{"id":15897,"date":"2016-09-15T05:00:29","date_gmt":"2016-09-15T12:00:29","guid":{"rendered":"http:\/\/www.yardi.com\/blog\/?p=15897"},"modified":"2020-12-24T10:13:32","modified_gmt":"2020-12-24T18:13:32","slug":"election-hack","status":"publish","type":"post","link":"https:\/\/www.yardi.com\/blog\/election-hack\/","title":{"rendered":"Election Hack"},"content":{"rendered":"<p><em>With the presidential election only a few weeks away, questions swirl about the vulnerability of electronic voting machines.<\/em><\/p>\n<p>Today\u2019s voting systems run the gamut from punch cards to touchscreens. This November, three-quarters of U.S. voters will cast a paper ballot, but the other 25% are triggering concern. As electronic voting machines get older and less secure, the question becomes: just how safe is our vote?<img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-15907\" src=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg\" alt=\"shutterstock_305852261\" width=\"667\" height=\"445\" srcset=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg 1000w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg?resize=768,512 768w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg?w=400 400w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg?w=500 500w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg?w=600 600w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg?w=720 720w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg?w=800 800w\" sizes=\"auto, (max-width: 667px) 100vw, 667px\" \/><\/p>\n<p>Over at <a href=\"https:\/\/www.wired.com\/2016\/08\/americas-voting-machines-arent-ready-election\/\" target=\"_blank\" rel=\"noopener\">Wired<\/a>, Brian Barrett investigates the vulnerabilities of America\u2019s electronic voting machines. Though he makes sure to emphasize there\u2019s \u201cno evidence of direct voting machine interference to date,\u201d he concedes the research is grim. Susceptibility to malware and denial of service attacks has repeatedly been demonstrated. In some cases, compromising an electronic voting machine could be as easy as jumping onto an unsecured Wi-Fi network.<\/p>\n<p>Just last year <a href=\"https:\/\/www.wired.com\/2015\/08\/virginia-finally-drops-americas-worst-voting-machines\/\" target=\"_blank\" rel=\"noopener\">Virginia decertified<\/a> 3000 WINVote touchscreen voting machines when serious security problems were exposed, including \u201ca poorly secured Wi-Fi feature for tallying votes.\u201d At the time, Jeremy Epstein, a computer scientist with SRI International, noted, \u201c\u201canyone with even a modicum of training could have succeeded,\u201d including someone within a half-mile of a polling pace outfitted with \u201ca rudimentary antenna built using a Pringles can.\u201d<\/p>\n<p><strong>Hacking the Vote<\/strong><\/p>\n<p>Aging operating systems provide the biggest opportunity for would-be hackers. As Barrett explains, most electronic voting machines use some variation of Windows XP, which hasn\u2019t received a security patch in over two years. Unfortunately, most of the voting computers are at least a decade old, and just not equipped to deal with a sophisticated attack.<\/p>\n<p>\u201cPeople weren\u2019t thinking about voting system security or all the additional challenges that come with electronic voting systems,\u201d Brennan Center\u2019s Lawrence Norden tells Wired. \u201cMoving to electronic voting systems solved a lot of problems, but created a lot of new ones.\u201d<\/p>\n<p><strong>The Paper Trail<\/strong><\/p>\n<p>While the vulnerabilities of electronic voting machines are real and frightening, for the most part, fraud attempts can be easily thwarted through a simple paper trail. While <a href=\"https:\/\/www.verifiedvoting.org\/verifier\/\" target=\"_blank\" rel=\"noopener\">plenty<\/a> of states combine some form of paper and electronic ballots,\u00a0most vote manipulation attempts\u00a0can be quickly caught by comparing paper records against computerized vote tallies.<\/p>\n<p>Unfortunately, the power of the paper trail lies in execution. Many states do not have formal voter assessment procedures in place. Even those required to by law to conduct post-election audits don\u2019t necessarily conduct them effectively. The lack of concrete checks and balances can be blamed on lack of funding and political will, says Norden.<\/p>\n<p>\u201cThe money\u2019s not there right now,\u201d says Norden. \u201cWe interviewed election officials who told us what they were hearing from their state legislators and others who would be funding this type of equipment, and they say come back to us after there\u2019s some kind of crisis.\u201d<\/p>\n<p><strong>Russian Interference<\/strong><\/p>\n<p>The recent Russian hack of DNC emails has once again put Russia in the spotlight, which, for security specialists like Ryan Maness, could be a blessing in disguise.<\/p>\n<p>\u201cPutin\u2019s not very nice, but he\u2019s not stupid,\u201d Maness, a visiting fellow at Northeastern University who specializes in international cyber conflict and Russian foreign policy, tells Wired. \u201cIf they were going to mess with the voting machines and the vote-counting software, they wouldn\u2019t have done the DNC hack.\u201d<\/p>\n<p>While foreign nations may sit this one out, three key swing states could still be seen as being in the line of fire. Overall, the threat is relatively small. Florida, Ohio and Pennsylvania all use voting machines that Barrett describes as being \u201cin relatively good shape.\u201d Even better news, both Florida and Ohio have audit requirements in place. Pennsylvania relies heavily on DREs, but even election officials in the state can deploy paper ballots if those machines are compromised.<\/p>\n<p><strong>The Danger of Uncertainty<\/strong><\/p>\n<p>Awareness of potential voting machine hacks may be enough to protect polls from outside manipulation as election officials hustle to establish effective security measures. Most of November\u2019s votes will be cast on paper ballots, and the potential security flaws associated with electronic voting machines can easily be mitigated by simple audits and paper records. Nevertheless, security experts and election watchdogs say there\u2019s reason to be concerned.<\/p>\n<p>\u201cOld equipment can have serious security flaws, and the longer we delay purchasing new machines, the higher the risk,\u201d warns Norden. \u201cTo avoid a new technology crisis every decade, we must plan for and invest in voting technology for the 21<sup>st<\/sup> century.\u201d<\/p>\n<p>While this year\u2019s election should be relatively hacker-free, Barrett points out a more insidious consequence: doubt.<\/p>\n<p>\u201cSuspicion is the real danger of electronic voting systems,\u201d Barrett writes. \u201cIf you can\u2019t guarantee that there was no tampering\u2014which not every state can\u2014it might not matter if any actually took place. In the wrong hands, the doubt itself is damaging enough.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the presidential election only a few weeks away, questions swirl about the vulnerability of electronic voting machines. Today\u2019s voting systems run the gamut from punch cards to touchscreens. This November, three-quarters of U.S. voters will cast a paper ballot, but the other 25% are triggering concern. As electronic voting machines get older and less [&hellip;]<\/p>\n","protected":false},"author":103,"featured_media":15907,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_s2mail":"yes","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6],"tags":[1613,1610,1609,1614,1615,91,76,1612,1611],"class_list":["post-15897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-election","tag-hackers","tag-hacking","tag-president","tag-russia","tag-security","tag-technology-2","tag-voters","tag-voting"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Yardi Blog<\/title>\n<meta name=\"description\" content=\"With the presidential election only a few weeks away, questions swirl about the vulnerability of electronic voting machines. Today\u2019s voting systems run\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Election Hack\" \/>\n<meta property=\"og:description\" content=\"With the presidential election only a few weeks away, questions swirl about the vulnerability of electronic voting machines. Today\u2019s voting systems run\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yardi.com\/blog\/election-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"Yardi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-15T12:00:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-24T18:13:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cutright Elizabeth\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cutright Elizabeth\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.yardi.com\/blog\/election-hack\/\",\"url\":\"https:\/\/www.yardi.com\/blog\/election-hack\/\",\"name\":\"Election Hack - Yardi Corporate Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/election-hack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/election-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg\",\"datePublished\":\"2016-09-15T12:00:29+00:00\",\"dateModified\":\"2020-12-24T18:13:32+00:00\",\"author\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/dba832121806bbec3d280d6cdde90b4d\"},\"description\":\"With the presidential election only a few weeks away, questions swirl about the vulnerability of electronic voting machines. Today\u2019s voting systems run\",\"breadcrumb\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/election-hack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.yardi.com\/blog\/election-hack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/election-hack\/#primaryimage\",\"url\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg\",\"contentUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.yardi.com\/blog\/election-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.yardi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Election Hack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\",\"url\":\"https:\/\/www.yardi.com\/blog\/\",\"name\":\"Yardi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.yardi.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/dba832121806bbec3d280d6cdde90b4d\",\"name\":\"Cutright Elizabeth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4016b5eabd512619820fc63946d01cd983acc211f98fbc559a890a5b4b27c559?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4016b5eabd512619820fc63946d01cd983acc211f98fbc559a890a5b4b27c559?s=96&d=mm&r=g\",\"caption\":\"Cutright Elizabeth\"},\"description\":\"Elizabeth Cutright is an award-winning writer and editor with over 20 years of experience in journalism, publishing and online content creation. A film school grad with a law degree from the University of San Diego, outside of work Elizabeth can usually be found in the pool, on a hiking trail, or sampling Santa Barbara\u2019s latest vintage.\",\"url\":\"https:\/\/www.yardi.com\/blog\/author\/elizabeth-cutright-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Yardi Blog","description":"With the presidential election only a few weeks away, questions swirl about the vulnerability of electronic voting machines. Today\u2019s voting systems run","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Election Hack","og_description":"With the presidential election only a few weeks away, questions swirl about the vulnerability of electronic voting machines. Today\u2019s voting systems run","og_url":"https:\/\/www.yardi.com\/blog\/election-hack\/","og_site_name":"Yardi Blog","article_published_time":"2016-09-15T12:00:29+00:00","article_modified_time":"2020-12-24T18:13:32+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg","type":"image\/jpeg"}],"author":"Cutright Elizabeth","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cutright Elizabeth","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.yardi.com\/blog\/election-hack\/","url":"https:\/\/www.yardi.com\/blog\/election-hack\/","name":"Election Hack - Yardi Corporate Blog","isPartOf":{"@id":"https:\/\/www.yardi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.yardi.com\/blog\/election-hack\/#primaryimage"},"image":{"@id":"https:\/\/www.yardi.com\/blog\/election-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg","datePublished":"2016-09-15T12:00:29+00:00","dateModified":"2020-12-24T18:13:32+00:00","author":{"@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/dba832121806bbec3d280d6cdde90b4d"},"description":"With the presidential election only a few weeks away, questions swirl about the vulnerability of electronic voting machines. Today\u2019s voting systems run","breadcrumb":{"@id":"https:\/\/www.yardi.com\/blog\/election-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yardi.com\/blog\/election-hack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/election-hack\/#primaryimage","url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg","contentUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.yardi.com\/blog\/election-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yardi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Election Hack"}]},{"@type":"WebSite","@id":"https:\/\/www.yardi.com\/blog\/#website","url":"https:\/\/www.yardi.com\/blog\/","name":"Yardi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yardi.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/dba832121806bbec3d280d6cdde90b4d","name":"Cutright Elizabeth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4016b5eabd512619820fc63946d01cd983acc211f98fbc559a890a5b4b27c559?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4016b5eabd512619820fc63946d01cd983acc211f98fbc559a890a5b4b27c559?s=96&d=mm&r=g","caption":"Cutright Elizabeth"},"description":"Elizabeth Cutright is an award-winning writer and editor with over 20 years of experience in journalism, publishing and online content creation. A film school grad with a law degree from the University of San Diego, outside of work Elizabeth can usually be found in the pool, on a hiking trail, or sampling Santa Barbara\u2019s latest vintage.","url":"https:\/\/www.yardi.com\/blog\/author\/elizabeth-cutright-2\/"}]}},"jetpack_featured_media_url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/09\/shutterstock_305852261.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/15897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/users\/103"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/comments?post=15897"}],"version-history":[{"count":10,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/15897\/revisions"}],"predecessor-version":[{"id":27617,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/15897\/revisions\/27617"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media\/15907"}],"wp:attachment":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media?parent=15897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/categories?post=15897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/tags?post=15897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}