When the Paper Trail Leads Nowhere
This talk examines the systemic failures and lack of procedural preparedness in the Voting Solutions for All People (VSAP) system used in Los Angeles County. The speaker details how the transition to a vote-center model, combined with the absence of standardized recount procedures, rendered the paper trail effectively unusable during a contested local election. The analysis highlights how technical design choices and a lack of operational planning can undermine the integrity of election audits.
When the Paper Trail is Just Digital Theater
TLDR: The Voting Solutions for All People (VSAP) system in Los Angeles County demonstrates how a lack of operational planning can render physical paper trails useless during an audit. Despite the system's high cost and technical complexity, the absence of standardized, pre-sorted ballot procedures creates a massive bottleneck that effectively prevents meaningful recounts. This research highlights the critical gap between theoretical security controls and the practical reality of incident response in high-stakes environments.
Security researchers often focus on the exploit—the buffer overflow, the injection, or the misconfigured S3 bucket. We obsess over the technical failure points while ignoring the operational processes that are supposed to act as the final line of defense. The recent analysis of the VSAP system in Los Angeles County serves as a stark reminder that even the most "secure" technical architecture is worthless if the human and procedural components are designed to fail under pressure.
The Illusion of the Paper Trail
Election integrity relies on the concept of a voter-verified paper audit trail. The theory is simple: if the electronic count is questioned, you go back to the physical ballots and perform a manual recount. However, the VSAP system, a bespoke solution developed for Los Angeles County, reveals how technical design choices can systematically dismantle this safeguard.
During a 2020 local election, the system faced a series of operational meltdowns. When the results were contested, the path to a recount was not just difficult; it was functionally blocked. Because the system utilizes a vote-center model, ballots are not pre-sorted by precinct. Instead, millions of ballots are commingled. To perform a manual recount, an auditor must first physically extract the specific ballots from a massive, unsorted pool.
This is not a technical bug in the traditional sense; it is a process failure. The request for proposals for the VSAP system, which spanned over 50 pages, failed to include a single mention of "recount" procedures. The designers built a system that could count votes, but they never built a system that could be audited.
Logic Errors in the Counting Process
Beyond the procedural failures, the research identified consistent logic errors in how the IBML ImageTrac 6400 scanners—the hardware powering the VSAP backend—interpreted voter intent. In many instances, the system flagged ballots as "overvotes" when a voter had clearly marked a single choice.
The error occurred when a stray mark, a dot, or a tick appeared in the vicinity of an adjacent circle. Rather than applying a standard for voter intent, the system’s logic defaulted to an overvote classification, effectively nullifying the ballot. This is a classic example of a brittle system failing to handle real-world input. When the software is configured to be hyper-sensitive to noise, it treats human error or minor imperfections as malicious or invalid input, leading to a systematic undercounting of valid votes.
For a pentester, this is a lesson in input validation gone wrong. If you are auditing a system that processes sensitive data, look for where the logic assumes "perfect" input. When the system encounters "dirty" data, does it fail gracefully, or does it discard the entire transaction? In the case of VSAP, the failure was silent and consistent, leading to a measurable skew in the results.
The Cost of Operational Incompetence
The most damning aspect of this research is the financial and operational barrier to entry for an audit. Because the system lacks a sorting mechanism, the county estimated that a manual recount would require 16 workers to spend 16 days just to extract the relevant ballots. This effectively prices out any grassroots organization or candidate from exercising their right to a recount.
When a system is too expensive or too complex to audit, it is effectively unauditable. This is a common pattern in enterprise security as well. We deploy complex, proprietary black-box solutions that require vendor-specific tools and massive resource investments to monitor or audit. If your security stack requires a specialized team and a month of manual labor to verify a single incident, you do not have a security program; you have a liability.
Lessons for the Security Professional
Defenders and researchers must look beyond the code. When you are assessing a system, ask yourself: "How do I verify the output?" If the answer involves a process that is prohibitively expensive or operationally impossible, the system is fundamentally broken.
The OWASP Top 10 often highlights broken access control or injection, but we should also consider the risk of "broken operational integrity." A system that cannot be verified is a system that cannot be trusted. Whether you are working on election infrastructure or a cloud-native microservice, your goal should be to make the audit process as automated and transparent as the primary function of the system itself.
If you find yourself working with a system that lacks a clear, documented, and accessible audit path, you are not looking at a secure system. You are looking at a black box that is waiting for a failure. Start by mapping out the "happy path" for an audit. If that path is blocked by manual, undocumented, or prohibitively expensive steps, you have found your most critical vulnerability. Document it, report it, and push for a design that prioritizes verifiability over convenience. The paper trail is only as good as your ability to follow it.
Vulnerability Classes
Target Technologies
Up Next From This Conference

The Fortress Island of Voting System Physical Security

It's Not Safe Yet: Online Voting in Practice

Is End-to-End Verifiability a Magic Bullet for Internet Voting?
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Counter Deception: Defending Yourself in a World Full of Lies

