Voting machines and election centers

In addition to providing physical security and asset management, any cable tampering, movement of the cabling, or the machines themselves would result in visual indicators and alert election officials.

Voting machines and election centers represent an ideal use case for securecables.com products.  In many municipalities, voters are in private booths with the voting machines and voting is not timed. With several minutes of uninterrupted access, an electronic voting machine could easily be compromised and/or exploited. Additionally, many states allow cell phones in voting booths.  Any malware or system compromise can be completed and tested for operation without any election officials or site security being alerted to or aware of the nefarious activity.  

Aside from the security and cable management, the RF/EMI shielding in all securecables.com cables adds a good initial layer of defense against the compromise of voting machines. The larger threat however is RF attacks.  These types of exploits of systems and computers is a very real threat and can be performed from a distance of several meters.  These attacks can even penetrate exterior walls.  Given the demonstrated attacks and threats to voting machines and the voting process in the news, not to mention the rumored compromises of those voting machines, Shielded power and signal transmission cables on all voting machines should be a requirement, not an option. All securecables.com cabling products use top-of-the line bi-metal shielding (tinned copper).  To read about some of the real world exploits using RF/EMI, the target, how the exploits are introduced, the results, and just how real the potential threats of RF/EMI attacks are, click here.

Return to main page