Incident: Security Flaws in Voatz Voting App Raise Election Concerns

Published Date: 2020-02-14

Postmortem Analysis
Timeline 1. The software failure incident involving flaws in the smartphone-based voting app designed by Voatz happened in 2020 [95640]. Therefore, the software failure incident happened in 2020.
System The system that failed in the software failure incident reported in the news article is: 1. Voatz smartphone-based voting app [95640]
Responsible Organization 1. Voatz - The company responsible for designing the smartphone-based voting app that had vulnerabilities allowing hackers to potentially view, block, or change smartphone ballots [95640].
Impacted Organization 1. Military voters overseas 2. Utah County, Utah 3. Voatz 4. Security researchers at the Massachusetts Institute of Technology 5. Department of Homeland Security
Software Causes 1. The software causes of the failure incident were vulnerabilities in the smartphone-based voting app developed by Voatz, as reported by security researchers from the Massachusetts Institute of Technology [95640].
Non-software Causes 1. Lack of transparency and openness from Voatz regarding their technology and audits [95640]. 2. Disagreements between Voatz and independent security experts on the security of the voting app [95640]. 3. Concerns about the security and integrity of the election process using smartphone-based voting apps [95640].
Impacts 1. The software failure incident involving flaws in the smartphone-based voting app designed by Voatz had the potential to allow nation-state hackers to view, block, or change smartphone ballots before they were counted, raising concerns about election security [95640]. 2. The incident led to rising concerns about the use of apps and online voting tools in the 2020 election, especially following the failure of reporting tools in the Iowa caucuses [95640]. 3. The tension between Voatz and independent security experts highlighted the importance of transparency and openness in the industry, as well as the common misperception that greater secrecy leads to stronger security [95640].
Preventions 1. Conducting thorough security audits and penetration testing by independent experts before deploying the software [95640]. 2. Ensuring transparency in the technology used and allowing for independent audits to verify the security of the software [95640]. 3. Maintaining open communication channels between researchers and the company to address potential vulnerabilities [95640]. 4. Following industry trends towards greater disclosure and openness in software security practices [95640].
Fixes 1. Conducting a thorough security audit of the Voatz app by independent security experts to identify and address any vulnerabilities [95640]. 2. Implementing necessary patches and updates to the Voatz app to address the security flaws identified by the MIT researchers [95640]. 3. Enhancing transparency around the technology used by Voatz and ensuring that independent audits are conducted regularly to maintain the security and integrity of the voting app [95640]. 4. Encouraging collaboration between Voatz and security researchers to address concerns and improve the security of the app [95640].
References 1. Security researchers at the Massachusetts Institute of Technology [Article 95640] 2. Voatz company [Article 95640] 3. County Clerk Amelia Powers Gardner from Utah County, Utah [Article 95640] 4. Election security experts, including Andrea Matwyshyn from Penn State University [Article 95640] 5. Voatz's CEO, Nimit Sawhney [Article 95640] 6. Eric Mill, a cybersecurity expert who has administered technology programs for the federal government [Article 95640] 7. Department of Homeland Security [Article 95640] 8. Technology news site Coindesk [Article 95640]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to the Voatz voting app has happened again within the same organization. Voatz, the company behind the app, faced security flaws in its smartphone-based voting app that could potentially allow hackers to manipulate ballots. The company defended itself by stating that all previous pilot elections conducted with the app were safe and secure [95640]. (b) The incident also highlights concerns about the use of apps and online voting tools in the 2020 election, following the failure of reporting tools in the Iowa caucuses. This indicates that similar incidents or concerns about software failures in election-related apps may have occurred in multiple organizations or contexts [95640].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the flaws reported in the smartphone-based voting app developed by Voatz. Security researchers identified vulnerabilities that could allow nation-state hackers to view, block, or change smartphone ballots before they are counted. The flaws were attributed to the design of the app by Voatz, which raised concerns about the security of the election process [95640]. (b) The software failure incident related to the operation phase is evident in the criticism Voatz faced regarding the security and transparency of its technology. Critics highlighted the lack of transparency in Voatz's technology and the company's handling of independent audits. There were concerns about the operation and misuse of the system, leading to tensions between Voatz and independent security experts regarding the disclosure of information and the company's reaction to security reports [95640].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident related to the Voatz voting app was primarily due to vulnerabilities and flaws within the app itself. Security researchers identified issues within the app that could allow hackers to view, block, or change smartphone ballots before they are counted [95640]. The researchers conducted a detailed analysis of the app's Android version in a simulated environment, revealing potential security risks such as ballot alteration and candidate preference identification [95640]. Voatz, the company behind the app, disputed the researchers' findings, claiming that some of the identified issues had already been patched in updated versions of the software [95640]. (b) outside_system: The software failure incident also involved external factors such as the actions and responses of independent security experts, government agencies, and the company itself. There was tension between Voatz and independent security experts regarding the transparency of Voatz's technology and the handling of prior research attempts [95640]. The company's reaction to the report, including accusations of hypothetical claims and outdated software usage by the researchers, highlighted a lack of openness and disclosure in addressing the identified issues [95640]. Additionally, the involvement of government agencies like the Department of Homeland Security as a clearinghouse for election integrity information demonstrated external oversight and scrutiny of the software's security [95640].
Nature (Human/Non-human) non-human_actions (a) The software failure incident in the articles is primarily related to non-human actions, specifically flaws and vulnerabilities in the smartphone-based voting app developed by Voatz. Security researchers at MIT identified vulnerabilities in the app that could potentially allow nation-state hackers to view, block, or change smartphone ballots before they are counted [95640]. The flaws were discovered through a reverse-engineered version of Voatz's Android app, which was run in a simulated environment, indicating that the failure was due to technical weaknesses in the software itself rather than human actions. (b) While the articles do not explicitly mention any software failure incident resulting from human actions, there are references to the company Voatz defending its technology and accusing the researchers of deliberately disrupting the election process, spreading fear and confusion, and making hypothetical claims based on their simulation [95640]. This suggests a conflict between the company's stance on the security of its app and the researchers' findings, highlighting potential disagreements or human actions influencing the perception of the software failure incident.
Dimension (Hardware/Software) software (a) The articles do not mention any software failure incident occurring due to contributing factors originating in hardware. Hence, there is no information available to address this option. (b) The software failure incident reported in the articles is related to flaws in a smartphone-based voting app designed by Voatz. Security researchers identified vulnerabilities in the app that could allow nation-state hackers to view, block, or change smartphone ballots before they are counted. The vulnerabilities were found in the software of the Voatz app, indicating a software failure incident [95640].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident related to the voting app developed by Voatz can be categorized as malicious. Security researchers identified vulnerabilities in the app that could potentially allow nation-state hackers to view, block, or even change smartphone ballots before they are counted [95640]. The researchers' findings were based on a reverse-engineered version of Voatz's Android app, indicating that the vulnerabilities were not accidental but rather introduced with the potential intent to disrupt the election process and manipulate voting outcomes. Additionally, the company Voatz accused the researchers of making "hypothetical" claims based on their simulation, suggesting a deliberate attempt to discredit the security concerns raised by the researchers [95640]. (b) The incident can also be considered non-malicious as the company Voatz defended its technology, stating that all governmental pilot elections conducted with the app had been safe and secure with no reported issues [95640]. Voatz emphasized that the researchers' aim was to disrupt the election process and spread fear and confusion, indicating that the company viewed the security concerns as unfounded and not originating from unintentional flaws in the software. Additionally, Voatz mentioned that some of the issues identified by the researchers had already been patched, implying a proactive approach to addressing potential vulnerabilities in the app [95640].
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident was related to poor_decisions. The incident involved flaws in a smartphone-based voting app designed by Voatz, which could potentially allow nation-state hackers to manipulate smartphone ballots before they are counted [95640]. Voatz criticized the report by security researchers, calling it "flawed" and accusing the researchers of deliberately disrupting the election process and spreading fear and confusion [95640]. Additionally, Voatz accused the researchers of using an outdated version of the software and making "hypothetical" claims based on their simulation, rather than having the app interact with an actual Voatz server [95640].
Capability (Incompetence/Accidental) development_incompetence, unknown (a) The software failure incident related to development incompetence is evident in the article. Security researchers identified flaws in a smartphone-based voting app developed by Voatz, which could potentially allow nation-state hackers to manipulate smartphone ballots [95640]. The company Voatz defended its technology, stating that all pilot elections conducted so far were safe and secure, despite the researchers' findings. This incident highlights the potential risks associated with software development incompetence leading to vulnerabilities in critical systems like election infrastructure. (b) The software failure incident related to accidental factors is not explicitly mentioned in the articles provided.
Duration permanent (a) The software failure incident in this case appears to be more permanent in nature. The security researchers identified flaws in the smartphone-based voting app designed by Voatz, which could potentially allow nation-state hackers to manipulate smartphone ballots [95640]. Voatz defended its technology but did not deny the existence of the vulnerabilities identified by the researchers. Additionally, there were concerns raised about the app's security risks and the lack of transparency from Voatz in allowing independent audits of its technology [95640]. These factors indicate that the software failure incident is more permanent in nature, as the underlying vulnerabilities in the app need to be addressed and resolved to ensure the security and integrity of the voting process.
Behaviour omission, value, byzantine, other (a) crash: The articles do not mention any specific instance of the software crashing and losing its state [95640]. (b) omission: The software failure incident related to the voting app by Voatz could be categorized under omission as it failed to ensure the security and integrity of the voting process by allowing vulnerabilities that could potentially alter or block ballots [95640]. (c) timing: There is no indication in the articles that the software failure incident was related to timing issues [95640]. (d) value: The software failure incident can be attributed to a value failure as the system was performing its intended functions incorrectly by allowing potential manipulation of ballots by hackers [95640]. (e) byzantine: The software failure incident could also be classified as a byzantine failure as the system was behaving erroneously with inconsistent responses and interactions, potentially allowing hackers to interfere with the voting process [95640]. (f) other: The other behavior exhibited by the software failure incident is the lack of transparency and openness by Voatz in addressing the security concerns raised by independent researchers. This lack of cooperation and transparency can be considered as another aspect of the software failure incident [95640].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, theoretical_consequence The consequence of the software failure incident discussed in the articles is primarily a "theoretical_consequence" as there were potential consequences discussed that did not occur. The security researchers reported vulnerabilities in a smartphone-based voting app that could potentially allow nation-state hackers to view, block, or change smartphone ballots before they are counted. The researchers highlighted the risk of interference in the voting process by altering ballots or determining which candidate a voter supports, which could potentially impact the election outcome [95640].
Domain government (a) The failed system was related to the government industry as it involved a smartphone-based voting app used by military voters overseas and being tested for use in the US [Article 95640].

Sources

Back to List