fbpx
Wikipedia

Electoral fraud

Electoral fraud, sometimes referred to as election manipulation, voter fraud or vote rigging, involves illegal interference with the process of an election, either by increasing the vote share of a favored candidate, depressing the vote share of rival candidates, or both.[1] It differs from but often goes hand-in-hand with voter suppression. What exactly constitutes electoral fraud varies from country to country.

Electoral legislation outlaws many kinds of election fraud,[2] but other practices violate general laws, such as those banning assault, harassment or libel. Although technically the term "electoral fraud" covers only those acts which are illegal, the term is sometimes used to describe acts which are legal, but considered morally unacceptable, outside the spirit of an election or in violation of the principles of democracy.[3][4] Show elections, featuring only one candidate, are sometimes classified[by whom?] as electoral fraud, although they may comply with the law and are presented more as referendums/plebiscites.

In national elections, successful electoral fraud on a sufficient scale can have the effect of a coup d'état,[citation needed] protest[5] or corruption of democracy. In a narrow election, a small amount of fraud may suffice to change the result. Even if the outcome is not affected, the revelation of fraud can reduce voters' confidence in democracy.

Law

In the US someone may be fined and/or imprisoned for not more than five years.[6] In France, someone guilty may be fined and/or imprisoned for not more than one year, or two years if the person is an official (like a mayor for example).[7]

Electorate manipulation

Electoral fraud can occur in advance of voting if the composition of the electorate is altered. The legality of this type of manipulation varies across jurisdictions. Deliberate manipulation of election outcomes is widely considered a violation of the principles of democracy.[8]

Artificial migration or party membership

In many cases, it is possible for authorities to artificially control the composition of an electorate in order to produce a foregone result. One way of doing this is to move a large number of voters into the electorate prior to an election, for example by temporarily assigning them land or lodging them in flophouses.[9][10] Many countries prevent this with rules stipulating that a voter must have lived in an electoral district for a minimum period (for example, six months) in order to be eligible to vote there. However, such laws can also be used for demographic manipulation as they tend to disenfranchise those with no fixed address, such as the homeless, travelers, Roma, students (studying full-time away from home), and some casual workers.

Another strategy is to permanently move people into an electoral district, usually through public housing. If people eligible for public housing are likely to vote for a particular party, then they can either be concentrated into one area, thus making their votes count for less, or moved into marginal seats, where they may tip the balance towards their preferred party. One example of this was the 1986–1990 Homes for votes scandal in the City of Westminster in England under Shirley Porter.[11]

Immigration law may also be used to manipulate electoral demography. For instance, Malaysia gave citizenship to immigrants from the neighboring Philippines and Indonesia, together with suffrage, in order for a political party to "dominate" the state of Sabah; this controversial process was known as Project IC.[12]

A method of manipulating primary contests and other elections of party leaders are related to this. People who support one party may temporarily join another party (or vote in a crossover way, when permitted) in order to elect a weak candidate for that party's leadership. The goal ultimately is to defeat the weak candidate in the general election by the leader of the party that the voter truly supports. There were claims that this method was being utilised in the UK Labour Party leadership election in 2015, where Conservative-leaning Toby Young encouraged Conservatives to join Labour and vote for Jeremy Corbyn in order to "consign Labour to electoral oblivion".[13][14] Shortly after, #ToriesForCorbyn trended on Twitter.[14]

Disenfranchisement

The composition of an electorate may also be altered by disenfranchising some classes of people, rendering them unable to vote. In some cases, states have passed provisions that raised general barriers to voter registration, such as poll taxes, literacy and comprehension tests, and record-keeping requirements, which in practice were applied against minority populations to discriminatory effect. From the turn of the century into the late 1960s, most African Americans in the southern states of the former Confederacy were disenfranchised by such measures. Corrupt election officials may misuse voting regulations such as a literacy test or requirement for proof of identity or address in such a way as to make it difficult or impossible for their targets to cast a vote. If such practices discriminate against a religious or ethnic group, they may so distort the political process that the political order becomes grossly unrepresentative, as in the post-Reconstruction or Jim Crow era until the Voting Rights Act of 1965. Felons have been disenfranchised in many states as a strategy to prevent African Americans from voting.[15]

Groups may also be disenfranchised by rules which make it impractical or impossible for them to cast a vote. For example, requiring people to vote within their electorate may disenfranchise serving military personnel, prison inmates, students, hospital patients or anyone else who cannot return to their homes. Polling can be set for inconvenient days, such as midweek or on holy days of religious groups: for example on the Sabbath or other holy days of a religious group whose teachings determine that voting is prohibited on such a day. Communities may also be effectively disenfranchised if polling places are situated in areas perceived by voters as unsafe, or are not provided within reasonable proximity (rural communities are especially vulnerable to this).[example needed]

In some cases, voters may be invalidly disenfranchised, which is true electoral fraud. For example, a legitimate voter may be "accidentally" removed from the electoral roll, making it difficult or impossible for the person to vote.

In the Canadian federal election of 1917, during the Great War, the Canadian government, led by the Union Party, passed the Military Voters Act and the Wartime Elections Act. The Military Voters Act permitted any active military personnel to vote by party only and allowed that party to decide in which electoral district to place that vote. It also enfranchised those women who were directly related or married to an active soldier. These groups were believed to be disproportionately in favor of the Union government, as that party was campaigning in favor of conscription.[citation needed] The Wartime Elections Act, conversely, disenfranchised particular ethnic groups assumed to be disproportionately in favour of the opposition Liberal Party.[citation needed]

Division of opposition support

Stanford University professor Beatriz Magaloni described a model governing the behaviour of autocratic regimes. She proposed that ruling parties can maintain political control under a democratic system without actively manipulating votes or coercing the electorate. Under the right conditions, the democratic system is maneuvered into an equilibrium in which divided opposition parties act as unwitting accomplices to single-party rule. This permits the ruling regime to abstain from illegal electoral fraud.[16]

Preferential voting systems such as score voting, instant-runoff voting, and single transferable vote are designed to prevent systemic electoral manipulation and political duopoly.[17][18]

Intimidation

Voter intimidation involves putting undue pressure on a voter or group of voters so that they will vote a particular way, or not at all. Absentee and other remote voting can be more open to some forms of intimidation as the voter does not have the protection and privacy of the polling location. Intimidation can take a range of forms including verbal, physical, or coercion. This was so common that in 1887, a Kansas Supreme Court in New Perspectives on Election Fraud in The Gilded Age said "[...] physical retaliation constituted only a slight disturbance and would not vitiate an election."

  • Violence or the threat of violence: In its simplest form, voters from a particular demographic or known to support a particular party or candidate are directly threatened by supporters of another party or candidate or by those hired by them. In other cases, supporters of a particular party make it known that if a particular village or neighborhood is found to have voted the 'wrong' way, reprisals will be made against that community. Another method is to make a general threat of violence, for example, a bomb threat which has the effect of closing a particular polling place, thus making it difficult for people in that area to vote.[19] One notable example of outright violence was the 1984 Rajneeshee bioterror attack, where followers of Bhagwan Shree Rajneesh deliberately contaminated salad bars in The Dalles, Oregon, in an attempt to weaken political opposition during county elections. Historically, this tactic included Lynching in the United States to terrorize potential African American voters in some areas.
  • Attacks on polling places: Polling places in an area known to support a particular party or candidate may be targeted for vandalism, destruction or threats, thus making it difficult or impossible for people in that area to vote.
  • Legal threats: In this case, voters will be made to believe, accurately or otherwise, that they are not legally entitled to vote, or that they are legally obliged to vote a particular way. Voters who are not confident about their entitlement to vote may also be intimidated by real or implied authority figures who suggest that those who vote when they are not entitled to will be imprisoned, deported or otherwise punished.[20][21]
    • For example, in 2004, in Wisconsin and elsewhere voters allegedly received flyers that said, "If you already voted in any election this year, you can't vote in the Presidential Election", implying that those who had voted in earlier primary elections were ineligible to vote. Also, "If anybody in your family has ever been found guilty of anything you can't vote in the Presidential Election." Finally, "If you violate any of these laws, you can get 10 years in prison and your children will be taken away from you."[22][23]
    • Another method, allegedly used in Cook County, Illinois, in 2004, is to falsely tell particular people that they are not eligible to vote.[21]
    • In 1981 in New Jersey, the Republican National Committee created the Ballot Security Task Force to discourage voting among Latino and African-American citizens of New Jersey. The task force identified voters from an old registration list and challenged their credentials. It also paid off-duty police officers to patrol polling sites in Newark and Trenton, and posted signs saying that falsifying a ballot is a crime.[24]
  • Coercion: The demographic that controlled the voting ballot would try to persuade others to follow them. By singling out those who were against the majority, people would attempt to switch the voters' decision. Their argument could be that since the majority sides with a certain candidate, they should admit defeat and join the winning side. If this did not work, this led to the threatening of violence seen countless times during elections. Coercion, electoral intimidation was seen in the Navy. In 1885 William C. Whitney started an investigation that involved the men in the Navy. As said by Whitney "the vote of the yard was practically coerced and controlled by the foremen. This instance shows how even in the Navy there were still instances of people going to great lengths for the desired elective to win.

Disinformation

People may distribute false or misleading information in order to affect the outcome of an election.[3] For example, in the Chilean presidential election of 1970, the U.S. government's Central Intelligence Agency used "black propaganda"—materials purporting to be from various political parties—to sow discord between members of a coalition between socialists and communists.[25]

Another use of disinformation is to give voters incorrect information about the time or place of polling, thus causing them to miss their chance to vote. As part of the 2011 Canadian federal election voter suppression scandal, Elections Canada traced fraudulent phone calls, telling voters that their polling stations had been moved, to a telecommunications company that worked with the Conservative Party.[26]

Similarly in the United States, right-wing political operatives Jacob Wohl and Jack Burkman were indicted on several counts of bribery and election fraud in October 2020 regarding a voter disinformation scheme they undertook in the months prior to the November, 3 2020 general election.[27] The pair hired a firm to make nearly 85,000 robocalls that targeted minority neighborhoods in Pennsylvania, Ohio, New York, Michigan, and Illinois. Like Democratic constituencies in general that year, minorities voted overwhelmingly by absentee ballot, many judging it a safer option during the COVID-19 pandemic than in-person voting.[28] Baselessly, the call warned potential voters if they submitted their votes by mail that authorities could use their personal information against them, including threats of police arrest for outstanding warrants and forced debt collection by creditors.[29]

On October 24, 2022 Wohl and Burkman pleaded guilty in Cuyahoga County, Ohio Common Pleas Court to one count each of felony telecommunications fraud.[30] Commenting on the tactic of using disinformation to suppress voter turnout, Cuyahoga County Prosecutor Michael C. O’Malley said the two men had "infringed upon the right to vote", and that "by pleading guilty, they were held accountable for their un-American actions.”[31]

Vote buying

Vote buying occurs when a political party or candidate seeks to buy the vote of a voter in an upcoming election. Vote buying can take various forms such as a monetary exchange, as well as an exchange for necessary goods or services.[32] This practice is often used to incentivise or persuade voters to turn out to elections and vote in a particular way. Although this practice is illegal in many countries such as the United States, Argentina, Mexico, Kenya, Brazil and Nigeria, its prevalence remains worldwide.

Voting process and results

A list of threats to voting systems, or electoral fraud methods considered as sabotage are kept by the National Institute of Standards and Technology.[33]

Misleading or confusing ballot papers

Ballot papers may be used to discourage votes for a particular party or candidate, using the design or other features which confuse voters into voting for a different candidate. For example, in the 2000 U.S. presidential election, Florida's butterfly ballot paper was criticized as poorly designed, leading some voters to vote for the wrong candidate. While the ballot itself was designed by a Democrat, it was the Democratic candidate, Al Gore, who was most harmed by voter errors because of this design.[34] Poor or misleading design is usually not illegal and therefore not technically election fraud, but it can nevertheless subvert the principles of democracy.

Sweden has a system with separate ballots used for each party, to reduce confusion among candidates. However, ballots from small parties such as Piratpartiet, Junilistan and Feministiskt initiativ have been omitted or placed on a separate table in the election to the EU parliament in 2009.[35] Ballots from Sweden Democrats have been mixed with ballots from the larger Swedish Social Democratic Party, which used a very similar font for the party name written on the top of the ballot.[citation needed]

Another method of confusing people into voting for a different candidate than intended is to run candidates or create political parties with similar names or symbols as an existing candidate or party. The goal is to mislead voters into voting for the false candidate or party to influence the results.[36] Such tactics may be particularly effective when a large proportion of voters have limited literacy in the language used on the ballot. Again, such tactics are usually not illegal but often work against the principles of democracy.

Another type of possible electoral confusion is multiple variations of voting by different electoral systems. This may cause ballots to be counted as invalid if the wrong system is used. For instance, if a voter puts a first-past-the-post cross in a numbered single transferable vote ballot paper, it is invalidated. For example, in Scotland and other parts of the United Kingdom, up to three different voting systems and types of ballots may be used, based on the jurisdictional level of elections for candidates. Local elections are determined by single transferable votes; Scottish parliamentary elections by the additional member system; national elections and for the UK Parliament by first-past-the-post.

Ballot stuffing

 
Transparent ballot box used in Ukraine to prevent election officials from pre-stuffing the box with fake ballots
 
A specialised ballot box used to assist ballot stuffing, featured in Frank Leslie's Illustrated Newspaper in 1856

Ballot stuffing, or "ballot-box stuffing", is the illegal practice of one person submitting multiple ballots during a vote in which only one ballot per person is permitted.

In Major League Baseball's All Star Game

Major League Baseball's All-Star Game has had problems with ballot stuffing on occasion.

  • In 1957, Cincinnati Reds fans aided by a local newspaper arranged for seven of the eight elected starting fielders to be Reds players.[45]
  • In 1999, the online ballot was stuffed by computer programmer Chris Nandor in favor of Boston Red Sox shortstop Nomar Garciaparra. Nandor created a program that enabled him to vote multiple times for Garciaparra and his teammates before his ballots—which were submitted through a dial-up connection—were traced back to him.[45]
  • In 2015, MLB annulled 65 million (out of a total of 620 million) online ballots after it was reported that eight out of the starting nine positions for the American League would have been Kansas City Royals players.[46]

Misrecording of votes

Votes may be misrecorded at source, on a ballot paper or voting machine, or later in misrecording totals. The 2019 Malawian general election was nullified by the Constitutional Court in 2020 because many results were changed by use of correction fluid, as well as duplicate, unverified and unsigned results forms.[47][48] California allows correction fluid and tape, so changes can be made after the ballot leaves the voter.[49]

Where votes are recorded through electronic or mechanical means, the voting machinery may be altered so that a vote intended for one candidate is recorded for another, or electronic results are duplicated or lost, and there is rarely evidence whether the cause was fraud or error.[50][51][52]

Many elections feature multiple opportunities for unscrupulous officials or 'helpers' to record an elector's vote differently from their intentions. Voters who require assistance to cast their votes are particularly vulnerable to having their votes stolen in this way. For example, a blind or illiterate person may be told that they have voted for one party when in fact they have been led to vote for another.

Misuse of proxy votes

Proxy voting is particularly vulnerable to election fraud, due to the amount of trust placed in the person who casts the vote. In several countries, there have been allegations of retirement home residents being asked to fill out 'absentee voter' forms. When the forms are signed and gathered, they are secretly rewritten as applications for proxy votes, naming party activists or their friends and relatives as the proxies. These people, unknown to the voter, cast the vote for the party of their choice. In the United Kingdom, this is known as 'granny farming.'[53]

Destruction or invalidation of ballots

One of the simplest methods of electoral fraud is to destroy ballots for an opposing candidate or party. While mass destruction of ballots can be difficult to execute without drawing attention, in a very close election, it may be possible to destroy a very small number of ballot papers without detection, thereby changing the overall result. Blatant destruction of ballot papers can render an election invalid and force it to be re-run. If a party can improve its vote on the re-run election, it can benefit from such destruction as long as it is not linked to it.

Another method is to make it appear that the voter has spoiled his or her ballot, thus rendering it invalid. Typically this would be done by adding another mark to the paper, making it appear that the voter has voted for more candidates than entitled, for instance. It would be difficult to do this to a large number of paper ballots without detection in some locales, but altogether too simple in others, especially jurisdictions where legitimate ballot spoiling by voter would serve a clear and reasonable aim. Examples may include emulating protest votes in jurisdictions that have recently had and since abolished a "none of the above" or "against all" voting option, civil disobedience where voting is mandatory, and attempts at discrediting or invalidating an election. An unusually large share of invalidated ballots may be attributed to loyal supporters of candidates that lost in primaries or previous rounds, did not run or did not qualify to do so, or some manner of protest movement or organized boycott.

In 2016, during the EU membership referendum, Leave-supporting voters in the UK alleged without evidence that the pencils supplied by voting stations would allow the referendum to be rigged in favour of Remain by MI5 erasing their votes from the ballot.[54] This has been described as the "use pens" conspiracy theory.[55]

Tampering with electronic voting systems

General tampering

All voting systems face threats of some form of electoral fraud. The types of threats that affect voting machines vary.[56] Research at Argonne National Laboratories revealed that a single individual with physical access to a machine, such as a Diebold Accuvote TS, can install inexpensive, readily available electronic components to manipulate its functions.[57][58]

Other approaches include:

  • Tampering with the software of a voting machine to add malicious code that alters vote totals or favors a candidate in any way.
    • Multiple groups have demonstrated this possibility.[59][60][61]
    • Private companies manufacture these machines. Many companies will not allow public access or review of the machines' source code, claiming fear of exposing trade secrets.[62]
  • Tampering with the hardware of the voting machine to alter vote totals or favor any candidate.[60][citation needed]
    • Some of these machines require a smart card to activate the machine and vote. However, a fraudulent smart card could attempt to gain access to voting multiple times[63] or be pre-loaded with negative votes to favor one candidate over another, as has been demonstrated.
  • Abusing the administrative access to the machine by election officials might also allow individuals to vote multiple times.
  • Election results that are sent directly over the internet from the polling place centre to the vote-counting authority can be vulnerable to a man-in-the-middle attack, where they are diverted to an intermediate website where the man in the middle flips the votes in favour of a certain candidate and then immediately forwards them on to the vote-counting authority. All votes sent over the internet violate the chain of custody and hence should be avoided by driving or flying memory cards in locked metal containers to the vote-counters. For purposes of getting quick preliminary total results on election night, encrypted votes can be sent over the internet, but final official results should be tabulated the next day only after the actual memory cards arrive in secure metal containers and are counted.[64]

South Africa

In 1994, the election which brought majority rule and put Nelson Mandela in office, South Africa's election compilation system was hacked, so they re-tabulated by hand.[65][66][67]

Ukraine

In 2014, Ukraine's central election system was hacked. Officials found and removed a virus and said the totals were correct.[68]

United States

During the 2020 presidential election, incumbent President Donald Trump made numerous allegations of electoral fraud by Democratic candidate Joe Biden. The Trump campaign filed numerous legal challenges to the results, making unsubstantiated allegations accusing Democrats of manipulating the votes in favor of Biden.[69][70] The campaign lost 64 of 65 lawsuits. Election security experts, officials, analysts, and Trump's own Attorney General William Barr have found no evidence of widespread voter fraud.[71][72]

Voter impersonation

United Kingdom

Concerns about voter impersonation have led the UK government to propose the Electoral Integrity Bill.[73] Academic research shows very little evidence of impersonation, however.[74]

United States

Some commentators, such as former Federal Election Commission member Hans von Spakovsky, have claimed that voter impersonation fraud, in which one person votes by impersonating another, eligible voter, is widespread, but documentation has been scarce and prosecutions rare. Numerous others, such as Professor Larry Sabato, and a variety of studies have shown this to be "relatively rare" in the US.[75] Since 2013, when the US Supreme Court ruled that a provision of the Voting Rights Act was no longer enforceable, several states have passed voter ID laws, ostensibly to counter the alleged fraud. But many experts counter that voter ID laws are not very effective against some forms of impersonation. These ID laws have been challenged by minority groups that claimed to be disadvantaged by the changes. By August 2016, four federal court rulings overturned laws or parts of such laws because they placed undue burdens on minority populations, including African Americans and Native Americans.[76] In each case: Texas, North Carolina, Wisconsin, and North Dakota, and may adversely affect minority voters. The states were required to accept alternatives for the November 2016 elections. These cases are expected to reach the US Supreme Court for hearings. In April 2020, a 20-year voter fraud study by MIT University found the level of fraud "exceedingly rare" since it occurs only in "0.00006 percent" of instances nationally, and, in one state, "0.000004 percent—about five times less likely than getting hit by lightning in the United States.[77]

Allegations of widespread voter fraud in the 2016 United States presidential election by busing out-of-state voters to New Hampshire were found to be false.[78] Suspicions of hacking of electronic voting machines in Wisconsin, Michigan, and Pennsylvania were determined to be unfounded.[79]

The North Carolina Board of Elections reported in 2017 on questions of voter fraud and the state's proposed voter ID law. The report showed that out of 4,769,640 votes cast in the November 2016 election in North Carolina, only one illegal vote would potentially have been blocked by the voter ID law. The investigation found fewer than 500 incidences of invalid ballots cast, the vast majority of which were cast by individuals on probation for felony who were likely not aware that this status disqualified them from voting, and the total number of invalid votes was far too small to have affected the outcome of any race in North Carolina in the 2016 election.[80][81]

Artificial results

In particularly corrupt regimes, the voting process may be nothing more than a sham, to the point that officials simply announce whatever results they want, sometimes without even bothering to count the votes. While such practices tend to draw international condemnation, voters typically have little if any recourse, as there would seldom be any ways to remove the fraudulent winner from power, short of a revolution.

In Turkmenistan, incumbent President Gurbanguly Berdymukhamedov received 97.69% of votes in the 2017 election, with his sole opponent, who was seen as pro-government, in fact being appointed by Berdymukhamedov. In Georgia, Mikheil Saakashvili received 96.2% of votes in the election following the Rose Revolution while his ally Nino Burjanadze was an interim head of state.

Postal ballot fraud

Fraud with absentee or postal ballots has been found occasionally in the United Kingdom,[82] and the United States[83] and has been alleged in Malaysia.[84][85] In both the United Kingdom and the United States, experts estimate there is more fraud with postal ballots than in-person voting, and that even so it has affected only a few local elections.[86][87][82]

Types of fraud have included pressure on voters from family or others, since the ballot is not cast in secret;[82][88][89] collection of ballots by dishonest collectors who mark votes or fail to deliver ballots;[90][91] and insiders changing or destroying ballots after they arrive.[92][93]

A significant measure to prevent some types of fraud has been to require the voter's signature on the outer envelope, which is compared to one or more signatures on file before taking the ballot out of the envelope and counting it.[82][94] Not all places have standards for signature review,[95] and there have been calls to update signatures more often to improve this review.[82][94] While any level of strictness involves rejecting some valid votes and accepting some invalid votes,[96] there have been concerns that signatures are improperly rejected from young and minority voters at higher rates than others, with no or limited ability of voters to appeal the rejection.[97][98]

Some problems have inherently limited scope, such as family pressure, while others can affect several percent of the vote, such as dishonest collectors[82] and signature verification.[97]

In legislature

Vote fraud can also take place in legislatures. Some of the forms used in national elections can also be used in parliaments, particularly intimidation and vote-buying. Because of the much smaller number of voters, however, election fraud in legislatures is qualitatively different in many ways. Fewer people are needed to 'swing' the election, and therefore specific people can be targeted in ways impractical on a larger scale. For example, Adolf Hitler achieved his dictatorial powers due to the Enabling Act of 1933. He attempted to achieve the necessary two-thirds majority to pass the Act by arresting members of the opposition, though this turned out to be unnecessary to attain the needed majority. Later, the Reichstag was packed with Nazi party members who voted for the Act's renewal.

In many legislatures, voting is public, in contrast to the secret ballot used in most modern public elections. This may make their elections more vulnerable to some forms of fraud since a politician can be pressured by others who will know how the legislator voted. However, it may also protect against bribery and blackmail, since the public and media will be aware if a politician votes in an unexpected way. Since voters and parties are entitled to pressure politicians to vote a particular way, the line between legitimate and fraudulent pressure is not always clear.

As in public elections, proxy votes are particularly prone to fraud. In some systems, parties may vote on behalf of any member who is not present in parliament. This protects those members from missing out on voting if prevented from attending parliament, but it also allows their party to prevent them from voting against its wishes. In some legislatures, proxy voting is not allowed, but politicians may rig voting buttons or otherwise illegally cast "ghost votes" while absent.[99]

Detection and prevention

The three main strategies for the prevention of electoral fraud in society are:

  1. Auditing the election process
  2. Deterrence through consistent and effective prosecution
  3. Cultivation of mores that discourage corruption.

Some of the main fraud prevention tactics can be summarised as secrecy and openness. The secret ballot prevents many kinds of intimidation and vote selling, while transparency at all other levels of the electoral process prevents and allows detection of most interference.

Election audits

Election auditing refers to any review conducted after polls close for the purpose of determining whether the votes were counted accurately (a results audit) or whether proper procedures were followed (a process audit), or both.

Audits vary and can include checking that the number of voters signed in at the polls matches the number of ballots, seals on ballot boxes and storage rooms are intact, computer counts (if used) match hand counts, and counts are accurately totaled.

Election recounts are a specific type of audit, with elements of both results and process audits.

Prosecution

In the United States the goal of prosecutions is not to stop fraud or keep fraudulent winners out of office; it is to deter and punish years later. The Justice Department has published Federal Prosecution of Election Offenses in eight editions from 1976 to 2017, under Presidents Ford, Carter, Reagan, Clinton, Bush and Trump. It says, "Department does not have authority to directly intercede in the election process itself. ... overt criminal investigative measures should not ordinarily be taken ... until the election in question has been concluded, its results certified, and all recounts and election contests concluded."[100][101] Sentencing guidelines provide a range of 0–21 months in prison for a first offender;[102] offense levels range from 8 to 14.[103] Investigation, prosecution and appeals can take over 10 years.[104]

In the Philippines, former President Gloria Macapagal Arroyo was arrested in 2011 following the filing of criminal charges against her for electoral sabotage, in connection with the 2007 Philippine general election. She was accused of conspiring with election officials to ensure the victory of her party's senatorial slate in the province of Maguindanao, through the tampering of election returns.[105]

Mores

The patterns of conventional behaviour in a society, or mores, are an effective means for preventing electoral fraud and corruption in general. A good example is Sweden, where the culture has a strong tendency toward positive values, resulting in a low incidence of political corruption.[106] Until recently Canada had a similar reputation. The In and Out scandal of 2008 and the Robocall scandal of 2011 has tarnished Canada's electoral integrity.[citation needed]

An advantage of cultivating positive mores as a prevention strategy is that it is effective across all electoral systems and devices. A disadvantage is that it makes other prevention and detection efforts more difficult to implement because members of society generally have more trust and less of a sense for fraudulent methods.

Secret ballot

The secret ballot, in which only the voter knows how they have voted, is believed by many to be a crucial part of ensuring free and fair elections through preventing voter intimidation or retribution.[107] Others argue that the secret ballot enables election fraud (because it makes it harder to verify that votes have been counted correctly)[108][109] and that it discourages voter participation.[110][failed verification] Although the secret ballot was sometimes practiced in ancient Greece and was a part of the Constitution of the Year III of 1795, it only became common in the nineteenth century. Secret balloting appears to have been first implemented in the former British colony—now an Australian state—of Tasmania on 7 February 1856. By the turn of the century, the practice had spread to most Western democracies.

In the United States, the popularity of the Australian ballot grew as reformers in the late 19th century sought to reduce the problems of election fraud. Groups such as the Greenbackers, Nationalist, and more fought for those who yearned to vote, but were exiled for their safety. George Walthew, Greenback, helped initiate one of the first secret ballots in America in Michigan in 1885. Even George Walthew had a predecessor in John Seitz, Greenback, who campaigned a bill to "preserve the purity of elections" in 1879 after the discovery of Ohio's electoral fraud in congressional elections.

The efforts of many helped accomplish this and led to the spread of other secret ballots all across the country. As mentioned on February 18, 1890, in the Galveston News "The Australian ballot has come to stay. It protects the independence of the voter and largely puts a stop to vote to buy." Before this, it was common for candidates to intimidate or bribe voters, as they would always know who had voted which way.

Transparency

Most methods of preventing electoral fraud involve making the election process completely transparent to all voters, from nomination of candidates through casting of the votes and tabulation.[111] A key feature in ensuring the integrity of any part of the electoral process is a strict chain of custody.

To prevent fraud in central tabulation, there has to be a public list of the results from every single polling place. This is the only way for voters to prove that the results they witnessed in their election office are correctly incorporated into the totals.

End-to-end auditable voting systems provide voters with a receipt to allow them to verify their vote was cast correctly, and an audit mechanism to verify that the results were tabulated correctly and all votes were cast by valid voters. However, the ballot receipt does not permit voters to prove to others how they voted, since this would open the door towards forced voting and blackmail. End-to-end systems include Punchscan and Scantegrity, the latter being an add-on to optical scan systems instead of a replacement.

In many cases, election observers are used to help prevent fraud and assure voters that the election is fair. International observers (bilateral and multilateral) may be invited to observe the elections (examples include election observation by the Organisation for Security and Cooperation in Europe (OSCE), European Union election observation missions, observation missions of the Commonwealth of Independent States (CIS), as well as international observation organised by NGOs, such as CIS-EMO, European Network of Election Monitoring Organizations (ENEMO), etc.). Some countries also invite foreign observers (i.e. bi-lateral observation, as opposed to multi-lateral observation by international observers).

In addition, national legislatures of countries often permit domestic observation. Domestic election observers can be either partisan (i.e. representing interests of one or a group of election contestants) or non-partisan (usually done by civil society groups). Legislations of different countries permit various forms and extents of international and domestic election observation.

Election observation is also prescribed by various international legal instruments. For example, paragraph 8 of the 1990 Copenhagen Document states that "The [OSCE] participating States consider that the presence of observers, both foreign and domestic, can enhance the electoral process for States in which elections are taking place. They, therefore, invite observers from any other CSCE participating States and any appropriate private institutions and organisations who may wish to do so to observe the course of their national election proceedings, to the extent permitted by law. They will also endeavour to facilitate similar access for election proceedings held below the national level. Such observers will undertake not to interfere in the electoral proceedings".

Critics note that observers cannot spot certain types of election fraud like targeted voter suppression or manipulated software of voting machines.

Statistical indicators and election forensics

Various forms of statistics can be indicators of election fraud—e.g., exit polls which diverge from the final results. Well-conducted exit polls serve as a deterrent to electoral fraud. However, exit polls are still notoriously imprecise. For instance, in the Czech Republic, some voters are afraid or ashamed to admit that they voted for the Communist Party (exit polls in 2002 gave the Communist party 2–3 percentage points less than the actual result). Variations in willingness to participate in an exit poll may result in an unrepresentative sample compared to the overall voting population.

When elections are marred by ballot-box stuffing (e.g., the Armenian presidential elections of 1996 and 1998), the affected polling stations will show abnormally high voter turnouts with results favouring a single candidate. By graphing the number of votes against turnout percentage (i.e., aggregating polling stations results within a given turnout range), the divergence from bell-curve distribution gives an indication of the extent of the fraud. Stuffing votes in favour of a single candidate affects votes vs. turnout distributions for that candidate and other candidates differently; this difference could be used to quantitatively assess the number of votes stuffed. Also, these distributions sometimes exhibit spikes at round-number turnout percentage values.[112][113][114] High numbers of invalid ballots, overvoting or undervoting are other potential indicators. Risk-limiting audits are methods to assess the validity of an election result statistically without the effort of a full election recount.

Though election forensics can determine if election results are anomalous, the statistical results still need to be interpreted. Alan Hicken and Walter R. Mebane describe the results of election forensic analyses as not providing "definitive proof" of fraud. Election forensics can be combined with other fraud detection and prevention strategies, such as in-person monitoring.[115]

Voting machine integrity

One method for verifying voting machine accuracy is Parallel Testing, the process of using an independent set of results compared to the original machine results. Parallel testing can be done prior to or during an election. During an election, one form of parallel testing is the VVPAT. Voter-verified paper audit trail (VVPAT) or verified paper record (VPR) is a method of providing feedback to voters using a ballotless voting system. A VVPAT is intended as an independent verification system for voting machines designed to allow voters to verify that their vote was cast correctly, to detect possible election fraud or malfunction, and to provide a means to audit the stored electronic results. This method is only effective if statistically significant numbers of voters verify that their intended vote matches both the electronic and paper votes.

On election day, a statistically significant number of voting machines can be randomly selected from polling locations and used for testing. This can be used to detect potential fraud or malfunction unless manipulated software would only start to cheat after a certain event like a voter pressing a special key combination (Or a machine might cheat only if someone does not perform the combination, which requires more insider access but fewer voters).

Another form of testing is Logic & Accuracy Testing (L&A), pre-election testing of voting machines using test votes to determine if they are functioning correctly.

Another method to ensure the integrity of electronic voting machines is independent software verification and certification.[111] Once a software is certified, code signing can ensure the software certified is identical to that which is used on election day. Some argue certification would be more effective if voting machine software was publicly available or open source.

Certification and testing processes conducted publicly and with oversight from interested parties can promote transparency in the election process. The integrity of those conducting testing can be questioned.

Testing and certification can prevent voting machines from being a black box where voters cannot be sure that counting inside is done as intended.[111]

One method that people have argued would help prevent these machines from being tampered with would be for the companies that produce the machines to share the source code, which displays and captures the ballots, with computer scientists. This would allow external sources to make sure that the machines are working correctly.[62]

Notable United States legislation

Help America Vote Act

The Help America Vote Act (Pub. L. 107–252 (text) (PDF)), or HAVA, is a United States federal law enacted on October 29, 2002.[116] It was drafted (at least in part) in reaction to the controversy surrounding the 2000 U.S. presidential election. The goals of HAVA are:[117] to replace punchcard and lever-based voting systems; create the Election Assistance Commission to assist in the administration of Federal elections; and establish minimum election administration standards.

Voting Rights Act of 1965

This was the most important federal legislation of the 20th century to protect voting rights, especially of ethnic and language minorities who had been disenfranchised for decades by states' constitutions and practices. Initially, it was particularly important for enforcing the constitutional right of African Americans in the South to vote, where millions of people had been mostly disenfranchised since the turn of the 20th century and excluded from politics. The law has also protected other ethnicities, such as Hispanics, Asians, Native Americans, and language minorities in other states, who have been discriminated against at various times, especially in the process of voter registration and electoral practices.

Civil Rights Act of 1964

The Civil Rights Act of 1964 (Pub. L. 88–352, 78 Stat. 241, enacted July 2, 1964) was a landmark piece of legislation in the United States[118] that outlawed major forms of discrimination against African Americans and other minorities.

See also

Further reading

General

  • Lehoucq, Fabrice. "Electoral fraud: Causes, types, and consequences". Annual review of political science (2003) 6#1 pp. 233–56.
  • Schaffer, Frederic Charles. The hidden costs of clean election reform (Cornell University Press, 2008)
  • Simpser, Alberto. Why Governments and Parties Manipulate Elections: Theory, Practice, and Implications (Cambridge University Press, 2013)

Australia

  • McGrath, Amy. The Forging of Votes, Tower House Publications, Kensington, NSW (1994)
  • McGrath, Amy. Frauding of Elections, Tower House Publications and H.S. Chapman Society, Brighton-le Sands, NSW (2003)
  • McGrath, Amy. (The Frauding of Votes, Tower House Publications, Kensington, NSW 1996)
  • Perry, Peter John. Political Corruption in Australia: A Very Wicked Place? (Ashgate Pub Limited, 2001)

Canada

  • Atkinson, Michael M., and Gerald Bierling. "Politicians, the public and political ethics: Worlds apart". Canadian Journal of Political Science (2005) 38#4: 1003.

France

  • Ebhardt, Christian. "In Search of a Political Office: Railway Directors and Electoral Corruption in Britain and France, 1820–1870". Journal of Modern European History (2013) 11#1 pp. 72–87.

Germany

  • Anderson, Margaret Lavinia. Practicing Democracy: Elections and Political Culture in Imperial Germany (2000)[119]
  • Ziblatt, Daniel. "Shaping Democratic Practice and the Causes of Electoral Fraud: The Case of Nineteenth-Century Germany". American Political Science Review (2009) 103#1 pp. 1–21.

Latin America

  • Hartlyn, Jonathan, and Arturo Valenzuela, "Democracy in Latin America since 1930", in Leslie Bethell, ed. Latin America: Politics and Society since 1930 (1998), 3–66.
  • Molina, Iván and Fabrice Lehoucq. "Political Competition and Electoral Fraud: A Latin American Case Study", Journal of Interdisciplinary History (1999) 30#2 pp. 199–234[120]
  • Posada-Carbó, Eduardo. "Electoral Juggling: A Comparative History of the Corruption of Suffrage in Latin America, 1830–1930". Journal of Latin American Studies (2000). pp. 611–44.
  • Ricci, Paolo. "'Beheading', Rule Manipulation and Fraud: The Approval of Election Results in Brazil, 1894–1930". Journal of Latin American Studies (2012) 44#3 pp. 495–521.
  • Silva, Marcos Fernandes da. "The political economy of corruption in Brazil". Revista de Administração de Empresas (1999) 39#3 pp. 26–41.

Russia

  • Reuter, O., & Szakonyi, D. (2021). "Electoral Manipulation and Regime Support: Survey Evidence from Russia". World Politics.

Turkey

  • Meyersson, Erik. "Is Something Rotten In Ankara's Mayoral Election? A Very Preliminary Statistical Analysis" (2014)[121]
  • Meyersson, Erik. "Trouble in Turkey's Elections" (2014)[122]
  • Meyersson, Erik. "Capital Fraud in Turkey? Evidence from Citizen Initiatives" (2014)[123]

United Kingdom

  • Gash, Norman. Politics in the Age of Peel: A Study in the Technique of Parliamentary Representation 1830–1850 (1953)
  • O'Gorman, Frank. Voters, Patrons and Parties: The Unreformed Electoral System of Hanoverian England, 1734–1832 (Oxford, 1989).
  • Harling, Philip. "Rethinking "Old Corruption", Past & Present (1995) No. 147 pp. 127–58[124]
  • Namier, Lewis Bernstein. The Structure of Politics at the Accession of George III (London: Macmillan, 1957)
  • O'Leary, Cornelius. The elimination of corrupt practices in British elections, 1868–1911 (Clarendon Press, 1962)

United States

  • Argersinger, Peter H. (1986). "New Perspectives on Election Fraud in the Gilded Age". Political Science Quarterly. The Academy of Political Science. 100 (4): 669–87. doi:10.2307/2151546. JSTOR 2151546. S2CID 156214317.
  • Campbell, Tracy (2005). Deliver the Vote: A History of Election Fraud, An American Political Tradition, 1742. Basic Books.[ISBN missing]
  • Fackler, Tim; Lin, Tse-min (1995). (PDF). Vol. 57. Journal of Politics. pp. 971–973. Archived from the original (PDF) on 2016-03-04. Retrieved 2015-05-29.
  • Mayfield, Loomis (1993). "Voting Fraud in Early Twentieth-Century Pittsburgh". The Journal of Interdisciplinary History. The MIT Press. 24 (1): 59–84. doi:10.2307/205101. JSTOR 205101.
  • Morris, Roy Jr. (2007). Fraud of the Century: Rutherford B. Hayes, Samuel Tilden, and the Stolen Election of 1876.[ISBN missing]
  • Summers, Mark Wahlgren (1993). The Era of Good Stealings.[ISBN missing]
  • Sydnor, Charles (1952). Gentlemen Freeholders: Political Practices in Washington's Virginia.[ISBN missing]

See also

References

  1. ^ "The Myth of Voter Fraud". Brennan Center for Justice. from the original on 2019-09-27. Retrieved 2020-11-07.
  2. ^ Jones, Douglas (2005-10-07). "Threats to Voting Systems". University of Iowa. from the original on 2020-09-30. Retrieved 2020-06-25.
    • also at Jones, Douglas (2005-10-07). "An Expanded Threat Taxonomy". National Institute of Standards and Technology. pp. 178–179. (PDF) from the original on 2021-01-15. Retrieved 2020-06-23.
  3. ^ a b Myagkov, Mikhail G.; Peter C. Ordeshook; Dimitri Shakin (2009). The Forensics of Election Fraud: Russia and Ukraine. Cambridge University Press. ISBN 978-0-521-76470-4.
  4. ^ Alvarez, Michael; Hall, Thad; Hyde, Susan (2008). Election Fraud: Detecting and Deterring Electoral Manipulation.[ISBN missing]
  5. ^ Dawn Brancati. 2016. Democracy Protests: Origins, Features, and Significance. New York: Cambridge University Press. ISBN 978-1107137738
  6. ^ legifrance.gouv.fr https://www.legifrance.gouv.fr/codes/article_lc/LEGIARTI000032964814. Retrieved 2023-02-07. {{cite web}}: Missing or empty |title= (help)
  7. ^ [1] November 11, 2007, at the Wayback Machine
  8. ^ Williamson, Chilton (1968). American Suffrage from Property to Democracy. Princeton, NJ: Princeton U. Press. ASIN B000FMPMK6.
  9. ^ Saltman, Roy G. (January 2006). The History and Politics of Voting Technology. Palgrave Macmillan. ISBN 1-4039-6392-4. from the original on 2009-12-14. Retrieved 2006-07-04.
  10. ^ House of Lords, Judgments - Magill v. Porter Magill v. Weeks, 13 December 2001, accessed 3 October 2022
  11. ^ Sadiq, Kamal (2005). "When States Prefer Non-Citizens Over Citizens: Conflict Over Illegal Immigration into Malaysia" (PDF). International Studies Quarterly. 49: 101–22. doi:10.1111/j.0020-8833.2005.00336.x. Archived from the original (PDF) on 2008-06-14. Retrieved 2008-04-23.
  12. ^ Young, Toby (17 June 2015). "Why Tories should join Labour and back Jeremy Corbyn". The Daily Telegraph. from the original on 24 April 2018. Retrieved 5 April 2018.
  13. ^ a b "Labour's response to #ToriesForCorbyn shows they really have lost the plot – Coffee House". 24 June 2015. from the original on 28 August 2017. Retrieved 15 January 2021.
  14. ^ Bazelon, Emily (2018-09-26). "Will Florida's Ex-Felons Finally Regain the Right to Vote?". The New York Times. ISSN 0362-4331. from the original on 2020-01-04. Retrieved 2018-12-04.
  15. ^ Magaloni, Beatriz. "Autocratic Elections, Voters, and the Game of Fraud" (PDF). Yale Macmillan Center. (PDF) from the original on 22 December 2015. Retrieved 10 December 2015.
  16. ^ Poundstone, William (2009). Gaming the Vote: Why Elections Aren't Fair (And What We Can Do About It). Macmillan. p. 170. ISBN 978-0-8090-4892-2. from the original on 2021-01-15. Retrieved 2020-10-24.
  17. ^ Bialik, Carl (May 14, 2011). "Latest Issue on the Ballot: How to Hold a Vote". The Wall Street Journal. from the original on July 23, 2015. Retrieved June 29, 2012.
  18. ^ . Madison.com. Archived from the original on March 4, 2009. Retrieved 2012-05-03.
  19. ^ Sullivan, Joseph F. (1993-11-13). "Florio's Defeat Revives Memories of G.O.P. Activities in 1981". The New York Times. from the original on 2009-03-07. Retrieved 2008-10-07.
  20. ^ a b [2] October 26, 2006, at the Wayback Machine
  21. ^ . Archived from the original on 2008-01-21. Retrieved 2018-04-23.
  22. ^ . 2006-11-08. Archived from the original on April 4, 2007. Retrieved 2012-05-03.
  23. ^ Sullivan, Joseph F. (November 13, 1993). "Florio's Defeat Revives Memories of G.O.P. Activities in 1981". The New York Times. from the original on October 6, 2020. Retrieved November 1, 2020.
  24. ^ Church Report (Covert Action in Chile 1963–1973) 2009-09-11 at the Wayback Machine, United States Senate Church Committee, 1975
  25. ^ "Fraudulent election calls traced to Racknine Inc., an Edmonton firm with Tory links". National Post. 2012-02-23. Archived from the original on 2020-03-26. Retrieved 2012-05-03.
  26. ^ "2 conservatives accused in hoax robocall scheme plead guilty". Associated Press. 2022-10-24. from the original on 2022-10-29.
  27. ^ "Mail-in voting became much more common in 2020 primaries as COVID-19 spread". Pew Research Center study published. 2022-10-24. from the original on 2022-10-31.
  28. ^ "Conspiracy theorist Jacob Wohl pleads guilty to felony over 2020 election robocalls". The Independent (US Edition). 2022-10-25. from the original on 2022-10-25.
  29. ^ "Section 2913.05 - Ohio Revised Code | Ohio Laws".
  30. ^ "Conservative activists plead guilty in 2020 election robocall fraud". CNN. 2022-10-25. from the original on 2022-11-02.
  31. ^ "Lynne Rienner Publishers – Elections for Sale The Causes and Consequences of Vote Buying". rienner.com. from the original on 2021-01-15. Retrieved 2018-04-22.
  32. ^ [3] October 21, 2006, at the Wayback Machine
  33. ^ Lacayo, Richard. . CNN. Archived from the original on 2011-06-22.
  34. ^ . sr.se. Archived from the original on 2009-06-15.
  35. ^ Hicks, Jonathon (July 24, 2004). . The New York Times. Archived from the original on 2009-03-04. Retrieved 18 December 2008.
  36. ^ "POLITICAL". The Queenslander. National Library of Australia. 3 November 1883. p. 721. Retrieved 13 January 2015.
  37. ^ "HERBERTON". The Northern Miner. Charters Towers, Qld.: National Library of Australia. 6 November 1883. p. 2. Retrieved 13 January 2015.
  38. ^ "COLONIAL TELEGRAMS [FROM OUR OWN CORRESPONDENT.] QUEENSLAND". The Morning Bulletin. Rockhampton, Qld.: National Library of Australia. 18 December 1883. p. 3. Retrieved 13 January 2015.
  39. ^ "Telegraphic Intelligence". The Northern Miner. Charters Towers, Qld.: National Library of Australia. 5 March 1884. p. 2. Retrieved 14 January 2015.
  40. ^ Hoffman, Ian (1 November 2006). "Button on e-voting machine allows multiple votes". East Bay Times. Retrieved 17 May 2021.
  41. ^ Hickins, Michael (3 November 2006). "A little yellow button on the back of Sequoia voting machines provides a manual override that lets a single person vote multiple times". InternetNews.com. Retrieved 17 May 2021.
  42. ^ Coll, Steve (2019). Directorate S: The C.I.A. and America's Secret Wars in Afghanistan and Pakistan. Penguin Group. pp. 649–650. ISBN 9780143132509.
  43. ^ Bodner, Matthew (March 19, 2018). "Analysis | Videos online show blatant ballot-stuffing in Russia". The Washington Post. from the original on July 13, 2020. Retrieved July 6, 2020.
  44. ^ a b Rovell, Darren (June 26, 2001). "Cyber-stuffing remains threat to All-Star voting". ESPN.com. ESPN. Retrieved May 7, 2021.
  45. ^ . Archived from the original on 2015-10-25.
  46. ^ "Malawi anxiously awaits verdict on alleged presidential election fraud". Radio France Internationale. 3 February 2020. from the original on 3 February 2020. Retrieved 3 February 2020.
  47. ^ "Malawi top court annuls presidential election results". Al Jazeera. from the original on 4 February 2020. Retrieved 3 February 2020.
  48. ^ "2 CCR 20983(c)(6)" (PDF). California Secretary of State. 2020-10-01. (PDF) from the original on 2020-10-09. Retrieved 2020-10-05.
  49. ^ Freed, Benjamin (2019-01-07). "South Carolina voting machines miscounted hundreds of ballots, report finds". from the original on 2020-02-05. Retrieved 2020-02-05.
  50. ^ Buell, Duncan (2018-12-23). Analysis of the Election Data from the 6 November 2018 General Election in South Carolina (PDF) (Report). (PDF) from the original on 2019-02-24. Retrieved 2020-02-05.
  51. ^ McDaniel; et al. (2007-12-07). EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing (PDF) (Report). (PDF) from the original on 2019-07-15. Retrieved 2020-02-05.
  52. ^ . BBC News. 2005-05-04. Archived from the original on 19 April 2016. Retrieved 13 November 2018.
  53. ^ Etehad, Melissa (23 June 2016). "Pencil or pen? An unusual conspiracy theory grips Brexit vote". Washington Post. Retrieved 12 July 2021.
  54. ^   Dobreva, Diyana; Grinnell, Daniel; Innes, Martin (6 May 2019). "Prophets and Loss: How "Soft Facts" on Social Media Influenced the Brexit Campaign and Social Reactions to the Murder of Jo Cox MP". Policy & Internet. 12 (2): 144–164. doi:10.1002/poi3.203.
  55. ^ . National Institute of Standards and Technology. October 7, 2005. Archived from the original on 21 October 2006. Retrieved 5 March 2011.
  56. ^ Jaikumar Vijayan (2011-09-28). "Argonne researchers 'hack' Diebold e-voting system". Computerworld. from the original on 2012-05-09. Retrieved 2012-05-03.
  57. ^ Layton, J. (2006-09-22). "How can someone tamper with an electronic voting machine". from the original on 2011-07-12. Retrieved 2011-02-27.
  58. ^ "Security Analysis of the Diebold AccuVote-TS Voting Machine" (PDF). Jhalderm.com. (PDF) from the original on 2015-02-05. Retrieved 2015-05-29.
  59. ^ a b "images". Retrieved February 17, 2012.[dead link]
  60. ^ "Problems in test run for voting". Miami Herald. October 31, 2006.[dead link]
  61. ^ a b Bonsor and Strickland, Kevin and Jonathan (2007-03-12). "How E-Voting Works". from the original on 2011-07-12. Retrieved 2011-02-27.
  62. ^ Kohno, T. "Analysis of Electronic Voting System" (PDF). (PDF) from the original on 2021-01-15. Retrieved 2011-02-27.
  63. ^ . Electiondefensealliance.org. Archived from the original on 2015-07-21. Retrieved 2015-05-29.
  64. ^ "Excerpt from Birth: The Conspiracy to Stop the '94 Election by Peter Harris". Penguin SA @ Sunday Times Books LIVE. 2010-10-25. Retrieved 2020-02-03.
  65. ^ Harris, Peter (2010). Birth: The Conspiracy to Stop the '94 Election (1st ed.). Cape Town: Umuzi. ISBN 978-1-4152-0102-2. OCLC 683401576.
  66. ^ Laing, Aislinn (2010-10-24). "Election won by Mandela 'rigged by opposition'". The Daily Telegraph. ISSN 0307-1235. from the original on 2020-02-03. Retrieved 2020-02-03.
  67. ^ Clayton, Mark (2014-06-17). "Ukraine election narrowly avoided 'wanton destruction' from hackers". The Christian Science Monitor. ISSN 0882-7729. from the original on 2020-10-13. Retrieved 2020-02-03.
  68. ^ "Trump's lawyer alleges voter fraud in 'big cities', says loss in Pennsylvania 'statistically impossible'". Hindustan Times. 19 November 2020. from the original on 2020-11-19. Retrieved 2020-11-19.
  69. ^ "Trump claims without evidence that mail voting leads to cheating: A guide to facts on absentee ballots". news.yahoo.com. Retrieved 2021-06-16.
  70. ^ Conradis, Brandon (2020-12-01). "Barr says DOJ hasn't uncovered widespread voter fraud in 2020 election". The Hill. from the original on 2020-12-01. Retrieved 2020-12-01.
  71. ^ "US election security officials reject Trump's fraud claims". BBC News. 13 November 2020. from the original on 2020-11-13. Retrieved 2020-11-14.
  72. ^ "Voter fraud measures announced in the Queen's speech".
  73. ^ James, Toby S.; Clark, Alistair (2020). "Electoral integrity, voter fraud and voter ID in polling stations: Lessons from English local elections". Policy Studies. 41 (2–3): 190–209. doi:10.1080/01442872.2019.1694656. S2CID 214322870.
  74. ^ Mayer, Jane (29 October 2012). "The Voter-Fraud Myth". The New Yorker. from the original on 6 January 2016. Retrieved 9 December 2015.
  75. ^ Rober Barnes (August 1, 2016). "Federal judge blocks N. Dakota's voter-ID law, calling it unfair to Native Americans". The Washington Post. from the original on 2016-08-02. Retrieved 2016-08-02.
  76. ^ "Election 2020 – Voting by mail in the U.S. is safe, honest, and fair – Let's put the vote-by-mail 'fraud' myth to rest". MIT University. April 28, 2020. from the original on July 28, 2020. Retrieved July 28, 2020.
  77. ^ James Pindell (1 June 2018). . The Boston Globe. Archived from the original on 26 October 2018. Retrieved 26 October 2018.
  78. ^ "Nate Silver on Twitter". from the original on November 24, 2016. Retrieved November 24, 2016 – via Twitter.
  79. ^ "Now we know how bad voter fraud is in North Carolina | Charlotte Observer". from the original on 2018-06-28. Retrieved 2018-06-28.
  80. ^ (PDF) (Press release). April 21, 2017. Archived from the original (PDF) on April 25, 2017. Retrieved June 28, 2018.
  81. ^ a b c d e f Pickles, Eric (2016-08-11). "Securing the ballot, Report of Sir Eric Pickles' review into electoral fraud" (PDF). United Kingdom Government. (PDF) from the original on 2020-08-17. Retrieved 2020-06-15.
  82. ^ Young, Ashley (2016-09-23). "A Complete Guide To Early And Absentee Voting". from the original on 2020-12-01. Retrieved 2020-06-15.
  83. ^ "Malaysian oppn accuse govt of postal vote fraud". ABC News. March 3, 2008. from the original on 2020-07-30. Retrieved 2008-04-24.
  84. ^ "One foot in the door". The Sun. Malaysia. March 27, 2008. from the original on 2020-07-30. Retrieved 2008-04-24.
  85. ^ "Who Can Vote?". A News21 2012 National Project. from the original on 2020-06-05. Retrieved 2020-06-12.
  86. ^ Kahn, Natasha and Corbin Carson. "Investigation: election day fraud "virtually nonexistent"". The Philadelphia Inquirer. from the original on 2020-06-15. Retrieved 2020-06-15.
  87. ^ Journal, Glenn R. Simpson and Evan Perez (2000-12-19). "'Brokers' Exploit Absentee Voters; Elderly Are Top Targets for Fraud". The Wall Street Journal. ISSN 0099-9660. from the original on 2020-06-12. Retrieved 2020-06-12.
  88. ^ Bender, William. "Nursing home resident's son: 'That's voter fraud'". from the original on 2020-06-13. Retrieved 2020-06-12.
  89. ^ "Judge upholds vote-rigging claims". BBC News. 2005-04-04. from the original on 2019-10-01. Retrieved 2010-09-19.
  90. ^ Robertson, Gary D. (2020-04-22). "North Carolina ballot probe defendant now faces federal charges". Times-News. from the original on 2020-07-18. Retrieved 2020-06-27.
  91. ^ Mazzei, Patricia (2016-10-28). "Two women busted for election fraud in Miami-Dade in 2016". Miami Herald. from the original on 2020-06-02. Retrieved 2020-06-12.
  92. ^ "Judge hears testimony in Hawkins case". from the original on 2020-06-13. Retrieved 2020-06-12.
  93. ^ a b (PDF). Stanford University. 2020-04-15. Archived from the original (PDF) on 2020-04-18. Retrieved 2020-06-01.
  94. ^ "Vote at Home Policy Actions: 1 and 2 Stars" (PDF). National Vote at Home Institute. May 2020. (PDF) from the original on 2020-06-06. Retrieved 2020-06-18.
  95. ^ Sita, Jodi; Found, Bryan; Rogers, Douglas K. (September 2002). "Forensic Handwriting Examiners' Expertise for Signature Comparison". Journal of Forensic Sciences. 47 (5): 1117–24. doi:10.1520/JFS15521J. ISSN 0022-1198. PMID 12353558. from the original on 2021-01-15. Retrieved 2020-06-27.
  96. ^ a b Smith, Daniel (2018-09-18). "Vote-By-Mail Ballots Cast in Florida" (PDF). ACLU Florida. (PDF) from the original on 2020-12-02. Retrieved 2020-06-01.
  97. ^ Wilkie, Jordan (2018-10-12). "Exclusive: High Rate of Absentee Ballot Rejection Reeks of Voter Suppression". Who What Why. from the original on 2020-06-17. Retrieved 2020-06-18.
  98. ^ "Is "Ghost" Voting Acceptable?". Writ.lp.findlaw.com. 2004-04-08. from the original on 2012-03-15. Retrieved 2012-05-03.
  99. ^ "Federal Prosecution of Election Offenses Eighth Edition". United States Department of Justice. December 2017. from the original on October 12, 2020. Retrieved 2019-07-13.
  100. ^ "Federal Prosecution of Election Offenses". votewell.net. from the original on 2019-07-13. Retrieved 2019-07-13.
  101. ^ "Sentencing Table" (PDF). US Sentencing Commission. 2011. (PDF) from the original on 2020-02-20. Retrieved 2019-07-13.
  102. ^ "2018 Chapter 2 Part C, section 2C1.1". United States Sentencing Commission. 2018-06-27. from the original on 2019-07-13. Retrieved 2019-07-13.
  103. ^ WKYT. "Ex-judge convicted of vote fraud in Clay County disbarred". from the original on 2019-07-13. Retrieved 2019-07-13.
  104. ^ Jeannette I. Andrade (2011-11-18). "Electoral sabotage case filed vs Arroyo, Ampatuan, Bedol". Philippine Daily Inquirer. from the original on 2018-05-19. Retrieved 2018-05-18.
  105. ^ . Transparency International. 2011. Archived from the original on 19 June 2006. Retrieved 1 December 2011.
  106. ^ "Should secret voting be mandatory? 'Yes' say political scientists". 26 October 2020. Retrieved 2021-04-20.
  107. ^ "Scrap the "secret" ballot – return to open voting". from the original on 2016-08-07. Retrieved 2016-07-16.
  108. ^ Todd Davies. "Consequences of the Secret Ballot" (PDF). Symbolic Systems Program, Stanford University. (PDF) from the original on 2016-10-11. Retrieved 2016-07-16.
  109. ^ "Abolish the Secret Ballot". The Atlantic. from the original on 2017-03-12. Retrieved 2017-03-06.
  110. ^ a b c Lundin, Leigh (2008-08-17). "Dangerous Ideas". Voting Fiasco, Part 279.236(a). Criminal Brief. from the original on 2012-10-24. Retrieved 2010-10-07.
  111. ^ "podmoskovnik: Cтатья о выборах из Троицкого Варианта". Podmoskovnik.livejournal.com. from the original on 2016-09-30. Retrieved 2015-05-29.
  112. ^ . Trvscience.ru. 2009-10-27. Archived from the original on 2013-04-23. Retrieved 2015-05-29.
  113. ^ Walter R. Mebane, Jr.; Kirill Kalinin. "Comparative Election Fraud Detection" (PDF). Personal.umich.edu. (PDF) from the original on 2015-02-05. Retrieved 2015-05-29.
  114. ^ Hicken, Allen; Mebane, Walter R. (2017). A Guide to Elections Forensics (PDF) (Report). University of Michigan Center for Political Studies. (PDF) from the original on 2019-06-26. Retrieved 2020-08-10.
  115. ^ United States Department of Justice Civil Rights Division Voting Section Home Page,The Help America Vote Act of 2002
  116. ^ 107th U.S. Congress (October 29, 2002). "Help America Vote Act of 2002 (Pub.L. 107-252)". U.S. Government Printing Office. from the original on 2021-01-15. Retrieved 2008-10-10.
  117. ^ Wright, Susan (2005), The Civil Rights Act of 1964: Landmark Antidiscrimination Legislation, The Rosen Publishing Group, ISBN 1-4042-0455-5
  118. ^ Anderson, Margaret Lavinia (30 April 2000). Practicing Democracy: Elections and Political Culture in Imperial Germany: Margaret Lavinia Anderson. ISBN 978-0-691-04854-3.
  119. ^ "Political Competition and Electoral Fraud: A Latin American Case Study" (PDF). Libres.uncg.edu. (PDF) from the original on 2014-02-21. Retrieved 2015-05-29.
  120. ^ "Is Something Rotten In Ankara's Mayoral Election? A Very Preliminary Statistical Analysis". Erikmeyersson.com. 2014-04-01. from the original on 2016-07-16. Retrieved 2015-05-29.
  121. ^ "Trouble in Turkey's Elections". Erikmeyersson.com. 2014-04-06. from the original on 2016-08-26. Retrieved 2015-05-29.
  122. ^ "Capital Fraud in Turkey? Evidence from Citizen Initiatives". Erikmeyersson.com. 2014-04-11. from the original on 2016-03-18. Retrieved 2015-05-29.
  123. ^ Philip Harling (May 1995). "Rethinking 'Old Corruption'". Past & Present. Oxford University Press. 147 (147): 127–58. doi:10.1093/past/147.1.127. JSTOR 651042.

External links

  • Voter Fraud – an article from the ACE Project
  • , Roy G. Saltman, August 22, 2006
  • Legal provisions to prevent Electoral Fraud – an article from the ACE Project
  • by Robert F. Kennedy Jr., June 1, 2006.

electoral, fraud, examples, perspective, this, article, represent, worldwide, view, subject, improve, this, article, discuss, issue, talk, page, create, article, appropriate, december, 2022, learn, when, remove, this, template, message, sometimes, referred, el. The examples and perspective in this article may not represent a worldwide view of the subject You may improve this article discuss the issue on the talk page or create a new article as appropriate December 2022 Learn how and when to remove this template message Electoral fraud sometimes referred to as election manipulation voter fraud or vote rigging involves illegal interference with the process of an election either by increasing the vote share of a favored candidate depressing the vote share of rival candidates or both 1 It differs from but often goes hand in hand with voter suppression What exactly constitutes electoral fraud varies from country to country Electoral legislation outlaws many kinds of election fraud 2 but other practices violate general laws such as those banning assault harassment or libel Although technically the term electoral fraud covers only those acts which are illegal the term is sometimes used to describe acts which are legal but considered morally unacceptable outside the spirit of an election or in violation of the principles of democracy 3 4 Show elections featuring only one candidate are sometimes classified by whom as electoral fraud although they may comply with the law and are presented more as referendums plebiscites In national elections successful electoral fraud on a sufficient scale can have the effect of a coup d etat citation needed protest 5 or corruption of democracy In a narrow election a small amount of fraud may suffice to change the result Even if the outcome is not affected the revelation of fraud can reduce voters confidence in democracy Contents 1 Law 2 Electorate manipulation 2 1 Artificial migration or party membership 2 2 Disenfranchisement 2 3 Division of opposition support 2 4 Intimidation 2 5 Disinformation 3 Vote buying 4 Voting process and results 4 1 Misleading or confusing ballot papers 4 2 Ballot stuffing 4 2 1 In Major League Baseball s All Star Game 4 3 Misrecording of votes 4 4 Misuse of proxy votes 4 5 Destruction or invalidation of ballots 4 6 Tampering with electronic voting systems 4 6 1 General tampering 4 6 2 South Africa 4 6 3 Ukraine 4 6 4 United States 4 7 Voter impersonation 4 7 1 United Kingdom 4 7 2 United States 4 8 Artificial results 4 9 Postal ballot fraud 5 In legislature 6 Detection and prevention 6 1 Election audits 6 2 Prosecution 6 3 Mores 6 4 Secret ballot 6 5 Transparency 6 6 Statistical indicators and election forensics 6 7 Voting machine integrity 7 Notable United States legislation 7 1 Help America Vote Act 7 2 Voting Rights Act of 1965 7 3 Civil Rights Act of 1964 8 See also 9 Further reading 9 1 General 9 2 Australia 9 3 Canada 9 4 France 9 5 Germany 9 6 Latin America 9 7 Russia 9 8 Turkey 9 9 United Kingdom 9 10 United States 10 See also 11 References 12 External linksLaw EditIn the US someone may be fined and or imprisoned for not more than five years 6 In France someone guilty may be fined and or imprisoned for not more than one year or two years if the person is an official like a mayor for example 7 Electorate manipulation EditElectoral fraud can occur in advance of voting if the composition of the electorate is altered The legality of this type of manipulation varies across jurisdictions Deliberate manipulation of election outcomes is widely considered a violation of the principles of democracy 8 Artificial migration or party membership Edit In many cases it is possible for authorities to artificially control the composition of an electorate in order to produce a foregone result One way of doing this is to move a large number of voters into the electorate prior to an election for example by temporarily assigning them land or lodging them in flophouses 9 10 Many countries prevent this with rules stipulating that a voter must have lived in an electoral district for a minimum period for example six months in order to be eligible to vote there However such laws can also be used for demographic manipulation as they tend to disenfranchise those with no fixed address such as the homeless travelers Roma students studying full time away from home and some casual workers Another strategy is to permanently move people into an electoral district usually through public housing If people eligible for public housing are likely to vote for a particular party then they can either be concentrated into one area thus making their votes count for less or moved into marginal seats where they may tip the balance towards their preferred party One example of this was the 1986 1990 Homes for votes scandal in the City of Westminster in England under Shirley Porter 11 Immigration law may also be used to manipulate electoral demography For instance Malaysia gave citizenship to immigrants from the neighboring Philippines and Indonesia together with suffrage in order for a political party to dominate the state of Sabah this controversial process was known as Project IC 12 A method of manipulating primary contests and other elections of party leaders are related to this People who support one party may temporarily join another party or vote in a crossover way when permitted in order to elect a weak candidate for that party s leadership The goal ultimately is to defeat the weak candidate in the general election by the leader of the party that the voter truly supports There were claims that this method was being utilised in the UK Labour Party leadership election in 2015 where Conservative leaning Toby Young encouraged Conservatives to join Labour and vote for Jeremy Corbyn in order to consign Labour to electoral oblivion 13 14 Shortly after ToriesForCorbyn trended on Twitter 14 Disenfranchisement Edit The composition of an electorate may also be altered by disenfranchising some classes of people rendering them unable to vote In some cases states have passed provisions that raised general barriers to voter registration such as poll taxes literacy and comprehension tests and record keeping requirements which in practice were applied against minority populations to discriminatory effect From the turn of the century into the late 1960s most African Americans in the southern states of the former Confederacy were disenfranchised by such measures Corrupt election officials may misuse voting regulations such as a literacy test or requirement for proof of identity or address in such a way as to make it difficult or impossible for their targets to cast a vote If such practices discriminate against a religious or ethnic group they may so distort the political process that the political order becomes grossly unrepresentative as in the post Reconstruction or Jim Crow era until the Voting Rights Act of 1965 Felons have been disenfranchised in many states as a strategy to prevent African Americans from voting 15 Groups may also be disenfranchised by rules which make it impractical or impossible for them to cast a vote For example requiring people to vote within their electorate may disenfranchise serving military personnel prison inmates students hospital patients or anyone else who cannot return to their homes Polling can be set for inconvenient days such as midweek or on holy days of religious groups for example on the Sabbath or other holy days of a religious group whose teachings determine that voting is prohibited on such a day Communities may also be effectively disenfranchised if polling places are situated in areas perceived by voters as unsafe or are not provided within reasonable proximity rural communities are especially vulnerable to this example needed In some cases voters may be invalidly disenfranchised which is true electoral fraud For example a legitimate voter may be accidentally removed from the electoral roll making it difficult or impossible for the person to vote In the Canadian federal election of 1917 during the Great War the Canadian government led by the Union Party passed the Military Voters Act and the Wartime Elections Act The Military Voters Act permitted any active military personnel to vote by party only and allowed that party to decide in which electoral district to place that vote It also enfranchised those women who were directly related or married to an active soldier These groups were believed to be disproportionately in favor of the Union government as that party was campaigning in favor of conscription citation needed The Wartime Elections Act conversely disenfranchised particular ethnic groups assumed to be disproportionately in favour of the opposition Liberal Party citation needed Division of opposition support Edit Stanford University professor Beatriz Magaloni described a model governing the behaviour of autocratic regimes She proposed that ruling parties can maintain political control under a democratic system without actively manipulating votes or coercing the electorate Under the right conditions the democratic system is maneuvered into an equilibrium in which divided opposition parties act as unwitting accomplices to single party rule This permits the ruling regime to abstain from illegal electoral fraud 16 Preferential voting systems such as score voting instant runoff voting and single transferable vote are designed to prevent systemic electoral manipulation and political duopoly 17 18 Intimidation Edit Voter intimidation involves putting undue pressure on a voter or group of voters so that they will vote a particular way or not at all Absentee and other remote voting can be more open to some forms of intimidation as the voter does not have the protection and privacy of the polling location Intimidation can take a range of forms including verbal physical or coercion This was so common that in 1887 a Kansas Supreme Court in New Perspectives on Election Fraud in The Gilded Age said physical retaliation constituted only a slight disturbance and would not vitiate an election Violence or the threat of violence In its simplest form voters from a particular demographic or known to support a particular party or candidate are directly threatened by supporters of another party or candidate or by those hired by them In other cases supporters of a particular party make it known that if a particular village or neighborhood is found to have voted the wrong way reprisals will be made against that community Another method is to make a general threat of violence for example a bomb threat which has the effect of closing a particular polling place thus making it difficult for people in that area to vote 19 One notable example of outright violence was the 1984 Rajneeshee bioterror attack where followers of Bhagwan Shree Rajneesh deliberately contaminated salad bars in The Dalles Oregon in an attempt to weaken political opposition during county elections Historically this tactic included Lynching in the United States to terrorize potential African American voters in some areas Attacks on polling places Polling places in an area known to support a particular party or candidate may be targeted for vandalism destruction or threats thus making it difficult or impossible for people in that area to vote Legal threats In this case voters will be made to believe accurately or otherwise that they are not legally entitled to vote or that they are legally obliged to vote a particular way Voters who are not confident about their entitlement to vote may also be intimidated by real or implied authority figures who suggest that those who vote when they are not entitled to will be imprisoned deported or otherwise punished 20 21 For example in 2004 in Wisconsin and elsewhere voters allegedly received flyers that said If you already voted in any election this year you can t vote in the Presidential Election implying that those who had voted in earlier primary elections were ineligible to vote Also If anybody in your family has ever been found guilty of anything you can t vote in the Presidential Election Finally If you violate any of these laws you can get 10 years in prison and your children will be taken away from you 22 23 Another method allegedly used in Cook County Illinois in 2004 is to falsely tell particular people that they are not eligible to vote 21 In 1981 in New Jersey the Republican National Committee created the Ballot Security Task Force to discourage voting among Latino and African American citizens of New Jersey The task force identified voters from an old registration list and challenged their credentials It also paid off duty police officers to patrol polling sites in Newark and Trenton and posted signs saying that falsifying a ballot is a crime 24 Coercion The demographic that controlled the voting ballot would try to persuade others to follow them By singling out those who were against the majority people would attempt to switch the voters decision Their argument could be that since the majority sides with a certain candidate they should admit defeat and join the winning side If this did not work this led to the threatening of violence seen countless times during elections Coercion electoral intimidation was seen in the Navy In 1885 William C Whitney started an investigation that involved the men in the Navy As said by Whitney the vote of the yard was practically coerced and controlled by the foremen This instance shows how even in the Navy there were still instances of people going to great lengths for the desired elective to win Disinformation Edit People may distribute false or misleading information in order to affect the outcome of an election 3 For example in the Chilean presidential election of 1970 the U S government s Central Intelligence Agency used black propaganda materials purporting to be from various political parties to sow discord between members of a coalition between socialists and communists 25 Another use of disinformation is to give voters incorrect information about the time or place of polling thus causing them to miss their chance to vote As part of the 2011 Canadian federal election voter suppression scandal Elections Canada traced fraudulent phone calls telling voters that their polling stations had been moved to a telecommunications company that worked with the Conservative Party 26 Similarly in the United States right wing political operatives Jacob Wohl and Jack Burkman were indicted on several counts of bribery and election fraud in October 2020 regarding a voter disinformation scheme they undertook in the months prior to the November 3 2020 general election 27 The pair hired a firm to make nearly 85 000 robocalls that targeted minority neighborhoods in Pennsylvania Ohio New York Michigan and Illinois Like Democratic constituencies in general that year minorities voted overwhelmingly by absentee ballot many judging it a safer option during the COVID 19 pandemic than in person voting 28 Baselessly the call warned potential voters if they submitted their votes by mail that authorities could use their personal information against them including threats of police arrest for outstanding warrants and forced debt collection by creditors 29 On October 24 2022 Wohl and Burkman pleaded guilty in Cuyahoga County Ohio Common Pleas Court to one count each of felony telecommunications fraud 30 Commenting on the tactic of using disinformation to suppress voter turnout Cuyahoga County Prosecutor Michael C O Malley said the two men had infringed upon the right to vote and that by pleading guilty they were held accountable for their un American actions 31 Vote buying EditMain article Vote buying Vote buying occurs when a political party or candidate seeks to buy the vote of a voter in an upcoming election Vote buying can take various forms such as a monetary exchange as well as an exchange for necessary goods or services 32 This practice is often used to incentivise or persuade voters to turn out to elections and vote in a particular way Although this practice is illegal in many countries such as the United States Argentina Mexico Kenya Brazil and Nigeria its prevalence remains worldwide Voting process and results EditA list of threats to voting systems or electoral fraud methods considered as sabotage are kept by the National Institute of Standards and Technology 33 Misleading or confusing ballot papers Edit Ballot papers may be used to discourage votes for a particular party or candidate using the design or other features which confuse voters into voting for a different candidate For example in the 2000 U S presidential election Florida s butterfly ballot paper was criticized as poorly designed leading some voters to vote for the wrong candidate While the ballot itself was designed by a Democrat it was the Democratic candidate Al Gore who was most harmed by voter errors because of this design 34 Poor or misleading design is usually not illegal and therefore not technically election fraud but it can nevertheless subvert the principles of democracy Sweden has a system with separate ballots used for each party to reduce confusion among candidates However ballots from small parties such as Piratpartiet Junilistan and Feministiskt initiativ have been omitted or placed on a separate table in the election to the EU parliament in 2009 35 Ballots from Sweden Democrats have been mixed with ballots from the larger Swedish Social Democratic Party which used a very similar font for the party name written on the top of the ballot citation needed Another method of confusing people into voting for a different candidate than intended is to run candidates or create political parties with similar names or symbols as an existing candidate or party The goal is to mislead voters into voting for the false candidate or party to influence the results 36 Such tactics may be particularly effective when a large proportion of voters have limited literacy in the language used on the ballot Again such tactics are usually not illegal but often work against the principles of democracy Another type of possible electoral confusion is multiple variations of voting by different electoral systems This may cause ballots to be counted as invalid if the wrong system is used For instance if a voter puts a first past the post cross in a numbered single transferable vote ballot paper it is invalidated For example in Scotland and other parts of the United Kingdom up to three different voting systems and types of ballots may be used based on the jurisdictional level of elections for candidates Local elections are determined by single transferable votes Scottish parliamentary elections by the additional member system national elections and for the UK Parliament by first past the post Ballot stuffing Edit Transparent ballot box used in Ukraine to prevent election officials from pre stuffing the box with fake ballots A specialised ballot box used to assist ballot stuffing featured in Frank Leslie s Illustrated Newspaper in 1856 Ballot stuffing or ballot box stuffing is the illegal practice of one person submitting multiple ballots during a vote in which only one ballot per person is permitted In the 1883 election for the district of Cook in Queensland Australia arrests were made in connection with accusations of ballot stuffing and the election committee subsequently changed the result of the election 37 38 39 40 A 2006 version of the Sequoia touchscreen voting machine had a yellow service back button on the back that could allow repeated voting under specific circumstances 41 42 During the 2014 Afghan presidential election Afghanistan s National Directorate of Security NDS recorded Ziaul Haq Amarkhel the secretary of Afghanistan s Independent Election Commission telling local officials to take sheep to the mountains stuff them and bring them back in an apparent reference to ballot stuffing 43 During the 2018 Russian Presidential Election there were multiple instances some caught on camera throughout Russia of voters and polling staff alike stuffing multiple votes in the ballot box 44 In Major League Baseball s All Star Game Edit Major League Baseball s All Star Game has had problems with ballot stuffing on occasion In 1957 Cincinnati Reds fans aided by a local newspaper arranged for seven of the eight elected starting fielders to be Reds players 45 In 1999 the online ballot was stuffed by computer programmer Chris Nandor in favor of Boston Red Sox shortstop Nomar Garciaparra Nandor created a program that enabled him to vote multiple times for Garciaparra and his teammates before his ballots which were submitted through a dial up connection were traced back to him 45 In 2015 MLB annulled 65 million out of a total of 620 million online ballots after it was reported that eight out of the starting nine positions for the American League would have been Kansas City Royals players 46 Misrecording of votes Edit Votes may be misrecorded at source on a ballot paper or voting machine or later in misrecording totals The 2019 Malawian general election was nullified by the Constitutional Court in 2020 because many results were changed by use of correction fluid as well as duplicate unverified and unsigned results forms 47 48 California allows correction fluid and tape so changes can be made after the ballot leaves the voter 49 Where votes are recorded through electronic or mechanical means the voting machinery may be altered so that a vote intended for one candidate is recorded for another or electronic results are duplicated or lost and there is rarely evidence whether the cause was fraud or error 50 51 52 Many elections feature multiple opportunities for unscrupulous officials or helpers to record an elector s vote differently from their intentions Voters who require assistance to cast their votes are particularly vulnerable to having their votes stolen in this way For example a blind or illiterate person may be told that they have voted for one party when in fact they have been led to vote for another Misuse of proxy votes Edit Proxy voting is particularly vulnerable to election fraud due to the amount of trust placed in the person who casts the vote In several countries there have been allegations of retirement home residents being asked to fill out absentee voter forms When the forms are signed and gathered they are secretly rewritten as applications for proxy votes naming party activists or their friends and relatives as the proxies These people unknown to the voter cast the vote for the party of their choice In the United Kingdom this is known as granny farming 53 Destruction or invalidation of ballots Edit One of the simplest methods of electoral fraud is to destroy ballots for an opposing candidate or party While mass destruction of ballots can be difficult to execute without drawing attention in a very close election it may be possible to destroy a very small number of ballot papers without detection thereby changing the overall result Blatant destruction of ballot papers can render an election invalid and force it to be re run If a party can improve its vote on the re run election it can benefit from such destruction as long as it is not linked to it Another method is to make it appear that the voter has spoiled his or her ballot thus rendering it invalid Typically this would be done by adding another mark to the paper making it appear that the voter has voted for more candidates than entitled for instance It would be difficult to do this to a large number of paper ballots without detection in some locales but altogether too simple in others especially jurisdictions where legitimate ballot spoiling by voter would serve a clear and reasonable aim Examples may include emulating protest votes in jurisdictions that have recently had and since abolished a none of the above or against all voting option civil disobedience where voting is mandatory and attempts at discrediting or invalidating an election An unusually large share of invalidated ballots may be attributed to loyal supporters of candidates that lost in primaries or previous rounds did not run or did not qualify to do so or some manner of protest movement or organized boycott In 2016 during the EU membership referendum Leave supporting voters in the UK alleged without evidence that the pencils supplied by voting stations would allow the referendum to be rigged in favour of Remain by MI5 erasing their votes from the ballot 54 This has been described as the use pens conspiracy theory 55 Tampering with electronic voting systems Edit Main article Election security General tampering Edit Further information Vote counting Errors in optical scans and Vote counting Errors in direct recording electronic voting All voting systems face threats of some form of electoral fraud The types of threats that affect voting machines vary 56 Research at Argonne National Laboratories revealed that a single individual with physical access to a machine such as a Diebold Accuvote TS can install inexpensive readily available electronic components to manipulate its functions 57 58 Other approaches include Tampering with the software of a voting machine to add malicious code that alters vote totals or favors a candidate in any way Multiple groups have demonstrated this possibility 59 60 61 Private companies manufacture these machines Many companies will not allow public access or review of the machines source code claiming fear of exposing trade secrets 62 Tampering with the hardware of the voting machine to alter vote totals or favor any candidate 60 citation needed Some of these machines require a smart card to activate the machine and vote However a fraudulent smart card could attempt to gain access to voting multiple times 63 or be pre loaded with negative votes to favor one candidate over another as has been demonstrated Abusing the administrative access to the machine by election officials might also allow individuals to vote multiple times Election results that are sent directly over the internet from the polling place centre to the vote counting authority can be vulnerable to a man in the middle attack where they are diverted to an intermediate website where the man in the middle flips the votes in favour of a certain candidate and then immediately forwards them on to the vote counting authority All votes sent over the internet violate the chain of custody and hence should be avoided by driving or flying memory cards in locked metal containers to the vote counters For purposes of getting quick preliminary total results on election night encrypted votes can be sent over the internet but final official results should be tabulated the next day only after the actual memory cards arrive in secure metal containers and are counted 64 South Africa Edit In 1994 the election which brought majority rule and put Nelson Mandela in office South Africa s election compilation system was hacked so they re tabulated by hand 65 66 67 Ukraine Edit In 2014 Ukraine s central election system was hacked Officials found and removed a virus and said the totals were correct 68 United States Edit Further information Attempts to overturn the 2020 United States presidential election During the 2020 presidential election incumbent President Donald Trump made numerous allegations of electoral fraud by Democratic candidate Joe Biden The Trump campaign filed numerous legal challenges to the results making unsubstantiated allegations accusing Democrats of manipulating the votes in favor of Biden 69 70 The campaign lost 64 of 65 lawsuits Election security experts officials analysts and Trump s own Attorney General William Barr have found no evidence of widespread voter fraud 71 72 Voter impersonation Edit Main articles Voter impersonation and Voter ID laws United Kingdom Edit Concerns about voter impersonation have led the UK government to propose the Electoral Integrity Bill 73 Academic research shows very little evidence of impersonation however 74 United States Edit Main article Voter impersonation United States Some commentators such as former Federal Election Commission member Hans von Spakovsky have claimed that voter impersonation fraud in which one person votes by impersonating another eligible voter is widespread but documentation has been scarce and prosecutions rare Numerous others such as Professor Larry Sabato and a variety of studies have shown this to be relatively rare in the US 75 Since 2013 when the US Supreme Court ruled that a provision of the Voting Rights Act was no longer enforceable several states have passed voter ID laws ostensibly to counter the alleged fraud But many experts counter that voter ID laws are not very effective against some forms of impersonation These ID laws have been challenged by minority groups that claimed to be disadvantaged by the changes By August 2016 four federal court rulings overturned laws or parts of such laws because they placed undue burdens on minority populations including African Americans and Native Americans 76 In each case Texas North Carolina Wisconsin and North Dakota and may adversely affect minority voters The states were required to accept alternatives for the November 2016 elections These cases are expected to reach the US Supreme Court for hearings In April 2020 a 20 year voter fraud study by MIT University found the level of fraud exceedingly rare since it occurs only in 0 00006 percent of instances nationally and in one state 0 000004 percent about five times less likely than getting hit by lightning in the United States 77 Allegations of widespread voter fraud in the 2016 United States presidential election by busing out of state voters to New Hampshire were found to be false 78 Suspicions of hacking of electronic voting machines in Wisconsin Michigan and Pennsylvania were determined to be unfounded 79 The North Carolina Board of Elections reported in 2017 on questions of voter fraud and the state s proposed voter ID law The report showed that out of 4 769 640 votes cast in the November 2016 election in North Carolina only one illegal vote would potentially have been blocked by the voter ID law The investigation found fewer than 500 incidences of invalid ballots cast the vast majority of which were cast by individuals on probation for felony who were likely not aware that this status disqualified them from voting and the total number of invalid votes was far too small to have affected the outcome of any race in North Carolina in the 2016 election 80 81 Artificial results Edit Main article Show election In particularly corrupt regimes the voting process may be nothing more than a sham to the point that officials simply announce whatever results they want sometimes without even bothering to count the votes While such practices tend to draw international condemnation voters typically have little if any recourse as there would seldom be any ways to remove the fraudulent winner from power short of a revolution In Turkmenistan incumbent President Gurbanguly Berdymukhamedov received 97 69 of votes in the 2017 election with his sole opponent who was seen as pro government in fact being appointed by Berdymukhamedov In Georgia Mikheil Saakashvili received 96 2 of votes in the election following the Rose Revolution while his ally Nino Burjanadze was an interim head of state Postal ballot fraud Edit Further information Postal voting Controversy and Postal voting in the United States Reliability of postal ballots Fraud with absentee or postal ballots has been found occasionally in the United Kingdom 82 and the United States 83 and has been alleged in Malaysia 84 85 In both the United Kingdom and the United States experts estimate there is more fraud with postal ballots than in person voting and that even so it has affected only a few local elections 86 87 82 Types of fraud have included pressure on voters from family or others since the ballot is not cast in secret 82 88 89 collection of ballots by dishonest collectors who mark votes or fail to deliver ballots 90 91 and insiders changing or destroying ballots after they arrive 92 93 A significant measure to prevent some types of fraud has been to require the voter s signature on the outer envelope which is compared to one or more signatures on file before taking the ballot out of the envelope and counting it 82 94 Not all places have standards for signature review 95 and there have been calls to update signatures more often to improve this review 82 94 While any level of strictness involves rejecting some valid votes and accepting some invalid votes 96 there have been concerns that signatures are improperly rejected from young and minority voters at higher rates than others with no or limited ability of voters to appeal the rejection 97 98 Some problems have inherently limited scope such as family pressure while others can affect several percent of the vote such as dishonest collectors 82 and signature verification 97 In legislature EditVote fraud can also take place in legislatures Some of the forms used in national elections can also be used in parliaments particularly intimidation and vote buying Because of the much smaller number of voters however election fraud in legislatures is qualitatively different in many ways Fewer people are needed to swing the election and therefore specific people can be targeted in ways impractical on a larger scale For example Adolf Hitler achieved his dictatorial powers due to the Enabling Act of 1933 He attempted to achieve the necessary two thirds majority to pass the Act by arresting members of the opposition though this turned out to be unnecessary to attain the needed majority Later the Reichstag was packed with Nazi party members who voted for the Act s renewal In many legislatures voting is public in contrast to the secret ballot used in most modern public elections This may make their elections more vulnerable to some forms of fraud since a politician can be pressured by others who will know how the legislator voted However it may also protect against bribery and blackmail since the public and media will be aware if a politician votes in an unexpected way Since voters and parties are entitled to pressure politicians to vote a particular way the line between legitimate and fraudulent pressure is not always clear As in public elections proxy votes are particularly prone to fraud In some systems parties may vote on behalf of any member who is not present in parliament This protects those members from missing out on voting if prevented from attending parliament but it also allows their party to prevent them from voting against its wishes In some legislatures proxy voting is not allowed but politicians may rig voting buttons or otherwise illegally cast ghost votes while absent 99 Detection and prevention EditThe three main strategies for the prevention of electoral fraud in society are Auditing the election process Deterrence through consistent and effective prosecution Cultivation of mores that discourage corruption Some of the main fraud prevention tactics can be summarised as secrecy and openness The secret ballot prevents many kinds of intimidation and vote selling while transparency at all other levels of the electoral process prevents and allows detection of most interference Election audits Edit Main article Election audits Election auditing refers to any review conducted after polls close for the purpose of determining whether the votes were counted accurately a results audit or whether proper procedures were followed a process audit or both Audits vary and can include checking that the number of voters signed in at the polls matches the number of ballots seals on ballot boxes and storage rooms are intact computer counts if used match hand counts and counts are accurately totaled Election recounts are a specific type of audit with elements of both results and process audits Prosecution Edit In the United States the goal of prosecutions is not to stop fraud or keep fraudulent winners out of office it is to deter and punish years later The Justice Department has published Federal Prosecution of Election Offenses in eight editions from 1976 to 2017 under Presidents Ford Carter Reagan Clinton Bush and Trump It says Department does not have authority to directly intercede in the election process itself overt criminal investigative measures should not ordinarily be taken until the election in question has been concluded its results certified and all recounts and election contests concluded 100 101 Sentencing guidelines provide a range of 0 21 months in prison for a first offender 102 offense levels range from 8 to 14 103 Investigation prosecution and appeals can take over 10 years 104 In the Philippines former President Gloria Macapagal Arroyo was arrested in 2011 following the filing of criminal charges against her for electoral sabotage in connection with the 2007 Philippine general election She was accused of conspiring with election officials to ensure the victory of her party s senatorial slate in the province of Maguindanao through the tampering of election returns 105 Mores Edit The patterns of conventional behaviour in a society or mores are an effective means for preventing electoral fraud and corruption in general A good example is Sweden where the culture has a strong tendency toward positive values resulting in a low incidence of political corruption 106 Until recently Canada had a similar reputation The In and Out scandal of 2008 and the Robocall scandal of 2011 has tarnished Canada s electoral integrity citation needed An advantage of cultivating positive mores as a prevention strategy is that it is effective across all electoral systems and devices A disadvantage is that it makes other prevention and detection efforts more difficult to implement because members of society generally have more trust and less of a sense for fraudulent methods Secret ballot Edit Main article Secret ballot The secret ballot in which only the voter knows how they have voted is believed by many to be a crucial part of ensuring free and fair elections through preventing voter intimidation or retribution 107 Others argue that the secret ballot enables election fraud because it makes it harder to verify that votes have been counted correctly 108 109 and that it discourages voter participation 110 failed verification Although the secret ballot was sometimes practiced in ancient Greece and was a part of the Constitution of the Year III of 1795 it only became common in the nineteenth century Secret balloting appears to have been first implemented in the former British colony now an Australian state of Tasmania on 7 February 1856 By the turn of the century the practice had spread to most Western democracies In the United States the popularity of the Australian ballot grew as reformers in the late 19th century sought to reduce the problems of election fraud Groups such as the Greenbackers Nationalist and more fought for those who yearned to vote but were exiled for their safety George Walthew Greenback helped initiate one of the first secret ballots in America in Michigan in 1885 Even George Walthew had a predecessor in John Seitz Greenback who campaigned a bill to preserve the purity of elections in 1879 after the discovery of Ohio s electoral fraud in congressional elections The efforts of many helped accomplish this and led to the spread of other secret ballots all across the country As mentioned on February 18 1890 in the Galveston News The Australian ballot has come to stay It protects the independence of the voter and largely puts a stop to vote to buy Before this it was common for candidates to intimidate or bribe voters as they would always know who had voted which way Transparency Edit Most methods of preventing electoral fraud involve making the election process completely transparent to all voters from nomination of candidates through casting of the votes and tabulation 111 A key feature in ensuring the integrity of any part of the electoral process is a strict chain of custody To prevent fraud in central tabulation there has to be a public list of the results from every single polling place This is the only way for voters to prove that the results they witnessed in their election office are correctly incorporated into the totals End to end auditable voting systems provide voters with a receipt to allow them to verify their vote was cast correctly and an audit mechanism to verify that the results were tabulated correctly and all votes were cast by valid voters However the ballot receipt does not permit voters to prove to others how they voted since this would open the door towards forced voting and blackmail End to end systems include Punchscan and Scantegrity the latter being an add on to optical scan systems instead of a replacement In many cases election observers are used to help prevent fraud and assure voters that the election is fair International observers bilateral and multilateral may be invited to observe the elections examples include election observation by the Organisation for Security and Cooperation in Europe OSCE European Union election observation missions observation missions of the Commonwealth of Independent States CIS as well as international observation organised by NGOs such as CIS EMO European Network of Election Monitoring Organizations ENEMO etc Some countries also invite foreign observers i e bi lateral observation as opposed to multi lateral observation by international observers In addition national legislatures of countries often permit domestic observation Domestic election observers can be either partisan i e representing interests of one or a group of election contestants or non partisan usually done by civil society groups Legislations of different countries permit various forms and extents of international and domestic election observation Election observation is also prescribed by various international legal instruments For example paragraph 8 of the 1990 Copenhagen Document states that The OSCE participating States consider that the presence of observers both foreign and domestic can enhance the electoral process for States in which elections are taking place They therefore invite observers from any other CSCE participating States and any appropriate private institutions and organisations who may wish to do so to observe the course of their national election proceedings to the extent permitted by law They will also endeavour to facilitate similar access for election proceedings held below the national level Such observers will undertake not to interfere in the electoral proceedings Critics note that observers cannot spot certain types of election fraud like targeted voter suppression or manipulated software of voting machines Statistical indicators and election forensics Edit Various forms of statistics can be indicators of election fraud e g exit polls which diverge from the final results Well conducted exit polls serve as a deterrent to electoral fraud However exit polls are still notoriously imprecise For instance in the Czech Republic some voters are afraid or ashamed to admit that they voted for the Communist Party exit polls in 2002 gave the Communist party 2 3 percentage points less than the actual result Variations in willingness to participate in an exit poll may result in an unrepresentative sample compared to the overall voting population When elections are marred by ballot box stuffing e g the Armenian presidential elections of 1996 and 1998 the affected polling stations will show abnormally high voter turnouts with results favouring a single candidate By graphing the number of votes against turnout percentage i e aggregating polling stations results within a given turnout range the divergence from bell curve distribution gives an indication of the extent of the fraud Stuffing votes in favour of a single candidate affects votes vs turnout distributions for that candidate and other candidates differently this difference could be used to quantitatively assess the number of votes stuffed Also these distributions sometimes exhibit spikes at round number turnout percentage values 112 113 114 High numbers of invalid ballots overvoting or undervoting are other potential indicators Risk limiting audits are methods to assess the validity of an election result statistically without the effort of a full election recount Though election forensics can determine if election results are anomalous the statistical results still need to be interpreted Alan Hicken and Walter R Mebane describe the results of election forensic analyses as not providing definitive proof of fraud Election forensics can be combined with other fraud detection and prevention strategies such as in person monitoring 115 Voting machine integrity Edit Further information Certification of voting machines and Election audits One method for verifying voting machine accuracy is Parallel Testing the process of using an independent set of results compared to the original machine results Parallel testing can be done prior to or during an election During an election one form of parallel testing is the VVPAT Voter verified paper audit trail VVPAT or verified paper record VPR is a method of providing feedback to voters using a ballotless voting system A VVPAT is intended as an independent verification system for voting machines designed to allow voters to verify that their vote was cast correctly to detect possible election fraud or malfunction and to provide a means to audit the stored electronic results This method is only effective if statistically significant numbers of voters verify that their intended vote matches both the electronic and paper votes On election day a statistically significant number of voting machines can be randomly selected from polling locations and used for testing This can be used to detect potential fraud or malfunction unless manipulated software would only start to cheat after a certain event like a voter pressing a special key combination Or a machine might cheat only if someone does not perform the combination which requires more insider access but fewer voters Another form of testing is Logic amp Accuracy Testing L amp A pre election testing of voting machines using test votes to determine if they are functioning correctly Another method to ensure the integrity of electronic voting machines is independent software verification and certification 111 Once a software is certified code signing can ensure the software certified is identical to that which is used on election day Some argue certification would be more effective if voting machine software was publicly available or open source Certification and testing processes conducted publicly and with oversight from interested parties can promote transparency in the election process The integrity of those conducting testing can be questioned Testing and certification can prevent voting machines from being a black box where voters cannot be sure that counting inside is done as intended 111 One method that people have argued would help prevent these machines from being tampered with would be for the companies that produce the machines to share the source code which displays and captures the ballots with computer scientists This would allow external sources to make sure that the machines are working correctly 62 Notable United States legislation EditHelp America Vote Act Edit Main article Help America Vote Act See also For The People Act The Help America Vote Act Pub L 107 252 text PDF or HAVA is a United States federal law enacted on October 29 2002 116 It was drafted at least in part in reaction to the controversy surrounding the 2000 U S presidential election The goals of HAVA are 117 to replace punchcard and lever based voting systems create the Election Assistance Commission to assist in the administration of Federal elections and establish minimum election administration standards Voting Rights Act of 1965 Edit Main article Voting Rights Act of 1965 This was the most important federal legislation of the 20th century to protect voting rights especially of ethnic and language minorities who had been disenfranchised for decades by states constitutions and practices Initially it was particularly important for enforcing the constitutional right of African Americans in the South to vote where millions of people had been mostly disenfranchised since the turn of the 20th century and excluded from politics The law has also protected other ethnicities such as Hispanics Asians Native Americans and language minorities in other states who have been discriminated against at various times especially in the process of voter registration and electoral practices Civil Rights Act of 1964 Edit Main article Civil Rights Act of 1964 The Civil Rights Act of 1964 Pub L 88 352 78 Stat 241 enacted July 2 1964 was a landmark piece of legislation in the United States 118 that outlawed major forms of discrimination against African Americans and other minorities See also EditAdministrative resource American Center for Voting Rights Branch stacking Caging list Cooping Corruption Election subversion Electoral integrity Florida Central Voter File purging controversy Foreign electoral intervention Gerrymandering List of controversial elections List of UK parliamentary election petitions Political corruption Postal voting Show election Smear campaign Carousel voting Bulgarian trainFurther reading EditGeneral Edit Lehoucq Fabrice Electoral fraud Causes types and consequences Annual review of political science 2003 6 1 pp 233 56 Schaffer Frederic Charles The hidden costs of clean election reform Cornell University Press 2008 Simpser Alberto Why Governments and Parties Manipulate Elections Theory Practice and Implications Cambridge University Press 2013 Australia Edit McGrath Amy The Forging of Votes Tower House Publications Kensington NSW 1994 McGrath Amy Frauding of Elections Tower House Publications and H S Chapman Society Brighton le Sands NSW 2003 McGrath Amy The Frauding of Votes Tower House Publications Kensington NSW 1996 Perry Peter John Political Corruption in Australia A Very Wicked Place Ashgate Pub Limited 2001 Canada Edit Atkinson Michael M and Gerald Bierling Politicians the public and political ethics Worlds apart Canadian Journal of Political Science 2005 38 4 1003 France Edit Ebhardt Christian In Search of a Political Office Railway Directors and Electoral Corruption in Britain and France 1820 1870 Journal of Modern European History 2013 11 1 pp 72 87 Germany Edit Anderson Margaret Lavinia Practicing Democracy Elections and Political Culture in Imperial Germany 2000 119 Ziblatt Daniel Shaping Democratic Practice and the Causes of Electoral Fraud The Case of Nineteenth Century Germany American Political Science Review 2009 103 1 pp 1 21 Latin America Edit Hartlyn Jonathan and Arturo Valenzuela Democracy in Latin America since 1930 in Leslie Bethell ed Latin America Politics and Society since 1930 1998 3 66 Molina Ivan and Fabrice Lehoucq Political Competition and Electoral Fraud A Latin American Case Study Journal of Interdisciplinary History 1999 30 2 pp 199 234 120 Posada Carbo Eduardo Electoral Juggling A Comparative History of the Corruption of Suffrage in Latin America 1830 1930 Journal of Latin American Studies 2000 pp 611 44 Ricci Paolo Beheading Rule Manipulation and Fraud The Approval of Election Results in Brazil 1894 1930 Journal of Latin American Studies 2012 44 3 pp 495 521 Silva Marcos Fernandes da The political economy of corruption in Brazil Revista de Administracao de Empresas 1999 39 3 pp 26 41 Russia Edit Reuter O amp Szakonyi D 2021 Electoral Manipulation and Regime Support Survey Evidence from Russia World Politics Turkey Edit Meyersson Erik Is Something Rotten In Ankara s Mayoral Election A Very Preliminary Statistical Analysis 2014 121 Meyersson Erik Trouble in Turkey s Elections 2014 122 Meyersson Erik Capital Fraud in Turkey Evidence from Citizen Initiatives 2014 123 United Kingdom Edit Gash Norman Politics in the Age of Peel A Study in the Technique of Parliamentary Representation 1830 1850 1953 O Gorman Frank Voters Patrons and Parties The Unreformed Electoral System of Hanoverian England 1734 1832 Oxford 1989 Harling Philip Rethinking Old Corruption Past amp Present 1995 No 147 pp 127 58 124 Namier Lewis Bernstein The Structure of Politics at the Accession of George III London Macmillan 1957 O Leary Cornelius The elimination of corrupt practices in British elections 1868 1911 Clarendon Press 1962 United States Edit Argersinger Peter H 1986 New Perspectives on Election Fraud in the Gilded Age Political Science Quarterly The Academy of Political Science 100 4 669 87 doi 10 2307 2151546 JSTOR 2151546 S2CID 156214317 Campbell Tracy 2005 Deliver the Vote A History of Election Fraud An American Political Tradition 1742 Basic Books ISBN missing Fackler Tim Lin Tse min 1995 Political Corruption and Presidential Elections 1929 1992 PDF Vol 57 Journal of Politics pp 971 973 Archived from the original PDF on 2016 03 04 Retrieved 2015 05 29 Mayfield Loomis 1993 Voting Fraud in Early Twentieth Century Pittsburgh The Journal of Interdisciplinary History The MIT Press 24 1 59 84 doi 10 2307 205101 JSTOR 205101 Morris Roy Jr 2007 Fraud of the Century Rutherford B Hayes Samuel Tilden and the Stolen Election of 1876 ISBN missing Summers Mark Wahlgren 1993 The Era of Good Stealings ISBN missing Sydnor Charles 1952 Gentlemen Freeholders Political Practices in Washington s Virginia ISBN missing See also EditSnap electionReferences Edit The Myth of Voter Fraud Brennan Center for Justice Archived from the original on 2019 09 27 Retrieved 2020 11 07 Jones Douglas 2005 10 07 Threats to Voting Systems University of Iowa Archived from the original on 2020 09 30 Retrieved 2020 06 25 also at Jones Douglas 2005 10 07 An Expanded Threat Taxonomy National Institute of Standards and Technology pp 178 179 Archived PDF from the original on 2021 01 15 Retrieved 2020 06 23 a b Myagkov Mikhail G Peter C Ordeshook Dimitri Shakin 2009 The Forensics of Election Fraud Russia and Ukraine Cambridge University Press ISBN 978 0 521 76470 4 Alvarez Michael Hall Thad Hyde Susan 2008 Election Fraud Detecting and Deterring Electoral Manipulation ISBN missing Dawn Brancati 2016 Democracy Protests Origins Features and Significance New York Cambridge University Press ISBN 978 1107137738 52 U S Code 20511 LII Legal Information Institute 1993 05 20 Retrieved 2023 02 07 legifrance gouv fr https www legifrance gouv fr codes article lc LEGIARTI000032964814 Retrieved 2023 02 07 a href Template Cite web html title Template Cite web cite web a Missing or empty title help 1 Archived November 11 2007 at the Wayback Machine Williamson Chilton 1968 American Suffrage from Property to Democracy Princeton NJ Princeton U Press ASIN B000FMPMK6 Saltman Roy G January 2006 The History and Politics of Voting Technology Palgrave Macmillan ISBN 1 4039 6392 4 Archived from the original on 2009 12 14 Retrieved 2006 07 04 House of Lords Judgments Magill v Porter Magill v Weeks 13 December 2001 accessed 3 October 2022 Sadiq Kamal 2005 When States Prefer Non Citizens Over Citizens Conflict Over Illegal Immigration into Malaysia PDF International Studies Quarterly 49 101 22 doi 10 1111 j 0020 8833 2005 00336 x Archived from the original PDF on 2008 06 14 Retrieved 2008 04 23 Young Toby 17 June 2015 Why Tories should join Labour and back Jeremy Corbyn The Daily Telegraph Archived from the original on 24 April 2018 Retrieved 5 April 2018 a b Labour s response to ToriesForCorbyn shows they really have lost the plot Coffee House 24 June 2015 Archived from the original on 28 August 2017 Retrieved 15 January 2021 Bazelon Emily 2018 09 26 Will Florida s Ex Felons Finally Regain the Right to Vote The New York Times ISSN 0362 4331 Archived from the original on 2020 01 04 Retrieved 2018 12 04 Magaloni Beatriz Autocratic Elections Voters and the Game of Fraud PDF Yale Macmillan Center Archived PDF from the original on 22 December 2015 Retrieved 10 December 2015 Poundstone William 2009 Gaming the Vote Why Elections Aren t Fair And What We Can Do About It Macmillan p 170 ISBN 978 0 8090 4892 2 Archived from the original on 2021 01 15 Retrieved 2020 10 24 Bialik Carl May 14 2011 Latest Issue on the Ballot How to Hold a Vote The Wall Street Journal Archived from the original on July 23 2015 Retrieved June 29 2012 Did bomb threat stifle vote Capital Times Madison com Archived from the original on March 4 2009 Retrieved 2012 05 03 Sullivan Joseph F 1993 11 13 Florio s Defeat Revives Memories of G O P Activities in 1981 The New York Times Archived from the original on 2009 03 07 Retrieved 2008 10 07 a b 2 Archived October 26 2006 at the Wayback Machine Intimidation and Deceptive Practices EP365 Archived from the original on 2008 01 21 Retrieved 2018 04 23 Incidents Of Voter Intimidation amp Suppression 2006 11 08 Archived from the original on April 4 2007 Retrieved 2012 05 03 Sullivan Joseph F November 13 1993 Florio s Defeat Revives Memories of G O P Activities in 1981 The New York Times Archived from the original on October 6 2020 Retrieved November 1 2020 Church Report Covert Action in Chile 1963 1973 Archived 2009 09 11 at the Wayback Machine United States Senate Church Committee 1975 Fraudulent election calls traced to Racknine Inc an Edmonton firm with Tory links National Post 2012 02 23 Archived from the original on 2020 03 26 Retrieved 2012 05 03 2 conservatives accused in hoax robocall scheme plead guilty Associated Press 2022 10 24 Archived from the original on 2022 10 29 Mail in voting became much more common in 2020 primaries as COVID 19 spread Pew Research Center study published 2022 10 24 Archived from the original on 2022 10 31 Conspiracy theorist Jacob Wohl pleads guilty to felony over 2020 election robocalls The Independent US Edition 2022 10 25 Archived from the original on 2022 10 25 Section 2913 05 Ohio Revised Code Ohio Laws Conservative activists plead guilty in 2020 election robocall fraud CNN 2022 10 25 Archived from the original on 2022 11 02 Lynne Rienner Publishers Elections for Sale The Causes and Consequences of Vote Buying rienner com Archived from the original on 2021 01 15 Retrieved 2018 04 22 3 Archived October 21 2006 at the Wayback Machine Lacayo Richard Florida recount In the eye of the storm CNN Archived from the original on 2011 06 22 Sidolagda valsedlar inget lagbrott sr se Archived from the original on 2009 06 15 Hicks Jonathon July 24 2004 Seeing Double on Ballot Similar Names Sow Confusion The New York Times Archived from the original on 2009 03 04 Retrieved 18 December 2008 POLITICAL The Queenslander National Library of Australia 3 November 1883 p 721 Retrieved 13 January 2015 HERBERTON The Northern Miner Charters Towers Qld National Library of Australia 6 November 1883 p 2 Retrieved 13 January 2015 COLONIAL TELEGRAMS FROM OUR OWN CORRESPONDENT QUEENSLAND The Morning Bulletin Rockhampton Qld National Library of Australia 18 December 1883 p 3 Retrieved 13 January 2015 Telegraphic Intelligence The Northern Miner Charters Towers Qld National Library of Australia 5 March 1884 p 2 Retrieved 14 January 2015 Hoffman Ian 1 November 2006 Button on e voting machine allows multiple votes East Bay Times Retrieved 17 May 2021 Hickins Michael 3 November 2006 A little yellow button on the back of Sequoia voting machines provides a manual override that lets a single person vote multiple times InternetNews com Retrieved 17 May 2021 Coll Steve 2019 Directorate S The C I A and America s Secret Wars in Afghanistan and Pakistan Penguin Group pp 649 650 ISBN 9780143132509 Bodner Matthew March 19 2018 Analysis Videos online show blatant ballot stuffing in Russia The Washington Post Archived from the original on July 13 2020 Retrieved July 6 2020 a b Rovell Darren June 26 2001 Cyber stuffing remains threat to All Star voting ESPN com ESPN Retrieved May 7 2021 MLB says it has canceled as many as 65 million All Star ballots MLB Sporting News Archived from the original on 2015 10 25 Malawi anxiously awaits verdict on alleged presidential election fraud Radio France Internationale 3 February 2020 Archived from the original on 3 February 2020 Retrieved 3 February 2020 Malawi top court annuls presidential election results Al Jazeera Archived from the original on 4 February 2020 Retrieved 3 February 2020 2 CCR 20983 c 6 PDF California Secretary of State 2020 10 01 Archived PDF from the original on 2020 10 09 Retrieved 2020 10 05 Freed Benjamin 2019 01 07 South Carolina voting machines miscounted hundreds of ballots report finds Archived from the original on 2020 02 05 Retrieved 2020 02 05 Buell Duncan 2018 12 23 Analysis of the Election Data from the 6 November 2018 General Election in South Carolina PDF Report Archived PDF from the original on 2019 02 24 Retrieved 2020 02 05 McDaniel et al 2007 12 07 EVEREST Evaluation and Validation of Election Related Equipment Standards and Testing PDF Report Archived PDF from the original on 2019 07 15 Retrieved 2020 02 05 Row over Alzheimer woman s proxy BBC News 2005 05 04 Archived from the original on 19 April 2016 Retrieved 13 November 2018 Etehad Melissa 23 June 2016 Pencil or pen An unusual conspiracy theory grips Brexit vote Washington Post Retrieved 12 July 2021 Dobreva Diyana Grinnell Daniel Innes Martin 6 May 2019 Prophets and Loss How Soft Facts on Social Media Influenced the Brexit Campaign and Social Reactions to the Murder of Jo Cox MP Policy amp Internet 12 2 144 164 doi 10 1002 poi3 203 Threat Analyses amp Papers National Institute of Standards and Technology October 7 2005 Archived from the original on 21 October 2006 Retrieved 5 March 2011 Jaikumar Vijayan 2011 09 28 Argonne researchers hack Diebold e voting system Computerworld Archived from the original on 2012 05 09 Retrieved 2012 05 03 Layton J 2006 09 22 How can someone tamper with an electronic voting machine Archived from the original on 2011 07 12 Retrieved 2011 02 27 Security Analysis of the Diebold AccuVote TS Voting Machine PDF Jhalderm com Archived PDF from the original on 2015 02 05 Retrieved 2015 05 29 a b images Retrieved February 17 2012 dead link Problems in test run for voting Miami Herald October 31 2006 dead link a b Bonsor and Strickland Kevin and Jonathan 2007 03 12 How E Voting Works Archived from the original on 2011 07 12 Retrieved 2011 02 27 Kohno T Analysis of Electronic Voting System PDF Archived PDF from the original on 2021 01 15 Retrieved 2011 02 27 Man in the Middle Attacks to Subvert the Vote Electiondefensealliance org Archived from the original on 2015 07 21 Retrieved 2015 05 29 Excerpt from Birth The Conspiracy to Stop the 94 Election by Peter Harris Penguin SA Sunday Times Books LIVE 2010 10 25 Retrieved 2020 02 03 Harris Peter 2010 Birth The Conspiracy to Stop the 94 Election 1st ed Cape Town Umuzi ISBN 978 1 4152 0102 2 OCLC 683401576 Laing Aislinn 2010 10 24 Election won by Mandela rigged by opposition The Daily Telegraph ISSN 0307 1235 Archived from the original on 2020 02 03 Retrieved 2020 02 03 Clayton Mark 2014 06 17 Ukraine election narrowly avoided wanton destruction from hackers The Christian Science Monitor ISSN 0882 7729 Archived from the original on 2020 10 13 Retrieved 2020 02 03 Trump s lawyer alleges voter fraud in big cities says loss in Pennsylvania statistically impossible Hindustan Times 19 November 2020 Archived from the original on 2020 11 19 Retrieved 2020 11 19 Trump claims without evidence that mail voting leads to cheating A guide to facts on absentee ballots news yahoo com Retrieved 2021 06 16 Conradis Brandon 2020 12 01 Barr says DOJ hasn t uncovered widespread voter fraud in 2020 election The Hill Archived from the original on 2020 12 01 Retrieved 2020 12 01 US election security officials reject Trump s fraud claims BBC News 13 November 2020 Archived from the original on 2020 11 13 Retrieved 2020 11 14 Voter fraud measures announced in the Queen s speech James Toby S Clark Alistair 2020 Electoral integrity voter fraud and voter ID in polling stations Lessons from English local elections Policy Studies 41 2 3 190 209 doi 10 1080 01442872 2019 1694656 S2CID 214322870 Mayer Jane 29 October 2012 The Voter Fraud Myth The New Yorker Archived from the original on 6 January 2016 Retrieved 9 December 2015 Rober Barnes August 1 2016 Federal judge blocks N Dakota s voter ID law calling it unfair to Native Americans The Washington Post Archived from the original on 2016 08 02 Retrieved 2016 08 02 Election 2020 Voting by mail in the U S is safe honest and fair Let s put the vote by mail fraud myth to rest MIT University April 28 2020 Archived from the original on July 28 2020 Retrieved July 28 2020 James Pindell 1 June 2018 N H says once and for all that no one was bused in to vote The Boston Globe Archived from the original on 26 October 2018 Retrieved 26 October 2018 Nate Silver on Twitter Archived from the original on November 24 2016 Retrieved November 24 2016 via Twitter Now we know how bad voter fraud is in North Carolina Charlotte Observer Archived from the original on 2018 06 28 Retrieved 2018 06 28 North Carolina State Board of Elections PDF Press release April 21 2017 Archived from the original PDF on April 25 2017 Retrieved June 28 2018 a b c d e f Pickles Eric 2016 08 11 Securing the ballot Report of Sir Eric Pickles review into electoral fraud PDF United Kingdom Government Archived PDF from the original on 2020 08 17 Retrieved 2020 06 15 Young Ashley 2016 09 23 A Complete Guide To Early And Absentee Voting Archived from the original on 2020 12 01 Retrieved 2020 06 15 Malaysian oppn accuse govt of postal vote fraud ABC News March 3 2008 Archived from the original on 2020 07 30 Retrieved 2008 04 24 One foot in the door The Sun Malaysia March 27 2008 Archived from the original on 2020 07 30 Retrieved 2008 04 24 Who Can Vote A News21 2012 National Project Archived from the original on 2020 06 05 Retrieved 2020 06 12 Kahn Natasha and Corbin Carson Investigation election day fraud virtually nonexistent The Philadelphia Inquirer Archived from the original on 2020 06 15 Retrieved 2020 06 15 Journal Glenn R Simpson and Evan Perez 2000 12 19 Brokers Exploit Absentee Voters Elderly Are Top Targets for Fraud The Wall Street Journal ISSN 0099 9660 Archived from the original on 2020 06 12 Retrieved 2020 06 12 Bender William Nursing home resident s son That s voter fraud Archived from the original on 2020 06 13 Retrieved 2020 06 12 Judge upholds vote rigging claims BBC News 2005 04 04 Archived from the original on 2019 10 01 Retrieved 2010 09 19 Robertson Gary D 2020 04 22 North Carolina ballot probe defendant now faces federal charges Times News Archived from the original on 2020 07 18 Retrieved 2020 06 27 Mazzei Patricia 2016 10 28 Two women busted for election fraud in Miami Dade in 2016 Miami Herald Archived from the original on 2020 06 02 Retrieved 2020 06 12 Judge hears testimony in Hawkins case Archived from the original on 2020 06 13 Retrieved 2020 06 12 a b Signature Verification and Mail Ballots Guaranteeing Access While Preserving Integrity PDF Stanford University 2020 04 15 Archived from the original PDF on 2020 04 18 Retrieved 2020 06 01 Vote at Home Policy Actions 1 and 2 Stars PDF National Vote at Home Institute May 2020 Archived PDF from the original on 2020 06 06 Retrieved 2020 06 18 Sita Jodi Found Bryan Rogers Douglas K September 2002 Forensic Handwriting Examiners Expertise for Signature Comparison Journal of Forensic Sciences 47 5 1117 24 doi 10 1520 JFS15521J ISSN 0022 1198 PMID 12353558 Archived from the original on 2021 01 15 Retrieved 2020 06 27 a b Smith Daniel 2018 09 18 Vote By Mail Ballots Cast in Florida PDF ACLU Florida Archived PDF from the original on 2020 12 02 Retrieved 2020 06 01 Wilkie Jordan 2018 10 12 Exclusive High Rate of Absentee Ballot Rejection Reeks of Voter Suppression Who What Why Archived from the original on 2020 06 17 Retrieved 2020 06 18 Is Ghost Voting Acceptable Writ lp findlaw com 2004 04 08 Archived from the original on 2012 03 15 Retrieved 2012 05 03 Federal Prosecution of Election Offenses Eighth Edition United States Department of Justice December 2017 Archived from the original on October 12 2020 Retrieved 2019 07 13 Federal Prosecution of Election Offenses votewell net Archived from the original on 2019 07 13 Retrieved 2019 07 13 Sentencing Table PDF US Sentencing Commission 2011 Archived PDF from the original on 2020 02 20 Retrieved 2019 07 13 2018 Chapter 2 Part C section 2C1 1 United States Sentencing Commission 2018 06 27 Archived from the original on 2019 07 13 Retrieved 2019 07 13 WKYT Ex judge convicted of vote fraud in Clay County disbarred Archived from the original on 2019 07 13 Retrieved 2019 07 13 Jeannette I Andrade 2011 11 18 Electoral sabotage case filed vs Arroyo Ampatuan Bedol Philippine Daily Inquirer Archived from the original on 2018 05 19 Retrieved 2018 05 18 Corruption Perceptions Index Transparency International 2011 Archived from the original on 19 June 2006 Retrieved 1 December 2011 Should secret voting be mandatory Yes say political scientists 26 October 2020 Retrieved 2021 04 20 Scrap the secret ballot return to open voting Archived from the original on 2016 08 07 Retrieved 2016 07 16 Todd Davies Consequences of the Secret Ballot PDF Symbolic Systems Program Stanford University Archived PDF from the original on 2016 10 11 Retrieved 2016 07 16 Abolish the Secret Ballot The Atlantic Archived from the original on 2017 03 12 Retrieved 2017 03 06 a b c Lundin Leigh 2008 08 17 Dangerous Ideas Voting Fiasco Part 279 236 a Criminal Brief Archived from the original on 2012 10 24 Retrieved 2010 10 07 podmoskovnik Ctatya o vyborah iz Troickogo Varianta Podmoskovnik livejournal com Archived from the original on 2016 09 30 Retrieved 2015 05 29 Statisticheskoe issledovanie rezultatov rossijskih vyborov 2007 2009 gg Troickij variant Nauka Trvscience ru 2009 10 27 Archived from the original on 2013 04 23 Retrieved 2015 05 29 Walter R Mebane Jr Kirill Kalinin Comparative Election Fraud Detection PDF Personal umich edu Archived PDF from the original on 2015 02 05 Retrieved 2015 05 29 Hicken Allen Mebane Walter R 2017 A Guide to Elections Forensics PDF Report University of Michigan Center for Political Studies Archived PDF from the original on 2019 06 26 Retrieved 2020 08 10 United States Department of Justice Civil Rights Division Voting Section Home Page The Help America Vote Act of 2002 107th U S Congress October 29 2002 Help America Vote Act of 2002 Pub L 107 252 U S Government Printing Office Archived from the original on 2021 01 15 Retrieved 2008 10 10 Wright Susan 2005 The Civil Rights Act of 1964 Landmark Antidiscrimination Legislation The Rosen Publishing Group ISBN 1 4042 0455 5 Anderson Margaret Lavinia 30 April 2000 Practicing Democracy Elections and Political Culture in Imperial Germany Margaret Lavinia Anderson ISBN 978 0 691 04854 3 Political Competition and Electoral Fraud A Latin American Case Study PDF Libres uncg edu Archived PDF from the original on 2014 02 21 Retrieved 2015 05 29 Is Something Rotten In Ankara s Mayoral Election A Very Preliminary Statistical Analysis Erikmeyersson com 2014 04 01 Archived from the original on 2016 07 16 Retrieved 2015 05 29 Trouble in Turkey s Elections Erikmeyersson com 2014 04 06 Archived from the original on 2016 08 26 Retrieved 2015 05 29 Capital Fraud in Turkey Evidence from Citizen Initiatives Erikmeyersson com 2014 04 11 Archived from the original on 2016 03 18 Retrieved 2015 05 29 Philip Harling May 1995 Rethinking Old Corruption Past amp Present Oxford University Press 147 147 127 58 doi 10 1093 past 147 1 127 JSTOR 651042 External links EditVoter Fraud an article from the ACE Project Independent Verification Essential Action to Assure Integrity in the Voting Process Roy G Saltman August 22 2006 Legal provisions to prevent Electoral Fraud an article from the ACE Project Was the 2004 Election Stolen by Robert F Kennedy Jr June 1 2006 Retrieved from https en wikipedia org w index php title Electoral fraud amp oldid 1149608334 Ballot stuffing, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.