Short answer: not directly, in most well-run jurisdictions. Long answer: IoT devices are a clear and present danger to the election ecosystem, but the risk is mostly indirect. Attackers are far more likely to use poorly secured cameras, printers, or building systems to compromise networks, create outages, or enable insider-style access than to wirelessly take over an air-gapped tabulator from a smart thermostat.
What the record shows
Researchers have demonstrated real vulnerabilities in modern voting equipment, but exploitation usually requires physical access, manipulation of election-management systems, or pre-loading malicious files that later travel to voting devices. The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency documented a set of critical vulnerabilities in Dominion ImageCast X ballot-marking devices; those issues could let an attacker install code or manipulate ballots, but only with either physical access or access to the election management environment. Jurisdictions can blunt those risks with sound procedures and timely vendor updates.
Why IoT still matters
IoT devices do not need to speak to a voting machine to be useful to an adversary. Two proven threat vectors matter:
-
Pivot risk. If an election office network is not properly segmented, an attacker who compromises an internet-connected IP camera, print server, or building management system can move laterally toward systems used for ballot preparation or tabulation. This is less Hollywood than deadly serious logistics failure.
-
Denial and disruption. Large IoT botnets have proven they can take down critical services at scale. Mirai-class malware infected hundreds of thousands of devices and generated record DDoS attacks, showing that mass-compromised IoT gear can be weaponized to knock election-related websites, call centers, or supporting infrastructure offline during critical windows. That can suppress participation, slow reporting, and sow confusion.
There is also a realistic physical-disruption threat. Building systems that are networked for convenience, such as fire alarms, HVAC, or access controls, can be tampered with to delay voting, force relocations, or create chaotic conditions on election day. The practical impact of that kind of targeted disruption should not be underestimated.
Common misconceptions
-
“If a device is internet-connected it means the tabulator is exposed.” Not automatically. Many voting systems are designed to be air-gapped and isolated. The problem is configuration and procedure. A single misconfigured workstation, an infected laptop used for maintenance, or a shared network printer can bridge that air gap. Best practice is to treat any internet-capable device as poison to election networks unless explicitly required and strictly controlled.
-
“IoT lets hackers change votes remotely from home.” The technical bar for that is high where proper controls exist. Adversaries find value in lower-cost, higher-reward actions like altering reporting feeds, introducing irregularities that delay certification, or undermining trust through outages and disinformation. Vulnerabilities in voting devices have been found, but they typically require more access than a random smart bulb provides.
Plausible attack scenarios
1) Compromise an IP camera in an election office, escalate to the local administrative network because of poor segmentation, and then corrupt an EMS image before it is written to memory cards used on polling machines. The risk comes from procedure failures, not the smart camera itself.
2) Use a Mirai-style botnet to DDoS a state election website, online ballot-tracking portal, or county call center on election night. The goal is disruption and confusion rather than flipping individual ballots.
3) Trigger a building system remotely to force a polling location to close or relocate during peak hours. That produces localized disenfranchisement and headlines.
What works as defense — immediate, low-cost steps
-
Enforce strict air gaps. No voting or tabulation system should be reachable from the public Internet. Treat any Internet-capable device as an adversary until proven otherwise. Use read-only media and carefully controlled procedures for all software and ballot transfers.
-
Inventory and isolate. Catalog every IoT device in election offices and polling locations. Put them on a separate network segment with no path to election systems. Remove unnecessary devices before elections.
-
Harden and patch. Apply vendor patches for both election equipment and enterprise devices. Where vendor updates are slow, implement compensating controls: physical locks, tamper seals, two-person custody, and pre- and post-election logic-and-accuracy testing.
-
Prepare for DDoS. Work with ISPs and DDoS mitigators to protect public-facing election services. Have redundant, offline ways to disseminate critical information.
-
Emphasize paper and audits. Voter-verifiable paper ballots plus mandatory, risk-limiting audits are the strongest defense against any remote manipulation claim. If the paper trail exists and is audited, it is the ultimate decider.
Final assessment
IoT does not magically enable a remote, anonymous actor to flip usable vote counts in properly run jurisdictions. However, IoT devices materially increase the attack surface for disruption, delay, and deception. That is a strategic problem, not an inevitable fate. Fix procedures, segment networks, inventory devices, demand vendor accountability, and audit paper results. Those steps are inexpensive relative to the damage a chaotic election season can inflict on public confidence and national stability. Act now, because adversaries already exploit low-cost weaknesses every day.