How vulnerable are US voting machines to foreign hackers?

Aug 10, 2016

How vulnerable are US voting machines to foreign hackers?

The recent hack of Democratic National Committee computers, attributed by authorities to Russia, has many Americans worried about foreign influence swaying the upcoming presidential election.

The DNC breach provides an excellent example of political doxing. This co-opted 1990s hacker revenge technique employs extra-legal methods to acquire and publish an individual's personal information on the internet, computer security expert Bruce Schneier explained in an article for Motherboard. What's more, according to Schneier​, political doxing is trending among cybercriminals.

Following the initial theft of DNC emails and opposition research on Republican Presidential Nominee Donald J. Trump, anti-secrecy website WikiLeaks issued approximately 20,000 internal DNC emails, Rebecca Hersher reported for NPR.

The emails, along with subsequently released stolen voicemails, indicated that high-level DNC staff actively favored Hillary Clinton during the primary election, Tom LoBianco and David Wright reported for CNN. In the wake of this leak, DNC Chairwoman Debbie Wasserman Schultz offered her resignation, an embarrassment on the eve of the Democratic National Convention where Clinton accepted the party's presidential nomination.

Fears that the Russian government may use cybercrime to ensure a Trump presidency are swirling after Trump's suggestion that Russian intelligence should similarly acquire missing emails from Clinton's tenure as Secretary of State, LoBianco and Wright reported. Trump later claimed the comment was sarcastic, and Russian authorities deny any involvement in the DNC hack. However, many still raise the question of whether Russia might look to cyberattacks to influence the 2016 U.S. presidential election.

Electronic voting technology

Political doxing represents an eye-catching weak point in the American electoral system, but a quieter risk to ballot security lies in the age of voting machines. While electronic voting technology is hardly a new concept - the 2002 Help America Vote Act mandated that each county make a minimum of two electronic ballot boxes available to residents - most people might expect to find the most up-to-date technology when they head to the polls.

However, the reality disappoints. A 2015 report by the Brennan Center for Justice warned that modern voting machines differ from their predecessors in that they are not intended to function for decades. According to the report, equipment purchased after 2000 is expected to last between 10 and 20 years. Most electronic ballot boxes that debuted at the turn of the century were designed in the 1990s, creating several problems: Chiefly, the report asserted, as of 2016 43 states are using machines 10 or more years old, and 14 states are using machines at least 15 years old.

Not only is the technology more than a decade behind current innovations, but because of the equipment's age, finding replacements for damaged or worn-out parts can be difficult, the Brennan Center report noted. As the technology nears the end of its life expectancy, voting machines are at increasing risk of crashing.

Such errors can affect elections, Richard Forno reported in a recent Government Technology article. Forno noted that in 2004 North Carolina voting machines deleted 4,438 votes, for which there was no backup record. In the end, fewer than 2,000 votes determined the results of that same election, Cory Bennett noted in a 2014 article for The Hill.

Yet another trouble that surrounds electronic ballot boxes is the lack of funding for states to purchase updated technology. As the functionality of electronic voting machines begins to deteriorate across the country, the Brennan Center reported, 22 out of 31 states seeking to purchase new equipment in the next five years reported lacking the necessary funds. The national cost of replacing all outdated voting machines may be upward of $1 billion, the Brennan Center calculated.

What else could go wrong?

Beyond voting machine age and political doxing, U.S. elections face other technology issues. In an opinion article in The Washington Post, Schneier argued that directly influencing electronic ballots is not the only way foreign governments might tamper with a U.S. election. Schneier expressed concerns about electronic voter records, stating that foreign cybercriminals could access and delete such information.

In a May 2016 article on election fraud, The Hill's Cory Bennett also cited the security of voter data as an important issue to address. Quoting the CEO of secure digital election system advocate group Free & Fair, Joseph Kiniry, Bennett made the case that by deleting select voter registration data, hackers have the power to easily wreak havoc on elections and noted that stolen voter information is somewhat valuable in of itself, with packages of 5 to 10 million records selling for $1,350 to $2,250 on the dark web, providing a further motive to potential cyber criminals.

What's more, Bennett asserted, security guidelines are not consistent between states, and some categorize voter information as "public record." This classification means that states are not mandated to meet the federal security standards placed upon "personally identifiable information" for voter data, which is not viewed as such.

In his Government Technology article, Forno explained that electronic ballot boxes face security risks due to the voting process itself. In order to successfully serve each precinct, voting machines are spread out across their county's municipal gird. Furthermore, votes must be transferred to a higher voting office to be tallied, creating vulnerable junctures that hackers could attack, Forno noted.

In order to ensure accurate election results, Forno concluded, the hardware and the network connection linking electoral machines must be secure. In addition, the electronic ballot boxes' software and the states' local tabulating software must be able to resist cyberattacks.

What is the alternative?

Some states have opted to return to traditional paper ballots, citing security concerns. In fact, Bennett asserted, more than half the states have begun to revert to paper ballots.

A more high-tech alternative to cybercrime risks is to invest in securing and updating electronic voting machines. While Forno made it clear that he does not believe that any given piece of electoral equipment is likely to be sabotaged by a foreign government, he maintained the importance of securing voting machines to ensure the legitimacy and accuracy of U.S. elections.

The best solution seems to come when paper and digital meet in the middle. Other states can take their cue from Ohio, which passed legislation requiring all precincts to use only voting machines that generate a voter-verified paper trail, according to Bennett.

In addition, allocating funds to meet the impending costs of upgrading electrical equipment, as estimated by the Brennan Center, is also a necessary step for states to take, should they wish to maintain electronic voting machines.

In the face of election security concerns, state governments are wise to update their voting machines.

 



Tags:
Category: Cybersecurity

Add Pingback

Please add a comment

You must be logged in to leave a reply. Login »

Category List

IoT (1)
Application Development (2)
Intel (9)
Transportation (19)
Cloud Computing (54)
Industrial Automation (3)
Edge Computing (1)
Mainframe Modernization (8)
Data Security (82)
Cyber Security (2)
Storage & Archive (4)
Defense Architecture (6)
Supply Chain (1)
Application Management (4)
Products and Services (8)
Collaboration (15)
Green IT (2)
Dell OEM Platforms (3)
Oil and Gas (2)
Solution Overview (3)
Research & Development (1)
Big Data (1)
Product Lifecycle Support (3)
Compliance (5)
Strategic Planning (6)
Dell EMC OEM (9)
Health Monitoring (1)
Data Center (33)
Industry News and Trends (53)
Data Backup and Data Loss Prevention (6)
Global Support Services (8)
Education (4)
Virtualization (5)
Security (7)
Wireless Infrastructure (31)
Storage and Archive (5)
Sales Kick-Off (1)
Events (37)
Healthcare IT (4)
Systems Integration Partner (2)
Cloud Storage (16)
Dell Technologies OEM | Embedded & Edge Solutions (1)
Public Safety (60)
Information Governance (5)
e-Recycling (3)
Ivy Bridge (1)
Solutions (6)
Appliance Model and Methodology (1)
Mobile Device Management (32)
OEM Partnership (3)
Transparent Supply Chain (2)
Manufacturing (1)
Survey (2)
System and Data Management (4)
Homeland Security (3)
Cybersecurity (80)
Logistics & Compliance (5)
System Architecture (4)
Telecom Platform Deployment (5)
News (25)
Datasheet (1)
Manuals (2)
Demos (4)
Data Backup (2)
Online File Sharing (35)
Technology (32)
Collateral (2)
Global Logistics (7)
5G (2)
System Integration (10)
Hardware Appliance (11)
Intel Xeon Scalable processors (4)
Internet of Things (8)
Trade Compliance (2)
Application Deployment (21)

Tag List

IoT Challenges (1)
Physical Security (1)
Accessory (5)
Hub (4)
storage and networking (1)
ntel Xeon Scalable Processor Family (1)
Copper (12)
Product Compliance (1)
purpose-built hardware (3)
Data protection (3)
NAS (6)
golf classic, humanitarian, charity, philanthropy, engineering, (2)
Autonomous Driving (1)
Fleet Management (1)
Automated Operations (65)
REXX (2)
Intel Xeon Scalable Processor Family (4)
Softmodem (5)
Data Center (1)
Spool File Management (8)
video data storage (2)
Helpdesk (2)
Cybersecurity Awareness Month (3)
Windows (66)
SSD (1)
Productivity (38)
Voice (5)
Intel Xeon Scalable (3)
gold (1)
Intel Atom (2)
Risk Management (1)
Dell Technologies World (2)
Cost Accounting Standards (1)
customs and trade (1)
UNICOM Government Services (1)
Grown Defects on HDDs (1)
GPS (8)
Dell Security (1)
Logistics and Trade Compliance (1)
Batch Schedule (6)
Technology Transitions (5)
Dell EMC OEM (2)
Message Console Management (9)
Optane (1)
Federal Government (1)
UNICOM Engineering Flexibility (3)
4G (1)
State and local Government (1)
Web Access (7)
Cloud Computing (2)
certifications (1)
Embedded (5)
Performance Management (83)
QuickAssist (1)
J2EE (2)
56K (48)
Cyber Security (11)
V.22 (15)
Terminal Emulation (10)
Policy Management (1)
Capacity Planning (23)
Software Change Management (27)
purpose built hardware (1)
Dial-up (69)
Intel Xeon Scalable Based Platforms (2)
DellTechWorld (1)
3270 Terminals (7)
UNICOM Engineering Global Scale (3)
Dell EMC Titanium OEM (2)
Modemulator (6)
Dell Technologies OEM & IoT (6)
GCS (7)
Dell 14G (1)
Automated (2)
System Integration (4)
Compression (4)
UniGW 2.0 (3)
Problem and Incident Management (2)
Data Backup (12)
Output Management (142)
Portfolio Management (5)
Optane memory (1)
e-recycling (2)
Web-Enablement (11)
Line Probing (18)
Intel Partner Connect (1)
USB (51)
Public Sector (1)
2nd Generation Intel Xeon Processor Family (1)
architecture (2)
Content Management (32)
Help Desk (2)
Compact Flash (3)
Aggregation (11)
z/VSE (132)
Forward Stocking Locations (1)
VM (7)
Dell PowerEdge C4140 (1)
Reporting (68)
Gigabit (15)
Administration (1)
Edge computing (1)
SDXC (3)
Security (18)
ExpressCard (5)
Line Consolidation (5)
EU Lot 9 Regulations (3)
Technology (4)
NAB (1)
Defects (1)
Statement of Conformance (1)
Knowledge base (2)
Dell EMC OEM PowerEdge 14th Generation Servers (2)
WebSphere (1)
JES Administration (10)
product lifecycle support (1)
Global (15)
Performance Monitoring (5)
Dell EMC OEM Storage (1)
V.Everywhere (8)
Analysis (8)
Intel Optane (5)
Business Intelligence (15)
Resource Management (7)
CICS (85)
trade rules and regulations (2)
Low Profile PCI (10)
Solaris (3)
DIP switches (5)
UNICOM Engineering (12)
Debugging (30)
AI (1)
PowerEdge 14G Servers (4)
GDPR (1)
File Sharing (10)
RSA 2018 (1)
TeamBLUE (5)
servers (1)
IMS (10)
Advance Replacement Services (1)
computing (2)
Issue Tracking (4)
Data security (5)
Content Transformation (1)
bronze (1)
Application Deployment (3)
Production Printing (1)
platinum (1)
Fiber (7)
IPMI (1)
Dell EMC Unity XT (2)
Loop Detection (3)
Code Path Analysis (11)
Card Reader (3)
Dashboard (4)
CA 2E (4)
Global Expansion Partners (1)
Synon (4)
Partners (1)
silver (1)
VROC (1)
Intel Atom C3000 (5)
RAID (1)
CICS Print (1)
Stand (9)
USB 3.0 (30)
VSAM Forward Data Recovery (5)
Console Management (19)
Diagnostic (3)
UNIX/Linux (18)
Multi-Mode (4)
Purley (2)
Asset Management (2)
Flash ROM (28)
Whitepaper (1)
electronic waste (2)
TAP (19)
Intel Optane SSDs (1)
Controller (28)
recycle electronics (2)
Omni-Path (3)
Event (1)
Carrier Loss Redial (8)
Video Surveillance (2)
Quality (1)
Serial (40)
Data File Management (4)
OEM (8)
Document Processing (125)
ISC West (1)
Advance Replacement Support Program (1)
Application Modernization (12)
Code Editor (10)
memory (1)
Intel (4)
PIE/CICS Suite (13)
Half Duplex (9)
Network Attached Storage (6)
Application Lifecycle (2)
GSM (8)
Port Server (8)
Java, PC, and Web Version Control (3)
PDQ (4)
appliance servers (4)
UNICOM Engineering Expertise (3)
Intel Optane DC (3)
Skylake (2)
digital transformation (2)
Artificial Intelligence (4)
Tape Management (8)
Menu Management (11)
FPGA (1)
Virtual OEM (2)
Security Management (8)
Internet of Things (6)
Dell Platforms (1)
Fault Analysis and Testing (62)
z/OS (306)
Datacenter, NetApp, DCOI, Compliance, data center optimization (1)
Brand Protection (1)
Automated Job Scheduling (6)
low-power (1)
Support Services (1)
Eclipse (30)
Cloud Storage (2)
CARTS Suite (10)
Line Sharing (11)
Consolidation (2)
Brexit (1)
Backup (3)
electronic recycling (2)
5G Network (1)
SCM (27)
Power Switch (8)
File Management (19)
Micro (5)
Job Accounting (5)
Online Help (11)
deep technology (1)
Hybrid (8)
e-waste (2)
Deployment Partner (2)
Dell OEM (1)
Skylake (1)
ISO Standards (2)
File Delivery (1)
trade restrictions (1)
Tablet (9)
File Processing (8)
Session Management (36)
Disk Management (9)
IoT (8)
Batch Processing (6)
Print Management (137)
ProGen Plus Interface (3)
Synchronization (1)
z/VM (16)
Console Server (8)
Ethernet (12)
30 Pin (5)
SD (3)
VOEM (1)
V.Everything (8)
WCDMA (5)
Singlemode (3)
Storage Appliances (2)
Golf Classic 2019 (1)
virtualization (1)
Systems Monitoring (2)
VTAM (33)
Strategic Partner (1)
Global Expansion (1)
CDMA (5)
PCIe (10)
Full Duplex (16)
Global Services (1)
Compliance Management (1)
Business (5)
2019 Partner of the Year (1)
Columbus Suite (140)
Independent Software Vendors (1)
UNICOM Engineering Services (1)
Regulatory Compliance (4)
Application Development (7)
HDDs (1)
NVMe (1)
Regeneration (2)
Dell PowerStore (1)
5G (4)
Document Management and Delivery (164)
Document Composition (13)
CICS Applications (11)
PowerEdge (1)
Firewall (5)
database IOPS1 (1)
Automated Data Compression (5)
IBM i (94)
Mac (5)
Centralized Control (1)
RSA Conference (10)
Custom Server Branding (1)
Smartphone (9)
QAT (1)
HSPA+ (5)
Cable (18)
Expansion Card (3)
Modem (51)
VSAM (27)
ATCA (1)
TSO (3)
Lewisburg (1)
PIE/TSO Suite (15)
Window Management (4)
Internal (25)
Dell EMC (4)
Telephony (11)
Transitioning to Haswell (1)
Transparent Supply Chain (2)
AIX (6)
VSE (7)
data storage (4)
solutions development (2)
Remote Access (8)
Solution Design (1)
System Performance Monitoring (5)
Modem Emulation (6)
appliance (1)
trade compliance (2)
Web-Based (1)
Accounting (6)
edge servers (1)
Partnership (1)
Systems Management (18)
Intel® Atom® C3000 (2)
4GL (5)
Advance Server Replacement (1)
Dell EMC PowerVault ME4 (2)
Performance Analysis (5)
Dell EMC Isilon (2)
Systems Integration (2)
PCI (20)
Speed Leveling (8)
SDHC (3)
Storage Management (8)
Library Management (10)
software (2)
Lewisburg PCH (1)
eReader (4)
Automated Messaging (8)
Atom C3000 (2)
InSync Suite (34)
Global Support (3)
Intel Xeon Scalable Processors (10)
Dell (1)
Application Lifecycle Management (38)
Macro-Level Interpreter (2)
Extension (4)
Reliability (4)
VMware vSAN cluster1 (1)
server architecture (1)
Java (10)
Data Management (68)
Skylake Purley (1)
External (23)
Database (24)
communications (1)
Intel® (6)
microarchitecture (1)
Advanced Job Scheduling (8)
EVDO (5)
Gateway (11)
Network (1)
Linux (33)
iDRAC with Quick Sync 2 mobile-based management (1)
UNICOM Engineering Products (3)
Enterprise Content Management (1)
Sandy Bridge (4)
ALM (27)
Help Management (4)
ECM (1)
Wireless Mesh (4)
Cellular (12)
LANSA (3)

Tag Cloud

System Performance MonitoringiDRAC with Quick Sync 2 mobile-based managementserver architectureSolution DesignNetwork Attached StorageWeb-EnablementJES AdministrationAutomatedContent ManagementReportingGatewayWindowse-wasteWeb-BasedIoTCloud StorageWeb AccessSystems ManagementQualityHelp ManagementBackupDellApplication LifecycleGigabitAccountingEnterprise Content ManagementvirtualizationAnalysisIntel Optane SSDsdeep technologyEmbeddedFiberHDDsCARTS SuiteUNICOM Government ServicesFlash ROMProduct ComplianceCompact FlashVMVSAMDell Technologies OEM & IoTInSync SuiteIntel AtomPerformance ManagementPIE/CICS SuiteV.225G NetworkEVDOAutonomous Drivingdata storage4GLIntelSoftmodemIntel Partner ConnectJavaHalf DuplexSpool File ManagementDell EMC Titanium OEMDashboardOEMPDQSystems MonitoringDell Technologies WorldVirtual OEMSmartphoneFile SharingStandvideo data storageISC WestAutomated Job SchedulingTechnology Transitions5GPowerEdgeDell EMCREXXSecuritySerialIntel Xeon Scalable ProcessorsLow Profile PCISupport ServicesAdvanced Job SchedulingmicroarchitecturePerformance AnalysisGolf Classic 2019File ManagementSandy BridgeUNICOM Engineering FlexibilityOmni-PathIntel Xeon Scalable Based PlatformsCA 2EPolicy ManagementDell PlatformsCode EditorConsole ManagementIntel Optane DCStatement of ConformanceProblem and Incident ManagementQuickAssistDell EMC OEM StorageApplication ModernizationV.EverywhereJob AccountingSkylakeAdvance Server ReplacementAccessorysolutions developmentProduction PrintingNASWireless MeshPrint ManagementSkylakeSynchronizationDell PowerStoreSoftware Change ManagementStorage ManagementATCALogistics and Trade ComplianceControllerLewisburgCyber Securitypurpose-built hardwareJ2EEFPGABatch ProcessingIssue TrackingSCMUNIX/LinuxUNICOM Engineering30 PinCellulardatabase IOPS1Artificial Intelligencelow-powerapplianceDellTechWorldSDXCGlobal SupportMicroIntel® Atom® C3000DatabaseIoT ChallengesGrown Defects on HDDsz/OSSynonSecurity ManagementDell EMC OEMNVMeSystems IntegrationPort ServerPower SwitchTSOAdvance Replacement Support ProgramPowerEdge 14G ServersLine SharingApplication DeploymentUniGW 2.0Performance MonitoringSkylake PurleyVideo SurveillanceHSPA+softwareHybridGDPRNetworkAutomated OperationsIntel Xeon ScalableVROCFederal GovernmentOutput ManagementIBM iCablentel Xeon Scalable Processor FamilyCICS Applicationsedge serversFull DuplexVOEMData File ManagementSDAtom C3000Online Helpdigital transformationappliance serversLine ProbingLANSAPurleyIPMICopper56KOptane memoryCompressionBrexitEventserversAIRegulatory ComplianceCard ReaderProductivityConsolidationEU Lot 9 RegulationsEclipse4GSolarisResource ManagementRSA 2018Data BackupPartnerscomputingPortfolio ManagementFile Processingcommunicationsrecycle electronicsLine ConsolidationRegenerationbronzeMacRSA ConferenceCode Path AnalysisPCIeGlobal ServicesDell EMC IsilonRemote Accessgolf classic, humanitarian, charity, philanthropy, engineering,DefectsWebSpherez/VSETAPGSMCloud ComputingHelpdeskExtensionModemulatorJava, PC, and Web Version ControlAdvance Replacement ServicesNABBusiness IntelligenceIntel Optanetrade complianceDiagnosticIntel®Loop DetectionCentralized ControlDell OEMKnowledge baseForward Stocking LocationsmemoryRisk ManagementData protectionVTAMLewisburg PCHDell EMC OEM PowerEdge 14th Generation ServersCDMAelectronic recyclingVSEBatch ScheduleDell EMC Unity XTUSBGlobal ExpansionCompliance ManagementState and local GovernmentEdge computingSession ManagementData CenterTechnologyColumbus SuiteFault Analysis and TestingCarrier Loss RedialDebuggingIndependent Software VendorsPCITeamBLUEarchitectureDocument ProcessingDocument CompositionVoiceDell PowerEdge C4140UNICOM Engineering ExpertiseModem EmulationAsset ManagementData securityHelp DeskFirewallDial-upz/VM3270 TerminalsTabletFleet ManagementAdministrationCost Accounting StandardsgoldBrand ProtectionsilverApplication Lifecycle Management2019 Partner of the YearConsole ServerECMApplication DevelopmentAggregationHubCustom Server BrandingCapacity PlanningTape ManagementDisk ManagementMenu ManagementAutomated Data CompressionALMWhitepaperExternalSSDGPSpurpose built hardwareSDHCDatacenter, NetApp, DCOI, Compliance, data center optimizationtrade rules and regulationsData ManagementDell EMC PowerVault ME4GlobalBusinessUNICOM Engineering ServicesMacro-Level InterpreterSystem IntegrationVSAM Forward Data RecoveryCICSproduct lifecycle supportRAIDUSB 3.0Speed LevelingFile DeliveryInternalMessage Console ManagementIntel Atom C3000CICS Printe-recyclingEthernetGCSPublic SectorIntel Xeon Scalable Processor FamilyReliabilitySinglemodestorage and networkingLibrary ManagementOptaneProGen Plus InterfaceAIXCybersecurity Awareness MonthUNICOM Engineering Global ScaleWindow ManagementExpressCardcertificationsDell SecurityTransparent Supply ChainDIP switchesStrategic PartnerPartnershipContent TransformationQATTransitioning to HaswellModemPIE/TSO SuiteIMSeReaderV.EverythingExpansion CardWCDMAISO StandardsDell 14GGlobal Expansion PartnersUNICOM Engineering ProductsAutomated Messagingtrade restrictionsInternet of Things2nd Generation Intel Xeon Processor FamilyTerminal EmulationLinuxVMware vSAN cluster1TelephonyplatinumDeployment PartnerStorage AppliancesMulti-ModePhysical Securitycustoms and tradeelectronic wasteDocument Management and Delivery


Archive