Larry Alton is an independent business consultant specializing in social media trends, business and entrepreneurship.
This year’s electoral process has been unconventional, to say the least, and most voters are either polarized or frustrated (sometimes both) with how we got to this point.
Now, as this volatile election approaches the final threshold of November, citizens are skeptical about whether our electoral system — particularly the technology used in it — is precise, unbiased or secure enough to produce a fair, accurate vote count. In fact, 66 percent of citizens think our electoral system is, in some ways, broken.
But just how vulnerable is our election technology? Is it something we should be collectively worried about?
Rumors and natural fears
First, I want to address some of the reasons why people fear the security of our voting technology. Elections are highly sensitive and impactful events, but the sensationalism of potential vulnerabilities puts people even more on edge.
Media sites frequently play up the vulnerabilities of machines, and add fuel to the fire of rumors that circulate in political circles — such as the suggestion that Russia is trying to undermine the Democratic Party through coordinated cyberattacks. This doesn’t invalidate fears of election vulnerabilities, but it does amplify them.
Inherent vulnerabilities
Cyberattacks aren’t the only threats that make voting systems potentially vulnerable; in fact, most computerized systems naturally have infrastructures prone to errors and failures of various types. For example, voting systems in North Carolina once “lost” more than 4,400 votes because of a simple system error.
Our election tech is vulnerable, but that doesn’t mean it’s in shambles.
The fact is, election machines are built by people, and people are capable of error; a single processing flaw could lead to lost data, misreported data or entire system failures. This alone isn’t problematic, but when coupled with a system that doesn’t recognize or report failures (as many election systems are set up), it can lead to an election with potentially flawed results.
Malicious attacks
Researchers and specialists have proven, time and again, that it is possible to gain access to and manipulate certain types of voting systems. For example, Diebold voting machines from 2006 can be infiltrated with vote-changing malware in the span of less than a minute, and fairly easily too.
Even more recently, in 2011, it was shown how voting devices could be taken over remotely, enabling hackers to take control and change votes without ever even entering the voting establishment. To make matters worse, “hacking” at the voting machine level is only part of the problem — cybercriminals could also create false registered voters, or interfere with the process at other steps to manipulate results.
The updating problem
Cybersecurity and cyberthreats are always evolving, and feeding off each other. Every time cybercriminals get a little more sophisticated, our defenses rise to the occasion and take another step forward to stay just out of reach — which is why it’s so important to regularly update hardware and software.
There’s one big problem here; the United States does a poor job of updating its technology systems. According to Brennan Center for Justice, voting machines in 43 of our 50 states are 10 years old or older.
How to improve our voting security
Related Articles
The state of election technology is… improvingWatch Voting Machine Change Obama Votes To Romney VotesPac-Man Hacked Onto Voting MachineThe first and most important way of improving our voting technology is to simply update it regularly; old devices need to be taken out of circulation immediately, and both hardware and software updates are necessary on a regular basis to stay a step ahead of cybercriminals. This is expensive, but it’s a necessary expenditure if we want our systems to be safe. Better security checks and observation, including self-reported security breaches and data anomalies, could also help raise red flags if data is ever compromised.
Why we’ll never be safe
It’s important to recognize that even these added security measures will never be able to make our systems 100 percent safe, because there will always be flaws in our systems, and vulnerabilities are everywhere. If you fix a problem in one spot, there will always be another to exploit.
None of this is meant to be comforting, but it shouldn’t scare you, either. Our election tech is vulnerable, but that doesn’t mean it’s in shambles; it just means we need to commit ourselves to making more improvements if we’re going to protect ourselves and the future of our elections.
Featured Image: Blablo101/Getty Images
No comments:
Post a Comment