Protecting Election Security Researchers Globally
This talk examines the legal and professional risks faced by security researchers who identify and disclose vulnerabilities in election infrastructure. It highlights how existing laws, such as the Computer Fraud and Abuse Act (CFAA) and various international cybercrime statutes, are often weaponized against researchers, leading to legal threats and intimidation. The presentation advocates for the adoption of 'safe harbor' frameworks, structured disclosure protocols, and cross-border cooperation to protect researchers and improve the security of democratic processes. The speaker emphasizes that vulnerability disclosure is a service to democracy rather than an act of sabotage.
Why Security Researchers Are Being Criminalized for Finding Election Flaws
TLDR: Security researchers who identify vulnerabilities in election infrastructure frequently face legal retaliation, including arrest and intimidation, rather than receiving the recognition they deserve. This talk outlines the critical need for standardized safe harbor policies and structured disclosure protocols to protect the individuals who act as the last line of defense for democratic systems. Without these protections, the chilling effect on research leaves critical cyber-physical systems exposed to exploitation by malicious actors.
Election infrastructure is no longer just paper ballots and physical boxes. Modern voting systems are complex cyber-physical environments where software, hardware, and network protocols intersect to determine the outcome of democratic processes. When a researcher identifies a flaw in an electronic voting machine or an election portal, they are essentially performing a public service. Yet, the current legal environment often treats these researchers as criminals, weaponizing statutes like the Computer Fraud and Abuse Act (CFAA) to silence them. This is not a theoretical risk; it is a reality that discourages the very people capable of securing our most critical systems.
The Legal Trap for Researchers
The core issue is that many jurisdictions lack a clear distinction between malicious exploitation and good-faith security research. When a researcher discovers a vulnerability in an election portal, they often find themselves in a catch-22. If they disclose the flaw, they risk being charged with unauthorized access or violating anti-hacking laws. If they remain silent, the vulnerability remains unpatched, leaving the system open to anyone with the intent to manipulate it.
In the United States, the CFAA has historically been used to threaten researchers who access public-facing systems, even when their intent is to identify and report security gaps. Similar patterns exist globally. In Nigeria, researchers have faced threats after exposing flaws in election portals, while in India, those reporting issues with electronic voting machines have been arrested. These actions create a massive chilling effect. Why would a talented researcher spend months auditing a complex voting system if the reward is a potential lawsuit or a criminal record?
Why Safe Harbor Matters
Safe harbor policies are the only way to bridge this gap. A robust safe harbor framework provides legal immunity for researchers who act in good faith, follow established disclosure protocols, and do not cause harm to the systems they are testing. This is not about giving researchers a free pass to break things; it is about creating a predictable, legal pathway for vulnerability disclosure.
For a pentester or bug bounty hunter, the absence of these policies means that every engagement with election-related infrastructure is a high-stakes gamble. We need to move toward a model where disclosure is treated as a collaborative effort between researchers and election officials. This requires:
- Codified Legal Immunity: Clear, non-ambiguous protections for researchers who operate within the scope of a defined program.
- Structured Disclosure Protocols: Standardized timelines, such as a 90 to 120-day window for mitigation, which ensure that vulnerabilities are addressed promptly without the researcher being left in limbo.
- Cross-Border Mutual Recognition: Agreements that ensure researchers are protected regardless of where they are located, acknowledging the global nature of digital infrastructure.
The Reality of Cyber-Physical Systems
Voting machines and election management systems are prime examples of cyber-physical systems. Unlike a standard web application, a vulnerability here can have immediate, real-world consequences. If an attacker can manipulate the code that counts the votes, the integrity of the entire election is compromised.
When we talk about OWASP Top 10 vulnerabilities in this context, we are not just talking about data leaks. We are talking about the potential for unauthorized modification of vote tallies, denial-of-service attacks on reporting portals, and the erosion of public trust. A pentester encountering these systems must be hyper-aware of the legal boundaries. Without a formal safe harbor, the risk of being labeled a threat actor is simply too high for most independent researchers to engage.
Moving Toward a Collaborative Future
Defenders and election officials must recognize that researchers are not the enemy. They are the watchdogs. If you are working on the blue team for an election-related organization, your priority should be to establish a clear, public-facing vulnerability disclosure policy (VDP). This is the first step toward building the trust necessary to keep these systems secure.
If you are a researcher, look for organizations that have already adopted coordinated vulnerability disclosure practices. If they haven't, advocate for them. We need to shift the mindset from secrecy to transparency. The goal is to create an environment where the discovery of a flaw leads to a patch, not a police report.
Election security is a shared responsibility. It requires the active participation of civil society, technical experts, and government officials. We must protect the people who are willing to put in the work to secure our democracy. If we continue to punish the truth-tellers, we are only making it easier for those who wish to do us harm. Let’s keep the conversation going and push for the structural changes that will make our election systems more resilient.
Target Technologies
All Tags
Up Next From This Conference

The Fortress Island of Voting System Physical Security

It's Not Safe Yet: Online Voting in Practice

Is End-to-End Verifiability a Magic Bullet for Internet Voting?
Similar Talks

Anyone Can Hack IoT: A Beginner's Guide to Hacking Your First IoT Device

The Dark Side of Bug Bounty

