyond voting machine age and political doxing, U.S. elections face other technology issues. In an opinion article in The Washington Post, Schneier argued that directly influencing electronic ballots is not the only way foreign governments might tamper with a U.S. election. Schneier expressed concerns about electronic voter records, stating that foreign cybercriminals could access and delete such information.

In a May 2016 article on election fraud, The Hill's Cory Bennett also cited the security of voter data as an important issue to address. Quoting the CEO of secure digital election system advocate group Free & Fair, Joseph Kiniry, Bennett made the case that by deleting select voter registration data, hackers have the power to easily wreak havoc on elections and noted that stolen voter information is somewhat valuable in of itself, with packages of 5 to 10 million records selling for $1,350 to $2,250 on the dark web, providing a further motive to potential cyber criminals.

What's more, Bennett asserted, security guidelines are not consistent between states, and some categorize voter information as "public record." This classification means that states are not mandated to meet the federal security standards placed upon "personally identifiable information" for voter data, which is not viewed as such.

In his Government Technology article, Forno explained that electronic ballot boxes face security risks due to the voting process itself. In order to successfully serve each precinct, voting machines are spread out across their county's municipal gird. Furthermore, votes must be transferred to a higher voting office to be tallied, creating vulnerable junctures that hackers could attack, Forno noted.

In order to ensure accurate election results, Forno concluded, the hardware and the network connection linking electoral machines must be secure. In addition, the electronic ballot boxes' software and the states' local tabulating software must be able to resist cyberattacks.

What is the alternative?

Some states have opted to return to traditional paper ballots, citing security concerns. In fact, Bennett asserted, more than half the states have begun to revert to paper ballots.

A more high-tech alternative to cybercrime risks is to invest in securing and updating electronic voting machines. While Forno made it clear that he does not believe that any given piece of electoral equipment is likely to be sabotaged by a foreign government, he maintained the importance of securing voting machines to ensure the legitimacy and accuracy of U.S. elections.

The best solution seems to come when paper and digital meet in the middle. Other states can take their cue from Ohio, which passed legislation requiring all precincts to use only voting machines that generate a voter-verified paper trail, according to Bennett.

In addition, allocating funds to meet the impending costs of upgrading electrical equipment, as estimated by the Brennan Center, is also a necessary step for states to take, should they wish to maintain electronic voting machines.

In the face of election security concerns, state governments are wise to update their voting machines.


Category: Cybersecurity

Add Pingback

Please add a comment

You must be logged in to leave a reply. Login »

Category List

Events (36)
Internet of Things (8)
Demos (3)
Intel Xeon Scalable processors (3)
Product Lifecycle Support (3)
News (23)
Manuals (2)
Mobile Device Management (32)
Intel (9)
Products and Services (8)
Manufacturing (1)
Data Backup and Data Loss Prevention (6)
Information Governance (5)
Transparent Supply Chain (2)
Public Safety (60)
Cloud Storage (16)
Compliance (5)
System Architecture (4)
IoT (1)
Collaboration (15)
Hardware Appliance (11)
e-Recycling (3)
Wireless Infrastructure (31)
Logistics & Compliance (5)
Healthcare IT (4)
Defense Architecture (6)
Industry News and Trends (53)
Global Logistics (7)
Strategic Planning (6)
Online File Sharing (35)
Dell OEM Platforms (3)
Ivy Bridge (1)
Sales Kick-Off (1)
Health Monitoring (1)
Virtualization (5)
Oil and Gas (2)
Application Management (4)
Mainframe Modernization (7)
Data Backup (2)
Dell EMC OEM (9)
Collateral (2)
Supply Chain (1)
Storage & Archive (3)
Cybersecurity (80)
Green IT (2)
Cloud Computing (54)
Homeland Security (3)
Security (1)
Application Development (2)
OEM Partnership (3)
System Integration (9)
Big Data (1)
Education (4)
Dell Technologies OEM | Embedded & Edge Solutions (1)
Data Center (33)
Research & Development (1)
Datasheet (1)
Appliance Model and Methodology (1)
Industrial Automation (3)
Data Security (82)
Solutions (6)
Transportation (19)
Systems Integration Partner (2)
Global Support Services (7)
Survey (2)
Cyber Security (8)
Technology (31)
System and Data Management (4)
Solution Overview (3)
Storage and Archive (5)
Trade Compliance (1)
Edge Computing (1)
5G (2)
Telecom Platform Deployment (5)
Application Deployment (21)

Tag List

NVMe (1)
UniGW 2.0 (3)
V.Everything (8)
Serial (40)
video data storage (2)
Internet of Things (6)
ISO Standards (2)
Stand (9)
InSync Suite (34)
digital transformation (2)
Asset Management (2)
Resource Management (7)
UNICOM Engineering Global Scale (2)
VOEM (1)
Dell Technologies OEM & IoT (5)
Policy Management (1)
QuickAssist (1)
Partnership (1)
PowerEdge (1)
Optane (1)
Compliance Management (1)
Console Management (19)
Copper (12)
Advanced Job Scheduling (8)
ALM (27)
Transitioning to Haswell (1)
trade rules and regulations (2)
Disk Management (9)
VTAM (33)
OEM (8)
microarchitecture (1)
Content Management (32)
Custom Server Branding (1)
Edge computing (1)
Singlemode (3)
Dial-up (69)
Full Duplex (16)
Ethernet (12)
GPS (8)
Data Management (68)
solutions development (2)
Half Duplex (9)
Performance Analysis (5)
Administration (1)
Artificial Intelligence (4)
z/VSE (132)
IMS (10)
Dell EMC Titanium OEM (1)
Intel (3)
AIX (6)
Embedded (5)
Help Management (4)
Automated Operations (65)
Smartphone (9)
Hub (4)
RSA Conference (10)
certifications (1)
ECM (1)
System Integration (3)
Reliability (4)
architecture (2)
Global Expansion Partners (1)
Knowledge base (2)
CICS (85)
Low Profile PCI (10)
customs and trade (1)
edge servers (1)
Cloud Storage (2)
Java, PC, and Web Version Control (3)
purpose-built hardware (3)
IoT Challenges (1)
Software Change Management (27)
Line Sharing (11)
Line Probing (18)
Carrier Loss Redial (8)
Code Editor (10)
Centralized Control (1)
ExpressCard (5)
CICS Applications (11)
Deployment Partner (2)
UNICOM Engineering (11)
Enterprise Content Management (1)
eReader (4)
Analysis (8)
UNICOM Government Services (1)
Internal (25)
UNIX/Linux (18)
Synon (4)
Dell EMC (4)
Business (5)
Aggregation (11)
golf classic, humanitarian, charity, philanthropy, engineering, (2)
IoT (8)
SDHC (3)
Regeneration (2)
Intel Xeon Scalable Processors (8)
appliance servers (4)
Dell EMC OEM (1)
Fault Analysis and Testing (62)
Remote Access (8)
Production Printing (1)
Security Management (8)
trade restrictions (1)
Menu Management (11)
Grown Defects on HDDs (1)
Diagnostic (3)
Cable (18)
5G Network (1)
Power Switch (8)
Print Management (137)
JES Administration (10)
PCI (20)
Extension (4)
Port Server (8)
computing (2)
Optane memory (1)
Autonomous Driving (1)
Global Expansion (1)
V.Everywhere (8)
Output Management (142)
Golf Classic 2019 (1)
Network (1)
NAS (6)
ProGen Plus Interface (3)
SCM (27)
Risk Management (1)
purpose built hardware (1)
Fleet Management (1)
2019 Partner of the Year (1)
Advance Server Replacement (1)
WebSphere (1)
Data security (5)
Intel Atom C3000 (5)
Helpdesk (2)
EU Lot 9 Regulations (3)
Intel Xeon Scalable Processor Family (4)
Independent Software Vendors (1)
Brand Protection (1)
3270 Terminals (7)
RSA 2018 (1)
AI (1)
Cloud Computing (2)
database IOPS1 (1)
30 Pin (5)
Consolidation (2)
Cyber Security (11)
Dell (1)
product lifecycle support (1)
PIE/TSO Suite (15)
PowerEdge 14G Servers (3)
Systems Monitoring (2)
low-power (1)
Web-Based (1)
Global Support (2)
VSE (7)
Terminal Emulation (10)
Modem Emulation (6)
Forward Stocking Locations (1)
Spool File Management (8)
Micro (5)
z/VM (16)
DIP switches (5)
FPGA (1)
Gigabit (15)
PDQ (4)
QAT (1)
Content Transformation (1)
GDPR (1)
Strategic Partner (1)
Eclipse (30)
VM (7)
56K (48)
memory (1)
Session Management (36)
TeamBLUE (5)
Application Lifecycle Management (38)
Console Server (8)
VSAM (27)
File Sharing (10)
Accessory (5)
V.22 (15)
Debugging (30)
Macro-Level Interpreter (2)
e-waste (2)
Speed Leveling (8)
Transparent Supply Chain (2)
bronze (1)
Data File Management (4)
Automated (2)
Productivity (38)
Global Services (1)
Web Access (7)
Application Lifecycle (2)
4GL (5)
Intel Xeon Scalable Based Platforms (2)
trade compliance (2)
Job Accounting (5)
deep technology (1)
Linux (33)
Intel Optane DC (3)
Application Modernization (12)
VROC (1)
Intel Atom (2)
System Performance Monitoring (5)
NAB (1)
Federal Government (1)
Support Services (1)
Dashboard (4)
UNICOM Engineering Products (3)
Cellular (12)
VMware vSAN cluster1 (1)
CDMA (5)
Controller (28)
Sandy Bridge (4)
appliance (1)
Intel® Atom® C3000 (2)
Lewisburg (1)
Lewisburg PCH (1)
Security (18)
Physical Security (1)
PIE/CICS Suite (13)
Portfolio Management (5)
z/OS (306)
Compact Flash (3)
server architecture (1)
Card Reader (3)
recycle electronics (2)
SD (3)
Synchronization (1)
Technology (2)
Batch Schedule (6)
Dell Technologies World (2)
5G (4)
Modem (51)
Technology Transitions (3)
Regulatory Compliance (4)
Skylake (1)
RAID (1)
Gateway (11)
Mac (5)
Window Management (4)
2nd Generation Intel Xeon Processor Family (1)
Virtual OEM (2)
storage and networking (1)
Dell EMC Unity XT (2)
Intel® (6)
iDRAC with Quick Sync 2 mobile-based management (1)
Multi-Mode (4)
Intel Xeon Scalable (3)
Voice (5)
Flash ROM (28)
Tablet (9)
UNICOM Engineering Expertise (3)
Database (24)
ATCA (1)
REXX (2)
Dell EMC OEM Storage (1)
GCS (7)
PCIe (10)
Partners (1)
Whitepaper (1)
Automated Job Scheduling (6)
Systems Management (18)
Product Compliance (1)
Wireless Mesh (4)
Datacenter, NetApp, DCOI, Compliance, data center optimization (1)
Fiber (7)
SDXC (3)
Message Console Management (9)
Solution Design (1)
HSPA+ (5)
servers (1)
electronic recycling (2)
Intel Optane (4)
Automated Messaging (8)
Telephony (11)
UNICOM Engineering Flexibility (3)
TAP (19)
Softmodem (5)
Network Attached Storage (6)
Dell EMC Isilon (2)
Brexit (1)
Cost Accounting Standards (1)
Dell EMC PowerVault ME4 (2)
Video Surveillance (2)
Performance Monitoring (5)
Cybersecurity Awareness Month (3)
Backup (3)
Loop Detection (3)
Atom C3000 (2)
Application Development (7)
Problem and Incident Management (2)
J2EE (2)
Storage Appliances (1)
CA 2E (4)
Dell 14G (1)
VSAM Forward Data Recovery (5)
Reporting (68)
CARTS Suite (10)
Dell EMC OEM PowerEdge 14th Generation Servers (2)
EVDO (5)
File Delivery (1)
External (23)
Data protection (3)
SSD (1)
Defects (1)
Application Deployment (3)
Tape Management (8)
Hybrid (8)
Solaris (3)
gold (1)
Document Processing (125)
File Management (19)
silver (1)
Business Intelligence (15)
Capacity Planning (23)
Quality (1)
e-recycling (2)
File Processing (8)
IPMI (1)
Windows (66)
Performance Management (83)
Global (15)
Dell Security (1)
ntel Xeon Scalable Processor Family (1)
Compression (4)
Systems Integration (2)
DellTechWorld (1)
TSO (3)
Batch Processing (6)
Skylake (2)
software (2)
Dell Platforms (1)
Data Center (1)
IBM i (94)
Omni-Path (3)
virtualization (1)
USB 3.0 (30)
Java (10)
State and local Government (1)
Automated Data Compression (5)
Online Help (11)
Advance Replacement Support Program (1)
communications (1)
Document Management and Delivery (164)
Accounting (6)
Skylake Purley (1)
Advance Replacement Services (1)
Dell OEM (1)
GSM (8)
platinum (1)
Data Backup (12)
Document Composition (13)
electronic waste (2)
Library Management (10)
Web-Enablement (11)
Statement of Conformance (1)
Storage Management (8)
HDDs (1)
CICS Print (1)
Firewall (5)
4G (1)
ISC West (1)
Line Consolidation (5)
Columbus Suite (140)
Public Sector (1)
Modemulator (6)
Purley (2)
Help Desk (2)
USB (51)
Issue Tracking (4)
data storage (4)
Code Path Analysis (11)
Expansion Card (3)

Tag Cloud

ReliabilityData File ManagementCellularBatch ScheduleCyber SecurityModemulatorProGen Plus InterfaceAdministrationUSBPerformance MonitoringBrexitWCDMAgoldRAIDTAPHelpdeskrecycle electronicsMacProduct ComplianceV.22Card ReaderModem EmulationDatacenter, NetApp, DCOI, Compliance, data center optimizationJava4GDell EMC OEMserversHelp DeskPCIeSDXC2019 Partner of the YearsoftwareSandy BridgeGlobal ServicesSecurityPowerEdgeVMware vSAN cluster1Carrier Loss RedialIPMIMulti-ModeLewisburgTechnology TransitionsOEMData protectionFirewallAutomated Operationspurpose built hardwareAIXInternalIndependent Software VendorscommunicationsapplianceConsolidationtrade complianceApplication DevelopmentDocument ProcessingData BackupExpressCardPublic SectorSkylakeReportinggolf classic, humanitarian, charity, philanthropy, engineering,PurleyVideo Surveillance2nd Generation Intel Xeon Processor FamilyFPGALoop DetectionData ManagementPIE/CICS SuitePrint ManagementAccessoryPartnershipAutonomous DrivingSecurity ManagementWhitepaperEdge computingAdvanced Job SchedulingIntel Atom C3000Dell EMC OEM PowerEdge 14th Generation ServersCableBrand ProtectionAdvance Replacement ServicesWebSpherelow-powerV.EverywhereEmbeddedLewisburg PCHCloud ComputingDell PlatformsSupport Servicesz/OSVSEPerformance AnalysismemoryPower SwitchGlobal SupportProblem and Incident ManagementSoftware Change ManagementUNICOM EngineeringCICSREXXDellTechWorldsolutions developmentTeamBLUEDIP switchesPerformance ManagementMenu ManagementDocument Management and DeliveryDeployment PartnerLine ProbingWeb-EnablementState and local GovernmentVSAMRegenerationAggregationSoftmodemz/VMFiberbronzetrade restrictionsGrown Defects on HDDsIntel Xeon Scalable Based PlatformsTechnologyLibrary ManagementSDHCDocument CompositionCopperelectronic wasteRegulatory ComplianceConsole ServerGolf Classic 2019File DeliveryDell EMC Unity XTDell EMC OEM StorageDell EMC IsilonIoT ChallengesQualityPowerEdge 14G ServersGigabitSession ManagementSSDWireless MeshTSOGDPRPCIJob Accountingvideo data storageWindow ManagementIssue TrackingVMe-recyclingVROCDebuggingSolarisApplication Lifecycle ManagementPIE/TSO Suite4GL3270 TerminalsData securityplatinumStorage AppliancesLine SharingHubDell EMC Titanium OEMAutomated MessagingResource Managementdeep technologyIMSIntel Optane DCISC WestTabletSkylake PurleyWeb AccessDefectsFull DuplexCloud StorageQATApplication DeploymentSerialCapacity PlanningJ2EEVOEMCode EditorSystem Performance MonitoringSynonAsset ManagementMacro-Level InterpreterSolution Designdatabase IOPS1Compact FlashDial-upKnowledge baseBusinessGCSntel Xeon Scalable Processor FamilyFleet ManagementIntel®System Integrationdigital transformationAutomated Data Compressionelectronic recyclingCentralized ControlUNICOM Engineering Flexibilityedge serversSystems ManagementTransitioning to HaswellGPSAdvance Replacement Support ProgramFault Analysis and TestingTerminal EmulationIntel Xeon Scalable Processor Familyproduct lifecycle support5G NetworkPartnersAnalysisFile ProcessingCICS Print5GDell OEMCybersecurity Awareness MonthSystems MonitoringDell EMC PowerVault ME4Dell 14GLine ConsolidationForward Stocking LocationsPhysical SecurityDell SecurityDiagnosticQuickAssistInternet of ThingsOptane memoryECMGlobalStrategic PartnerSpool File Management30 PinVirtual OEMNetworkUNICOM Engineering ExpertiseOnline HelpVSAM Forward Data RecoveryHDDsCARTS SuiteCICS ApplicationsCompliance ManagementArtificial IntelligenceCustom Server BrandingcertificationssilverApplication LifecycleV.EverythingUNIX/LinuxAccountingHelp ManagementAutomated Job SchedulingALMHSPA+e-waste56KNASJES AdministrationStandCode Path AnalysisVoicearchitectureserver architectureUNICOM Government ServicesEthernetDell Technologies OEM & IoTiDRAC with Quick Sync 2 mobile-based managementAutomatedDisk ManagementPolicy ManagementIntel OptaneBusiness IntelligenceSpeed LevelingEU Lot 9 RegulationsSCMFederal GovernmentSystems IntegrationCDMAIntel® Atom® C3000SinglemodeIntel Xeon Scalable ProcessorsFlash ROMUNICOM Engineering Global ScaleModemIBM iHalf DuplexATCAGlobal Expansion PartnersIntelBatch ProcessingNABDell Technologies WorldNVMeSkylakeBackupAITelephonyExternalStorage ManagementConsole ManagementIntel Xeon ScalableOptaneAdvance Server ReplacementRemote AccessData CenterLANSALow Profile PCIRisk ManagementDatabaseUniGW 2.0Production PrintingTape ManagementContent ManagementUNICOM Engineering ProductsIoTISO Standardspurpose-built hardwaremicroarchitectureSmartphoneContent TransformationAtom C3000Application ModernizationInSync SuitePortfolio ManagementSynchronizationCost Accounting StandardsvirtualizationUSB 3.0DashboardMicroVTAMRSA 2018Statement of ConformanceEVDOLinuxGlobal ExpansionPDQOmni-PathPort ServerEnterprise Content ManagementSDRSA Conferencestorage and networkingHybridColumbus SuiteWindowsappliance serverscomputingExpansion CardControllerWeb-BasedNetwork Attached Storagetrade rules and regulationseReaderCA 2EExtensionEclipseDell EMCOutput ManagementGatewaydata storageIntel AtomMessage Console ManagementFile ManagementDellCompressionJava, PC, and Web Version ControlTransparent Supply Chainz/VSEProductivitycustoms and tradeGSMFile Sharing