Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Unveiling the Vulnerabilities: How Public Voter Data Can Be Exploited for Personal Identification


Researcher Noah M. Kenney has discovered that public voter data can be used to identify individuals with a high degree of accuracy, raising concerns about the potential risks associated with sharing sensitive information. His investigation highlights the need for greater vigilance and better data protection measures when it comes to personal information.

  • Voter records contain sensitive information that can be exploited for personal identification.
  • Publicly available voter data can be re-identified with a high degree of accuracy using other sources of information.
  • The disclosure regimes of counties in Texas and North Carolina vary, but both share vulnerabilities.
  • Limited redaction of sensitive information from public voter records may not mitigate re-identification risks.
  • Greater vigilance and better data protection measures are needed to prevent misuse of publicly available data sources.



  • The recent discovery by researcher Noah M. Kenney has shed light on a previously overlooked aspect of cybersecurity – the potential risks associated with public voter data. In a research paper titled "Public Voting Records: A Record, or an Attack Surface?", Kenney analyzed publicly available voter records from two counties in Texas and North Carolina to demonstrate how these seemingly innocuous datasets can be exploited for personal identification.

    Kenney's investigation began by examining the disclosure regimes of the two counties, comparing their data points on a range of sensitive information. The results revealed that while some counties may hide certain sensitive information, others openly share it with minimal protection. In Texas, the voter file provides full names, addresses, and phone numbers, although date of birth and race/ethnicity are not disclosed. On the other hand, North Carolina's data includes all these fields, along with party registration details.

    Kenney then turned his attention to the re-identification scenarios that could be possible using publicly available voter data. He discovered that by combining the datasets with other sources of information, such as social media posts or employer records, it was possible to identify individuals with a high degree of accuracy. For example, in Travis County, Texas, 74.3% of voters who had registered to vote in 20 or more elections could be identified using their unique voter history.

    Furthermore, Kenney found that the public voter records can be linked to other datasets, such as phone number databases and social media profiles, to facilitate re-identification. In North Carolina, for instance, the ability to link phone numbers with voter records resulted in an 88.53% identification rate.

    These findings have significant implications for personal data protection, particularly in regards to sensitive information like date of birth and address. The research highlights how a foreign intelligence service could potentially identify deployed military personnel by cross-referencing public voter record data with social media posts. Similarly, an employer seeking to hire employees with specific political affiliations could analyze primary ballot history to target job applicants.

    In light of these concerns, Kenney argues that the redaction of sensitive information from public voter records does little to mitigate re-identification risks. His research suggests that even minimal disclosure can result in significant identification rates when combined with other datasets.

    This incident highlights the need for greater vigilance and better data protection measures when it comes to personal information. As we become increasingly reliant on publicly available data sources, it is essential to recognize the potential risks associated with these datasets and take steps to prevent their misuse.

    In conclusion, Kenney's research serves as a wake-up call for policymakers, cybersecurity professionals, and individuals alike. By understanding how public voter data can be exploited for personal identification, we can work towards mitigating these risks and protecting sensitive information in an increasingly digital world.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Unveiling-the-Vulnerabilities-How-Public-Voter-Data-Can-Be-Exploited-for-Personal-Identification-ehn.shtml

  • https://go.theregister.com/feed/www.theregister.com/2026/05/04/public_voter_records_weaponized_for_privacy_violation/


  • Published: Mon May 4 04:40:53 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us