- Electoral fraud
Electoral fraud is illegal interference with the process of an
election. Acts of fraudtend to involve affecting vote counts to bring about a desired election outcome, whether by increasing the vote share of the favored candidate, depressing the vote share of the rival candidates, or both.
Election fraud is probably as old as elections themselves. The first suspicion dates back to 471 BC in the
Athenian democracy. Archaeologistsfound 190 pieces of broken pottery used then as ballots with only 14 different handwritings.Fact|date=April 2007
Electoral fraud is illegal in most countries including
dictatorships likely to both control the electoral process and excuse any measures that achieve a desired result.
Especially with national elections, successful election fraud can have the effect of a
coup d'étator corruption of the democracy. But even if it does not go this far, the 500 million dollar campaigning during the United States general elections, 2006shows how much might be at stake in some countries. [ [http://sfgate.com/cgi-bin/article.cgi?file=/c/a/2006/10/27/MNGE8M168R1.DTL CAMPAIGN 2006: 11 Days to go 'Orgy' of spending on political ads -- $500 million breaks state record (SF Chronicle, October 27, 2006)] ] [ [http://www.schneier.com/essay-046.html Insider Risks in Elections] ( Bruce Schneier, July 2004)]
A look at some narrow elections with a margin of less than 0.1% shows that sometimes there would not be much fraud needed to change the outcome.
Extreme examples of election fraud are sham elections that are a common event in
dictatorial regimes that still feel the need to establish some element of public legitimacy, some even showing 100% of eligible voters voting on behalf of the régime. Most people only call a regime democratic as long as electoral fraud is rare, isolated, and small, or that electoral fraud by opposing groups roughly cancels the effects.
Electoral fraud is not limited to political polls and can happen in any kind of election where the potential gain is worth the risk for the cheater, as in elections for
labor unionofficials, student councils, sports judging, and the awarding of merit to books, films, music, or television programming.
Despite many known instances of electoral fraud, it remains a difficult phenomenon to study and characterize. This follows from its inherent illegality. Harsh penalties aimed at deterring electoral fraud make it likely that any individuals who perpetrate acts of fraud do so with the expectation that it either will not be discovered or will be excused after the fact.
The introduction of
secret ballots in the 19th century made electoral fraud more difficult, forestalling attempts to influence the voter by intimidationor bribery. Secret balloting appears to have been first implemented in the former Australian colony-- now a state -- of Tasmaniaon 7 February 1856. The first President of the United Stateselected using a secret ballot was president Grover Clevelandin 1892.
Reconstruction, an effort to secure the voting rights of former slaves, ultimately failed in the states of the former
Confederate States of Americaas reactionary interests used violence and intimidation against freedmen as well as political legerdemain to disenfranchise African-Americans, including poll taxesand so-called literacy tests, for almost a century after the American Civil War, ensuring the continuing hegemony of élite agrarian interests at the expense of all other interests in the South until the Voting Rights Act of 1965.
Enabled by the
Reichstag Fire Decreeon March 23, 1933, Hitlerarrested or murdered all MPs from the Communist Party of Germanythat were unable to flee or hide, and some from the Social Democratic Party of Germany. He also intimidated most of the other MPs into supporting him. This helped the NSDAPto get the needed two-thirds-majority to pass the Enabling Act giving Hitler dictatorial powers. Ferdinand Marcos, once fairly elected as President of the Philippines, remained in power and became increasingly dictatorial and kleptocratic as he succeeded in marginalizing dissent and opposition through rigged elections.
Many dictatorships hold
show elections in which results predictably show that nearly 100% of all eligible voters vote and that nearly 100% of those eligible voters vote for the prescribed (often only) list of candidates for office or for referendums that favor the Party in power irrespective of economic conditions and the cruelties of the government.
Some notorious examples of electoral fraud in the
United States of Americainclude the widespread election manipulation committed by the Daley Machine in 20th century Chicago and Tammany Hallin 19th century New York.
Ugandan election of 2006 [http://observer.guardian.co.uk/world/story/0,,1718408,00.html Uganda hit by violence as opposition claims election fraud | World news | The Observer ] ] and the Kenyan [ [http://edition.cnn.com/2008/WORLD/africa/01/05/kenya.diplomat/?iref=mpstoryview Kibaki hints at power-sharing deal - CNN.com ] ] election of 2007 were marred by opposition claims that the ruling party had cheated its way back in to power with the heavy use of electoral fraud.
It is also widely held that the
Ukrainianelection of 2004 was also hit by ballot rigging and voter intimidation on all sides. [ [http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2004/11/28/wukra28.xml Revealed: the full story of the Ukrainian election fraud - Telegraph ] ]
Both virulent tabloid press accusations and continuing anecdotal public claims of
postal votefraud in both Birminghamand Hackneystill dog many aspects of United Kingdom general election, 2001and United Kingdom general election, 2005which are being reviewed in the court of appeal. [ [http://management.silicon.com/government/0,39024677,39129095,00.htm] ] [ [http://news.bbc.co.uk/1/hi/england/west_midlands/4406575.stm] ] [ [http://www.timesonline.co.uk/tol/news/uk/article377468.ece] ] [ [http://news.bbc.co.uk/1/hi/uk/4410743.stm] ] [ [http://www.dca.gov.uk/elections/index.htm] ] [ [http://www.psr.keele.ac.uk/election.htm] ] [ [http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2004/11/28/wukra28.xml] ]
There have also been other claims over the Euro-election of 2004 and several local elections in resent years, (including at the 2004 European and local government elections in
Birmingham) [ [http://news.bbc.co.uk/2/hi/uk_news/england/west_midlands/4406575.stm Judge upholds vote-rigging claims (BBC, 4. April 2005)] ] [ [http://politics.guardian.co.uk/election/story/0,15803,1458341,00.html New fears over postal vote fraud (Guardian, 13. April 2005)] ] [ [http://www.timesonline.co.uk/article/0,,19809-1564522,00.html Labour to halt postal vote fraud but only after election (Times, April 11, 2005)] ]
Voter intimidation and coercion
* Intimidation of voters that prevents them from voting, such as by
* Disrupting voting in
polling stations in areas with unwanted political tendencies for example with bomb threats to polling places [ [http://www.madison.com/tct/news/index.php?ntid=106590&ntpid=12 Did bomb threat stifle vote? (Capital Times)] ] or other sabotage, including ballots, ballot boxes, or voting machines.
* Using caging lists for voter suppression
* In the 1981 gubernational election in
New Jersey, the Republican National Committeeallegedly appointed a Ballot Security Task Forceto intimidate voters. [cite web|url=http://query.nytimes.com/gst/fullpage.html?res=9F0CE6D91638F932A25752C1A965958260|title=Florio's Defeat Revives Memories of G.O.P. Activities in 1981|date=1993-11-13|accessdate=2008-10-07|last=Sullivan|first=Joseph F.|publisher= New York Times] [cite book|url=http://books.google.co.uk/books?id=7TPEJNAIP4EC|title=The Politics of Deceit: Saving Freedom and Democracy from Extinction|last=Smith|first=Glenn W.|year=2004|publisher=John Wiley and Sons|accessdate=2008-10-07|isbn=0471667633|page=124] cite web|url=http://books.google.co.uk/books?id=0zwTAAAAIAAJ|title=Maximizing Voter Choice|author= United States Congress|publisher= Library of Congress|page=65|date=2004-10-05|accessdate=2008-10-07]
* For example, in 2004, police stationed outside a Cook County, Illinois, polling place were allegedly requesting photo ID and telling voters (falsely) that if they had been convicted of a felony, they could not vote. [http://www.ep365.org/site/c.fnKGIMNtEoG/b.2052599/k.6FF4/Intimidation_and_Deceptive_Practices.htm Intimidation and Deceptive Practices EP365 ] ]
* Also in 2004, for example, In Pima, Arizona, voters at multiple polls were allegedly confronted by an individual, wearing a black t-shirt with “US Constitution Enforcer” and a military-style belt that gave the appearance he was armed. He asked voters if they were citizens, accompanied by a cameraman who filmed the encounters.
* Voters often complain about misinformation campaigns via flyers or phone calls encouraging them to vote on a day other than election day or spreading false information regarding their right to vote. In Polk County, Florida, in 2004, for example, voters allegedly received a call telling them to vote on November 3 (the election was on November 2). Also in 2004, in Wisconsin and elsewhere voters allegedly received flyers that said, “If you already voted in any election this year, you can’t vote in the Presidential Election”, implying that those who had voted in earlier primary elections were ineligible to vote. Also, “If anybody in your family has ever been found guilty of anything you can’t vote in the Presidential Election.” Finally, “If you violate any of these laws, you can get 10 years in prison and your children will be taken away from you.” [http://www.ep365.org/site/c.fnKGIMNtEoG/b.2052599/k.6FF4/Intimidation_and_Deceptive_Practices.htm Intimidation and Deceptive Practices] [ [http://www.ac4vr.com/reports/072005/republicanincidents.html Incidents Of Voter Intimidation & Suppression] ]
* Another simple, but notorious method of voter intimidation is the shoe polish method, which is often used in
company towns. This method entails coating the voting machines lever or button of the opposing candidate(s) with shoe polish. To understand how this works, take the example of an employee of the "company" who, against the advice of the party in power, votes for the opposing candidate(s). After they leave the voting booth, a conspirator to the fraud (a precinct captain or other local V.I.P.) will handshakethe voter. The conspirator will then subtly check their hand for any shoe polish and will note that the voter has left some shoe polish after the handshake. Soon afterward that unfortunate voter gets fired from his job.
* Buying or coercing votes from persons who would normally vote for another candidate or would not vote at all, but who are nevertheless eligible to vote.
* Intimidation of voters that alters their vote. "Four-legged voting," where
precinctworkers would pull the levers on voting machines instead of the voter.
* Absentee and other remote voting can be more open to some forms of intimidation and coercion as the voter does not have the protection and privacy of the polling location.
* In Britain, one historically popular technique has been long known as "granny farming", after a contemptuous
slangdesignation for retirement homes. In this, party activists visit retirement homes, purportedly to help the elderly and immobile exercise their voting rights. Residents are asked to fill out 'absentee voter' forms, allowing them a proxy or postal vote. When the forms are signed and gathered, they are then secretly rewritten as applications for proxy votes, naming party activists or their friends and relatives as the proxies. These people, unknown to the voter, then cast the vote for the party of their choice. This trick relies on elderly care home residents typically being absent-minded, or suffering from dementia. A case for this had occurred into the United States, when Kwame Kilpatrickwas running for reelection as mayor of Detroit. Kilpatrick supporters had nursing home residents sign absentee ballots which were either already marked or later marked as voting for Kilpatrick.
Ballot stuffing, also called "ghost voting."
Booth capturingis a persistent problem in Indian democracy where thugs of one party "capture" a polling booth and stamp their votes, threatening everyone.
*Theft or destruction of ballot boxes.
*Destroying election material in order to annul results for individual polling stations or even whole constituencies.
Physical tampering with voting machines
softwareof a voting machine to shift votes between candidates. A demonstration how this can be done on a Premier Election Solutions(formerly Diebold Election Systems) AccuVote-TS was conducted by the Center for Information Technology Policy, at Princeton University. [ [http://itpolicy.princeton.edu/voting/ Security Analysis of the Diebold AccuVote-TS Voting Machine] ] . Another demonstration was shown on Dutch TV by the group "Wij vertrouwen stemcomputers niet". [ [http://www.wijvertrouwenstemcomputersniet.nl/images/9/91/Es3b-en.pdf Nedap/Groenendaal ES3B voting computer a security analysis] ]
*Altering or replacing the
hardwareof the voting machine, such as inserting a circuit board using a Man in the middle attacktechnique to manipulate recorded votes. The board could be placed between keyboard, display and voting storage. In the case of Nedap machines this would allow manipulation without breaking the seals covering the central unit. [ [http://www.wijvertrouwenstemcomputersniet.nl/images/9/91/Es3b-en.pdf Nedap/Groenendaal ES3B voting computer a security analysis (chapter 7.1)] ] . Another place for a man in the middle attack could be between the central unit and the printer, but this would only be useful on machines where the stored votes will not be verified by other means like a display.
*Altering voting machines to favor one candidate over another, for example by jamming a button or changing the sensitive area of a
touchscreen. [ [http://www.miami.com/mld/miamiherald/news/editorial/15889697.htm Test run for voting (Miami Herald, 10/31/2006)] ]
*Intentional misconfiguration, for example altering the ballot design to misidentify a candidates party.
*Voting machines might also be subject to
Van Eck phreakingon the display or keyboard, compromising the secrecy of the votes. [ [http://www.wijvertrouwenstemcomputersniet.nl/images/9/91/Es3b-en.pdf Nedap/Groenendaal ES3B voting computer a security analysis (chapter 6)] ]
* One voting machine possibly subject to
ballot stuffingif the voter is allowed unsupervised access, is the Sequoia Voting Systems"AVC Edge" touchscreen. These machines have a yellow button on the bottom (the reverse side of the touch screen) which if pressed after a valid vote will set the machine in "manual mode" bringing up a blank ballot allowing an additional vote. [ [http://www.insidebayarea.com/oaklandtribune/localnews/ci_4588048 Button on e-voting machine allows multiple votes] ] . This is an "optional" feature not found on all "AVC Edge" touchscreens, and is programmed to alert supervisors with two audible beeps.
* Abusing the administrative access to the machine by election officials might also allow individuals to vote multiple times.
*Electronic, and mechanical voting machines can be subject to different types of electoral fraud, as potential fraud could be incorrectly categorized as a technical problem.
A list of other threats to voting systems is kept by the
National Institute of Standards and Technology. [ [http://vote.nist.gov/threats/papers.htm Threats to Voting Systems] (NIST)]
The most comprehensive study on attacking electronic voting machines has been compiled by the Brennan Center for Justice. [ [http://www.brennancenter.org/dynamic/subpages/download_file_39288.pdf The Machinery of Democracy: Protecting Elections in an Electronic World] ]
Inflation or deflation of voters lists
*Registering false voters such as the deceased or even fictitious persons.
*Subverting voter registration rules, such as with "fagot voters." (persons who had land assigned to them prior to an election and removed immediately after an election to meet requirements to vote), [cite book
last = Williamson
first = Chilton
title = American Suffrage from Property to Democracy
publisher = Princeton U. Press
location = Princeton, NJ
id = ASIN B000FMPMK6 ] through "colonization" (the process of transporting groups of men from other cities and lodging them in
last = Saltman
first = Roy G.
authorlink = Roy G. Saltman
title = The History and Politics of Voting Technology
publisher = Palgrave Macmillan
url = http://www.palgrave-usa.com/catalog/product.aspx?isbn=1403963924
id = ISBN 1-4039-6392-4]
*People pretending to help elderly or blind persons with their vote.
*Election officials misinforming voters of when their vote is recorded and later recording it themselves. This apparently happened during municipality elections in
Landerd, Netherlands in 2006 where a candidate was also an election official and got the unusual amount of 181 votes in the polling place where he was working. In the other three polling places together he got 11 votes. [ [http://www.wahlsysteme.de/Wahlnachrichten/2006_Menschenwerk%20und%20kein%20Maschinenwerk.pdf Statement of voting machine manufacturer Nedap (German)] ] Only circumstantial evidencecould be found because the voting machine was a direct-recording electronic voting machine, in a poll by a local newspaper the results were totally different. The case is still under prosecution. [ [http://www.brabantsdagblad.nl/brabant/article247185.ece Raadslid Landerd is stuk minder populair in schaduwverkiezing (dutch)] ]
*As a spoiling tactic, running candidates and creating political parties with similar names as the main rivals in a constituency with the aim that enough voters will be misled into voting for the false candidate or party to influence the results.
*Impersonating a voter.
*Voting in multiple precincts, carousel voting. Men who were known to sell their vote and vote in multiple precincts were known as "floaters."cite book
last = Saltman
first = Roy G.
authorlink = Roy G. Saltman
title = The History and Politics of Voting Technology
publisher = Palgrave Macmillan
url = http://www.palgrave-usa.com/catalog/product.aspx?isbn=1403963924
id = ISBN 1-4039-6392-4] In the United States, fifty-two people have been convicted of federal election fraud for voting in multiple locations since 2002. In some countries like
El Salvador, Namibiaor Afghanistanvoters get a finger marked with election inkto prevent multiple votes. In the Afghanistan elections in 2005 this didn't work well because the ink could be rubbed off.
* Voter import: In
Bulgariathe controversial Movement for Rights and Freedomsis said to combine the former two, by "importing" voters from Turkeyat the day of the election, who then vote in every single polling station within a city. Similarly, in Malaysiaimmigrants from neighbouring Philippinesand Indonesiawere given citizenship together with voting rights in order for a political party to "dominate" the state of Sabahin a controversial process referred to as " Project IC".cite journal |last= Sadiq|first= Kamal|authorlink= |coauthors= |year= 2005|month= |title= When States Prefer Non-Citizens Over Citizens: Conflict Over Illegal Immigration into Malaysia|format=PDF|journal= International Studies Quarterly|volume= 49|issue= |pages= 101–122|id= |url= http://www.cri.uci.edu/pdf/ISQ2005FinalCopy.pdf|accessdate= 2008-04-23 |quote=|doi= 10.1111/j.0020-8833.2005.00336.x ]
* Vote selling: This is possible as long as a voter has a way to prove how he voted. Because of this a
secret ballotis preferred and postal- or internet votingis just accepted as an exception in most electoral systems. (also see Blocks of Five) In Mexico and several other places, voters willing to sell their vote are asked to take a picture of their ballot with a cellphone camera to validate their payment.
* Changing parties: voters (in elections for party leader) who change membership of parties in order to elect a weaker candidate to run against the leader of their original party.
During tabulation in the polling place
*Bribery, corruption or threatening of election officials.
*Destroying all ballots if the balance was not as desired.
*Tampering with tabulation software (applicable only to computer assisted tabulation). This apparently happened in the
Mexican general election, 1988.Fact|date=April 2007
*Spoiling votes: for example, by marking more candidates than allowed.
ballots of voting machines, usually memory cards, more than once if they contain votes as wanted by the fraudster. The opposite is to let them disappear in case of unwanted votes, this is equivalent to stealing a whole ballot box. [ [http://www.abcnews.go.com/Politics/Vote2006/story?id=2623854&page=1 ABC News: Hackable Democracy? ] ]
*Obstructing vote counting. [ [http://baltimorechronicle.com/2006/110706Harris.shtml The best defense is a good offense, so VOTE!] ]
*Double marking. A corrupt election official will conceal a piece of pencil lead underneath his fingernail, in which he
covertly marks an unvoted box in an area where the maximum number of votes has already been cast. Since this ballot is then considered overvoted, it is discarded, effectively throwing out the voter's vote.
During central tabulation of the results
*Bribery or corruption of election officials. This apparently happened in the Philippine general election, 2004 and is suspected in the Italian general election, 2006.
*Interfering in the data transmission.
Through legislative means
Gerrymandering(drawing voting district lines in such a way as to obtain a favorable result) or including prison inmates in a local population are also often argued to be forms of electoral fraud.
*Creating additional barriers to vote can also be considered fraud, such as requiring extensive forms of identification.
*Mandating voter matching standards be too strict (purging voters from the rolls and disenfranchising eligible voters) or too loose (leaving ineligible voters on the rolls and making the system vulnerable to fraud).
*Creating election deadlines that are unreasonable to certain portions of the electorate, such as requiring active duty military ballots to be delivered before it would be possible for them to be mailed.
*Disqualification of candidates by arbitrary means. One example was the 1990 mayoral race in Washington DC when
Jesse Jacksonconsidered running for DC mayor, which concerned incumbent mayor Marion Barrywho had been polling very low and felt he could not compete with Jackson's popularity. Since Jackson made most of his money from speeches, Barry ordered the DC Council to pass a law making it illegal for anyone to run for mayor of Washington DC who makes more than $10,000 a year from honorarium. This became known as the "Jesse Jackson law", as the sole intent of the law was to declare Jackson unsuitable for election. ["Shakedown: Exposing the Real Jesse Jackson" by Kenneth Timmerman]
Smear campaigns are illegal in the Philippinesand can thus be considered election fraud.
*Laws exist in the UK to prevent untrue statements being made about candidates—see
Miranda Grellfor a 2007 case.
Election fraud in legislature
Election fraud in legislature is qualitatively different because the number of voters is smaller. For example,
* The two-thirds majority
Hitlerneeded to pass the Enabling Act, which gave him dictatorial power, was only attained by arresting enough members of the opposition. The act had a two-year expiration date, which had the option for renewal. After the start of the Second World War, the last opposition to the act's renewal was extinguished. Hitler treated the Enabling Act's renewal as a matter of appearance, knowing he could get the renewal rubber stamped by a Reichstag made entirely of Nazi party members, even getting a renewal as late as 1944 and planning on getting a rubber stamped renewal in 1946.Fact|date=November 2007
* The controversial method of using a paper-clip or bubblegum to jam a representative's voting button in absence. [ [http://writ.lp.findlaw.com/hamilton/20040408.html Is "Ghost" Voting Acceptable?] ]
* In 2004 security expert
Bruce Schneierpublished a theoretical paper how election fraudin the papal electioncould be done. [ [http://schneier.com/crypto-gram-0504.html#8 Bruce Schneier: Hacking the Papal Election, April 15, 2005] ]
The best way to protect the electorate from electoral fraud is to have an election process which is completely transparent to all voters, from nomination of candidates through casting of the votes and tabulation. A key feature in insuring the integrity of any part of the electoral process is a strict
chain of custody.
To prevent fraud in central tabulation, there has to be a public list of the results from every single polling place. This is the only way for voters to prove that the results they witnessed in their election office are correctly incorporated into the totals.
Various forms of
statistics can be indicators for election fraud e.g. exit polls which are very different from the final results. Having reliable exit polls could keep the amount of fraud low to avoid a controversy. Other indicators might be unusual high numbers of invalid ballots, overvoting or undervoting. It has to be kept in mind that most statistics do not reflect the types of election fraud which prevent citizens from voting at all like intimidation or misinformation.
There may, however, be a problem with exit-polls or other verifications methods dependent on the honesty of the voters; for instance, in the Czech Republic (previously part of Czechoslovakia), some voters are afraid or ashamed to admit that they voted for the Communist Party, often claiming to have voted for other party than Communists (exit polls in 2002 gave Communist party 2-3 percents lower gain than was the actual case).
In countries with strong laws and effective legal systems, lawsuits can be brought against those who have allegedly committed fraud; but determent with legal prosecution would not be enough. Although the penalties for getting caught may be severe, the rewards for succeeding are likely to be worth the risk. The rewards range from benefits in contracting to total control of a country.
Germanythere are currently calls for reform of these laws because lawsuits can be and are usually prolonged by the newly elected Bundestag[ [http://de.wikipedia.org/wiki/Wahlpr%C3%BCfung#Reform_der_Wahlpr.C3.BCfung Reform der Wahlprüfung (German)] ]
International observers (bilateral and multilateral) may be invited to observe the elections (examples include election observation by the Organization for Security and Cooperation in Europe (OSCE), European Union election observation missions, observation missions of the Commonwealth of Independent States (CIS), as well as international observation organized by NGOs, such as European Network of Election Monitoring Organizations (ENEMO), etc.). Some countries also invite foreign observers (i.e. bi-lateral observation, as opposed to multi-lateral observation by international observers).
In addition, national legislations of countries often permit domestic observation. Domestic election observers can be either partisan (i.e. representing interests of one or a group of election contestants) or non-partisant (usually done by civil society groups). Legislations of different countries permit various forms and extents of international and domestic election observation.
Election observation is also prescribed by various international legal instrucments. For example, paragraph 8 of the 1990 Copenhagen Document states that "The [OSCE] participating States consider that the presence of observers, both foreign and domestic, can enhance the electoral process for States in which elections are taking place. They therefore invite observers from any other CSCE participating States and any appropriate private institutions and organizations who may wish to do so to observe the course of their national election proceedings, to the extent permitted by law. They will also endeavour to facilitate similar access for election proceedings held below the national level. Such observers will undertake not to interfere in the electoral proceedings".
Examples from the USA include:
* Justice Department [ [http://www.cnn.com/2006/POLITICS/11/06/election.observers/index.html Justice department dispatches election monitors (cnn.com, 6. November 2006)] ]
* Political parties, e.g., the United States Democratic Party's election protection program. [ [http://www.democrats.org/page/content/voterprotection/ democrats.org: Voter Protection Resource Center] ]
* Poll watchers from
election integrity groups. Most of them also offer information websites and phone hotlines for voters to report problems. Some of them also help with voter registration. Examples are VoteTrust USA and Verified Voting Foundation.
Critics note that observers cannot spot certain types of election fraud like targeted
voter suppressionor manipulated software of voting machines.
End-to-end auditable voting systemsprovide voters with a receipt to allow them to verify their vote was cast correctly, and an audit mechanism to verify that the results were tabulated correctly and all votes were cast by valid voters. However, the ballot receipt does not permit voters to prove to others how they voted, since this would open the door towards forced voting and blackmail. End-to-end systems include Punchscanand Scantegrity, the latter being an add-on to optical scan systems instead of a replacement.
Testing and certification of electronic voting
One method for verifying
voting machineaccuracy is Parallel Testing, the process of using an independent set of results compared against the original machine results. Parallel testing can be done prior to or during an election. During an election, one form of parallel testing is the VVPAT. This method is only effective if statistically significant numbers of voters verify that their intended vote matches both the electronic and paper votes.
On election day, a statistically significant number of voting machines can be randomly selected from polling locations and used for testing. This can be used to detect potential fraud or malfunction unless manipulated software would only start to cheat after a certain event like a voter pressing a special key combination (Or a machine might cheat only if someone doesn't perform the combination, which requires more insider access but fewer voters).
Another form of testing is
Logic & Accuracy Testing(L&A), pre-election testing of voting machines using test votes to determine if they are functioning correctly.
Another method to insure the integrity of electronic voting machines is independent
software verificationand certification. Once software is certified, code signing can insure the software certified is identical to that which is used on election day. Some argue certification would be more effective if voting machine software was publicly available or open source.
Certification and testing processes conducted publicly and with oversight from interested parties can promote transparency in the election process. The integrity of those conducting testing can be questioned.
Testing and certification can prevent voting machines from being a black box where voters can not be sure that counting inside is done as intended.
American Center for Voting Rights
Florida Central Voter File(purging controversy)
Open Voting Consortium
* [http://www.aceproject.org/ace-en/topics/vo/vog/vog05/vog05b Voter Fraud] - an article from the [http://www.aceproject.org ACE Project]
* [http://www.votetrustusa.org/pdfs/saltman.pdf Independent Verification: Essential Action to Assure Integrity in the Voting Process] , Roy G. Saltman, August 22, 2006
* [http://www.aceproject.org/ace-en/topics/vr/vra/vra16/ Legal provisions to prevent Electoral Fraud] - an article from the [http://www.aceproject.org ACE Project]
* [http://www.rollingstone.com/news/story/10432334/was_the_2004_election_stolen/print "Was the 2004 Election Stolen?"] by Robert F. Kennedy Jr., June 1, 2006.
* [http://www.businessweek.com/2000/00_22/b3683058.htm Article referencing "four-legged voting"]
* [http://www.tc.umn.edu/~hause011/article/Vote1.html Vote Fraud Actors and Motivation]
* [http://www.tc.umn.edu/~hause011/article/Vote2.html Vote Fraud Strategy and Tactics]
* [http://www.thirdworldtraveler.com/Project%20Censored/Theft_2004_Pres_Election.html No Paper Trail Left Behind: The Theft of the 2004 Presidential Election, by Dennis Loo, Ph.D]
* [http://www.votingmachinesprocon.org/subtabsecurity.htm Electronic Voting: Safe or Fraudulent?]
Wikimedia Foundation. 2010.