VoteFlare™ at the Georgia Runoff Election
Latanya Sweeney led a team that developed and deployed a production grade version of VoteFlare™ using the MyDataCan™ infrastructure. The effort was part of Harvard’s public interest tech initiative and was free to Georgia voters during the runoff Senatorial election. Professor Sweeney’s team members included Bradley Abruzzi, Pascal Delpe-Brice, Brad Frank, Eli Munn and Jinyan Zang. Georgia voters signed up at https://voteflare.org and the service monitored their voter registrations in real-time and sent text or email messages if any issue arose that needed the voter’s attention. Recent Harvard graduate, Dhruv Gupta, and Harvard student, Sumhith Aradhyula, developed accompanying technology to offer free rides to the polls, schedulable by text message, to those users who opted to vote on election day. VoteFlare™ performed tens of thousands of lookups flawlessly. Voters said the system relieved a lot of voter anxiety and the team received many thank you messages from Georgia voters afterwards. The work was first featured in Axios and the Harvard Crimson .
Jinyan Zang and Daniel Gottesman developed a prototype that demonstrated usability and user interaction. Latanya Sweeney developed and demonstrated technology back-end prototypes that worked for each of the websites for 48 states and the District of Columbia.
Gov1430 Explores the VoteFlare Concept
Professor Latanya Sweeney challenged students in her Gov1430 Tech Science to Save the World course at Harvard to explore the viability and utility of an automated service that monitors voter registrations for voters. Jinyan Zang was the teaching fellow for the course and helped develop concepts. Students demonstrated whether technology could achieve this goal in 48 states and the District of Columbia. Students (listed alphabetically) were Ryan Chung, Diego Garcia, Kaitlyn Greta, Juan Guzman, Pernilla Hamren, Jasmine Hyppolite, Aidan Keenan, Samuel Lurye, Paul Marino, Colin McGinn, David Netter, Kiera O’Brien, Jordy Rodriguez, Bruna Saraiva and Alyx Van Der Vorm.
Vulnerabilities found in Voter Websites
Latanya Sweeney, Jinyan Zang and JiSu Yoo, in the Data Privacy Lab at Harvard University, led a study that found voters could be impersonated at state websites. Da’Von Boyd, Evelyn Chen, Asia DaCosta, and Rachel Matheson (listed alphabetically) were the 2016 Technology Science summer interns who worked with them and who identified some of the state websites. Natalie Altman, Evelyn Chen, and Anupama Jeevan (listed alphabetically) provided help with automation..
The study found:
- Websites for 35 states and DC in 2016 were vulnerable to voter identity theft attacks: an imposter could submit changes to voter registration information
- An imposter needed a combination of voter’s name, date of birth, gender, address, Social Security Number, or Driver’s License Number
- Relevant data can be acquired from government, data brokers, or darknet markets. Total cost of an automated attack against 1% of all vulnerable voter registrations nationwide ranged from $10,081 to $24,926 depending on the data source used. States cost less, e.g., $1 for Alaska and $1,020 for Illinois
A voter identity theft attack could disrupt an election by imposters submitting address changes, deleting voter registrations, or requesting absentee ballots. (published paper)