How vulnerable are US voting machines to foreign hackers?

Aug 10, 2016

How vulnerable are US voting machines to foreign hackers?

The recent hack of Democratic National Committee computers, attributed by authorities to Russia, has many Americans worried about foreign influence swaying the upcoming presidential election.

The DNC breach provides an excellent example of political doxing. This co-opted 1990s hacker revenge technique employs extra-legal methods to acquire and publish an individual's personal information on the internet, computer security expert Bruce Schneier explained in an article for Motherboard. What's more, according to Schneier​, political doxing is trending among cybercriminals.

Following the initial theft of DNC emails and opposition research on Republican Presidential Nominee Donald J. Trump, anti-secrecy website WikiLeaks issued approximately 20,000 internal DNC emails, Rebecca Hersher reported for NPR.

The emails, along with subsequently released stolen voicemails, indicated that high-level DNC staff actively favored Hillary Clinton during the primary election, Tom LoBianco and David Wright reported for CNN. In the wake of this leak, DNC Chairwoman Debbie Wasserman Schultz offered her resignation, an embarrassment on the eve of the Democratic National Convention where Clinton accepted the party's presidential nomination.

Fears that the Russian government may use cybercrime to ensure a Trump presidency are swirling after Trump's suggestion that Russian intelligence should similarly acquire missing emails from Clinton's tenure as Secretary of State, LoBianco and Wright reported. Trump later claimed the comment was sarcastic, and Russian authorities deny any involvement in the DNC hack. However, many still raise the question of whether Russia might look to cyberattacks to influence the 2016 U.S. presidential election.

Electronic voting technology

Political doxing represents an eye-catching weak point in the American electoral system, but a quieter risk to ballot security lies in the age of voting machines. While electronic voting technology is hardly a new concept - the 2002 Help America Vote Act mandated that each county make a minimum of two electronic ballot boxes available to residents - most people might expect to find the most up-to-date technology when they head to the polls.

However, the reality disappoints. A 2015 report by the Brennan Center for Justice warned that modern voting machines differ from their predecessors in that they are not intended to function for decades. According to the report, equipment purchased after 2000 is expected to last between 10 and 20 years. Most electronic ballot boxes that debuted at the turn of the century were designed in the 1990s, creating several problems: Chiefly, the report asserted, as of 2016 43 states are using machines 10 or more years old, and 14 states are using machines at least 15 years old.

Not only is the technology more than a decade behind current innovations, but because of the equipment's age, finding replacements for damaged or worn-out parts can be difficult, the Brennan Center report noted. As the technology nears the end of its life expectancy, voting machines are at increasing risk of crashing.

Such errors can affect elections, Richard Forno reported in a recent Government Technology article. Forno noted that in 2004 North Carolina voting machines deleted 4,438 votes, for which there was no backup record. In the end, fewer than 2,000 votes determined the results of that same election, Cory Bennett noted in a 2014 article for The Hill.

Yet another trouble that surrounds electronic ballot boxes is the lack of funding for states to purchase updated technology. As the functionality of electronic voting machines begins to deteriorate across the country, the Brennan Center reported, 22 out of 31 states seeking to purchase new equipment in the next five years reported lacking the necessary funds. The national cost of replacing all outdated voting machines may be upward of $1 billion, the Brennan Center calculated.

What else could go wrong?

Beyond voting machine age and political doxing, U.S. elections face other technology issues. In an opinion article in The Washington Post, Schneier argued that directly influencing electronic ballots is not the only way foreign governments might tamper with a U.S. election. Schneier expressed concerns about electronic voter records, stating that foreign cybercriminals could access and delete such information.

In a May 2016 article on election fraud, The Hill's Cory Bennett also cited the security of voter data as an important issue to address. Quoting the CEO of secure digital election system advocate group Free & Fair, Joseph Kiniry, Bennett made the case that by deleting select voter registration data, hackers have the power to easily wreak havoc on elections and noted that stolen voter information is somewhat valuable in of itself, with packages of 5 to 10 million records selling for $1,350 to $2,250 on the dark web, providing a further motive to potential cyber criminals.

What's more, Bennett asserted, security guidelines are not consistent between states, and some categorize voter information as "public record." This classification means that states are not mandated to meet the federal security standards placed upon "personally identifiable information" for voter data, which is not viewed as such.

In his Government Technology article, Forno explained that electronic ballot boxes face security risks due to the voting process itself. In order to successfully serve each precinct, voting machines are spread out across their county's municipal gird. Furthermore, votes must be transferred to a higher voting office to be tallied, creating vulnerable junctures that hackers could attack, Forno noted.

In order to ensure accurate election results, Forno concluded, the hardware and the network connection linking electoral machines must be secure. In addition, the electronic ballot boxes' software and the states' local tabulating software must be able to resist cyberattacks.

What is the alternative?

Some states have opted to return to traditional paper ballots, citing security concerns. In fact, Bennett asserted, more than half the states have begun to revert to paper ballots.

A more high-tech alternative to cybercrime risks is to invest in securing and updating electronic voting machines. While Forno made it clear that he does not believe that any given piece of electoral equipment is likely to be sabotaged by a foreign government, he maintained the importance of securing voting machines to ensure the legitimacy and accuracy of U.S. elections.

The best solution seems to come when paper and digital meet in the middle. Other states can take their cue from Ohio, which passed legislation requiring all precincts to use only voting machines that generate a voter-verified paper trail, according to Bennett.

In addition, allocating funds to meet the impending costs of upgrading electrical equipment, as estimated by the Brennan Center, is also a necessary step for states to take, should they wish to maintain electronic voting machines.

In the face of election security concerns, state governments are wise to update their voting machines.

 



Tags:
Category: Cybersecurity

Add Pingback

Please add a comment

You must be logged in to leave a reply. Login »

Category List

Homeland Security (3)
System Architecture (4)
Demos (4)
System Integration (10)
Big Data (1)
Defense Architecture (6)
Events (37)
5G (2)
Cyber Security (2)
Health Monitoring (1)
Application Deployment (21)
Technology (33)
Green IT (2)
Dell Technologies OEM | Embedded & Edge Solutions (1)
Manufacturing (1)
e-Recycling (3)
Appliance Model and Methodology (1)
Information Governance (5)
Trade Compliance (3)
Ivy Bridge (1)
Education (4)
Dell OEM Platforms (3)
System and Data Management (4)
News (25)
Internet of Things (8)
Data Security (82)
Intel Xeon Scalable processors (4)
Transparent Supply Chain (2)
Collaboration (15)
Solution Overview (3)
Intel (9)
Hardware Appliance (11)
Sales Kick-Off (1)
Cloud Computing (54)
Global Logistics (7)
Supply Chain (1)
Data Backup and Data Loss Prevention (6)
OEM Partnership (3)
Oil and Gas (2)
Compliance (5)
Storage & Archive (5)
Transportation (19)
Mainframe Modernization (8)
Virtualization (5)
Public Safety (60)
Datasheet (1)
Solutions (6)
Edge Computing (1)
Wireless Infrastructure (31)
Cloud Storage (16)
Survey (2)
Data Center (33)
Application Development (2)
Industry News and Trends (53)
Logistics & Compliance (5)
IoT (1)
Strategic Planning (6)
Industrial Automation (3)
Application Management (4)
Cybersecurity (80)
Manuals (2)
Storage and Archive (5)
Product Lifecycle Support (3)
Healthcare IT (4)
Dell EMC OEM (9)
Research & Development (1)
Collateral (2)
Systems Integration Partner (2)
Data Backup (2)
Telecom Platform Deployment (5)
Security (7)
Online File Sharing (35)
Global Support Services (9)
Products and Services (8)
Mobile Device Management (32)

Tag List

Grown Defects on HDDs (1)
Technology Transitions (5)
HDDs (1)
Telephony (11)
Online Help (11)
IoT Challenges (1)
Line Sharing (11)
Application Lifecycle Management (38)
ISC West (1)
Menu Management (11)
FPGA (1)
GPS (8)
Brexit (1)
Security (18)
ATCA (1)
Controller (28)
DellTechWorld (1)
Purley (2)
Carrier Loss Redial (8)
Forward Stocking Locations (1)
Dell EMC OEM Storage (3)
Atom C3000 (2)
Batch Schedule (6)
Copper (12)
DIP switches (5)
Linux (33)
communications (1)
Automated Job Scheduling (6)
Line Probing (18)
Asset Management (2)
NAS (6)
Omni-Path (3)
Analysis (8)
Synon (4)
Application Lifecycle (2)
Consolidation (2)
Extension (4)
digital transformation (2)
GSM (8)
Defects (1)
Production Printing (1)
Message Console Management (9)
Cable (18)
edge servers (1)
Full Duplex (16)
SDXC (3)
CARTS Suite (10)
NVMe (1)
V.Everywhere (8)
CDMA (5)
e-recycling (2)
Console Management (19)
Skylake (1)
Transparent Supply Chain (2)
Data Management (68)
Technology (5)
Partners (1)
Advanced Job Scheduling (8)
Artificial Intelligence (4)
Macro-Level Interpreter (2)
Window Management (4)
Embedded (5)
Strategic Partner (1)
Document Composition (13)
z/OS (306)
LANSA (3)
gold (1)
Help Desk (2)
PCI (20)
Dell Platforms (2)
TAP (19)
Solution Design (1)
Power Switch (8)
QAT (1)
V.Everything (8)
2019 Partner of the Year (1)
Dell 14G (1)
USB 3.0 (30)
Optane (1)
Synchronization (1)
Dell Technologies (1)
Automated (2)
z/VM (16)
Software Change Management (27)
Modem Emulation (6)
SCM (27)
Skylake Purley (1)
Performance Monitoring (5)
5G Network (1)
Security Management (8)
Session Management (36)
Hybrid (8)
Capacity Planning (23)
Dial-up (69)
Cellular (12)
Centralized Control (1)
VROC (1)
Cloud Computing (2)
servers (1)
EU Lot 9 Regulations (3)
Internet of Things (6)
Systems Integration (2)
JES Administration (10)
Federal Government (1)
Document Processing (125)
database IOPS1 (1)
System Performance Monitoring (5)
Dell PowerStore (1)
Dell EMC ProSupport (1)
ECM (1)
UniGW 2.0 (3)
Dell EMC Titanium OEM (2)
WCDMA (5)
InSync Suite (34)
Wireless Mesh (4)
data storage (4)
SSD (1)
Gateway (11)
Output Management (142)
UNICOM Engineering Flexibility (3)
4GL (5)
CA 2E (4)
Intel Atom C3000 (5)
Intel Xeon Scalable (3)
VOEM (1)
Network Attached Storage (6)
Systems Monitoring (2)
software (2)
platinum (1)
Softmodem (5)
Application Development (7)
Card Reader (3)
Dell EMC PowerScale Storage (1)
Web Access (7)
V.22 (15)
Intel Xeon Scalable Processor Family (4)
Productivity (38)
NAB (1)
golf classic, humanitarian, charity, philanthropy, engineering, (2)
Golf Classic 2019 (1)
PowerEdge 14G Servers (4)
Stand (9)
Java (10)
J2EE (2)
Regulatory Compliance (4)
z/VSE (132)
AIX (6)
Virtual OEM (2)
Web-Based (1)
UNICOM Engineering Products (3)
server architecture (1)
Dell EMC OEM PowerEdge 14th Generation Servers (2)
AI (1)
Global (15)
Database (24)
REXX (2)
Half Duplex (9)
Deployment Partner (2)
Intel Optane DC (3)
Logistics and Trade Compliance (2)
Global Services (1)
CICS (85)
Print Management (137)
Problem and Incident Management (2)
Intel Optane SSDs (1)
Accessory (5)
Statement of Conformance (1)
IoT (8)
Accounting (6)
Cost Accounting Standards (1)
Data security (5)
SD (3)
30 Pin (5)
Application Deployment (3)
Eclipse (30)
Physical Security (1)
ntel Xeon Scalable Processor Family (1)
Quality (1)
Intel Partner Connect (1)
RSA 2018 (1)
Automated Messaging (8)
UNICOM Engineering Expertise (3)
Internal (25)
Cloud Storage (2)
purpose built hardware (1)
Web-Enablement (11)
Enterprise Content Management (1)
SDHC (3)
virtualization (1)
ExpressCard (5)
PDQ (4)
TSO (3)
Regeneration (2)
File Management (19)
Debugging (30)
Performance Management (83)
56K (48)
PIE/CICS Suite (13)
Intel Optane (5)
Compression (4)
RAID (1)
PCIe (10)
Modemulator (6)
Storage Management (8)
OEM (8)
ALM (27)
Intel® (6)
PowerEdge (1)
Smartphone (9)
Custom Server Branding (1)
Storage Appliances (2)
Tape Management (8)
Resource Management (7)
Dell Security (1)
Global Expansion Partners (1)
Whitepaper (1)
GDPR (1)
Mac (5)
Edge computing (1)
Job Accounting (5)
File Sharing (10)
Firewall (5)
trade restrictions (1)
Cyber Security (11)
Content Management (32)
Public Sector (1)
Code Path Analysis (11)
External (23)
HSPA+ (5)
Global Expansion (1)
Aggregation (11)
Advance Replacement Services (1)
UNICOM Engineering Global Scale (3)
Spool File Management (8)
purpose-built hardware (3)
Lewisburg (1)
Hub (4)
memory (1)
Advance Replacement Support Program (1)
Dell EMC Isilon (2)
Diagnostic (3)
ISO Standards (2)
Issue Tracking (4)
Low Profile PCI (10)
Application Modernization (12)
IBM i (94)
Micro (5)
Policy Management (1)
WebSphere (1)
Helpdesk (2)
e-waste (2)
Windows (66)
Voice (5)
Administration (1)
trade compliance (2)
CICS Print (1)
Ethernet (12)
architecture (2)
Dell EMC Unity XT (2)
Fiber (7)
IPMI (1)
recycle electronics (2)
Data Backup (12)
Reporting (68)
Independent Software Vendors (1)
QuickAssist (1)
Autonomous Driving (1)
storage and networking (1)
3270 Terminals (7)
Dell EMC Powerlex (1)
Product Compliance (1)
Batch Processing (6)
UNICOM Engineering (12)
appliance servers (4)
Backup (3)
Console Server (8)
Intel (4)
System Integration (4)
Systems Management (18)
Library Management (10)
IMS (10)
eReader (4)
Fault Analysis and Testing (62)
Cybersecurity Awareness Month (3)
Dell PowerEdge C4140 (1)
iDRAC with Quick Sync 2 mobile-based management (1)
Modem (51)
computing (2)
TeamBLUE (5)
silver (1)
CICS Applications (11)
GCS (7)
Dell OEM (1)
Automated Data Compression (5)
Dell Technologies OEM & IoT (6)
UNICOM Government Services (1)
Intel Xeon Scalable Processors (10)
Intel Atom (2)
EVDO (5)
appliance (1)
Dashboard (4)
Dell EMC (4)
ProGen Plus Interface (3)
Intel® Atom® C3000 (2)
Content Transformation (1)
VTAM (33)
PIE/TSO Suite (15)
VSE (7)
Lewisburg PCH (1)
Help Management (4)
RSA Conference (10)
Singlemode (3)
Video Surveillance (2)
Compliance Management (1)
Expansion Card (3)
Brand Protection (1)
Advance Server Replacement (1)
4G (1)
Data File Management (4)
Flash ROM (28)
certifications (1)
electronic waste (2)
Partnership (1)
VSAM (27)
Tablet (9)
Datacenter, NetApp, DCOI, Compliance, data center optimization (1)
VMware vSAN cluster1 (1)
Remote Access (8)
Code Editor (10)
deep technology (1)
microarchitecture (1)
Dell Technologies World (2)
Support Services (1)
Compact Flash (3)
Dell EMC PowerVault ME4 (2)
Global Support (3)
Skylake (2)
Solaris (3)
UNIX/Linux (18)
electronic recycling (2)
Intel Xeon Scalable Based Platforms (2)
Terminal Emulation (10)
Document Management and Delivery (164)
video data storage (2)
Business (5)
Data protection (3)
Sandy Bridge (4)
Line Consolidation (5)
Columbus Suite (140)
Fleet Management (1)
Business Intelligence (15)
Network (1)
VSAM Forward Data Recovery (5)
File Processing (8)
Java, PC, and Web Version Control (3)
File Delivery (1)
Portfolio Management (5)
solutions development (2)
USB (51)
Loop Detection (3)
Port Server (8)
Knowledge base (2)
Optane memory (1)
bronze (1)
Data Center (1)
Serial (40)
Multi-Mode (4)
UNICOM Engineering Services (1)
Dell (1)
2nd Generation Intel Xeon Processor Family (1)
Event (1)
Automated Operations (65)
Risk Management (1)
Performance Analysis (5)
Disk Management (9)
product lifecycle support (1)
trade rules and regulations (2)
Dell EMC OEM (2)
VM (7)
Gigabit (15)
Reliability (4)
customs and trade (1)
Speed Leveling (8)
5G (4)
State and local Government (1)
low-power (1)
Transitioning to Haswell (1)

Tag Cloud

AccountingSDVTAMVoiceappliance serversMacro-Level Interpreterntel Xeon Scalable Processor FamilyVROCJ2EEbronzeData ManagementSDHCIntel Partner ConnectcertificationsIntel AtomAdvance Replacement ServicesIMSInSync SuiteIntel Xeon ScalableRisk ManagementDell Technologiestrade restrictionseReaderV.EverythingControllerApplication DeploymentIntel Optane SSDsCompressionCard ReaderApplication LifecycleContent ManagementDocument Management and DeliveryUniGW 2.0DashboardVMz/VSEDell EMC OEMSmartphoneJava, PC, and Web Version ControlDell EMC PowerScale Storageedge serversIBM iState and local GovernmentEthernetDial-up5GRegulatory ComplianceExtension4GLGCSQualityIoTFile ManagementVOEMFederal GovernmentPort Serverstorage and networkingSolarisPerformance MonitoringData File ManagementDell SecurityAtom C3000VMware vSAN cluster1EU Lot 9 RegulationsLoop DetectionSystems IntegrationIndependent Software VendorsAutomated Job SchedulingVSEAutomatedApplication Developmentgolf classic, humanitarian, charity, philanthropy, engineering,Asset ManagementMac5G NetworkGlobal SupportOmni-PathALMHubFiberiDRAC with Quick Sync 2 mobile-based managementDiagnosticMulti-ModePartnersForward Stocking LocationsDell EMC OEM StorageSSDLine SharingWeb-EnablementFault Analysis and TestingOptane memoryRSA ConferenceQATApplication ModernizationTransparent Supply Chaincustoms and tradePCITabletCableLine ProbingEmbeddedHybridLinuxDell Technologies OEM & IoTWCDMANASelectronic recyclingtrade complianceSupport ServicesDell EMC Unity XTGlobal ServicesCost Accounting StandardsProduction PrintingSCMGolf Classic 2019Issue TrackingOnline HelpLewisburg PCHPolicy ManagementDell OEMAggregationTelephonyBrexitPrint ManagementSkylakeVSAM Forward Data RecoveryFPGASDXCAutomated Messagingarchitecturedigital transformationExpansion CardTerminal EmulationPIE/CICS SuiteAutonomous DrivingPublic SectorAdvance Replacement Support ProgramsilverUNICOM Engineering ExpertiseConsole ManagementConsolidationOEMGatewayContent TransformationUNICOM Engineering FlexibilityCICS ApplicationsData CenterDisk ManagementStorage Appliancesrecycle electronicsFull DuplexapplianceVideo SurveillancePowerEdge 14G ServersHSPA+UNIX/LinuxDell Platforms2nd Generation Intel Xeon Processor FamilymemoryCICSAdvance Server ReplacementExpressCardAIXECMSandy BridgeCybersecurity Awareness MonthArtificial Intelligencepurpose built hardwareWindow ManagementserversAccessoryCustom Server BrandingData securityReportingJob AccountingQuickAssistOptaneBusiness IntelligenceIntel® Atom® C3000TSONVMeColumbus SuiteFile ProcessingAutomated OperationsBusinesscomputingWeb AccessLow Profile PCIdatabase IOPS1purpose-built hardwareATCADebuggingAnalysisSecurity ManagementJavaCloud ComputingGlobal Expansion Partnersdeep technologyPerformance ManagementCode EditorDell Technologies WorldTechnology TransitionsTeamBLUEDell PowerEdge C4140Power SwitchDell EMC OEM PowerEdge 14th Generation Serversdata storagesoftwareEVDOtrade rules and regulationsDell EMC Titanium OEMREXXSystems ManagementEdge computingRemote AccessWhitepaperMenu ManagementIntel Xeon Scalable Processor FamilyTAPHalf DuplexCode Path AnalysisSoftmodemLine ConsolidationSession ManagementCICS Print2019 Partner of the YearStandDell PowerStoreCyber SecurityvirtualizationFirewallDell EMC ProSupportDocument CompositionUSB 3.0PowerEdgeIntel Xeon Scalable Based PlatformsDell 14GGlobal ExpansionBatch ProcessingSoftware Change ManagementFile DeliveryFleet ManagementStatement of ConformanceBackupe-wasteCA 2ECapacity Planninglow-powerGSMUNICOM Engineering ServicesHelp ManagementNABcommunications3270 TerminalsBrand Protection4GLogistics and Trade Compliance56KGigabitV.22Strategic PartnerSystem Performance MonitoringDatabaseOutput ManagementNetworkCarrier Loss RedialSystem IntegrationIntel Optane DCDIP switchesIntel OptaneUSBGlobalAutomated Data CompressionConsole ServerSinglemodeBatch ScheduleIntel Xeon Scalable ProcessorsUNICOM Engineering ProductsCARTS SuiteCellularGDPRData BackupMicroCopperCDMADell EMCEclipseProduct ComplianceEventSynonPartnershipISC WestgoldHelpdeskMessage Console ManagementModemulatorDeployment PartnerLewisburgHDDsTape ManagementDellTechWorldUNICOM Engineering Global Scale30 PinVSAMSerialDocument ProcessingPIE/TSO SuiteWeb-BasedTransitioning to HaswellProductivityCentralized ControlDellKnowledge baseSkylake PurleyFlash ROMProblem and Incident ManagementCompact FlashIntel Atom C3000RegenerationPhysical SecurityFile SharingV.Everywherevideo data storageSkylakeAdministrationSecurityproduct lifecycle supportReliabilityRAIDGrown Defects on HDDsEnterprise Content Managementserver architectureData protectionTechnologyCompliance ManagementDefectsSpeed LevelingExternalResource ManagementWebSphereGPSUNICOM Government ServicesPurleyRSA 2018JES AdministrationProGen Plus Interfacez/OSSolution DesignLibrary ManagementPortfolio Managementz/VMStorage ManagementAIelectronic wastePCIeSynchronizationmicroarchitectureISO Standardse-recyclingNetwork Attached StorageIntel®Internet of ThingsDatacenter, NetApp, DCOI, Compliance, data center optimizationHelp DeskUNICOM EngineeringIoT ChallengesDell EMC IsilonModem EmulationIPMIIntelSpool File ManagementAdvanced Job SchedulingDell EMC PowerVault ME4ModemWindowsPDQPerformance Analysissolutions developmentCloud StorageDell EMC PowerlexplatinumLANSAInternalApplication Lifecycle ManagementVirtual OEMWireless MeshSystems Monitoring


Archive