Electoral fraud
















Electoral fraud, sometimes referred to as election manipulation or vote rigging, is illegal interference with the process of an election, either by increasing the vote share of the favored candidate, depressing the vote share of the rival candidates, or both. What exactly constitutes electoral fraud varies from country to country.


Many kinds of election fraud are outlawed in electoral legislation, but others are in violation of general laws, such as those banning assault, harassment or libel. Although technically the term 'electoral fraud' covers only those acts which are illegal, the term is sometimes used to describe acts which are legal, but considered morally unacceptable, outside the spirit of an election or in violation of the principles of democracy.[1][2]Show elections, containing only one candidate, are sometimes classified as electoral fraud, although they may comply with the law and are presented more as referendums.


In national elections, successful electoral fraud can have the effect of a coup d'état or corruption of democracy. In a narrow election, a small amount of fraud may be enough to change the result. Even if the outcome is not affected, the revelation of fraud can have a damaging effect, if not punished, as it can reduce voters' confidence in democracy.




Contents






  • 1 Specific methods


    • 1.1 Electorate manipulation


      • 1.1.1 Manipulation of demography


      • 1.1.2 Disenfranchisement


      • 1.1.3 Division of opposition support




    • 1.2 Intimidation


    • 1.3 Vote buying


      • 1.3.1 Examples


        • 1.3.1.1 Latin America


          • 1.3.1.1.1 Argentina


          • 1.3.1.1.2 Mexico




        • 1.3.1.2 Africa


          • 1.3.1.2.1 Nigeria


          • 1.3.1.2.2 Kenya






      • 1.3.2 Considerations


        • 1.3.2.1 Who to target


        • 1.3.2.2 How to monitor




      • 1.3.3 Consequences




    • 1.4 Turnout buying


      • 1.4.1 Examples


        • 1.4.1.1 United States




      • 1.4.2 Argentina


      • 1.4.3 Advantages


      • 1.4.4 Disadvantages




    • 1.5 Disinformation


    • 1.6 Misleading or confusing ballot papers


    • 1.7 Ballot stuffing


    • 1.8 Misrecording of votes


    • 1.9 Misuse of proxy votes


    • 1.10 Destruction or invalidation of ballots


    • 1.11 Tampering with electronic voting machines


    • 1.12 Voter impersonation


      • 1.12.1 United States




    • 1.13 Artificial results




  • 2 Vote fraud in legislature


  • 3 Prevention


    • 3.1 Mores


    • 3.2 Secret ballot


    • 3.3 Transparency


    • 3.4 Statistical indicators


    • 3.5 Prosecution


    • 3.6 Voting machine integrity




  • 4 Notable United States legislation


    • 4.1 Help America Vote Act


    • 4.2 Voting Rights Act of 1965


    • 4.3 Civil Rights Act of 1964




  • 5 See also


  • 6 Further reading


    • 6.1 General


    • 6.2 Australia


    • 6.3 Canada


    • 6.4 France


    • 6.5 Germany


    • 6.6 United Kingdom


    • 6.7 Latin America


    • 6.8 Turkey


    • 6.9 United States




  • 7 References


  • 8 External links





Specific methods




























A list of threats to voting systems, or electoral fraud methods considered as sabotage are kept by the National Institute of Standards and Technology.[3]



Electorate manipulation


Electoral fraud can occur in advance of voting if the composition of the electorate is altered. The legality of this type of manipulation varies across jurisdictions. Deliberate manipulation of election outcomes is widely considered a violation of the principles of democracy.[4]



Manipulation of demography


In many cases, it is possible for authorities to artificially control the composition of an electorate in order to produce a foregone result. One way of doing this is to move a large number of voters into the electorate prior to an election, for example by temporarily assigning them land or lodging them in flophouses.[5][6] Many countries prevent this with rules stipulating that a voter must have lived in an electoral district for a minimum period (for example, six months) in order to be eligible to vote there. However, such laws can also be used for demographic manipulation as they tend to disenfranchise those with no fixed address, such as the homeless, travelers, Roma, students (studying full-time away from home), and some casual workers.


Another strategy is to permanently move people into an electoral district, usually through public housing. If people eligible for public housing are likely to vote for a particular party, then they can either be concentrated into one area, thus making their votes count for less, or moved into marginal electorates, where they may tip the balance towards their preferred party. One notable example of this occurred in the City of Westminster in England under Shirley Porter.[7]


Immigration law may also be used to manipulate electoral demography. For instance, Malaysia gave citizenship to immigrants from the neighboring Philippines and Indonesia, together with suffrage, in order for a political party to "dominate" the state of Sabah; this controversial process was known as Project IC.[8]


A method of manipulating primary contests and other elections of party leaders are related to this. People who support one party may temporarily join another party (or vote in a crossover way, when permitted) in order to elect a weak candidate for that party's leadership. The goal ultimately is to defeat the weak candidate in the general election by the leader of the party that the voter truly supports. There were claims that this method was being utilised in the UK Labour Party leadership election in 2015, where Conservative-leaning Toby Young encouraged Conservatives to join Labour and vote for Jeremy Corbyn in order to "consign Labour to electoral oblivion".[9][10] Shortly after, #ToriesForCorbyn trended on Twitter.[11]



Disenfranchisement


The composition of an electorate may also be altered by disenfranchising some classes of people, rendering them unable to vote. In some cases, states have passed provisions that raised general barriers to voter registration, such as poll taxes, literacy and comprehension tests, and record-keeping requirements, which in practice were applied against minority populations to discriminatory effect. From the turn of the century into the late 1960s, most African Americans in the southern states of the former Confederacy were disenfranchised by such measures. Corrupt election officials may misuse voting regulations such as a literacy test or requirement for proof of identity or address in such a way as to make it difficult or impossible for their targets to cast a vote. If such practices discriminate against a religious or ethnic group, they may so distort the political process that the political order becomes grossly unrepresentative, as in the post-Reconstruction or Jim Crow era until the Voting Rights Act of 1965. Felons have been disenfranchised in many states as a strategy to prevent African Americans from voting.[12]


Groups may also be disenfranchised by rules which make it impractical or impossible for them to cast a vote. For example, requiring people to vote within their electorate may disenfranchise serving military personnel, prison inmates, students, hospital patients or anyone else who cannot return to their homes.[example needed] Polling can be set for inconvenient days, such as midweek or on holy days of religious groups: for example on the Sabbath or other holy days of a religious group whose teachings determine that voting is a prohibited on such a day. Communities may also be effectively disenfranchised if polling places are situated in areas perceived by voters as unsafe, or are not provided within reasonable proximity (rural communities are especially vulnerable to this)[example needed].


In some cases, voters may be invalidly disenfranchised, which is true electoral fraud. For example, a legitimate voter may be “accidentally” removed from the electoral roll, making it difficult or impossible for the person to vote.


In the Canadian federal election of 1917, during the Great War, the Union government passed the Military Voters Act and the Wartime Elections Act. The Military Voters Act permitted any active military personnel to vote by party only and allowed that party to decide in which electoral district to place that vote. It also enfranchised those women who were directly related or married to an active soldier. These groups were believed to be disproportionately in favor of the Union government, as that party was campaigning in favor of conscription.[citation needed] The Wartime Elections Act, conversely, disenfranchised particular ethnic groups assumed to be disproportionately in favour of the opposition Liberal Party.[citation needed]



Division of opposition support


Stanford University professor Beatriz Magaloni described a model governing the behaviour of autocratic regimes. She proposed that ruling parties can maintain political control under a democratic system without actively manipulating votes or coercing the electorate. Under the right conditions, the democratic system is manouvered into an equilibrium in which divided opposition parties act as unwitting accomplices to single-party rule. This permits the ruling regime to abstain from illegal electoral fraud.[13]


Preferential voting systems such as score voting, instant-runoff voting, and single transferable vote are designed to prevent systemic electoral manipulation and political duopoly.[14][15]



Intimidation


Voter intimidation involves putting undue pressure on a voter or group of voters so that they will vote a particular way, or not at all. Absentee and other remote voting can be more open to some forms of intimidation as the voter does not have the protection and privacy of the polling location. Intimidation can take a range of forms including verbal, physical, or coercion. This was so common that in 1887, a Kansas Supreme Court in New Perspectives on Election Fraud in The Gilded Age said “[…] physical retaliation constituted only a slight disturbance and would not vitiate an election.”




  • Violence or the threat of violence: In its simplest form, voters from a particular demographic or known to support a particular party or candidate are directly threatened by supporters of another party or candidate or by those hired by them. In other cases, supporters of a particular party make it known that if a particular village or neighborhood is found to have voted the 'wrong' way, reprisals will be made against that community. Another method is to make a general threat of violence, for example, a bomb threat which has the effect of closing a particular polling place, thus making it difficult for people in that area to vote.[16] One notable example of outright violence was the 1984 Rajneeshee bioterror attack, where followers of Bhagwan Shree Rajneesh deliberately contaminated salad bars in The Dalles, Oregon, in an attempt to weaken political opposition during county elections.


  • Attacks on polling places: Polling places in an area known to support a particular party or candidate may be targeted for vandalism, destruction or threats, thus making it difficult or impossible for people in that area to vote.


  • Legal threats: In this case, voters will be made to believe, accurately or otherwise, that they are not legally entitled to vote, or that they are legally obliged to vote a particular way. Voters who are not confident about their entitlement to vote may also be intimidated by real or implied authority figures who suggest that those who vote when they are not entitled to will be imprisoned, deported or otherwise punished.[17][18] For example, in 2004, in Wisconsin and elsewhere voters allegedly received flyers that said, "If you already voted in any election this year, you can’t vote in the Presidential Election", implying that those who had voted in earlier primary elections were ineligible to vote. Also, "If anybody in your family has ever been found guilty of anything you can’t vote in the Presidential Election." Finally, "If you violate any of these laws, you can get 10 years in prison and your children will be taken away from you."[19][20] Another method, allegedly used in Cook County, Illinois in 2004, is to falsely tell particular people that they are not eligible to vote.[18]


  • Coercion: The demographic that controlled the voting ballot would try to persuade others to follow them. By singling out those who were against the majority, people would attempt to switch the voters' decision. Their argument could be that since the majority sides with a certain candidate, they should admit defeat and join the winning side. If this didn't work, this led to the threatening of violence seen countless times during elections. Coercion, electoral intimidation was seen in the Navy. In 1885 William C. Whitney started an investigation that involved the men in the Navy. As said by Whitney "the vote of the yard was practically coerced and controlled by the foremen. This instance shows how even in the Navy there were still instances of people going to great lengths for the desired elective to win.



Vote buying


Vote buying occurs when a political party or candidate seeks to buy the vote of a voter in an upcoming election. Vote buying can take various forms such as a monetary exchange, as well as an exchange for necessary goods or services.[21] This practice is often used to incentivise or persuade voters to turn out to elections and vote in a particular way. Despite the fact that this practice is illegal in many countries such as the United States, Argentina, Mexico, Kenya and Nigeria, its prevalence remains worldwide.


In some parts of the United States[which?] in the mid- and late 19th century, members of competing parties would vie, sometimes openly and other times with much greater secrecy, to buy and sell votes. Voters would be compensated with cash or the covering of one’s house/tax payment. To keep the practice of vote buying secret, parties would open fully staffed vote-buying shops.[22] Parties would also hire runners, who would go out into the public and find floating voters and bargain with them to vote for their side.[22]


In England, documentation and stories of vote buying and vote selling are also well known. The most famous episodes of vote buying came in 18th century England when two or more rich aristocrats spent whatever money it took to win. The notorious "Spendthrift election" came in Northamptonshire in 1768, when three earls spent over ₤100,000 each to win a seat.[23]


Voters may be given money or other rewards for voting in a particular way, or not voting. In some jurisdictions, the offer or giving of other rewards is referred to as "electoral treating".[24]
Electoral treating remains legal in some jurisdictions, such as in the Seneca Nation of Indians.[25]



Examples



Latin America


Argentina

Vote buying and the overall practice of clientelism is widespread in Argentina. One of the main perpetrators of these illegal activities were the Peronist party.[26] The relationship between voters and Peronist candidates are such that voters are offered particular goods, services, favours or monetary compensation in exchange for their political support for the party. These rewards could include a job, medicine, a roof, clothing, foods, and other goods or services. The case of Argentina in particular in that it relies heavily on face-to-face and day-to-day interactions between "brokers" who act as middlemen and voters.[27] Since many of the communities in Argentina are ridden with poverty and are in need of these particular resources, it is these communities that have proven to be the demographic that were targeted for voted buying. Additionally, vote buying in this region focuses on citizens who are not strongly in favour or opposed to the political machine, and whose political loyalty does not necessarily lie with one party or another.[28] In this way, vote buying acts as a mechanism to sway the decisions of weakly opposed voters. In a study done by Susan C. Stokes, she finds that the brokers in these communities are known to all the citizens and have access to the necessary resources from the municipality. They maintain relationships with the voters and grant them rewards and favours continuously in order to keep the party they work for in the office. This is one main explanation for why many lower-income voters are seen voting for populist leaders, as well as authoritarian ones.[28] Many citizens view these brokers as positive pillars in their lives and have the utmost respect for the help they distribute. However, others view them as hands of corruption. Stokes further explains that the capacity of these brokers is constrained due to the fact that they can only maintain this type of transactional relationship with a limited number of voters.[28] Furthermore, the brokers have the additional responsibility of maintaining trusting and solid relationships with their resource suppliers. Without these strong ties, they will have no means through which to carry out vote-buying practices.[27]



Mexico

Similarly to Argentina, it has been found that vote-buying in Mexico is most likely in rural and poor regions of the country.[29] There are many instances of vote buying that have occurred in the history of Mexican elections, however, there are two main instances of fund in the literature that occurred in the last two decades. The first was the 2006 Mexican election, where it was found that 8.8% of the population that was not a beneficiary of a specific social program was offered compensation for their vote.[30] Similarly, a corruption inquiry arrested Andrés Granier Melo for embezzlement of funds in the state of Tabasco during his governorship: among other things, some of these funds were used for vote-buying (although Melo has denied all accusations).[31]



Africa


Nigeria

On a self-reported survey that was conducted, 1 in 5 Nigerian has experienced an offer for their vote. The rewards offered by Nigerian politicians include money, commodities such as food and clothing, or a job.[32] Although the practice of vote buying is widespread, 58% of Nigerians surveyed at the time of the 2007 election viewed vote buying as immoral.[32] Despite this, when asked if they thought it was wrong to accept rewards or monetary compensation for your vote, 78% said no.[32] One factor that needs to be iterated when it comes to studies that are based on surveys is that since vote buying is illegal in most countries, a researcher’s ability to collect accurate data is hindered. This is because many citizens may not feel comfortable revealing their experience or involvement with corrupt activities, or fear that they will suffer repercussions from their governments for coming forward with such information.[32]



Kenya

Since the 1990s, Kenya has had regular multiparty elections in which vote buying has played a central role. In his article, scholar Eric Kramon states that: "According to the data gathered by the Coalition for Accountable Political Finance in Kenya, cash handouts to voters represents around 40% of the average parliamentary candidates’ campaign budget, making up the largest budget item."[33] These handouts are made in various ways including stops on the campaign trail, and at-large campaign rallies. "In the 2002 election, 40% of surveyed adult Kenyans reported having accepted a bribe in exchange for their vote, and 22% for the 2007 elections.”[33]


It is noted by Kramen that access to information is a huge factor in determining the success of vote buying in Kenya. If the voters have little access to political information or lack political knowledge then they are more likely to be swayed by clientelistic reasoning.[33] Moreover, if the voter does have access to information about an incumbent, then the price to sway their vote is more likely to go up. Additionally, Kramon notes that citizens of Kenya tend to value candidates who provide rewards because their ability to do so points to how great their abilities will be once they are in office.[33]



Considerations



Who to target

One of the main concerns with vote buying lies in the question of which population or group of voters are most likely to be susceptible to accepting compensation in exchange for their vote. Scholars such as Stokes argue that it is the weakly opposed voters are the best ones to target for vote buying.[28] This means that in a situation in which there are two parties running for office, for example, the voters who are not inclined to vote one way or the other are the best to target.
Other scholars argue that it is people of lower income status who are the best group to target, as they are the most likely to be receptive to monetary or other forms of compensation.[28] This has proven to be the case in both Argentina and Nigeria. Since the wealthy are presumably not in need of money, goods or services, it would require a much larger compensation in order to sway their vote. However, as seen in the case of Argentina for example, citizens who reside within poor communities are in great need of income, or medical services, for example, to feed their families and keep them in good health. With that being said, a much smaller sum of cash or a medical prescription would be of much greater value and thus their political support can be much easier to purchase.



How to monitor

The main concern of a person when engaging in vote buying for the party involved is how to ensure that the votes the unethical candidate are buying are being cast in his/her favor. For example, in Argentina as in many other representative democracies, there is a secret ballot that is used to cast votes.[28] In some cases, there have been instances of voter tickets, or monitoring by individuals.[26] Voters seeking to be compensated for their votes would use specially-provided voter ballots, or would fold their ballot in a particular way in order to indicate that they voted for the candidate they were paid to vote for. Monitoring could also include taking attendance at campaigns rallies, or keeping track of who took party transportation to voting booths.[34] Many scholars hold that this strategy of accountability works best in smaller communities as there is less anonymity, thus more incentive to vote as you are directed for fear of repercussion. Another strategy has been to invoke personalized social norms to make voters honor their contracts at the voting booth.[21] Such social norms could include personal obligation such as moral debts, social obligations to the buyers, or a threat of withholding or ceasing to produce necessary resources. This is made more effective when the rewards are delivered personally by the candidate or someone close to them, in order to create a sense of gratitude on behalf of the voters towards the candidate. A third strategy is informal sanctions. These are placed on voters who refuse material offers or who don’t vote as instructed. This type of sanction relies however on the ability to discern who voted as instructed and who did not.[21] This issue of monitoring is of ongoing concern for political parties, and new ways to do so are constantly being developed.



Consequences


There are several negative consequences that arise from the practice of vote buying. The presence of vote buying in democratic states poses a threat to democracy itself, as it interferes with the ability to rely on a popular vote as a measure of people's support for potential governments' policies.[35]


Another noted consequence is that the autonomy of voters is undermined. Since getting paid or receiving rewards for their votes generates a form of income that they may need to support themselves or their families, they have no autonomy to cast the vote that they truly want.[28] This is extremely problematic because if it is the most corrupt politicians who are engaging in vote buying, then it is their interests that remain the ones that dictate how the country is going to be run. This, in turn, perpetuates corruption in the system even further creating an unbreakable cycle.


Thirdly, vote buying can create a dependency of voters on the income or goods that they are receiving for their votes, and can further perpetuate a type of poverty trap.[36] If they are receiving medicine from their communities’ broker for example, if this tie is cut off then they may no longer have access to this necessity. It can be true that the broker in that community has no interest or incentive to actually increase the standards of living of the community members, as it is very possible that they are only interested in getting whatever share of the profit they are entitled to for working for the party.[37] Additionally, if the goods or money are coming directly from a candidate, this candidate’s only wish is to maintain their power. That being said, they may provide services but their real interest may lie in keeping the voters dependent on the rewards they are providing in order to stay in power.



Turnout buying


Turnout buying occurs when a political party or candidate offers citizens compensation in order for them to turn out to the election, but does not monitor who they voted for specifically.[38]



Examples



United States

According to research done by Nichter, the United States has seen its fair share of turnout buying in recent elections. During the 2004 election, five Democratic Party operatives in East St. Louis were convicted in federal court for offering cigarettes, beer, medicine and $5 to $10 reward to increase turnout of the poor.[26] One operative pleaded guilty and stated that if they didn’t provide rewards, "they" (the poor) wouldn’t come out. A local election in Oakland is another example. Campaign workers handed out thousands of coupons for free chicken dinners in an explicit and targeted effort to draw voters to the polls.[26]



Argentina


In Susan Stokes’ article on corruption in elections in Argentina, she describes the case as being an example in which vote buying is taking place. This is further discussed in the section in vote buying above (link) Although this case was originally thought of as vote buying, another scholar by the name of Nichter believes that it is, in fact, a case of turnout buying. Nichter simplifies Stokes’ original model that favors vote buying and finds that the populations who are actually being targeted in Argentina are in fact strong supporters of the party. This contradicts Stokes’ theory of weakly opposed voters being targeted and points to a situation of turnout buying instead.
[26]



Advantages


One advantage of turnout buying is that it has the potential to increase political participation. The practice of vote buying is extremely corrupt which only hurts the state of a democracy. However, Nichter argues that turnout buying is arguably less corrupt than vote buying.[26] Since it increases the likelihood of voter participation, we may see a more accurate representation of what the citizens want for their country’s politics. This could, in turn, enhance the quality of the country's democracy and the prevalence of the opinions and wishes of the voters. Since there is no direct monitoring of who an individual votes for, as long as they turn out to the voting booth then they will receive the compensation they were promised, but can still vote for whomever they desire.



Disadvantages


Although it is easier by far to monitor the turnout of an election over which votes were cast for which politicians, large problems still remain with turnout buying. Firstly, even though it has been said that turnout buying is less corrupt, this may not be the case. The practice of turnout buying, similarly to vote buying, can undermine voter autonomy. If a voter is given some type of compensation for turning out to an election to vote, this compensation and who it came from may play a part in who they vote for.[34] Since the poorer demographics are largely the ones being targeted by turnout buying, they are also more likely to accept the rewards. For example, if Candidate A paid Voter B to turn out to the upcoming federal election, they may feel a subconscious loyalty to Candidate A, and this may sway their vote even if they are more aligned with the ideologies and policy of Candidate B. Even though the compensation is simply given for turning out to the voting booths, the politicians or broker giving the compensation may still have an agenda which is made clear to the voter. Meaning that turnout buying could still be inadvertent vote buying.[26]


Many scholars[Like whom?] have noted that the capacity of the politicians to monitor their brokers is the means through which turnout buying becomes effective or not.[34] If the mechanisms put in place to monitor the turn out that the party has paid for aren’t effective enough, then there will be no way of knowing if their resources are generating the results they want.


As with vote buying, turnout buying undermines the legitimacy of democracy. Only the wealthiest of political parties have the resources to buy turnout from voters. This leaves less wealthy but potentially more qualified parties at a loss when it comes to competing in elections.



Disinformation


People may distribute false or misleading information in order to affect the outcome of an election.[1] For example, in the Chilean presidential election of 1970, the U.S. government's Central Intelligence Agency used "black propaganda"—materials purporting to be from various political parties—to sow discord between members of a coalition between socialists and communists.[39]


Another use of disinformation is to give voters incorrect information about the time or place of polling, thus causing them to miss their chance to vote. As part of the 2011 Canadian federal election voter suppression scandal, Elections Canada traced fraudulent phone calls, telling voters that their polling stations had been moved, to a telecommunications company that worked with the Conservative Party.[40]



Misleading or confusing ballot papers


Ballot papers may be used to discourage votes for a particular party or candidate, using the design or other features which confuse voters into voting for a different candidate. For example, in the 2000 U.S. presidential election, Florida's butterfly ballot paper was criticized as poorly designed, leading some voters to vote for the wrong candidate. While ballot was designed by a Democrat, it was the Democrat, Al Gore, who was most harmed by voter errors because of this design.[41] Poor or misleading design is usually not illegal and therefore not technically election fraud, but it can nevertheless subvert the principles of democracy.


Sweden has a system with separate ballots used for each party, to reduce confusion among candidates. However, ballots from small parties such as piratpartiet, junilistan and feministiskt initiativ have been omitted or placed on a separate table in the election to the EU parliament in 2009.[42] Ballots from Sweden Democrats have been mixed with ballots from the larger Swedish Social Democratic Party, which used a very similar font for the party name written on the top of the ballot.[citation needed]


Another method of confusing people into voting for a different candidate than intended is to run candidates or create political parties with similar names or symbols as an existing candidate or party. The goal is to mislead voters into voting for the false candidate or party to influence the results.[43] Such tactics may be particularly effective when a large proportion of voters have limited literacy in the language used on the ballot. Again, such tactics are usually not illegal but often work against the principles of democracy.


Another type of possible electoral confusion is multiple variations of voting by different electoral systems. This may cause ballots to be counted as invalid if the wrong system is used. For instance, if a voter puts a first-past-the-post cross in a numbered single transferable vote ballot paper, it is invalidated. For example, in Scotland and other parts of the United Kingdom, up to four different voting systems and types of ballots may be used, based on the jurisdictional level of elections for candidates. Local elections are determined by single transferable votes; Scottish parliamentary elections by the additional member system; national elections for the UK Parliament by first-past-the-post; and elections to the European Parliament by a party list system.



Ballot stuffing




Transparent ballot box used in Russia to prevent election officials from pre-stuffing the box with fake ballots.




A specialised ballot box used to assist ballot stuffing, featured in Frank Leslie's Illustrated Newspaper in 1856.


Ballot stuffing, or "ballot-box stuffing", is the illegal practice of one person submitting multiple ballots during a vote in which only one ballot per person is permitted.


Ballot stuffing is still possible with electronic machines. For example, a version of the Sequoia touchscreen voting machine has a yellow button on the back side that allows repeated voting. Pressing the button triggers two audible beeps to alert election observers about the illegal votes.[44]



  • In the 1883 election for the district of Cook, in Queensland, Australia, arrests were made in connection with accusations of ballot stuffing, and the election committee subsequently changed the result of the election.

  • The Major League Baseball All-Star Game has suffered from ballot stuffing more than once.

    • In 1957, Cincinnati Reds fans arranged for seven of the eight elected starting fielders to be Reds players.

    • In 1999, the online ballot was stuffed in favor of Nomar Garciaparra.

    • In 2015, Major League Baseball annulled 65 million (out of a total of 620 million) online ballots.



  • During election day of the 2018 Russian Presidential Election, there were multiple instances, some caught on camera, throughout Russia of voters and polling-staff alike stuffing multiple votes for incumbent President, Vladimir Putin in the ballot box.



Misrecording of votes


Many elections feature multiple opportunities for unscrupulous officials or 'helpers' to record an elector's vote differently from their intentions. Voters who require assistance to cast their votes are particularly vulnerable to having their votes stolen in this way. For example, a blind or illiterate person may be told that they have voted for one party when in fact they have been led to vote for another. This is similar to the misuse of proxy votes; however, in this case, the voter will be under the impression that they have voted with the assistance of the other person, rather than having the other person voting on their behalf.


Where votes are recorded through electronic or mechanical means, the voting machinery may be altered so that a vote intended for one candidate is recorded for another.



Misuse of proxy votes


Proxy voting is particularly vulnerable to election fraud, due to the amount of trust placed in the person who casts the vote. In several countries, there have been allegations of retirement home residents being asked to fill out 'absentee voter' forms. When the forms are signed and gathered, they are secretly rewritten as applications for proxy votes, naming party activists or their friends and relatives as the proxies. These people, unknown to the voter, cast the vote for the party of their choice. In the United Kingdom, this is known as 'granny farming.'[45]



Destruction or invalidation of ballots


One of the simplest methods of electoral fraud is to destroy ballots for an opposing candidate or party. While mass destruction of ballots can be difficult to execute without drawing attention, in a very close election, it may be possible to destroy a very small number of ballot papers without detection, thereby changing the overall result. Blatant destruction of ballot papers can render an election invalid and force it to be re-run. If a party can improve its vote on the re-run election, it can benefit from such destruction as long as it is not linked to it.


Another method is to make it appear that the voter has spoiled his or her ballot, thus rendering it invalid. Typically this would be done by adding another mark to the paper, making it appear that the voter has voted for more candidates than entitled, for instance. It would be difficult to do this to a large number of paper ballots without detection in some locales, but altogether too simple in others, especially jurisdictions where legitimate ballot spoiling by voter would serve a clear and reasonable aim. Examples may include emulating protest votes in jurisdictions that have recently had and since abolished a "none of the above" or "against all" voting option, civil disobedience where voting is mandatory, and attempts at discrediting or invalidating an election. An unusually large share of invalidated ballots may be attributed to loyal supporters of candidates that lost in primaries or previous rounds, did not run or did not qualify to do so, or some manner of protest movement or organized boycott.



Tampering with electronic voting machines


All voting systems face threats of some form of electoral fraud. The types of threats that affect voting machines vary.[46] Research at Argonne National Laboratories revealed that a single individual with physical access to a machine, such as a Diebold Accuvote TS, can install inexpensive, readily-available electronic components to manipulate its functions.[47][48]


Other examples include:



  • Tampering with the software of a voting machine to add malicious code that alters vote totals or favors a candidate in any way.

    • Multiple groups have demonstrated this possibility.[49][50][51]

    • Private companies manufacture these machines. Many companies will not allow public access or review of the machines source code, claiming fear of exposing trade secrets.[52]



  • Tampering with the hardware of the voting machine to alter vote totals or favor any candidate.[50]
    • Some of these machines require a smart card to activate the machine and vote. However, a fraudulent smart card could attempt to gain access to voting multiple times[53] or be pre-loaded with negative votes to favor one candidate over another, as has been demonstrated.


  • Abusing the administrative access to the machine by election officials might also allow individuals to vote multiple times.

  • Election results that are sent directly over the internet from a county count centre to the state count centre can be vulnerable to a man-in-the-middle attack, where they are diverted to an intermediate website where the man in the middle flips the votes in favour of a certain candidate and then immediately forwards them on to the state count centre. All votes sent over the internet violate the chain of custody and hence should be avoided by driving or flying memory cards in locked metal containers from county count centres to the state count centre. For purposes of getting quick preliminary statewide results on election night, encrypted votes can be sent over the internet, but final official results should be tabulated the next day only after the actual memory cards arrive in secure metal containers and are counted.[54]



Voter impersonation




United States


Some commentators, such as former Federal Election Commission member Hans von Spakovsky, have claimed that voter impersonation fraud, in which one person votes by impersonating another, eligible voter, is widespread, but documentation has been scarce and prosecutions rare. Numerous others, such as Professor Larry Sabato, and a variety of studies have shown this to be "relatively rare" in the USA.[55] Since 2013, when the US Supreme Court ruled that a provision of the Voting Rights Act was no longer enforceable, several states have passed voter ID laws, ostensibly to counter the alleged fraud. But many experts counter that voter ID laws are not very effective against some forms of impersonation. These ID laws have been challenged by minority groups that claimed to be disadvantaged by the changes. By August 2016, four federal court rulings overturned laws or parts of such laws because they placed undue burdens on minority populations, including African Americans and Native Americans.[56] In each case: Texas, North Carolina, Wisconsin, and North Dakota, and may adversely affect minority voters. The states are required to accept alternatives for the November 2016 elections. These cases are expected to reach the US Supreme Court for hearings.


Allegations of widespread voter fraud in the 2016 United States presidential election by busing out-of-state voters to New Hampshire were found to be false.[57] Suspcions of hacking of electronic voting machines in Wisconsin, Michigan, and Pennsylvania were determined to be unfounded.[58]


The N.C. Board of Elections reported in 2017 on questions of voter fraud and the state's proposed voter ID law. The report showed that out of 4,769,640 votes cast in the Nov 2016 election in North Carolina, only one illegal vote would potentially have been blocked by the voter ID law. The investigation found fewer than 500 incidences of invalid ballots cast, the vast majority of which were cast by individuals on probation for felony who were likely not aware that this status disqualified them from voting, and the total amount of invalid votes was far too small to have affected the outcome of any race in North Carolina in the 2016 election.[59][60]



Artificial results



In particularly corrupt regimes, the voting process may be nothing more than a sham, as officials would simply announce whatever results they want, sometimes without even bothering to count the votes. Such practices tend to draw international condemnation, but voters typically have little recourse, as there would seldom be any ways to remove the "winner" from power, short of a revolution.



Vote fraud in legislature


Vote fraud can also take place in legislatures. Some of the forms used in national elections can also be used in parliaments, particularly intimidation and vote-buying. Because of the much smaller number of voters, however, election fraud in legislatures is qualitatively different in many ways. Fewer people are needed to 'swing' the election, and therefore specific people can be targeted in ways impractical on a larger scale. For example, Adolf Hitler achieved his dictatorial powers due to the Enabling Act of 1933. He attempted to achieve the necessary two-thirds majority to pass the Act by arresting members of the opposition, though this turned out to be unnecessary to attain the needed majority. Later, the Reichstag was packed with Nazi party members who voted for the Act's renewal.


In many legislatures, voting is public, in contrast to the secret ballot used in most modern public elections. This may make their elections more vulnerable to some forms of fraud since a politician can be pressured by others who will know how he or she has voted. However, it may also protect against bribery and blackmail, since the public and media will be aware if a politician votes in an unexpected way. Since voters and parties are entitled to pressure politicians to vote a particular way, the line between legitimate and fraudulent pressure is not always clear.


As in public elections, proxy votes are particularly prone to fraud. In some systems, parties may vote on behalf of any member who is not present in parliament. This protects those members from missing out on voting if prevented from attending parliament, but it also allows their party to prevent them from voting against its wishes. In some legislatures, proxy voting is not allowed, but politicians may rig voting buttons or otherwise illegally cast "ghost votes" while absent.[61]



Prevention


The two main strategies for the prevention of electoral fraud in society are: 1) Deterrence through consistent and effective prosecution; and 2) Cultivation of mores that discourage corruption. The two main fraud prevention tactics can be summarised as secrecy and openness. The secret ballot prevents many kinds of intimidation and vote selling, while transparency at all other levels of the electoral process prevents and allows detection of most interference.



Mores


The patterns of conventional behaviour in a society, or mores, are an effective means for preventing electoral fraud and corruption in general. A good example is Sweden, where the culture has a strong tendency toward positive values, resulting in a low incidence of political corruption.[62] Until recently Canada had a similar reputation. The In and Out scandal of 2008 and the Robocall scandal of 2011 has tarnished Canada's electoral integrity.


An advantage of cultivating positive mores as a prevention strategy is that it is effective across all electoral systems and devices. A disadvantage is that it makes other prevention and detection efforts more difficult to implement because members of society generally have more trust and less of a sense for fraudulent methods.



Secret ballot



The secret ballot, in which only the voter knows how they have voted, is believed by many to be a crucial part of ensuring free and fair elections through preventing voter intimidation or retribution.[63] Others argue that the secret ballot enables election fraud (because it makes it harder to verify that votes have been counted correctly) [64][65] and that it discourages voter participation.[66] Although the secret ballot was sometimes practiced in ancient Greece and was a part of the Constitution of the Year III of 1795, it only became common in the nineteenth century. Secret balloting appears to have been first implemented in the former British colony—now an Australian state—of Tasmania on 7 February 1856. By the turn of the century, the practice had spread to most Western democracies.


In the United States, the popularity of the Australian ballot grew as reformers in the late 19th century sought to reduce the problems of election fraud. Groups such as the Greenbackers, Nationalist, and more fought for those who yearned to vote, but were exiled for their safety. George Walthew, Greenback, helped initiate one of the first secret ballots in America in Michigan in 1885. Even George Walthew had a predecessor in John Seitz, Greenback, who campaigned a bill to " preserve the purity of elections" in 1879 after the discovery of Ohio's electoral fraud in congressional elections.


The efforts of many helped accomplish this and led to the spread of other secret ballots all across the country. As mentioned on February 18, 1890, in the Galveston News “The Australian ballot has come to stay. It protects the independence of the voter and largely puts a stop to vote to buy.” Before this, it was common for candidates to intimidate or bribe voters, as they would always know who had voted which way.



Transparency


Most methods of preventing electoral fraud involve making the election process completely transparent to all voters, from nomination of candidates through casting of the votes and tabulation.[67] A key feature in ensuring the integrity of any part of the electoral process is a strict chain of custody.


To prevent fraud in central tabulation, there has to be a public list of the results from every single polling place. This is the only way for voters to prove that the results they witnessed in their election office are correctly incorporated into the totals.


End-to-end auditable voting systems provide voters with a receipt to allow them to verify their vote was cast correctly, and an audit mechanism to verify that the results were tabulated correctly and all votes were cast by valid voters. However, the ballot receipt does not permit voters to prove to others how they voted, since this would open the door towards forced voting and blackmail. End-to-end systems include Punchscan and Scantegrity, the latter being an add-on to optical scan systems instead of a replacement.


In many cases, election observers are used to help prevent fraud and assure voters that the election is fair. International observers (bilateral and multilateral) may be invited to observe the elections (examples include election observation by the Organisation for Security and Cooperation in Europe (OSCE), European Union election observation missions, observation missions of the Commonwealth of Independent States (CIS), as well as international observation organised by NGOs, such as CIS-EMO, European Network of Election Monitoring Organizations (ENEMO), etc.). Some countries also invite foreign observers (i.e. bi-lateral observation, as opposed to multi-lateral observation by international observers).


In addition, national legislatures of countries often permit domestic observation. Domestic election observers can be either partisan (i.e. representing interests of one or a group of election contestants) or non-partisan (usually done by civil society groups). Legislations of different countries permit various forms and extents of international and domestic election observation.


Election observation is also prescribed by various international legal instruments. For example, paragraph 8 of the 1990 Copenhagen Document states that "The [OSCE] participating States consider that the presence of observers, both foreign and domestic, can enhance the electoral process for States in which elections are taking place. They, therefore, invite observers from any other CSCE participating States and any appropriate private institutions and organisations who may wish to do so to observe the course of their national election proceedings, to the extent permitted by law. They will also endeavour to facilitate similar access for election proceedings held below the national level. Such observers will undertake not to interfere in the electoral proceedings".


Critics note that observers cannot spot certain types of election fraud like targeted voter suppression or manipulated software of voting machines.



Statistical indicators


Various forms of statistics can be indicators of election fraud, e.g. exit polls which diverge from the final results. Well-conducted exit polls serve as a deterrent to electoral fraud. However, exit polls are still notoriously imprecise. For instance, in the Czech Republic, some voters are afraid or ashamed to admit that they voted for the Communist Party (exit polls in 2002 gave the Communist party 2–3 percentage points less than the actual result).


When elections are marred by ballot-box stuffing (e.g., the Armenian presidential elections of 1996 and 1998), the affected polling stations will show abnormally high voter turnouts with results favouring a single candidate. By graphing the number of votes against turnout percentage (i.e., aggregating polling stations results within a given turnout range), the divergence from bell-curve distribution gives an indication of the extent of the fraud. Stuffing votes in favour of a single candidate affects votes vs. turnout distributions for that candidate and other candidates differently; this difference could be used to quantitatively assess the number of votes stuffed. Also, these distributions sometimes exhibit spikes at round-number turnout percentage values.[68][69][70] High numbers of invalid ballots, overvoting or undervoting are other potential indicators.


Risk-limiting audits are methods to assess the validity of an election result statistically without the effort of a full election recount.



Prosecution


In the United States one such case was in Pennsylvania where Bill Stinson won an election based on fraudulent absentee ballots. The courts ruled that his opponent be seated in the state Senate as a result.[71]


In the Philippines, former President Gloria Macapagal-Arroyo was arrested in 2011 following the filing of criminal charges against her for electoral sabotage, in connection with the Philippine general election, 2007. She was accused of conspiring with election officials to ensure the victory of her party's senatorial slate in the province of Maguindanao, through the tampering of election returns.[72]



Voting machine integrity



One method for verifying voting machine accuracy is Parallel Testing, the process of using an independent set of results compared to the original machine results. Parallel testing can be done prior to or during an election. During an election, one form of parallel testing is the VVPAT. Voter-verified paper audit trail (VVPAT) or verified paper record (VPR) is a method of providing feedback to voters using a ballotless voting system. A VVPAT is intended as an independent verification system for voting machines designed to allow voters to verify that their vote was cast correctly, to detect possible election fraud or malfunction, and to provide a means to audit the stored electronic results. This method is only effective if statistically significant numbers of voters verify that their intended vote matches both the electronic and paper votes.


On election day, a statistically significant number of voting machines can be randomly selected from polling locations and used for testing. This can be used to detect potential fraud or malfunction unless manipulated software would only start to cheat after a certain event like a voter pressing a special key combination (Or a machine might cheat only if someone doesn't perform the combination, which requires more insider access but fewer voters).


Another form of testing is Logic & Accuracy Testing (L&A), pre-election testing of voting machines using test votes to determine if they are functioning correctly.


Another method to ensure the integrity of electronic voting machines is independent software verification and certification.[67] Once a software is certified, code signing can ensure the software certified is identical to that which is used on election day. Some argue certification would be more effective if voting machine software was publicly available or open source.


Certification and testing processes conducted publicly and with oversight from interested parties can promote transparency in the election process. The integrity of those conducting testing can be questioned.


Testing and certification can prevent voting machines from being a black box where voters cannot be sure that counting inside is done as intended.[67]


One method that people have argued would help prevent these machines from being tampered with would be for the companies that produce the machines to share the source code, which displays and captures the ballots, with computer scientists. This would allow external sources to make sure that the machines are working correctly.[52]



Notable United States legislation



Help America Vote Act



The Help America Vote Act (Pub.L. 107–252), or HAVA, is a United States federal law enacted on October 29, 2002.[73] It was drafted (at least in part) in reaction to the controversy surrounding the 2000 U.S. presidential election. The goals of HAVA are:[74] to replace punchcard and lever-based voting systems; create the Election Assistance Commission to assist in the administration of Federal elections; and establish minimum election administration standards.



Voting Rights Act of 1965



This was the most important federal legislation of the 20th century to protect voting rights, especially of ethnic and language minorities who had been disenfranchised for decades by states' constitutions and practices. Initially, it was particularly important for enforcing the constitutional right of African Americans in the South to vote, where millions of people had been mostly disenfranchised since the turn of the 20th century and excluded from politics. The law has also protected other ethnicities, such as Hispanics, Asians, Native Americans, and language minorities in other states, who have been discriminated against at various times, especially in the process of voter registration and electoral practices.



Civil Rights Act of 1964



The Civil Rights Act of 1964 (Pub.L. 88–352, 78 Stat. 241, enacted July 2, 1964) was a landmark piece of legislation in the United States[75] that outlawed major forms of discrimination against African Americans and other minorities.



See also




  • Administrative resource

  • American Center for Voting Rights

  • Branch stacking

  • Caging list

  • Cooping

  • Electoral integrity


  • Florida Central Voter File (purging controversy)

  • Foreign electoral intervention

  • Gerrymandering

  • List of controversial elections

  • List of UK Parliamentary election petitions

  • Notable instances of ballot box stuffing

  • Political corruption

  • Postal voting

  • Show election

  • Smear campaign

  • Voter suppression

  • Carousel voting

  • Bulgarian train




Further reading



General



  • Lehoucq, Fabrice. "Electoral fraud: Causes, types, and consequences." Annual review of political science (2003) 6#1 pp. 233–56.

  • Schaffer, Frederic Charles. The hidden costs of clean election reform (Cornell University Press, 2008)



Australia



  • McGrath, Amy. The Forging of Votes, Tower House Publications, Kensington, NSW (1994)

  • McGrath, Amy. Frauding of Elections, Tower House Publications and H.S. Chapman Society, Brighton-le Sands, NSW (2003)

  • McGrath, Amy. (The Frauding of Votes, Tower House Publications, Kensington, NSW 1996)

  • Perry, Peter John. Political Corruption in Australia: A Very Wicked Place? (Ashgate Pub Limited, 2001)



Canada


  • Atkinson, Michael M., and Gerald Bierling. "Politicians, the public and political ethics: Worlds apart." Canadian Journal of Political Science (2005) 38#4: 1003.


France


  • Ebhardt, Christian. "In Search of a Political Office: Railway Directors and Electoral Corruption in Britain and France, 1820-1870." Journal of Modern European History (2013) 11#1 pp. 72–87.


Germany



  • Anderson, Margaret Lavinia. Practicing Democracy: Elections and Political Culture in Imperial Germany (2000)[76]

  • Ziblatt, Daniel. "Shaping Democratic Practice and the Causes of Electoral Fraud: The Case of Nineteenth-Century Germany." American Political Science Review (2009) 103#1 pp. 1–21.



United Kingdom



  • Gash, Norman. Politics in the Age of Peel: A Study in the Technique of Parliamentary Representation 1830–1850 (1953)

  • O'Gorman, Frank. Voters, Patrons and Parties: The Unreformed Electoral System of Hanoverian England, 1734–1832 (Oxford, 1989).

  • Harling, Philip. "Rethinking "Old Corruption," Past & Present (1995) No. 147 pp. 127–58[77]

  • Namier, Lewis Bernstein. The structure of politics at the accession of George III (London: Macmillan, 1957)

  • O'Leary, Cornelius. The elimination of corrupt practices in British elections, 1868–1911 (Clarendon Press, 1962)



Latin America



  • Hartlyn, Jonathan, and Arturo Valenzuela, "Democracy in Latin America since 1930," in Leslie Bethell, ed. Latin America: Politics and Society since 1930 (1998), 3–66.

  • Molina, Iván and Fabrice Lehoucq. "Political Competition and Electoral Fraud: A Latin American Case Study," Journal of Interdisciplinary History (1999) 30#2 pp. 199–234[78]

  • Posada-Carbó, Eduardo. "Electoral Juggling: A Comparative History of the Corruption of Suffrage in Latin America, 1830–1930." Journal of Latin American Studies (2000). pp. 611–44.

  • Ricci, Paolo. "‘Beheading’, Rule Manipulation and Fraud: The Approval of Election Results in Brazil, 1894–1930." Journal of Latin American Studies (2012) 44#3 pp. 495–521.

  • Silva, Marcos Fernandes da. "The political economy of corruption in Brazil." Revista de Administração de Empresas (1999) 39#3 pp. 26–41.



Turkey



  • Meyersson, Erik. "Is Something Rotten In Ankara’s Mayoral Election? A Very Preliminary Statistical Analysis" (2014)[79]

  • Meyersson, Erik. "Trouble in Turkey’s Elections" (2014)[80]

  • Meyersson, Erik. "Capital Fraud in Turkey? Evidence from Citizen Initiatives" (2014)[81]



United States



  • Argersinger, Peter H. "New perspectives on election fraud in the Gilded Age." Political Science Quarterly (1985) 100#4 pp. 669–87[82]

  • Campbell, Tracy. Deliver the Vote: A History of Election Fraud, An American Political Tradition, 1742 2004 (Basic Books, 2005)

  • Fackler, Tim, and Tse-min Lin. "Political corruption and presidential elections, 1929–1992." Journal of Politics 57 (1995): 971–93.[83]

  • Mayfield, Loomis. "Voting Fraud in Early Twentieth-Century Pittsburgh," Journal of Interdisciplinary History (1993) 29#1 59–84[84]

  • Morris Jr., Roy. Fraud of the Century: Rutherford B. Hayes, Samuel Tilden, and the Stolen Election of 1876 (2007)[85]

  • Summers, Mark Wahlgren. The Era of Good Stealings (1993), covers corruption 1868–1877

  • Sydnor, Charles. Gentlemen Freeholders: Political Practices in Washington's Virginia (1952), 18th century



References





  1. ^ ab Myagkov, Mikhail G.; Peter C. Ordeshook; Dimitri Shakin (2009-05-31). The Forensics of Election Fraud: Russia and Ukraine. Cambridge University Press. ISBN 978-0-521-76470-4..mw-parser-output cite.citation{font-style:inherit}.mw-parser-output .citation q{quotes:"""""""'""'"}.mw-parser-output .citation .cs1-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/6/65/Lock-green.svg/9px-Lock-green.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output .citation .cs1-lock-limited a,.mw-parser-output .citation .cs1-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/d/d6/Lock-gray-alt-2.svg/9px-Lock-gray-alt-2.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output .citation .cs1-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/a/aa/Lock-red-alt-2.svg/9px-Lock-red-alt-2.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output .cs1-subscription,.mw-parser-output .cs1-registration{color:#555}.mw-parser-output .cs1-subscription span,.mw-parser-output .cs1-registration span{border-bottom:1px dotted;cursor:help}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/4/4c/Wikisource-logo.svg/12px-Wikisource-logo.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output code.cs1-code{color:inherit;background:inherit;border:inherit;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;font-size:100%}.mw-parser-output .cs1-visible-error{font-size:100%}.mw-parser-output .cs1-maint{display:none;color:#33aa33;margin-left:0.3em}.mw-parser-output .cs1-subscription,.mw-parser-output .cs1-registration,.mw-parser-output .cs1-format{font-size:95%}.mw-parser-output .cs1-kern-left,.mw-parser-output .cs1-kern-wl-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right,.mw-parser-output .cs1-kern-wl-right{padding-right:0.2em}


  2. ^ Alvarez, Michael; Hall, Thad; Hyde, Susan (2008). Election Fraud: Detecting and Deterring Electoral Manipulation.


  3. ^ [1] Archived October 21, 2006, at the Wayback Machine


  4. ^ [2] Archived November 11, 2007, at the Wayback Machine


  5. ^ Williamson, Chilton (1968). American Suffrage from Property to Democracy. Princeton, NJ: Princeton U. Press. ASIN B000FMPMK6.


  6. ^ Saltman, Roy G. (January 2006). The History and Politics of Voting Technology. Palgrave Macmillan. ISBN 1-4039-6392-4.


  7. ^ Magill v. Porter Magill v. Weeks, H=House of Lords Judgments, 13 December 2001. Accessed 2012-02-16.


  8. ^ Sadiq, Kamal (2005). "When States Prefer Non-Citizens Over Citizens: Conflict Over Illegal Immigration into Malaysia" (PDF). International Studies Quarterly. 49: 101–22. doi:10.1111/j.0020-8833.2005.00336.x. Archived from the original (PDF) on 2008-06-14. Retrieved 2008-04-23.


  9. ^ Young, Toby (17 June 2015). "Why Tories should join Labour and back Jeremy Corbyn" – via www.telegraph.co.uk.


  10. ^ "Labour's response to #ToriesForCorbyn shows they really have lost the plot - Coffee House". 24 June 2015.


  11. ^ "Labour's response to #ToriesForCorbyn shows they really have lost the plot - Coffee House". 24 June 2015.


  12. ^ Bazelon, Emily (2018-09-26). "Will Florida's Ex-Felons Finally Regain the Right to Vote?". The New York Times. ISSN 0362-4331. Retrieved 2018-12-04.


  13. ^ Magaloni, Beatriz. "Autocratic Elections, Voters, and the Game of Fraud" (PDF). Yale University. Retrieved 10 December 2015.


  14. ^ Poundstone, William (2009). Gaming the Vote: Why Elections Aren't Fair (And What We Can Do About It). Macmillan. p. 170. ISBN 9780809048922.


  15. ^ Bialik, Carl (May 14, 2011). "Latest Issue on the Ballot: How to Hold a Vote". Wall Street Journal. Retrieved June 29, 2012.


  16. ^ "Did bomb threat stifle vote? (Capital Times)". Madison.com. Archived from the original on March 4, 2009. Retrieved 2012-05-03.


  17. ^ Sullivan, Joseph F. (1993-11-13). "Florio's Defeat Revives Memories of G.O.P. Activities in 1981". New York Times. Retrieved 2008-10-07.


  18. ^ ab [3] Archived October 26, 2006, at the Wayback Machine


  19. ^ "Intimidation and Deceptive Practices EP365". Archived from the original on 2008-01-21. Retrieved 2018-04-23.


  20. ^ "Incidents Of Voter Intimidation & Suppression". Web.archive.org. 2006-11-08. Archived from the original on April 4, 2007. Retrieved 2012-05-03.


  21. ^ abc "Lynne Rienner Publishers - Elections for Sale The Causes and Consequences of Vote Buying". www.rienner.com.


  22. ^ ab Mark Wahlgren Summers. "Party Games: Getting, Keeping, and Using Power in Gilded Age Politics: Mark Wahlgren Summers: 9780807855379". Missing or empty |url= (help)


  23. ^ Joseph Grego (1886). A History of Parliamentary Elections and Electioneering in the Old Days . Books.google.com. Retrieved 2015-05-29.


  24. ^ "Parliamentary Electorates And Elections Act 1912 – Section 149, New South Wales Consolidated Acts". Austlii.edu.au. Archived from the original on 2011-11-30. Retrieved 2012-05-03.


  25. ^ Herbeck, Dan (November 15, 2011). Resentments abound in Seneca power struggle. The Buffalo News. Retrieved November 16, 2011.


  26. ^ abcdefg Nichter, Simeon (2008). "Vote Buying or Turnout Buying? Machine Politics and the Secret Ballot". American Political Science Review. 102: 19. doi:10.1017/S0003055408080106. JSTOR 27644495.


  27. ^ ab Brusco, Valeria; Nazareno, Marcelo; Stokes, Susan Carol (2004). "Vote Buying in Argentina". Latin American Research Review. 39 (2): 66. doi:10.1353/lar.2004.0022.


  28. ^ abcdefg Stokes, Susan C (2005). "Perverse Accountability: A Formal Model of Machine Politics with Evidence from Argentina". American Political Science Review. 99 (3): 315. doi:10.1017/S0003055405051683.


  29. ^ Vilalta, Carlos (2010). "Vote-buying crime reports in Mexico: Magnitude and correlates". Crime, Law, and Social Change. 54 (5): 325. doi:10.1007/s10611-010-9260-7.


  30. ^ Serra, Gilles (10 May 2016). "Vote Buying with Illegal Resources: Manifestation of a Weak Rule of Law in Mexico". Journal of Politics in Latin America. 8 (1): 129–150 – via journals.sub.uni-hamburg.de.


  31. ^ Serra, Gilles (10 May 2016). "Vote Buying with Illegal Resources: Manifestation of a Weak Rule of Law in Mexico". Journal of Politics in Latin America. 8 (1): 129–150.


  32. ^ abcd Bratton, Michael (2008). "Vote buying and violence in Nigerian election campaigns". Electoral Studies. 27 (4): 621. doi:10.1016/j.electstud.2008.04.013.


  33. ^ abcd Kramon, Eric (2016). "Where is vote buying effective? Evidence from a list experiment in Kenya". Electoral Studies. 44: 397. doi:10.1016/j.electstud.2016.09.006.


  34. ^ abc Larreguy, Horacio; Marshall, John; Querubín, Pablo (2016). "Parties, Brokers, and Voter Mobilization: How Turnout Buying Depends Upon the Party's Capacity to Monitor Brokers". American Political Science Review. 110: 160. doi:10.1017/S0003055415000593.


  35. ^ "Vote-Buying and Reciprocity". Econometrica. 80 (2): 863. 2012. doi:10.3982/ECTA9035.


  36. ^ Gersbach, Hans; Mühe, Felix (2011). "Vote-Buying and Growth". Macroeconomic Dynamics. 15 (5): 656. doi:10.1017/S1365100510000246.


  37. ^ Auyero, Javier (April 1999). "'From the Client's Point(s) of View': How Poor People Perceive and Evaluate Political Clientelism". Theory and Society. 28 (2): 297–334. JSTOR 3108473.


  38. ^ Gans-Morse, Jordan; Mazzuca, Sebastián; Nichter, Simeon (2008). "Who Gets Bought? Vote Buying, Turnout Buying, and Other Strategies".


  39. ^ Church Report (Covert Action in Chile 1963–1973), United States Senate Church Committee, 1975


  40. ^ "Fraudulent election calls traced to Racknine Inc., an Edmonton firm with Tory links | News | National Post". News.nationalpost.com. Retrieved 2012-05-03.


  41. ^ Lacayo, Richard. "Florida recount: In the eye of the storm". CNN. Archived from the original on 2011-06-22.


  42. ^ https://web.archive.org/web/20090615232203/http://www.sr.se/sormland/nyheter/artikel.asp?artikel=2894807


  43. ^ Hicks, Jonathon (July 24, 2004). "Seeing Double on Ballot: Similar Names Sow Confusion". The New York Times. The New York Times Company. Archived from the original on 2009-03-04. Retrieved 18 December 2008.


  44. ^ "VoteTrustUSA – Sequoia: Button On E-voting Machine Allows Multiple Votes". votetrustusa.org.


  45. ^ "Row over Alzheimer woman's proxy". BBC News. BBC MMVIII. Archived from the original on 19 April 2016. Retrieved 13 November 2018.


  46. ^ "Threat Analyses & Papers". National Institute of Standards and Technology. October 7, 2005. Archived from the original on 21 October 2006. Retrieved 5 March 2011.


  47. ^ Jaikumar Vijayan (2011-09-28). "Argonne researchers 'hack' Diebold e-voting system". Computerworld. Retrieved 2012-05-03.


  48. ^ Layton, J. "How can someone tamper with an electronic voting machine". Retrieved 2011-02-27.


  49. ^ "Security Analysis of the Diebold AccuVote-TS Voting Machine" (PDF). Jhalderm.com. Retrieved 2015-05-29.


  50. ^ ab "images". Retrieved February 17, 2012.
    [dead link]



  51. ^ [4][dead link]


  52. ^ ab Bonsor and Strickland, Kevin and Jonathan. "How E-Voting Works". Retrieved 2011-02-27.


  53. ^ Kohno, T. "Analysis of Electronic Voting System" (PDF). Retrieved 2011-02-27.


  54. ^ ""Man in the Middle" Attacks to Subvert the Vote". Electiondefensealliance.org. Archived from the original on 2015-07-21. Retrieved 2015-05-29.


  55. ^ Mayer, Jane (29 October 2012). "The Voter-Fraud Myth". The New Yorker. Retrieved 9 December 2015.


  56. ^ Rober Barnes (August 1, 2016). "Federal judge blocks N. Dakota's voter-ID law, calling it unfair to Native Americans". Washington Post. Retrieved 2016-08-02.


  57. ^ James Pindell (1 June 2018). "N.H. says once and for all that no one was bused in to vote". The Boston Globe.


  58. ^ "Nate Silver on Twitter". Twitter. Retrieved November 24, 2016.


  59. ^ https://www.charlotteobserver.com/opinion/editorials/article146486019.html


  60. ^ "North Carolina State Board of Elections" (PDF) (Press release). April 21, 2017. Archived from the original (PDF) on April 25, 2017. Retrieved June 28, 2018.


  61. ^ "Is "Ghost" Voting Acceptable?". Writ.lp.findlaw.com. 2004-04-08. Retrieved 2012-05-03.


  62. ^ "Corruption Perceptions Index". Transparency International. Transparency International. 2011. Archived from the original on 19 June 2006. Retrieved 1 December 2011.


  63. ^ "Why You Should Expect Challenges To Secret Ballots". The Federalist. Retrieved 16 July 2016.


  64. ^ "Scrap the "secret" ballot – return to open voting".


  65. ^ Todd Davies. "Consequences of the Secret Ballot" (PDF). Symbolic Systems Program, Stanford University.


  66. ^ "Abolish the Secret Ballot". The Atlantic.


  67. ^ abc Lundin, Leigh (2008-08-17). "Dangerous Ideas". Voting Fiasco, Part 279.236(a). Criminal Brief. Retrieved 2010-10-07.


  68. ^ "podmoskovnik: Cтатья о выборах из Троицкого Варианта". Podmoskovnik.livejournal.com. Retrieved 2015-05-29.


  69. ^ 27 октября 2009 года. (2009-10-27). "Статистическое исследование результатов российских выборов 2007–2009 гг. : Троицкий вариант – Наука". Trvscience.ru. Archived from the original on 2013-04-23. Retrieved 2015-05-29.


  70. ^ Walter R. Mebane, Jr.; Kirill Kalinin. "Comparative Election Fraud Detection" (PDF). Personal.umich.edu. Retrieved 2015-05-29.


  71. ^ Decourcy, Michael (1994-02-19). "Vote-Fraud Ruling Shifts Pennsylvania Senate". The New York Times. Pennsylvania. Retrieved 2015-05-29.


  72. ^ Jeannette I. Andrade (2011-11-18). "Electoral sabotage case filed vs Arroyo, Ampatuan, Bedol". Philippine Daily Inquirer.


  73. ^ United States Department of Justice Civil Rights Division Voting Section Home Page,Help America Vote Act of 2002[permanent dead link]


  74. ^ 107th U.S. Congress (October 29, 2002). "Help America Vote Act of 2002 (Pub.L. 107-252)". U.S. Government Printing Office. Retrieved 2008-10-10.


  75. ^ Wright, Susan (2005), The Civil Rights Act of 1964: Landmark Antidiscrimination Legislation, The Rosen Publishing Group,
    ISBN 1-4042-0455-5



  76. ^ Practicing Democracy: Elections and Political Culture in Imperial Germany: Margaret Lavinia Anderson: 9780691048543. Amazon.com. ASIN 0691048541.CS1 maint: ASIN uses ISBN (link)


  77. ^ Philip Harling (May 1995). "Rethinking "Old Corruption"". Past & Present. Oxford University Press. 147: 127–58. JSTOR 651042.


  78. ^ "Political Competition and Electoral Fraud: A Latin American Case Study" (PDF). Libres.uncg.edu. Retrieved 2015-05-29.


  79. ^ "Is Something Rotten In Ankara's Mayoral Election? A Very Preliminary Statistical Analysis". Erikmeyersson.com. 2014-04-01. Retrieved 2015-05-29.


  80. ^ "Trouble in Turkey's Elections". Erikmeyersson.com. 2014-04-06. Retrieved 2015-05-29.


  81. ^ "Capital Fraud in Turkey? Evidence from Citizen Initiatives". Erikmeyersson.com. 2014-04-11. Retrieved 2015-05-29.


  82. ^ Peter H. Argersinger (1986). "New Perspectives on Election Fraud in the Gilded Age". Political Science Quarterly. The Academy of Political Science. 100: 669–87. JSTOR 2151546.


  83. ^ "Political Corruption and Presidential Elections, 1929–1992" (PDF). Repositories2.lib.utexas.edu. Archived from the original (PDF) on 2016-03-04. Retrieved 2015-05-29.


  84. ^ Loomis Mayfield (1993). "Voting Fraud in Early Twentieth-Century Pittsburgh". The Journal of Interdisciplinary History. The MIT Press. 24: 59–84. JSTOR 205101.


  85. ^ "Fraud of the Century: Rutherford B. Hayes, Samuel Tilden, and the Stolen Election of 1876 eBook: Roy Morris Jr". Amazon.com. Retrieved 2015-05-29.




External links




  • Voter Fraud - an article from the ACE Project


  • Independent Verification: Essential Action to Assure Integrity in the Voting Process, Roy G. Saltman, August 22, 2006


  • Legal provisions to prevent Electoral Fraud - an article from the ACE Project


  • Was the 2004 Election Stolen? by Robert F. Kennedy Jr., June 1, 2006.

  • Article referencing "four-legged voting"


  • 20 Ways The 2018 Election Will Be Stolen by Jeff Reifman, October 1, 2017.









這個網誌中的熱門文章

12.7 cm/40 Type 89 naval gun

Rikitea

University of Vienna