CORRECTION (Feb. 21, 21:50 UTC): Because of inaccurate information provided by the West Virginia Secretary of Stateâs office, an earlier version of this article misdescribed the subject document as a declassified DHS report. It is a summary published by Voatz of a still-classified DHS report.
The Department of Homeland Security (DHS) found a number of security vulnerabilities in Voatzâs technical infrastructure during a cybersecurity audit of the mobile voting app vendorâs Boston headquarters, according to a newly declassified report obtained by CoinDesk.Â
However, the DHS report, conducted by a Hunt and Incident Response Team with the departmentâs Cybersecurity and Infrastructure Security Agency (CISA) also determined Voatz had no active threats on its network during the week-long operation, conducted in September. It developed a series of recommendations to further boost Voatzâs security. Voatz has since addressed those recommendations.
The CISA report was shared with CoinDesk hours after a technical paper by MIT researchers claimed to detail a number of major vulnerabilities in the Medici-backed Voatzâs app, including allegations the app leaves votersâ identities open to adversaries and that ballots can be altered.
The MIT report, published Thursday by graduate students Michael Specter and James Koppel and principal research scientist Daniel Weitzner, further alleges the app has limited transparency, a claim also raised by a number of security researchers. Â
âOur findings serve as a concrete illustration of the common wisdom against Internet voting, and of the importance of transparency to the legitimacy of elections,â the MIT researchers said in the report.Â
However, the CISA audit, which focuses less on the app itself and more on Voatzâs internal network and servers, draws a different conclusion. The DHS investigators wrote that while they found some issues that could pose future concerns to Voatzâs networks, overall the team âcommends Voatz for their proactive measuresâ in monitoring for potential threats.
The two reports paint contrasting pictures of how the company, whose app has been used in pilot programs and live elections in West Virginia, Colorado and Utah, approaches voting security. Further, at least one election official overseeing the Voatz app rollout believes the MIT study is missing data in its evaluation.Â
The MIT researchers did not return a request for comment by press time.
The MIT report relies on a reverse engineering of the Voatz app and reimplemented âclean roomâ server, according to the researchers, who did not interact with Voatzâs live servers or its purported blockchain back end.
They found privacy vulnerabilities and a wealth of potential avenues for attack in the app. Adversaries could infer user vote choice, corrupt the audit trail and even change what appeared on the ballot, the researchers said.Â
The researchersâ findings and faults did not focus on Voatzâs use of a blockchain, at least in part because they did not have access to the permissioned blockchain on which Voatz is said to store and authenticate votes. Instead, they report the Voatz app never submits vote information to any âblockchain-like system.âÂ
Criticizing Voatzâs lack of transparency, the researchers further argued the companyâs âblack boxâ approach to public documentation could, in tandem with the bugs, erode public trust.
âThe legitimacy of the government relies on scrutiny and transparency of the democratic process to ensure that no party or outside actor can unduly alter the outcome,â the report said.Â
Ultimately, the researchers recommended elected officials âabandonâ the app outright.
âIt remains unclear if any electronic-only mobile or Internet voting system can practically overcome the stringent security requirements on election systems,â they said.Â
But Amelia Powers Gardner, a Utah County, Utah, election auditor who supervised her countyâs rollout of the Voatz system for disabled voters and service members deployed overseas, told CoinDesk that at least some of the bugs the researchers found cannot be exploited in practice.
â[The researchers] werenât able to substantiate these claims because they were never able to actually connect to the Voatz server,â Powers Gardner said. âSo in theory they claim that they may have been able to do these things, and only on the Android version, not the Apple version.â
She said the MIT researchersâ effort comes from âwhat ifs, and perhaps, and maybes that, frankly, just havenât panned out,â and that the app had since been patched.Â
For Powers Gardner, Voatzâs benefits far outweigh any security risks. She said the software is a far better alternative for otherwise disenfranchised voting groups than the current technological solution: email.Â
âWhile these concerns of around mobile loading can be valid, they donât rise to a level of security that causes me to even question the use of the mobile app,â she said.Â
John Sebes, co-founder and chief technology officer of the Open Source Election Technology Institute, said a number of the researchersâ concerns still stand, despite Powers Gardnerâs claims.Â
Election officials and computer scientists live in very different worlds, and therefore may not see eye to eye, he said. However, he added, computer science researchers do not need to understand an election officialâs world to be able to assess a software vendorâs claims.
âWe canât validate Voatzâs claims that newer versions were better, but itâs still the case that the version inspected had some fairly basic issues,â Sebes said.
In response to Powers Gardnerâs claims the researchers claims were speculative, or âwhat ifs,â Sebes said this reflected a misunderstanding of the value of this kind of security assessment.Â
The goal is to find vulnerabilities in the software that could enable adversaries to conduct a successful cyber operation, rather than claim an actual attack occurred, Sebes said.Â
Voatz itself took issue with the MIT report, insinuating in a statement that the researchers were embarking on a fear campaign.
âIt is clear that from the theoretical nature of the researchersâ approachâ¦Â that the researchersâ true aim is to deliberately disrupt the election process, to sow doubt in the security of our election infrastructure, and to spread fear and confusion,â the statement said.
The companyâs response to the DHS report was more measured; while there was no written statement â and a spokesperson did not return a request for comment â the government investigators said Voatz had taken action on most of their recommendations.Â
Still, the DHS report remains inconclusive about the Voatz app itself.Â
West Virginia, one of the states that used the app, claims it has seen no issues so far.Â
Mike Queen, a spokesperson for West Virginia Secretary of State Mac Warner, said the stateâs 2018 pilot for overseas military voters went off without a hitch. However, he was noncommittal as to whether the state would continue using Voatz.
âSecretary Warner and his team will make a decision prior to March 1 regarding the technology that we will prescribe for use in the May 2020 Primary Election,â he said. âAs we have done from the very start, our decision will be based on the best available information with a strong emphasis on security and accessibility.â
Like Utahâs Powers Gardner, Queen said any potential physical disabilities or geographic location should not prevent voters from participating in the democratic process.Â
âI donât have a duty to an out-of-town researcher who doesnât understand how elections are actually run,â Powers Gardner said. âI have a duty to stand up for the constitutional rights of the disabled voters in my community, and Iâm going to ensure their constitutional right to vote in the safest way that I know how.â
Read the full DHS report below: