Jump to content

Electoral fraud

From Wikipedia, the free encyclopedia
(Redirected fromVote stuffing)

Electoral fraud,sometimes referred to aselection manipulation,voter fraud,orvote rigging,involves illegal interference with the process of anelection,either by increasing the vote share of a favored candidate, depressing the vote share of rival candidates, or both.[1]It differs from but often goes hand-in-hand withvoter suppression.What exactly constitutes electoral fraud varies from country to country, though the goal is oftenelection subversion.

Electoral legislation outlaws many kinds of election fraud,[2]but other practices violate general laws, such as those banningassault,harassmentorlibel.Although technically the term "electoral fraud" covers only those acts which are illegal, the term is sometimes used to describeacts which are legal,but considered morally unacceptable, outside the spirit of an election or in violation of the principles ofdemocracy.[3][4]Show elections,featuring only one candidate, are sometimes classified[by whom?]as electoral fraud, although they may comply with the law and are presented more as referendums/plebiscites.

In national elections, successful electoral fraud on a sufficient scale can have the effect of acoup d'état,[citation needed]protest[5]orcorruptionof democracy. In anarrow election,a small amount of fraud may suffice to change the result. Even if the outcome is not affected, the revelation of fraud can reduce voters' confidence in democracy.

Law

[edit]

In the US someone may be fined and/or imprisoned for not more than five years.[6][non-primary source needed] In France, someone guilty may be fined and/or imprisoned for not more than one year, or two years if the person is an official (like a mayor for example).[7][non-primary source needed]

Electorate manipulation

[edit]

Electoral fraud can occur in advance of voting if the composition of the electorate is altered. The legality of this type of manipulation varies across jurisdictions. Deliberate manipulation of election outcomes is widely considered a violation of the principles of democracy.[8]

Artificial migration or party membership

[edit]

In many cases, it is possible for authorities to artificially control the composition of an electorate in order to produce a foregone result. One way of doing this is to move a large number of voters into the electorate prior to an election, for example by temporarily assigning them land or lodging them inflophouses.[9][10]Many countries prevent this with rules stipulating that a voter must have lived in an electoral district for a minimum period (for example, six months) in order to be eligible to vote there. However, such laws can also be used for demographic manipulation as they tend todisenfranchisethose with no fixed address, such as the homeless, travelers,Roma,students (studying full-time away from home), and some casual workers.

Another strategy is to permanently move people into an electoral district, usually throughpublic housing.If people eligible for public housing are likely to vote for a particular party, then they can either be concentrated into one area, thus making their votes count for less, or moved intomarginal seats,where they may tip the balance towards their preferred party. One example of this was the 1986–1990Homes for votes scandalin theCity of Westminsterin England underShirley Porter.[11]

Immigration law may also be used to manipulate electoral demography. For instance,Malaysiagave citizenship to immigrants from the neighboringPhilippinesandIndonesia,together with suffrage, in order for a political party to "dominate" the state ofSabah;this controversial process was known asProject IC.[12]

A method of manipulatingprimary contestsand other elections of party leaders are related to this. People who support one party may temporarily join another party (or vote in a crossover way, when permitted) in order to elect a weak candidate for that party's leadership. The goal ultimately is to defeat the weak candidate in the general election by the leader of the party that the voter truly supports. There were claims that this method was being utilised in theUK Labour Party leadership election in 2015,where Conservative-leaningToby YoungencouragedConservativesto joinLabourand vote forJeremy Corbynin order to "consign Labour to electoral oblivion".[13][14]Shortly after, #ToriesForCorbyntrendedonTwitter.[14]

Disenfranchisement

[edit]

The composition of an electorate may also be altered bydisenfranchisingsome classes of people, rendering them unable to vote. In some cases, states had passed provisions that raised general barriers to voter registration, such aspoll taxes,literacy and comprehension tests, and record-keeping requirements, which in practice were applied against minority populations to discriminatory effect. From the turn of the century into the late 1960s, most African Americans in the southern states comprising theformer Confederacywere disenfranchised by such measures. Corrupt election officials may misuse voting regulations such as aliteracy testor requirement for proof of identity or address in such a way as to make it difficult or impossible for their targets to cast a vote. If such practices discriminate against a religious or ethnic group, they may so distort the political process that the political order becomes grossly unrepresentative, as in the post-ReconstructionorJim Crowera until theVoting Rights Act of 1965.Felons have been disenfranchisedin many states as a strategy to prevent African Americans from voting.[15]

Groups may also be disenfranchised by rules which make it impractical or impossible for them to cast a vote. For example, requiring people to vote within their electorate may disenfranchise serving military personnel, prison inmates, students, hospital patients or anyone else who cannot return to their homes. Polling can be set for inconvenient days, such as midweek or on holy days of religious groups: for example onthe Sabbathor otherholy daysof a religious group whose teachings determine that voting is prohibited on such a day. Communities may also be effectively disenfranchised if polling places are situated in areas perceived by voters as unsafe, or are not provided within reasonable proximity (rural communities are especially vulnerable to this).[example needed]

In some cases, voters may be invalidly disenfranchised, which is true electoral fraud. For example, a legitimate voter may be "accidentally" removed from theelectoral roll,making it difficult or impossible for the person to vote.[citation needed]

In the Canadian federal election of 1917, during theGreat War,the Canadian government, led by the Union Party, passed theMilitary Voters Actand theWartime Elections Act.TheMilitary Voters Actpermitted any active military personnel to vote by party only and allowed that party to decide in which electoral district to place that vote. It also enfranchised those women who were directly related or married to an active soldier. These groups were believed to be disproportionately in favor of the Union government, as that party was campaigning in favor of conscription.[citation needed]TheWartime Elections Act,conversely, disenfranchised particular ethnic groups assumed to be disproportionately in favour of the opposition Liberal Party.[citation needed]

Division of opposition support

[edit]

Stanford University professorBeatriz Magalonidescribed a model governing the behaviour of autocratic regimes. She proposed that ruling parties can maintain political control under a democratic system without actively manipulating votes or coercing the electorate. Under the right conditions, the democratic system is maneuvered into an equilibrium in which divided opposition parties act as unwitting accomplices to single-party rule. This permits the ruling regime to abstain from illegal electoral fraud.[16]

Preferential voting systems such asscore votingandsingle transferable vote,and in some cases,instant-runoff voting,can reduce the impact of systemic electoral manipulation andpolitical duopoly.[17][18]

Intimidation

[edit]

Voter intimidationinvolves putting undue pressure on a voter or group of voters so that they will vote a particular way, or not at all.[19]Absenteeand otherremote votingcan be more open to some forms of intimidation as the voter does not have the protection and privacy of the polling location. Intimidation can take a range of forms including verbal, physical, or coercion. This was so common that in 1887, a Kansas Supreme Court inNew Perspectives on Election Fraud in The Gilded Agesaid "[...] physical retaliation constituted only a slight disturbance and would not vitiate an election."

Violence or threats of violence

[edit]

In its simplest form, voters from a particular demographic or known to support a particular party or candidate are directly threatened by supporters of another party or candidate or by those hired by them. In other cases, supporters of a particular party make it known that if a particular village or neighborhood is found to have voted the 'wrong' way, reprisals will be made against that community. Another method is to make a general threat of violence, for example, abomb threatwhich has the effect of closing a particular polling place, thus making it difficult for people in that area to vote.[20]One notable example of outright violence was the1984 Rajneeshee bioterror attack,where followers ofBhagwan Shree Rajneeshdeliberately contaminated salad bars inThe Dalles, Oregon,in an attempt to weaken political opposition during county elections. Historically, this tactic includedLynching in the United Statesto terrorize potential African American voters in some areas.[citation needed]

Polling places in an area known to support a particular party or candidate may be targeted for vandalism, destruction or threats, thus making it difficult or impossible for people in that area to vote.[citation needed]

[edit]

In this case, voters will be made to believe, accurately or otherwise, that they are not legally entitled to vote, or that they are legally obliged to vote a particular way. Voters who are not confident about their entitlement to vote may also be intimidated by real or implied authority figures who suggest that those who vote when they are not entitled to will be imprisoned, deported or otherwise punished.[21][22]

For example, in 2004, in Wisconsin and elsewhere voters allegedly received flyers that said, "If you already voted in any election this year, you can't vote in the Presidential Election", implying that those who had voted in earlier primary elections were ineligible to vote. Also, "If anybody in your family has ever been found guilty of anything you can't vote in the Presidential Election." Finally, "If you violate any of these laws, you can get 10 years in prison and your children will be taken away from you."[23][24]

Disinformation

[edit]

Another method, allegedly used inCook County, Illinois,in 2004, is to falsely tell particular people that they are not eligible to vote[22]

In 1981 in New Jersey, theRepublican National Committeecreated theBallot Security Task Forceto discourage voting among Latino and African-American citizens of New Jersey. The task force identified voters from an old registration list and challenged their credentials. It also paid off-duty police officers to patrol polling sites in Newark and Trenton, and posted signs saying that falsifying a ballot is a crime.[25]

Coercion

[edit]

Employers can coerce the voters' decision, through strategies such as explicit or implicit threats of job loss.[26]

Disinformation

[edit]
To sow election doubt, Donald Trump escalated use of "rigged election" and "election interference" statements in advance of the 2024 election over that in the previous two elections—the statements described as part of a "heads I win; tails you cheated" rhetorical strategy.[27]

People may distribute false or misleading information in order to affect the outcome of an election.[3]For example, in theChilean presidential election of 1970,the U.S. government'sCentral Intelligence Agencyused "black propaganda" —materials purporting to be from various political parties—to sow discord between members of a coalition between socialists and communists.[28]

Another use ofdisinformationis to give voters incorrect information about the time or place of polling, thus causing them to miss their chance to vote. As part of the2011 Canadian federal election voter suppression scandal,Elections Canadatraced fraudulent phone calls, telling voters that their polling stations had been moved, to a telecommunications company that worked with theConservative Party.[29]

Similarly in the United States, right-wingpolitical operativesJacob WohlandJack Burkmanwere indicted on several counts of bribery and election fraud in October 2020 regarding a voter disinformation scheme they undertook in the months prior to the2020 United States presidential election.[30]The pair hired a firm to make nearly 85,000robocallsthat targeted minority neighborhoods in Pennsylvania, Ohio, New York, Michigan, and Illinois. LikeDemocraticconstituencies in general that year, minorities voted overwhelmingly byabsentee ballot,many judging it a safer option during theCOVID-19 pandemicthan in-person voting.[31]Baselessly, the call warned potential voters if they submitted their votes by mail that authorities could use theirpersonal informationagainst them, including threats of police arrest for outstanding warrants and forced debt collection by creditors.[32]

On October 24, 2022,WohlandBurkmanpleaded guilty inCuyahoga County, OhioCommon Pleas Courtto one count each of felony telecommunications fraud.[33]Commenting on the tactic of using disinformation to suppress voter turnout,Cuyahoga CountyProsecutor Michael C. O’Malley said the two men had "infringed upon the right to vote", and that "by pleading guilty, they were held accountable for their un-American actions.”[34]

Vote buying

[edit]

Vote buying occurs when a political party or candidate seeks to buy the vote of a voter in an upcoming election. Vote buying can take various forms such as a monetary exchange, as well as an exchange for necessary goods or services.[35]

Voting process and results

[edit]

A list of threats to voting systems, or electoral fraud methods considered as sabotage are kept by theNational Institute of Standards and Technology.[36]

Misleading or confusing ballot papers

[edit]

Ballot papers may be used to discourage votes for a particular party or candidate, using the design or other features which confuse voters into voting for a different candidate. For example, in the2000 U.S. presidential election,Florida'sbutterfly ballotpaper was criticized as poorly designed, leading some voters to vote for the wrong candidate. While the ballot itself was designed by a Democrat, it was the Democratic candidate,Al Gore,who was most harmed by voter errors because of this design.[37]Poor or misleading design is usually not illegal and therefore not technically election fraud, but it can nevertheless subvert the principles of democracy.[citation needed]

Swedenhas a system with separate ballots used for each party, to reduce confusion among candidates. However, ballots from small parties such asPiratpartiet,JunilistanandFeministiskt initiativhave been omitted or placed on a separate table in the election to the EU parliament in 2009.[38]Ballots fromSweden Democratshave been mixed with ballots from the largerSwedish Social Democratic Party,which used a very similar font for the party name written on the top of the ballot.[citation needed]

Another method of confusing people into voting for a different candidate from the one intended is to run candidates or create political parties with similar names or symbols to an existing candidate or party. The goal is to mislead voters into voting for the false candidate or party.[39]Such tactics may be particularly effective when many voters have limited literacy in the language used on the ballot. Again, such tactics are usually not illegal but they often work against the principles of democracy.[citation needed]

Another possible source of electoral confusion is multiple variations of voting by differentelectoral systems.This may cause ballots to be counted as invalid if the wrong system is used. For instance, if a voter puts afirst-past-the-postcross in a numberedsingle transferable voteballot paper, it is invalidated. For example, in Scotland and other parts of the United Kingdom, up to three different voting systems and types of ballots may be used, based on the jurisdictional level of the election.Local electionsare determined bysingle transferable votes;Scottish parliamentary electionsby theadditional member system;and UK Parliamentary elections byfirst-past-the-post.[citation needed]

Ballot stuffing

[edit]
Transparent ballot box used in Ukraine to prevent election officials from pre-stuffing the box with fake ballots
A specialised ballot box used to assist ballot stuffing, featured inFrank Leslie's Illustrated Newspaperin 1856

Ballot stuffing,or "ballot-box stuffing", is the illegal practice of one person submitting multipleballotsduring avotein which only one ballot per person is permitted.

In Major League Baseball's All Star Game

[edit]

Major League Baseball'sAll-Star Gamehas had problems with ballot stuffing on occasion.

  • In1957,Cincinnati Redsfans aided by a local newspaper arranged for seven of the eight elected starting fielders to be Reds players[48]
  • In1999,the online ballot was stuffed by computer programmer Chris Nandor in favor ofBoston Red SoxshortstopNomar Garciaparra.Nandor created a program that enabled him to vote multiple times for Garciaparra and his teammates before his ballots—which were submitted through adial-up connection—were traced back to him[48]
  • In2015,MLB annulled 65 million (out of a total of 620 million) online ballots after it was reported that eight out of the starting nine positions for theAmerican Leaguewould have beenKansas City Royalsplayers.[49]

Misrecording of votes

[edit]

Votes may be misrecorded at source, on a ballot paper or voting machine, or later in misrecording totals. The2019 Malawian general electionwas nullified by the Constitutional Court in 2020 because many results were changed by use of correction fluid, as well as duplicate, unverified and unsigned results forms.[50][51]California allows correction fluid and tape, so changes can be made after the ballot leaves the voter.[52]

Where votes are recorded through electronic or mechanical means, the voting machinery may be altered so that a vote intended for one candidate is recorded for another, or electronic results are duplicated or lost, and there is rarely evidence whether the cause was fraud or error.[53][54][55]

Many elections feature multiple opportunities for unscrupulous officials or 'helpers' to record an elector's vote differently from their intentions. Voters who require assistance to cast their votes are particularly vulnerable to having their votes stolen in this way. For example, a blind or illiterate person may be told that they have voted for one party when in fact they have been led to vote for another.[citation needed]

Misuse of proxy votes

[edit]

Proxy votingis particularly vulnerable to election fraud, due to the amount of trust placed in the person who casts the vote. In several countries, there have been allegations of retirement home residents being asked to fill out 'absentee voter' forms. When the forms are signed and gathered, they are secretly rewritten as applications for proxy votes, naming party activists or their friends and relatives as the proxies. These people, unknown to the voter, cast the vote for the party of their choice. In theUnited Kingdom,this is known as 'granny farming.'[56]

Destruction of ballots

[edit]

One of methods of electoral fraud is to destroy ballots for an opposing candidate or party.

While mass destruction of ballots can be difficult to achieve without drawing attention to it, in a very close election it may be possible to destroy a small number of ballot papers without detection, thereby changing the overall result. Blatant destruction of ballot papers can render an election invalid and force it to be re-run. If a party can improve its vote on the re-run election, it can benefit from such destruction as long as it is not linked to it.[citation needed]

During theBourbon Restorationin late 19th century Spain, the organized “loss” of voting slips (pucherazo) was used to maintain the agreed alternation between the Liberals and the Conservatives. This system of local political domination, especially rooted in rural areas and small cities, was known ascaciquismo.[citation needed]

Invalidation of ballots

[edit]

Another method is to make it appear that the voter has spoiled his or her ballot, thus rendering it invalid. Typically this would be done by adding another mark to the paper, making it appear that the voter has voted for more candidates than entitled, for instance. It would be difficult to do this to a large number of paper ballots without detection in some locales, but altogether too simple in others, especially jurisdictions where legitimate ballot spoiling by voter would serve a clear and reasonable aim: for example emulating protest votes in jurisdictions that have recently had and since abolished a "none of the above" or "against all" voting option; civil disobedience where voting is mandatory; and attempts at discrediting or invalidating an election. An unusually large share of invalidated ballots may be attributed to loyal supporters of candidates that lost in primaries or previous rounds, did not run or did not qualify to do so, or some manner of protest movement or organized boycott.[citation needed]

In 2016, during theEU membership referendum,Leave-supporting voters in the UKalleged without evidence that the pencilssupplied by voting stations would allow votes to be erased their votes from the ballot.[57][58]

Tampering with electronic voting systems

[edit]

General tampering

[edit]

Allvoting systemsface threats of some form of electoral fraud. The types of threats that affectvoting machinesvary.[59]Research at Argonne National Laboratories revealed that a single individual with physical access to a machine, such as a Diebold Accuvote TS, can install inexpensive, readily available electronic components to manipulate its functions.[60][61]

Other approaches include:

  • Tampering with thesoftwareof a voting machine to add malicious code that alters vote totals or favors a candidate in any way.
    • Multiple groups have demonstrated this possibility[62][63][64]
    • Private companies manufacture these machines. Many companies will not allow public access or review of the machines'source code,claiming fear of exposingtrade secrets[65]
  • Tampering with the hardware of thevoting machineto alter vote totals or favor any candidate.[63][citation needed]
    • Some of these machines require a smart card to activate the machine and vote. However, a fraudulent smart card could attempt to gain access to voting multiple times[66]or be pre-loaded with negative votes to favor one candidate over another, as has been demonstrated
  • Abusing the administrative access to the machine by election officials might also allow individuals to vote multiple times[citation needed]
  • Election results that are sent directly over the internet from the polling place centre to the vote-counting authority can be vulnerable to aman-in-the-middle attack,where they are diverted to an intermediate website where the man in the middle flips the votes in favour of a certain candidate and then immediately forwards them on to the vote-counting authority. All votes sent over the internet violate the chain of custody and hence should be avoided by driving or flying memory cards in locked metal containers to the vote-counters. For purposes of getting quick preliminary total results on election night, encrypted votes can be sent over the internet, but final official results should be tabulated the next day only after the actual memory cards arrive in secure metal containers and are counted[67]

South Africa

[edit]

In 1994,the electionwhich brought majority rule and putNelson Mandelain office, South Africa's election compilation system was hacked, so they re-tabulated by hand.[68][69][70]

Ukraine

[edit]

In 2014, Ukraine's central election system was hacked. Officials found and removed a virus and said the totals were correct.[71]

United States

[edit]

During the2020 presidential election,incumbent PresidentDonald Trumpmade numerous baseless allegations of electoral fraud by supporters ofDemocraticcandidateJoe Biden.The Trump campaign lost numerous legal challenges to the results.[72][73]The campaign lost 64 of 65 lawsuits. Election security experts, officials, analysts, and Trump's own Attorney GeneralWilliam Barrhave found no evidence of widespread voter fraud.[74][75]

Voter impersonation

[edit]

United Kingdom

[edit]

Academic research has generally found little evidence of widespread impersonation in the UK.[76]Concerns about voter impersonation have led the conservative government to propose the Electoral Integrity Bill.[77][relevant?discuss]

United States

[edit]

Voter impersonation is extremely rare in the US.[78]

Since 2013, several states have passedvoter ID lawsto counter voter impersonation, though their effectiveness and potential to disenfranchise citizens without the right ID have created controversy. By August 2016, four federal court rulings (Texas, North Carolina, Wisconsin, and North Dakota) overturned laws or parts of such laws because they placed undue burdens onminority populations,including African Americans and Native Americans.[79]

Allegations of widespread voter impersonation ususally turn out to be false.[80]The North Carolina Board of Elections reported in 2017 that out of 4,769,640 votes cast in the November 2016 election in North Carolina, only one illegal vote would potentially have been blocked by the voter ID law. The investigation found fewer than 500 incidences of invalid ballots cast, the vast majority of which were cast by individuals on probation forfelonywho were likely not aware that this status disqualified them from voting, and the total number of invalid votes was far too small to have affected the outcome of any race in North Carolina in the 2016 election.[81][82]

Artificial results

[edit]

In particularly corrupt regimes, the voting process may be nothing more than a sham, to the point that officials simply announce whatever results they want, sometimes without even bothering to count the votes. While such practices tend to draw international condemnation, voters typically have little if any recourse, as there would seldom be any ways to remove the fraudulent winner from power, short of a revolution.[citation needed]

InTurkmenistan,incumbent PresidentGurbanguly Berdymukhamedovreceived 97.69% of votesin the 2017 election,with his sole opponent, who was seen as pro-government, in fact being appointed by Berdymukhamedov. InGeorgia,Mikheil Saakashvilireceived 96.2% of votes in the election following theRose Revolutionwhile his allyNino Burjanadzewas an interim head of state.[citation needed]

Postal ballot fraud

[edit]

In both the United Kingdom and the United States, experts estimate that voting fraud by mail has affected only a few local elections, without likely any impact at the national level.[83][84][85][86]In April 2020, a 20-year voter fraud study by theMassachusetts Institute of Technologyfound the level of mail-in ballot fraud "exceedingly rare" in the United States, occurring only in "0.00006 percent" of instances nationally, and, with Oregon's mail-in-ballots, "0.000004 percent—about five times less likely than getting hit by lightning".[87]

Types of fraud have included pressure on voters from family or others, since the ballot is not always cast in secret;[85][88][89] collection of ballots by dishonest collectors who mark votes or fail to deliver ballots;[90][91]and insiders changing, challenging or destroying ballots after they arrive.[92][93]

A measure championed as a way to prevent some types of mail-in fraud has been to require the voter's signature on the outer envelope, which is compared to one or more signatures on file before taking the ballot out of the envelope and counting it.[85][94]Not all places have standards for signature review,[95] and there have been calls to update signatures more often to improve this review.[85][94]While any level of strictness involves rejecting some valid votes and accepting some invalid votes,[96]there have been concerns that signatures are improperly rejected from young and minority voters at higher rates than others, with no or limited ability of voters to appeal the rejection.[97][98]

Some problems have inherently limited scope, such as family pressure, while others can affect several percent of the vote, such as dishonest collectors[85]and overly strict signature verification.[97]

Non-citizen voting

[edit]

United States

[edit]

Illegal non-citizen voting is considered extremely rare in the United States due to the severe penalties associated with the practice including deportation, incarceration or fines in addition to jeopardizing their attempt to naturalize.[99][100][101][102]

In legislature

[edit]

Vote fraud can also take place in legislatures. Some of the forms used in national elections can also be used in parliaments, particularly intimidation and vote-buying. Because of the much smaller number of voters, however, election fraud in legislatures is qualitatively different in many ways. Fewer people are needed to 'swing' the election, and therefore specific people can be targeted in ways impractical on a larger scale. For example,Adolf Hitlerachieved hisdictatorialpowers due to theEnabling Act of 1933.He attempted to achieve the necessary two-thirds majority to pass the Act by arresting members of the opposition, though this turned out to be unnecessary to attain the needed majority. Later, the Reichstag was packed withNaziparty members who voted for the Act's renewal.[citation needed]

In many legislatures, voting is public, in contrast to thesecret ballotused in most modern public elections. This may make their elections more vulnerable to some forms of fraud since a politician can be pressured by others who will know how the legislator voted. However, it may also protect against bribery and blackmail, since the public and media will be aware if a politician votes in an unexpected way. Since voters and parties are entitled to pressure politicians to vote a particular way, the line between legitimate and fraudulent pressure is not always clear.[citation needed]

As in public elections, proxy votes are particularly prone to fraud. In some systems, parties may vote on behalf of any member who is not present in parliament. This protects those members from missing out on voting if prevented from attending parliament, but it also allows their party to prevent them from voting against its wishes. In some legislatures, proxy voting is not allowed, but politicians may rig voting buttons or otherwise illegally cast "ghost votes" while absent.[103]

Detection and prevention

[edit]

The three main strategies for the prevention of electoral fraud in society are:

  1. Auditing the election process
  2. Deterrence through consistent and effective prosecution
  3. Cultivation of mores that discourage corruption

Some of the main fraud prevention tactics can be summarised as secrecy and openness. Thesecret ballotprevents many kinds of intimidation and vote selling, while transparency at all other levels of the electoral process prevents and allows detection of most interference.

Election audits

[edit]

Election auditing refers to any review conducted after polls close for the purpose of determining whether the votes were counted accurately (a results audit) or whether proper procedures were followed (a process audit), or both.[citation needed]

Audits vary and can include checking that the number of voters signed in at the polls matches the number of ballots, seals on ballot boxes and storage rooms are intact, computer counts (if used) match hand counts, and counts are accurately totaled.[citation needed]

Election recountsare a specific type of audit, with elements of both results and process audits.[citation needed]

Prosecution

[edit]

In the United States the goal of prosecutions is not to stop fraud or keep fraudulent winners out of office; it is to deter and punish years later. TheJustice Departmenthas publishedFederal Prosecution of Election Offensesin eight editions from 1976 to 2017, under PresidentsFord,Carter,Reagan,Clinton,Bush andTrump.It says, "Department does not have authority to directly intercede in the election process itself.... overt criminal investigative measures should not ordinarily be taken... until the election in question has been concluded, its results certified, and all recounts and election contests concluded."[104][105]Sentencing guidelines provide a range of 0–21 months in prison for a first offender;[106]offense levelsrange from 8 to 14.[107]Investigation, prosecution and appeals can take over 10 years.[108]

In thePhilippines,formerPresidentGloria Macapagal Arroyowas arrested in 2011 following the filing of criminal charges against her for electoral sabotage, in connection with the2007 Philippine general election.She was accused of conspiring with election officials to ensure the victory of her party'ssenatorialslate in the province ofMaguindanao,through the tampering of election returns.[109]

Secret ballot

[edit]

Thesecret ballot,in which only the voter knows how they have voted, is believed by many to be a crucial part of ensuringfree and fair electionsthrough preventing voter intimidation or retribution.[110]Others argue that the secret ballot enables election fraud (because it makes it harder to verify that votes have been counted correctly)[111][112]and that it discourages voter participation.[113][failed verification]Although the secret ballot was sometimes practiced inancient Greeceand was a part of theConstitution of the Year IIIof 1795, it only became common in the nineteenth century. Secret balloting appears to have been first implemented in the former Britishcolony—now anAustralianstate—ofTasmaniaon 7 February 1856. By the turn of the century, the practice had spread to most Western democracies.[citation needed]

In the United States, the popularity of the Australian ballot grew as reformers in the late 19th century sought to reduce the problems of election fraud. Groups such as the Greenbackers, Nationalist, and more fought for those who yearned to vote, but were exiled for their safety. George Walthew, Greenback, helped initiate one of the first secret ballots in America in Michigan in 1885. Even George Walthew had a predecessor in John Seitz, Greenback, who campaigned a bill to "preserve the purity of elections" in 1879 after the discovery of Ohio's electoral fraud in congressional elections.[citation needed]

The efforts of many helped accomplish this and led to the spread of other secret ballots all across the country. As mentioned on February 18, 1890, in the Galveston News "The Australian ballot has come to stay. It protects the independence of the voter and largely puts a stop to vote to buy." Before this, it was common for candidates to intimidate or bribe voters, as they would always know who had voted which way.[citation needed]

Transparency

[edit]

Most methods of preventing electoral fraud involve making the election process completely transparent to all voters, from nomination of candidates through casting of the votes and tabulation.[114][non-primary source needed]A key feature in ensuring the integrity of any part of the electoral process is a strictchain of custody.[citation needed]

To prevent fraud in central tabulation, there has to be a public list of the results from every single polling place. This is the only way for voters to prove that the results they witnessed in their election office are correctly incorporated into the totals.[citation needed]

End-to-end auditable voting systemsprovide voters with a receipt to allow them to verify their vote was cast correctly, and an audit mechanism to verify that the results were tabulated correctly and all votes were cast by valid voters. However, the ballot receipt does not permit voters to prove to others how they voted, since this would open the door towards forced voting and blackmail. End-to-end systems includePunchscanandScantegrity,the latter being an add-on to optical scan systems instead of a replacement.[citation needed]

In many cases,election observersare used to help prevent fraud and assure voters that the election is fair. International observers (bilateral and multilateral) may be invited to observe the elections (examples include election observation by the Organisation for Security and Cooperation in Europe (OSCE), European Union election observation missions, observation missions of the Commonwealth of Independent States (CIS), as well as international observation organised by NGOs, such asCIS-EMO,European Network of Election Monitoring Organizations (ENEMO), etc.). Some countries also invite foreign observers (i.e. bi-lateral observation, as opposed to multi-lateral observation by international observers).[citation needed]

In addition, national legislatures of countries often permit domestic observation. Domestic election observers can be either partisan (i.e. representing interests of one or a group of election contestants) or non-partisan (usually done by civil society groups). Legislations of different countries permit various forms and extents of international and domestic election observation.[citation needed]

Election observation is also prescribed by various international legal instruments. For example, paragraph 8 of the 1990 Copenhagen Document states that "The [OSCE] participating States consider that the presence of observers, both foreign and domestic, can enhance the electoral process for States in which elections are taking place. They, therefore, invite observers from any other CSCE participating States and any appropriate private institutions and organisations who may wish to do so to observe the course of their national election proceedings, to the extent permitted by law. They will also endeavour to facilitate similar access for election proceedings held below the national level. Such observers will undertake not to interfere in the electoral proceedings".[citation needed]

Critics note that observers cannot spot certain types of election fraud like targetedvoter suppressionor manipulated software ofvoting machines.[citation needed]

Statistical indicators and election forensics

[edit]

Various forms ofstatisticscan be indicators of election fraud—e.g.,exit pollswhich diverge from the final results. Well-conducted exit polls serve as a deterrent to electoral fraud. However, exit polls are still notoriously imprecise. For instance, in the Czech Republic, some voters are afraid or ashamed to admit that they voted for the Communist Party (exit polls in 2002 gave the Communist party 2–3 percentage points less than the actual result). Variations in willingness to participate in an exit poll may result in an unrepresentative sample compared to the overall voting population.[citation needed]

When elections are marred by ballot-box stuffing (e.g., the Armenian presidential elections of 1996 and 1998), the affected polling stations will show abnormally high voter turnouts with results favouring a single candidate. By graphing the number of votes against turnout percentage (i.e., aggregating polling stations results within a given turnout range), the divergence from bell-curve distribution gives an indication of the extent of the fraud. Stuffing votes in favour of a single candidate affects votes vs. turnout distributions for that candidate and other candidates differently; this difference could be used to quantitatively assess the number of votes stuffed. Also, these distributions sometimes exhibit spikes at round-number turnout percentage values.[115][116][117]High numbers of invalid ballots, overvoting or undervoting are other potential indicators.Risk-limiting auditsare methods to assess the validity of an election result statistically without the effort of a fullelection recount.

Though electionforensicscan determine if election results are anomalous, the statistical results still need to be interpreted. Alan Hicken and Walter R. Mebane describe the results of election forensic analyses as not providing "definitive proof" of fraud. Election forensics can be combined with other fraud detection and prevention strategies, such as in-person monitoring.[118]

Voting machine integrity

[edit]

One method for verifyingvoting machineaccuracy is 'parallel testing', the process of using an independent set of results compared to the original machine results. Parallel testing can be done prior to or during an election. During an election, one form of parallel testing is thevoter-verified paper audit trail(VVPAT) or verified paper record (VPR). A VVPAT is intended as an independent verification system for voting machines designed to allow voters to verify that their vote was cast correctly, to detect possible election fraud or malfunction, and to provide a means to audit the stored electronic results. This method is only effective ifstatistically significantnumbers of voters verify that their intended vote matches both the electronic and paper votes.[citation needed]

On election day, a statistically significant number of voting machines can be randomly selected from polling locations and used for testing. This can be used to detect potential fraud or malfunction unless manipulated software would only start to cheat after a certain event like a voter pressing a special key combination (Or a machine might cheat only if someone does not perform the combination, which requires more insider access but fewer voters).[citation needed]

Another form of testing is 'Logic & Accuracy Testing (L&A)', pre-election testing of voting machines using test votes to determine if they are functioning correctly.[citation needed]

Open source

[edit]

Another method to ensure the integrity of electronic voting machines is independentsoftware verificationandcertification.[114]Once a software is certified, code signing can ensure the software certified is identical to that which is used on election day. Some argue certification would be more effective if voting machine software was publicly available oropen source.[119][120]VotingWorkshas created anopen-source voting systemin the United States.[121]

Certification and testing processes conducted publicly and with oversight from interested parties can promote transparency in the election process. The integrity of those conducting testing can be questioned.[citation needed]

Testing and certification can prevent voting machines from being ablack boxwhere voters cannot be sure that counting inside is done as intended.[114]

One method that people have argued would help prevent these machines from being tampered with would be for the companies that produce the machines to share the source code, which displays and captures the ballots, with computer scientists. This would allow external sources to make sure that the machines are working correctly.[65]

See also

[edit]

Further reading

[edit]

General

[edit]
  • Simpser, Alberto.Why Governments and Parties Manipulate Elections: Theory, Practice, and Implications(Cambridge University Press, 2013)
  • Schaffer, Frederic Charles.The hidden costs of clean election reform(Cornell University Press, 2008)
  • Lehoucq, Fabrice. "Electoral fraud: Causes, types, and consequences".Annual review of political science(2003) 6#1 pp. 233–256.

Latin America

[edit]
  • Posada-Carbó, Eduardo. "Electoral Juggling: A Comparative History of the Corruption of Suffrage in Latin America, 1830–1930".Journal of Latin American Studies(2000). pp. 611–644.
  • Silva, Marcos Fernandes da. "The political economy of corruption in Brazil".Revista de Administração de Empresas(1999) 39#3 pp. 26–41.
  • Molina, Iván and Fabrice Lehoucq. "Political Competition and Electoral Fraud: A Latin American Case Study",Journal of Interdisciplinary History(1999) 30#2 pp. 199–234[122]

Russia

[edit]

United Kingdom

[edit]
  • Harling, Philip. "Rethinking" Old Corruption ",Past & Present(1995) No. 147 pp. 127–158[123]
  • O'Gorman, Frank.Voters, Patrons and Parties: The Unreformed Electoral System of Hanoverian England, 1734–1832(Oxford, 1989).
  • O'Leary, Cornelius.The elimination of corrupt practices in British elections, 1868–1911(Clarendon Press, 1962)

United States

[edit]
  • Campbell, Tracy (2005).Deliver the Vote: A History of Election Fraud, An American Political Tradition, 1742–2004.Basic Books.ISBN978-0-78-671591-6.
  • Fackler, Tim; Lin, Tse-min (1995).Political Corruption and Presidential Elections, 1929–1992(PDF).Vol. 57. Journal of Politics. pp. 971–973. Archived fromthe original(PDF)on 2016-03-04.Retrieved2015-05-29.
  • Summers, Mark Wahlgren (1993).The Era of Good Stealings.Oxford University Press.ISBN978-0-19-507503-8.
  • Argersinger, Peter H. (1986). "New Perspectives on Election Fraud in the Gilded Age".Political Science Quarterly.100(4). The Academy of Political Science: 669–687.doi:10.2307/2151546.JSTOR2151546.S2CID156214317.

References

[edit]
  1. ^"The Myth of Voter Fraud".Brennan Center for Justice.Archivedfrom the original on 2019-09-27.Retrieved2020-11-07.
  2. ^Jones, Douglas (2005-10-07)."Threats to Voting Systems".University of Iowa.Archivedfrom the original on 2020-09-30.Retrieved2020-06-25.
    • also atJones, Douglas (2005-10-07)."An Expanded Threat Taxonomy".National Institute of Standards and Technology. pp. 178–179.Archived(PDF)from the original on 2021-01-15.Retrieved2020-06-23.
  3. ^abMyagkov, Mikhail G.; Peter C. Ordeshook; Dimitri Shakin (2009).The Forensics of Election Fraud: Russia and Ukraine.Cambridge University Press.ISBN978-0-521-76470-4.
  4. ^Alvarez, Michael; Hall, Thad; Hyde, Susan (2008).Election Fraud: Detecting and Deterring Electoral Manipulation.Brookings Institution Press.ISBN978-0-81-570138-5.
  5. ^Dawn Brancati. 2016.Democracy Protests: Origins, Features, and Significance.New York: Cambridge University Press.ISBN978-1107137738[page needed]
  6. ^"Article L113 - Code électoral".legifrance.gouv.fr.Retrieved2023-02-07.
  7. ^"NVRI Files Amicus Brief in Federal Court Regarding Felon Disenfranchisement".National Voting Rights Institute.January 31, 2005. Archived from the original on November 11, 2007.{{cite web}}:CS1 maint: unfit URL (link)
  8. ^Williamson, Chilton (1968).American Suffrage from Property to Democracy.Princeton, NJ: Princeton U. Press.ASINB000FMPMK6.
  9. ^Saltman, Roy G. (January 2006).The History and Politics of Voting Technology.Palgrave Macmillan.ISBN1-4039-6392-4.Archivedfrom the original on 2009-12-14.Retrieved2006-07-04.
  10. ^House of Lords,Judgments - Magill v. Porter Magill v. Weeks,13 December 2001, accessed 3 October 2022
  11. ^Sadiq, Kamal (2005)."When States Prefer Non-Citizens Over Citizens: Conflict Over Illegal Immigration into Malaysia"(PDF).International Studies Quarterly.49:101–22.doi:10.1111/j.0020-8833.2005.00336.x.Archived fromthe original(PDF)on 2008-06-14.Retrieved2008-04-23.
  12. ^Young, Toby (17 June 2015)."Why Tories should join Labour and back Jeremy Corbyn".The Daily Telegraph.Archivedfrom the original on 24 April 2018.Retrieved5 April2018.
  13. ^ab"Labour's response to #ToriesForCorbyn shows they really have lost the plot – Coffee House".24 June 2015.Archivedfrom the original on 28 August 2017.Retrieved15 January2021.
  14. ^Bazelon, Emily (2018-09-26)."Will Florida's Ex-Felons Finally Regain the Right to Vote?".The New York Times.ISSN0362-4331.Archivedfrom the original on 2020-01-04.Retrieved2018-12-04.
  15. ^Magaloni, Beatriz."Autocratic Elections, Voters, and the Game of Fraud"(PDF).Yale Macmillan Center.Archived(PDF)from the original on 22 December 2015.Retrieved10 December2015.
  16. ^Poundstone, William (2009).Gaming the Vote: Why Elections Aren't Fair (And What We Can Do About It).Macmillan. p. 170.ISBN978-0-8090-4892-2.Archivedfrom the original on 2021-01-15.Retrieved2020-10-24.
  17. ^Bialik, Carl (May 14, 2011)."Latest Issue on the Ballot: How to Hold a Vote".The Wall Street Journal.Archivedfrom the original on July 23, 2015.RetrievedJune 29,2012.
  18. ^Davis, Wynne (November 4, 2022)."What is voter intimidation and how concerned should you be?".NPR.
  19. ^"Did bomb threat stifle vote? (Capital Times)".Madison.com. Archived fromthe originalon March 4, 2009.Retrieved2012-05-03.
  20. ^Sullivan, Joseph F. (1993-11-13)."Florio's Defeat Revives Memories of G.O.P. Activities in 1981".The New York Times.Archivedfrom the original on 2009-03-07.Retrieved2008-10-07.
  21. ^ab[1]ArchivedOctober 26, 2006, at theWayback Machine
  22. ^"Intimidation and Deceptive Practices EP365".Archived fromthe originalon 2008-01-21.Retrieved2018-04-23.
  23. ^"Incidents Of Voter Intimidation & Suppression".2006-11-08. Archived fromthe originalon April 4, 2007.Retrieved2012-05-03.
  24. ^Sullivan, Joseph F. (November 13, 1993)."Florio's Defeat Revives Memories of G.O.P. Activities in 1981".The New York Times.Archivedfrom the original on October 6, 2020.RetrievedNovember 1,2020.
  25. ^Frye, Timothy; Reuter, Ora John; Szakonyi, David (2019). "Hitting Them With Carrots: Voter Intimidation and Vote Buying in Russia".British Journal of Political Science.49(3): 857–881.doi:10.1017/S0007123416000752.ISSN0007-1234.
  26. ^Yourish, Karen; Smart, Charlie (May 24, 2024)."Trump's Pattern of Sowing Election Doubt Intensifies in 2024".The New York Times.Archivedfrom the original on May 24, 2024.
  27. ^Church Report (Covert Action in Chile 1963–1973)Archived2009-09-11 at theWayback Machine,United States SenateChurch Committee,1975
  28. ^"Fraudulent election calls traced to Racknine Inc., an Edmonton firm with Tory links".National Post.2012-02-23.Archivedfrom the original on 2020-03-26.Retrieved2012-05-03.
  29. ^"2 conservatives accused in hoax robocall scheme plead guilty".Associated Press.2022-10-24.Archivedfrom the original on 2022-10-29.
  30. ^"Mail-in voting became much more common in 2020 primaries as COVID-19 spread".Pew Research Center study published.2022-10-24.Archivedfrom the original on 2022-10-31.
  31. ^"Conspiracy theorist Jacob Wohl pleads guilty to felony over 2020 election robocalls".The Independent (US Edition).2022-10-25.Archivedfrom the original on 2022-10-25.
  32. ^"Section 2913.05 - Ohio Revised Code | Ohio Laws".
  33. ^"Conservative activists plead guilty in 2020 election robocall fraud".CNN.2022-10-25.Archivedfrom the original on 2022-11-02.
  34. ^"Lynne Rienner Publishers – Elections for Sale The Causes and Consequences of Vote Buying".rienner.com.Archivedfrom the original on 2021-01-15.Retrieved2018-04-22.
  35. ^[2]ArchivedOctober 21, 2006, at theWayback Machine
  36. ^Lacayo, Richard."Florida recount: In the eye of the storm".CNN. Archived fromthe originalon 2011-06-22.
  37. ^"Sidolagda valsedlar inget lagbrott".sr.se.Archived fromthe originalon 2009-06-15.
  38. ^Hicks, Jonathon (July 24, 2004)."Seeing Double on Ballot: Similar Names Sow Confusion".The New York Times.Archived fromthe originalon 2009-03-04.Retrieved18 December2008.
  39. ^"Political".The Queenslander.National Library of Australia. 3 November 1883. p. 721.Retrieved13 January2015.
  40. ^"Herberton".The Northern Miner.Charters Towers, Qld.: National Library of Australia. 6 November 1883. p. 2.Retrieved13 January2015.
  41. ^"Colonial Telegrams [From Our Own Corresponden.] Queensland".The Morning Bulletin.Rockhampton, Qld.: National Library of Australia. 18 December 1883. p. 3.Retrieved13 January2015.
  42. ^"Telegraphic Intelligence".The Northern Miner.Charters Towers, Qld.: National Library of Australia. 5 March 1884. p. 2.Retrieved14 January2015.
  43. ^Hoffman, Ian (1 November 2006)."Button on e-voting machine allows multiple votes".East Bay Times.Retrieved17 May2021.
  44. ^Hickins, Michael (3 November 2006)."A little yellow button on the back of Sequoia voting machines provides a manual override that lets a single person vote multiple times".InternetNews.com.Retrieved17 May2021.
  45. ^Coll, Steve(2019).Directorate S: The C.I.A. and America's Secret Wars in Afghanistan and Pakistan.Penguin Group.pp. 649–650.ISBN9780143132509.
  46. ^Bodner, Matthew (March 19, 2018)."Analysis | Videos online show blatant ballot-stuffing in Russia".The Washington Post.Archivedfrom the original on July 13, 2020.RetrievedJuly 6,2020.
  47. ^abRovell, Darren (June 26, 2001)."Cyber-stuffing remains threat to All-Star voting".ESPN.com.ESPN.RetrievedMay 7,2021.
  48. ^"MLB says it has canceled as many as 65 million All-Star ballots | MLB | Sporting News".Archived fromthe originalon 2015-10-25.
  49. ^"Malawi anxiously awaits verdict on alleged presidential election fraud".Radio France Internationale. 3 February 2020.Archivedfrom the original on 3 February 2020.Retrieved3 February2020.
  50. ^"Malawi top court annuls presidential election results".Al Jazeera.Archivedfrom the original on 4 February 2020.Retrieved3 February2020.
  51. ^"2 CCR 20983(c)(6)"(PDF).California Secretary of State. 2020-10-01.Archived(PDF)from the original on 2020-10-09.Retrieved2020-10-05.
  52. ^Freed, Benjamin (2019-01-07)."South Carolina voting machines miscounted hundreds of ballots, report finds".Archivedfrom the original on 2020-02-05.Retrieved2020-02-05.
  53. ^Buell, Duncan (2018-12-23).Analysis of the Election Data from the 6 November 2018 General Election in South Carolina(PDF)(Report).Archived(PDF)from the original on 2019-02-24.Retrieved2020-02-05.
  54. ^McDaniel; et al. (2007-12-07).Everest: Evaluation and Validation of Election-Related Equipment, Standards and Testing(PDF)(Report).Archived(PDF)from the original on 2019-07-15.Retrieved2020-02-05.
  55. ^"Row over Alzheimer woman's proxy".BBC News.2005-05-04. Archived fromthe originalon 19 April 2016.Retrieved13 November2018.
  56. ^Etehad, Melissa (23 June 2016)."Pencil or pen? An unusual conspiracy theory grips Brexit vote".Washington Post.Retrieved12 July2021.
  57. ^Open access iconDobreva, Diyana; Grinnell, Daniel; Innes, Martin (6 May 2019)."Prophets and Loss: How 'Soft Facts' on Social Media Influenced the Brexit Campaign and Social Reactions to the Murder of Jo Cox MP".Policy & Internet.12(2): 144–164.doi:10.1002/poi3.203.
  58. ^"Threat Analyses & Papers".National Institute of Standards and Technology.October 7, 2005. Archived fromthe originalon 21 October 2006.Retrieved5 March2011.
  59. ^Jaikumar Vijayan (2011-09-28)."Argonne researchers 'hack' Diebold e-voting system".Computerworld.Archivedfrom the original on 2012-05-09.Retrieved2012-05-03.
  60. ^Layton, J. (2006-09-22)."How can someone tamper with an electronic voting machine".Archivedfrom the original on 2011-07-12.Retrieved2011-02-27.
  61. ^"Security Analysis of the Diebold AccuVote-TS Voting Machine"(PDF).Jhalderm.com.Archived(PDF)from the original on 2015-02-05.Retrieved2015-05-29.
  62. ^abGonggrijp, Rop; Hengeveld, Willem-Jan; Bogk, Andreas; Engling, Dirk; Mehnert, Hannes; Rieger, Frank; Scheffers, Pascal; Wels, Barry (October 6, 2006)."Nedap/Groenendaal ES3B voting computer a security analysis"(PDF).The We do not trust voting computers foundation.Netherlands.Archived(PDF)from the original on October 17, 2006.RetrievedFebruary 17,2012.
  63. ^"Problems in test run for voting".Miami Herald.October 31, 2006.[dead link]
  64. ^abBonsor and Strickland, Kevin and Jonathan (2007-03-12)."How E-Voting Works".Archivedfrom the original on 2011-07-12.Retrieved2011-02-27.
  65. ^Kohno, T."Analysis of Electronic Voting System"(PDF).Archived(PDF)from the original on 2021-01-15.Retrieved2011-02-27.
  66. ^""Man in the Middle" Attacks to Subvert the Vote ".Electiondefensealliance.org. Archived fromthe originalon 2015-07-21.Retrieved2015-05-29.
  67. ^"Excerpt from Birth: The Conspiracy to Stop the '94 Election by Peter Harris".Penguin SA @ Sunday Times Books.2010-10-25.Retrieved2020-02-03.
  68. ^Harris, Peter (2010).Birth: The Conspiracy to Stop the '94 Election(1st ed.). Cape Town: Umuzi.ISBN978-1-4152-0102-2.OCLC683401576.
  69. ^Laing, Aislinn (2010-10-24)."Election won by Mandela 'rigged by opposition'".The Daily Telegraph.ISSN0307-1235.Archivedfrom the original on 2020-02-03.Retrieved2020-02-03.
  70. ^Clayton, Mark (2014-06-17)."Ukraine election narrowly avoided 'wanton destruction' from hackers".The Christian Science Monitor.ISSN0882-7729.Archivedfrom the original on 2020-10-13.Retrieved2020-02-03.
  71. ^"Trump's lawyer alleges voter fraud in 'big cities', says loss in Pennsylvania 'statistically impossible'".Hindustan Times.19 November 2020.Archivedfrom the original on 2020-11-19.Retrieved2020-11-19.
  72. ^"Trump claims without evidence that mail voting leads to cheating: A guide to facts on absentee ballots".Yahoo News.22 June 2020.Retrieved2021-06-16.
  73. ^Conradis, Brandon (2020-12-01)."Barr says DOJ hasn't uncovered widespread voter fraud in 2020 election".The Hill.Archivedfrom the original on 2020-12-01.Retrieved2020-12-01.
  74. ^"US election security officials reject Trump's fraud claims".BBC News.13 November 2020.Archivedfrom the original on 2020-11-13.Retrieved2020-11-14.
  75. ^James, Toby S.; Clark, Alistair (2020)."Electoral integrity, voter fraud and voter ID in polling stations: Lessons from English local elections".Policy Studies.41(2–3): 190–209.doi:10.1080/01442872.2019.1694656.S2CID214322870.
  76. ^"Voter fraud measures announced in the Queen's speech".May 14, 2021.
  77. ^Mayer, Jane (29 October 2012)."The Voter-Fraud Myth".The New Yorker.Archivedfrom the original on 6 January 2016.Retrieved9 December2015.
  78. ^Rober Barnes (August 1, 2016)."Federal judge blocks N. Dakota's voter-ID law, calling it unfair to Native Americans".The Washington Post.Archivedfrom the original on 2016-08-02.Retrieved2016-08-02.
  79. ^James Pindell (1 June 2018)."N.H. says once and for all that no one was bused in to vote".The Boston Globe.Archived fromthe originalon 26 October 2018.Retrieved26 October2018.
  80. ^"Now we know how bad voter fraud is in North Carolina | Charlotte Observer".Archivedfrom the original on 2018-06-28.Retrieved2018-06-28.
  81. ^"North Carolina State Board of Elections"(PDF)(Press release). April 21, 2017. Archived fromthe original(PDF)on April 25, 2017.RetrievedJune 28,2018.
  82. ^"Who Can Vote?".A News21 2012 National Project.Archivedfrom the original on 2020-06-05.Retrieved2020-06-12.
  83. ^Kahn, Natasha and Corbin Carson."Investigation: election day fraud 'virtually nonexistent'".The Philadelphia Inquirer.Archivedfrom the original on 2020-06-15.Retrieved2020-06-15.
  84. ^abcdePickles, Eric (2016-08-11)."Securing the ballot, Report of Sir Eric Pickles' review into electoral fraud"(PDF).United Kingdom Government.Archived(PDF)from the original on 2020-08-17.Retrieved2020-06-15.
  85. ^Young, Ashley (2016-09-23)."A Complete Guide To Early And Absentee Voting".Archivedfrom the original on 2020-12-01.Retrieved2020-06-15.
  86. ^McReynolds, Amber; Stewart III, Charles (April 28, 2020)."Opinion: Let's put the vote-by-mail 'fraud' myth to rest".The Hill.
  87. ^Journal, Glenn R. Simpson and Evan Perez (2000-12-19)."'Brokers' Exploit Absentee Voters; Elderly Are Top Targets for Fraud ".The Wall Street Journal.ISSN0099-9660.Archivedfrom the original on 2020-06-12.Retrieved2020-06-12.
  88. ^Bender, William."Nursing home resident's son: 'That's voter fraud'".Archivedfrom the original on 2020-06-13.Retrieved2020-06-12.
  89. ^"Judge upholds vote-rigging claims".BBC News.2005-04-04.Archivedfrom the original on 2019-10-01.Retrieved2010-09-19.
  90. ^Robertson, Gary D. (2020-04-22)."North Carolina ballot probe defendant now faces federal charges".Times-News.Archivedfrom the original on 2020-07-18.Retrieved2020-06-27.
  91. ^Mazzei, Patricia (2016-10-28)."Two women busted for election fraud in Miami-Dade in 2016".Miami Herald.Archivedfrom the original on 2020-06-02.Retrieved2020-06-12.
  92. ^"Judge hears testimony in Hawkins case".Archivedfrom the original on 2020-06-13.Retrieved2020-06-12.
  93. ^ab"Signature Verification and Mail Ballots: Guaranteeing Access While Preserving Integrity"(PDF).Stanford University. 2020-04-15. Archived fromthe original(PDF)on 2020-04-18.Retrieved2020-06-01.
  94. ^"Vote at Home Policy Actions: 1 and 2 Stars"(PDF).National Vote at Home Institute.May 2020.Archived(PDF)from the original on 2020-06-06.Retrieved2020-06-18.
  95. ^Sita, Jodi; Found, Bryan; Rogers, Douglas K. (September 2002)."Forensic Handwriting Examiners' Expertise for Signature Comparison".Journal of Forensic Sciences.47(5): 1117–1124.doi:10.1520/JFS15521J.ISSN0022-1198.PMID12353558.Archivedfrom the original on 2021-01-15.Retrieved2020-06-27.
  96. ^abSmith, Daniel (2018-09-18)."Vote-By-Mail Ballots Cast in Florida"(PDF).ACLU Florida.Archived(PDF)from the original on 2020-12-02.Retrieved2020-06-01.
  97. ^Wilkie, Jordan (2018-10-12)."Exclusive: High Rate of Absentee Ballot Rejection Reeks of Voter Suppression".Who What Why.Archivedfrom the original on 2020-06-17.Retrieved2020-06-18.
  98. ^Sherman, Amy (2020-12-07)."Do states verify U.S. citizenship as a condition for voting?".Austin American-Statesman.Retrieved2024-04-21.
  99. ^Waldman, Michael; Karson, Kendall; Waldman, Michael; Singh, Jasleen; Karson, Kendall (2024-04-12)."Here's Why".Brennan Center for Justice.Retrieved2024-04-21.
  100. ^Parks, Miles (2024-04-12)."Republicans aim to stop noncitizen voting in federal elections. It's already illegal".NPR.Retrieved2024-04-21.
  101. ^Kessler, Glenn (2024-03-06)."The truth about noncitizen voting in federal elections".Washington Post.Retrieved2024-04-21.
  102. ^"Is" Ghost "Voting Acceptable?".Writ.lp.findlaw.com. 2004-04-08.Archivedfrom the original on 2012-03-15.Retrieved2012-05-03.
  103. ^"Federal Prosecution of Election Offenses Eighth Edition".United States Department of Justice.December 2017.Archivedfrom the original on October 12, 2020.Retrieved2019-07-13.
  104. ^"Federal Prosecution of Election Offenses".votewell.net.Archivedfrom the original on 2019-07-13.Retrieved2019-07-13.
  105. ^"Sentencing Table"(PDF).US Sentencing Commission.2011.Archived(PDF)from the original on 2020-02-20.Retrieved2019-07-13.
  106. ^"2018 Chapter 2 Part C, section 2C1.1".United States Sentencing Commission. 2018-06-27.Archivedfrom the original on 2019-07-13.Retrieved2019-07-13.
  107. ^WKYT."Ex-judge convicted of vote fraud in Clay County disbarred".Archivedfrom the original on 2019-07-13.Retrieved2019-07-13.
  108. ^Jeannette I. Andrade (2011-11-18)."Electoral sabotage case filed vs Arroyo, Ampatuan, Bedol".Philippine Daily Inquirer.Archivedfrom the original on 2018-05-19.Retrieved2018-05-18.
  109. ^"Should secret voting be mandatory? 'Yes' say political scientists".26 October 2020.Retrieved2021-04-20.
  110. ^"Scrap the" secret "ballot – return to open voting".Archivedfrom the original on 2016-08-07.Retrieved2016-07-16.
  111. ^Todd Davies."Consequences of the Secret Ballot"(PDF).Symbolic Systems Program, Stanford University.Archived(PDF)from the original on 2016-10-11.Retrieved2016-07-16.
  112. ^"Abolish the Secret Ballot".The Atlantic.Archivedfrom the original on 2017-03-12.Retrieved2017-03-06.
  113. ^abcLundin, Leigh (2008-08-17)."Dangerous Ideas".Voting Fiasco, Part 279.236(a).Criminal Brief.Archivedfrom the original on 2012-10-24.Retrieved2010-10-07.
  114. ^"podmoskovnik: Cтатья о выборах из Троицкого Варианта".Podmoskovnik.livejournal.com.Archivedfrom the original on 2016-09-30.Retrieved2015-05-29.
  115. ^"Статистическое исследование результатов российских выборов 2007–2009 гг.: Троицкий вариант – Наука".Trvscience.ru. 2009-10-27. Archived fromthe originalon 2013-04-23.Retrieved2015-05-29.
  116. ^Walter R. Mebane, Jr.; Kirill Kalinin."Comparative Election Fraud Detection"(PDF).Personal.umich.edu.Archived(PDF)from the original on 2015-02-05.Retrieved2015-05-29.
  117. ^Hicken, Allen; Mebane, Walter R. (2017).A Guide to Elections Forensics(PDF)(Report). University of Michigan Center for Political Studies.Archived(PDF)from the original on 2019-06-26.Retrieved2020-08-10.
  118. ^Wofford, Ben (June 25, 2021)."One Man's Quest to Break Open the Secretive World of American Voting Machines".POLITICO.Retrieved 2022-12-09.
  119. ^O'Neill, Patrick Howell (December 16, 2020)."The key to future election security starts with a roll of the dice".MIT Technology Review.Retrieved2022-12-09.
  120. ^Huseman, Jessica (November 12, 2019)."The Way America Votes Is Broken. In One Rural County, a Nonprofit Showed a Way Forward".ProPublica.Retrieved2022-12-09.
  121. ^"Political Competition and Electoral Fraud: A Latin American Case Study"(PDF).Libres.uncg.edu.Archived(PDF)from the original on 2014-02-21.Retrieved2015-05-29.
  122. ^Philip Harling (May 1995). "Rethinking 'Old Corruption'".Past & Present(147).Oxford University Press:127–158.doi:10.1093/past/147.1.127.JSTOR651042.
[edit]