- Electoral fraud
Articleissues|article=y
cleanup=January 2008
wikify=January 2008Electoral fraud is illegal interference with the process of an
election . Acts offraud tend to involve affecting vote counts to bring about a desired election outcome, whether by increasing the vote share of the favored candidate, depressing the vote share of the rival candidates, or both.Election fraud is probably as old as elections themselves. The first suspicion dates back to 471 BC in the
Athenian democracy .Archaeologists found 190 pieces of broken pottery used then asballot s with only 14 different handwritings.Fact|date=April 2007Electoral fraud is illegal in most countries including
dictator ships likely to both control the electoral process and excuse any measures that achieve a desired result.Especially with national elections, successful election fraud can have the effect of a
coup d'état or corruption of the democracy. But even if it does not go this far, the 500 million dollar campaigning during theUnited States general elections, 2006 shows how much might be at stake in some countries. [ [http://sfgate.com/cgi-bin/article.cgi?file=/c/a/2006/10/27/MNGE8M168R1.DTL CAMPAIGN 2006: 11 Days to go 'Orgy' of spending on political ads -- $500 million breaks state record (SF Chronicle, October 27, 2006)] ] [ [http://www.schneier.com/essay-046.html Insider Risks in Elections] (Bruce Schneier , July 2004)]A look at some narrow elections with a margin of less than 0.1% shows that sometimes there would not be much fraud needed to change the outcome.
Extreme examples of election fraud are sham elections that are a common event in
dictator ial regimes that still feel the need to establish some element of public legitimacy, some even showing 100% of eligible voters voting on behalf of the régime. Most people only call a regime democratic as long as electoral fraud is rare, isolated, and small, or that electoral fraud by opposing groups roughly cancels the effects.Electoral fraud is not limited to political polls and can happen in any kind of election where the potential gain is worth the risk for the cheater, as in elections for
labor union officials,student council s, sports judging, and the awarding of merit to books, films, music, or television programming.Despite many known instances of electoral fraud, it remains a difficult phenomenon to study and characterize. This follows from its inherent illegality. Harsh penalties aimed at deterring electoral fraud make it likely that any individuals who perpetrate acts of fraud do so with the expectation that it either will not be discovered or will be excused after the fact.
The introduction of
secret ballot s in the 19th century made electoral fraud more difficult, forestalling attempts to influence the voter byintimidation orbribery . Secret balloting appears to have been first implemented in the formerAustralia ncolony -- now a state -- ofTasmania on 7 February 1856. The firstPresident of the United States elected using a secret ballot was presidentGrover Cleveland in 1892.Reconstruction, an effort to secure the voting rights of former slaves, ultimately failed in the states of the former
Confederate States of America as reactionary interests used violence and intimidation against freedmen as well as political legerdemain to disenfranchise African-Americans, includingpoll taxes and so-calledliteracy test s, for almost a century after theAmerican Civil War , ensuring the continuing hegemony of élite agrarian interests at the expense of all other interests in the South until theVoting Rights Act of 1965 .Enabled by the
Reichstag Fire Decree on March 23, 1933,Hitler arrested or murdered all MPs from theCommunist Party of Germany that were unable to flee or hide, and some from theSocial Democratic Party of Germany . He also intimidated most of the other MPs into supporting him. This helped theNSDAP to get the needed two-thirds-majority to pass the Enabling Act giving Hitlerdictator ial powers.Ferdinand Marcos , once fairly elected as President of thePhilippines , remained in power and became increasinglydictator ial and kleptocratic as he succeeded in marginalizing dissent and opposition through rigged elections.Many dictatorships hold
show election s in which results predictably show that nearly 100% of all eligible voters vote and that nearly 100% of those eligible voters vote for the prescribed (often only) list of candidates for office or for referendums that favor the Party in power irrespective of economic conditions and the cruelties of the government.Some notorious examples of electoral fraud in the
United States of America include the widespread election manipulation committed by the Daley Machine in 20th century Chicago andTammany Hall in 19th century New York.The
Uganda n election of 2006 [http://observer.guardian.co.uk/world/story/0,,1718408,00.html Uganda hit by violence as opposition claims election fraud | World news | The Observer ] ] and theKenya n [ [http://edition.cnn.com/2008/WORLD/africa/01/05/kenya.diplomat/?iref=mpstoryview Kibaki hints at power-sharing deal - CNN.com ] ] election of 2007 were marred by opposition claims that the ruling party had cheated its way back in to power with the heavy use of electoral fraud.It is also widely held that the
Ukrainian election of 2004 was also hit by ballot rigging and voter intimidation on all sides. [ [http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2004/11/28/wukra28.xml Revealed: the full story of the Ukrainian election fraud - Telegraph ] ]Both virulent tabloid press accusations and continuing anecdotal public claims of
postal vote fraud in bothBirmingham andHackney still dog many aspects ofUnited Kingdom general election, 2001 andUnited Kingdom general election, 2005 which are being reviewed in the court of appeal. [ [http://management.silicon.com/government/0,39024677,39129095,00.htm] ] [ [http://news.bbc.co.uk/1/hi/england/west_midlands/4406575.stm] ] [ [http://www.timesonline.co.uk/tol/news/uk/article377468.ece] ] [ [http://news.bbc.co.uk/1/hi/uk/4410743.stm] ] [ [http://www.dca.gov.uk/elections/index.htm] ] [ [http://www.psr.keele.ac.uk/election.htm] ] [ [http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2004/11/28/wukra28.xml] ]There have also been other claims over the Euro-election of 2004 and several local elections in resent years, (including at the 2004 European and local government elections in
Birmingham ) [ [http://news.bbc.co.uk/2/hi/uk_news/england/west_midlands/4406575.stm Judge upholds vote-rigging claims (BBC, 4. April 2005)] ] [ [http://politics.guardian.co.uk/election/story/0,15803,1458341,00.html New fears over postal vote fraud (Guardian, 13. April 2005)] ] [ [http://www.timesonline.co.uk/article/0,,19809-1564522,00.html Labour to halt postal vote fraud but only after election (Times, April 11, 2005)] ]Techniques
Voter intimidation and coercion
* Intimidation of voters that prevents them from voting, such as by
voter suppression .
* Disrupting voting inpolling station s in areas with unwanted political tendencies for example with bomb threats topolling place s [ [http://www.madison.com/tct/news/index.php?ntid=106590&ntpid=12 Did bomb threat stifle vote? (Capital Times)] ] or othersabotage , includingballots ,ballot box es, orvoting machines .
* Using caging lists for voter suppression
* In the 1981 gubernational election inNew Jersey , theRepublican National Committee allegedly appointed aBallot Security Task Force to intimidate voters. [cite web|url=http://query.nytimes.com/gst/fullpage.html?res=9F0CE6D91638F932A25752C1A965958260|title=Florio's Defeat Revives Memories of G.O.P. Activities in 1981|date=1993-11-13|accessdate=2008-10-07|last=Sullivan|first=Joseph F.|publisher=New York Times ] [cite book|url=http://books.google.co.uk/books?id=7TPEJNAIP4EC|title=The Politics of Deceit: Saving Freedom and Democracy from Extinction|last=Smith|first=Glenn W.|year=2004|publisher=John Wiley and Sons|accessdate=2008-10-07|isbn=0471667633|page=124] cite web|url=http://books.google.co.uk/books?id=0zwTAAAAIAAJ|title=Maximizing Voter Choice|author=United States Congress |publisher=Library of Congress |page=65|date=2004-10-05|accessdate=2008-10-07]* For example, in 2004, police stationed outside a Cook County, Illinois, polling place were allegedly requesting photo ID and telling voters (falsely) that if they had been convicted of a felony, they could not vote. [http://www.ep365.org/site/c.fnKGIMNtEoG/b.2052599/k.6FF4/Intimidation_and_Deceptive_Practices.htm Intimidation and Deceptive Practices EP365 ] ]
* Also in 2004, for example, In Pima, Arizona, voters at multiple polls were allegedly confronted by an individual, wearing a black t-shirt with “US Constitution Enforcer” and a military-style belt that gave the appearance he was armed. He asked voters if they were citizens, accompanied by a cameraman who filmed the encounters.
* Voters often complain about misinformation campaigns via flyers or phone calls encouraging them to vote on a day other than election day or spreading false information regarding their right to vote. In Polk County, Florida, in 2004, for example, voters allegedly received a call telling them to vote on November 3 (the election was on November 2). Also in 2004, in Wisconsin and elsewhere voters allegedly received flyers that said, “If you already voted in any election this year, you can’t vote in the Presidential Election”, implying that those who had voted in earlier primary elections were ineligible to vote. Also, “If anybody in your family has ever been found guilty of anything you can’t vote in the Presidential Election.” Finally, “If you violate any of these laws, you can get 10 years in prison and your children will be taken away from you.” [http://www.ep365.org/site/c.fnKGIMNtEoG/b.2052599/k.6FF4/Intimidation_and_Deceptive_Practices.htm Intimidation and Deceptive Practices] [ [http://www.ac4vr.com/reports/072005/republicanincidents.html Incidents Of Voter Intimidation & Suppression] ]
* Another simple, but notorious method of voter intimidation is the shoe polish method, which is often used incompany towns . This method entails coating thevoting machine s lever or button of the opposing candidate(s) withshoe polish . To understand how this works, take the example of an employee of the "company" who, against the advice of the party in power, votes for the opposing candidate(s). After they leave the voting booth, a conspirator to the fraud (a precinct captain or other local V.I.P.) willhandshake the voter. The conspirator will then subtly check their hand for any shoe polish and will note that the voter has left some shoe polish after the handshake. Soon afterward that unfortunate voter gets fired from his job.
* Buying or coercing votes from persons who would normally vote for another candidate or would not vote at all, but who are nevertheless eligible to vote.
* Intimidation of voters that alters their vote. "Four-legged voting," whereprecinct workers would pull the levers on voting machines instead of the voter.
* Absentee and other remote voting can be more open to some forms of intimidation and coercion as the voter does not have the protection and privacy of the polling location.
* In Britain, one historically popular technique has been long known as "granny farming", after a contemptuousslang designation for retirement homes. In this, party activists visitretirement home s, purportedly to help the elderly and immobile exercise their voting rights. Residents are asked to fill out 'absentee voter' forms, allowing them a proxy or postal vote. When the forms are signed and gathered, they are then secretly rewritten as applications for proxy votes, naming party activists or their friends and relatives as the proxies. These people, unknown to the voter, then cast the vote for the party of their choice. This trick relies on elderly care home residents typically being absent-minded, or suffering fromdementia . A case for this had occurred into the United States, whenKwame Kilpatrick was running for reelection as mayor ofDetroit . Kilpatrick supporters had nursing home residents sign absentee ballots which were either already marked or later marked as voting for Kilpatrick.Physical tampering
*
Ballot stuffing , also called "ghost voting."
*Booth capturing is a persistent problem inIndia n democracy where thugs of one party "capture" a polling booth and stamp their votes, threatening everyone.
*Theft or destruction of ballot boxes.
*Destroying election material in order to annul results for individual polling stations or even whole constituencies.Physical tampering with voting machines
*Change the
software of a voting machine to shift votes between candidates. A demonstration how this can be done on aPremier Election Solutions (formerly Diebold Election Systems) AccuVote-TS was conducted by the Center for Information Technology Policy, at Princeton University. [ [http://itpolicy.princeton.edu/voting/ Security Analysis of the Diebold AccuVote-TS Voting Machine] ] . Another demonstration was shown on Dutch TV by the group "Wij vertrouwen stemcomputers niet". [ [http://www.wijvertrouwenstemcomputersniet.nl/images/9/91/Es3b-en.pdf Nedap/Groenendaal ES3B voting computer a security analysis] ]
*Altering or replacing thehardware of thevoting machine , such as inserting a circuit board using aMan in the middle attack technique to manipulate recorded votes. The board could be placed between keyboard, display and voting storage. In the case of Nedap machines this would allow manipulation without breaking the seals covering the central unit. [ [http://www.wijvertrouwenstemcomputersniet.nl/images/9/91/Es3b-en.pdf Nedap/Groenendaal ES3B voting computer a security analysis (chapter 7.1)] ] . Another place for a man in the middle attack could be between the central unit and the printer, but this would only be useful on machines where the stored votes will not be verified by other means like a display.
*Altering voting machines to favor one candidate over another, for example by jamming a button or changing the sensitive area of atouchscreen . [ [http://www.miami.com/mld/miamiherald/news/editorial/15889697.htm Test run for voting (Miami Herald, 10/31/2006)] ]
*Intentional misconfiguration, for example altering the ballot design to misidentify a candidates party.
*Voting machines might also be subject toVan Eck phreaking on the display or keyboard, compromising the secrecy of the votes. [ [http://www.wijvertrouwenstemcomputersniet.nl/images/9/91/Es3b-en.pdf Nedap/Groenendaal ES3B voting computer a security analysis (chapter 6)] ]
* One voting machine possibly subject toballot stuffing if the voter is allowed unsupervised access, is theSequoia Voting Systems "AVC Edge" touchscreen. These machines have a yellow button on the bottom (the reverse side of the touch screen) which if pressed after a valid vote will set the machine in "manual mode" bringing up a blank ballot allowing an additional vote. [ [http://www.insidebayarea.com/oaklandtribune/localnews/ci_4588048 Button on e-voting machine allows multiple votes] ] . This is an "optional" feature not found on all "AVC Edge" touchscreens, and is programmed to alert supervisors with two audible beeps.
* Abusing the administrative access to the machine by election officials might also allow individuals to vote multiple times.
*Electronic, and mechanical voting machines can be subject to different types of electoral fraud, as potential fraud could be incorrectly categorized as a technical problem.A list of other threats to voting systems is kept by the
National Institute of Standards and Technology . [ [http://vote.nist.gov/threats/papers.htm Threats to Voting Systems] (NIST)]The most comprehensive study on attacking electronic voting machines has been compiled by the Brennan Center for Justice. [ [http://www.brennancenter.org/dynamic/subpages/download_file_39288.pdf The Machinery of Democracy: Protecting Elections in an Electronic World] ]
Inflation or deflation of voters lists
*Registering false voters such as the deceased or even fictitious persons.
*Subverting voter registration rules, such as with "fagot voters." (persons who had land assigned to them prior to an election and removed immediately after an election to meet requirements to vote), [cite book
last = Williamson
first = Chilton
title = American Suffrage from Property to Democracy
publisher = Princeton U. Press
year=1968
location = Princeton, NJ
id = ASIN B000FMPMK6 ] through "colonization" (the process of transporting groups of men from other cities and lodging them inflophouse s).cite book
last = Saltman
first = Roy G.
authorlink = Roy G. Saltman
title = The History and Politics of Voting Technology
publisher = Palgrave Macmillan
date=January 2006
url = http://www.palgrave-usa.com/catalog/product.aspx?isbn=1403963924
id = ISBN 1-4039-6392-4]ocial engineering
*People pretending to help elderly or blind persons with their vote.
*Election officials misinforming voters of when their vote is recorded and later recording it themselves. This apparently happened during municipality elections inLanderd , Netherlands in 2006 where a candidate was also an election official and got the unusual amount of 181 votes in the polling place where he was working. In the other three polling places together he got 11 votes. [ [http://www.wahlsysteme.de/Wahlnachrichten/2006_Menschenwerk%20und%20kein%20Maschinenwerk.pdf Statement of voting machine manufacturer Nedap (German)] ] Onlycircumstantial evidence could be found because the voting machine was a direct-recording electronic voting machine, in a poll by a local newspaper the results were totally different. The case is still under prosecution. [ [http://www.brabantsdagblad.nl/brabant/article247185.ece Raadslid Landerd is stuk minder populair in schaduwverkiezing (dutch)] ]
*As a spoiling tactic, running candidates and creating political parties with similar names as the main rivals in a constituency with the aim that enough voters will be misled into voting for the false candidate or party to influence the results.By voters
*Impersonating a voter.
*Voting in multiple precincts, carousel voting. Men who were known to sell their vote and vote in multiple precincts were known as "floaters."cite book
last = Saltman
first = Roy G.
authorlink = Roy G. Saltman
title = The History and Politics of Voting Technology
publisher = Palgrave Macmillan
date=January 2006
url = http://www.palgrave-usa.com/catalog/product.aspx?isbn=1403963924
id = ISBN 1-4039-6392-4] In the United States, fifty-two people have been convicted of federal election fraud for voting in multiple locations since 2002. In some countries likeEl Salvador ,Namibia orAfghanistan voters get a finger marked withelection ink to prevent multiple votes. In the Afghanistan elections in 2005 this didn't work well because the ink could be rubbed off.
* Voter import: InBulgaria the controversialMovement for Rights and Freedoms is said to combine the former two, by "importing" voters fromTurkey at the day of the election, who then vote in every single polling station within a city. Similarly, inMalaysia immigrants from neighbouringPhilippines andIndonesia were given citizenship together with voting rights in order for a political party to "dominate" the state ofSabah in a controversial process referred to as "Project IC ".cite journal |last= Sadiq|first= Kamal|authorlink= |coauthors= |year= 2005|month= |title= When States Prefer Non-Citizens Over Citizens: Conflict Over Illegal Immigration into Malaysia|format=PDF|journal= International Studies Quarterly|volume= 49|issue= |pages= 101–122|id= |url= http://www.cri.uci.edu/pdf/ISQ2005FinalCopy.pdf|accessdate= 2008-04-23 |quote=|doi= 10.1111/j.0020-8833.2005.00336.x ]
* Vote selling: This is possible as long as a voter has a way to prove how he voted. Because of this asecret ballot is preferred and postal- orinternet voting is just accepted as an exception in most electoral systems. (also seeBlocks of Five ) In Mexico and several other places, voters willing to sell their vote are asked to take a picture of their ballot with a cellphone camera to validate their payment.
* Changing parties: voters (in elections for party leader) who change membership of parties in order to elect a weaker candidate to run against the leader of their original party.During tabulation in the polling place
*Bribery, corruption or threatening of election officials.
*Destroying all ballots if the balance was not as desired.
*Tampering with tabulation software (applicable only to computer assisted tabulation). This apparently happened in theMexican general election, 1988 .Fact|date=April 2007
*Spoiling votes: for example, by marking more candidates than allowed.
*Counting electronicballot s ofvoting machine s, usuallymemory cards , more than once if they contain votes as wanted by the fraudster. The opposite is to let them disappear in case of unwanted votes, this is equivalent to stealing a whole ballot box. [ [http://www.abcnews.go.com/Politics/Vote2006/story?id=2623854&page=1 ABC News: Hackable Democracy? ] ]
*Obstructing vote counting. [ [http://baltimorechronicle.com/2006/110706Harris.shtml The best defense is a good offense, so VOTE!] ]
*Double marking. A corrupt election official will conceal a piece of pencil lead underneath his fingernail, in which hecovert ly marks an unvoted box in an area where the maximum number of votes has already been cast. Since this ballot is then considered overvoted, it is discarded, effectively throwing out the voter's vote.During central tabulation of the results
*Bribery or corruption of election officials. This apparently happened in the Philippine general election, 2004 and is suspected in the Italian general election, 2006.
*Interfering in the data transmission.Through legislative means
*
Gerrymandering (drawing voting district lines in such a way as to obtain a favorable result) or including prison inmates in a local population are also often argued to be forms of electoral fraud.
*Creating additional barriers to vote can also be considered fraud, such as requiring extensive forms of identification.
*Mandating voter matching standards be too strict (purging voters from the rolls and disenfranchising eligible voters) or too loose (leaving ineligible voters on the rolls and making the system vulnerable to fraud).
*Creating election deadlines that are unreasonable to certain portions of the electorate, such as requiring active duty military ballots to be delivered before it would be possible for them to be mailed.
*Disqualification of candidates by arbitrary means. One example was the 1990 mayoral race in Washington DC whenJesse Jackson considered running for DC mayor, which concerned incumbent mayorMarion Barry who had been polling very low and felt he could not compete with Jackson's popularity. Since Jackson made most of his money from speeches, Barry ordered the DC Council to pass a law making it illegal for anyone to run for mayor of Washington DC who makes more than $10,000 a year fromhonorarium . This became known as the "Jesse Jackson law", as the sole intent of the law was to declare Jackson unsuitable for election. ["Shakedown: Exposing the Real Jesse Jackson" by Kenneth Timmerman]mear campaign
*
Smear campaign s are illegal in thePhilippines and can thus be considered election fraud.
*Laws exist in the UK to prevent untrue statements being made about candidates—seeMiranda Grell for a 2007 case.Election fraud in legislature
Election fraud in legislature is qualitatively different because the number of voters is smaller. For example,
* The two-thirds majorityHitler needed to pass the Enabling Act, which gave himdictator ial power, was only attained by arresting enough members of the opposition. The act had a two-year expiration date, which had the option for renewal. After the start of theSecond World War , the last opposition to the act's renewal was extinguished. Hitler treated the Enabling Act's renewal as a matter of appearance, knowing he could get the renewal rubber stamped by a Reichstag made entirely of Nazi party members, even getting a renewal as late as 1944 and planning on getting a rubber stamped renewal in 1946.Fact|date=November 2007
* The controversial method of using a paper-clip or bubblegum to jam a representative's voting button in absence. [ [http://writ.lp.findlaw.com/hamilton/20040408.html Is "Ghost" Voting Acceptable?] ]
* In 2004 security expertBruce Schneier published a theoretical paper howelection fraud in thepapal election could be done. [ [http://schneier.com/crypto-gram-0504.html#8 Bruce Schneier: Hacking the Papal Election, April 15, 2005] ]Fraud prevention
The best way to protect the electorate from electoral fraud is to have an election process which is completely transparent to all voters, from nomination of candidates through casting of the votes and tabulation. A key feature in insuring the integrity of any part of the electoral process is a strict
chain of custody .To prevent fraud in central tabulation, there has to be a public list of the results from every single polling place. This is the only way for voters to prove that the results they witnessed in their election office are correctly incorporated into the totals.
Various forms of
statistic s can be indicators for election fraud e.g.exit poll s which are very different from the final results. Having reliable exit polls could keep the amount of fraud low to avoid a controversy. Other indicators might be unusual high numbers of invalid ballots, overvoting or undervoting. It has to be kept in mind that most statistics do not reflect the types of election fraud which prevent citizens from voting at all like intimidation or misinformation.There may, however, be a problem with exit-polls or other verifications methods dependent on the honesty of the voters; for instance, in the Czech Republic (previously part of Czechoslovakia), some voters are afraid or ashamed to admit that they voted for the Communist Party, often claiming to have voted for other party than Communists (exit polls in 2002 gave Communist party 2-3 percents lower gain than was the actual case).
Prosecution
In countries with strong laws and effective legal systems, lawsuits can be brought against those who have allegedly committed fraud; but determent with legal prosecution would not be enough. Although the penalties for getting caught may be severe, the rewards for succeeding are likely to be worth the risk. The rewards range from benefits in contracting to total control of a country.
In
Germany there are currently calls for reform of these laws because lawsuits can be and are usually prolonged by the newly electedBundestag [ [http://de.wikipedia.org/wiki/Wahlpr%C3%BCfung#Reform_der_Wahlpr.C3.BCfung Reform der Wahlprüfung (German)] ]Election observation
International observers (bilateral and multilateral) may be invited to observe the elections (examples include election observation by the Organization for Security and Cooperation in Europe (OSCE), European Union election observation missions, observation missions of the Commonwealth of Independent States (CIS), as well as international observation organized by NGOs, such as European Network of Election Monitoring Organizations (ENEMO), etc.). Some countries also invite foreign observers (i.e. bi-lateral observation, as opposed to multi-lateral observation by international observers).
In addition, national legislations of countries often permit domestic observation. Domestic election observers can be either partisan (i.e. representing interests of one or a group of election contestants) or non-partisant (usually done by civil society groups). Legislations of different countries permit various forms and extents of international and domestic election observation.
Election observation is also prescribed by various international legal instrucments. For example, paragraph 8 of the 1990 Copenhagen Document states that "The [OSCE] participating States consider that the presence of observers, both foreign and domestic, can enhance the electoral process for States in which elections are taking place. They therefore invite observers from any other CSCE participating States and any appropriate private institutions and organizations who may wish to do so to observe the course of their national election proceedings, to the extent permitted by law. They will also endeavour to facilitate similar access for election proceedings held below the national level. Such observers will undertake not to interfere in the electoral proceedings".
Examples from the USA include:
* Justice Department [ [http://www.cnn.com/2006/POLITICS/11/06/election.observers/index.html Justice department dispatches election monitors (cnn.com, 6. November 2006)] ]
* Political parties, e.g., the United States Democratic Party's election protection program. [ [http://www.democrats.org/page/content/voterprotection/ democrats.org: Voter Protection Resource Center] ]
* Poll watchers fromelection integrity group s. Most of them also offer information websites and phone hotlines for voters to report problems. Some of them also help withvoter registration . Examples are VoteTrust USA and Verified Voting Foundation.Critics note that observers cannot spot certain types of election fraud like targeted
voter suppression or manipulated software ofvoting machine s.End-to-end Auditablity
End-to-end auditable voting systems provide voters with a receipt to allow them to verify their vote was cast correctly, and an audit mechanism to verify that the results were tabulated correctly and all votes were cast by valid voters. However, the ballot receipt does not permit voters to prove to others how they voted, since this would open the door towards forced voting and blackmail. End-to-end systems includePunchscan andScantegrity , the latter being an add-on to optical scan systems instead of a replacement.Testing and certification of electronic voting
One method for verifying
voting machine accuracy isParallel Testing , the process of using an independent set of results compared against the original machine results. Parallel testing can be done prior to or during an election. During an election, one form of parallel testing is the VVPAT. This method is only effective if statistically significant numbers of voters verify that their intended vote matches both the electronic and paper votes.On election day, a statistically significant number of voting machines can be randomly selected from polling locations and used for testing. This can be used to detect potential fraud or malfunction unless manipulated software would only start to cheat after a certain event like a voter pressing a special key combination (Or a machine might cheat only if someone doesn't perform the combination, which requires more insider access but fewer voters).
Another form of testing is
Logic & Accuracy Testing (L&A), pre-election testing of voting machines using test votes to determine if they are functioning correctly.Another method to insure the integrity of electronic voting machines is independent
software verification and certification. Once software is certified, code signing can insure the software certified is identical to that which is used on election day. Some argue certification would be more effective if voting machine software was publicly available oropen source .Certification and testing processes conducted publicly and with oversight from interested parties can promote transparency in the election process. The integrity of those conducting testing can be questioned.
Testing and certification can prevent voting machines from being a black box where voters can not be sure that counting inside is done as intended.
ee also
*
ACCURATE
*American Center for Voting Rights
*Ballot stuffing
*Branch stacking
*Caging list
*Cooping
*Florida Central Voter File (purging controversy)
*Open Voting Consortium
*Political corruption
*Postal voting
*Show election
*Smear campaign References
External links
* [http://www.aceproject.org/ace-en/topics/vo/vog/vog05/vog05b Voter Fraud] - an article from the [http://www.aceproject.org ACE Project]
* [http://www.votetrustusa.org/pdfs/saltman.pdf Independent Verification: Essential Action to Assure Integrity in the Voting Process] , Roy G. Saltman, August 22, 2006
* [http://www.aceproject.org/ace-en/topics/vr/vra/vra16/ Legal provisions to prevent Electoral Fraud] - an article from the [http://www.aceproject.org ACE Project]
* [http://www.rollingstone.com/news/story/10432334/was_the_2004_election_stolen/print "Was the 2004 Election Stolen?"] by Robert F. Kennedy Jr., June 1, 2006.
* [http://www.businessweek.com/2000/00_22/b3683058.htm Article referencing "four-legged voting"]
* [http://www.tc.umn.edu/~hause011/article/Vote1.html Vote Fraud Actors and Motivation]
* [http://www.tc.umn.edu/~hause011/article/Vote2.html Vote Fraud Strategy and Tactics]
* [http://www.thirdworldtraveler.com/Project%20Censored/Theft_2004_Pres_Election.html No Paper Trail Left Behind: The Theft of the 2004 Presidential Election, by Dennis Loo, Ph.D]
* [http://www.votingmachinesprocon.org/subtabsecurity.htm Electronic Voting: Safe or Fraudulent?]
Wikimedia Foundation. 2010.