1 SPECIFIC METHODS
Immigration law may also be used to manipulate electoral demography. An example of this happened in
Malaysia when immigrants from neighboring Philippines
and Indonesia were given citizenship, together with voting rights, in order for a political party to dominate the
state of Sabah in a controversial process referred to as
Project IC.[7]
Disenfranchisement
1.4
Misinformation
1.4 Misinformation
People may distribute false or misleading information in
order to aect the outcome of an election.[1] For example,
in the Chilean Presidential election of 1970 the Central
Intelligence Agency used black propagandamaterials
purporting to be from various political partiesto sow
discord between members of a coalition between socialists and communists.[17]
Another way in which misinformation can be used is to
give voters incorrect information about the time or place
of polling, thus causing them to miss their chance to
vote. The Democratic Party of Wisconsin alleged that
Americans for Prosperity engaged in this when a ier
printed in August 2011 gave an incorrect return date
for absentee ballots - Americans for Prosperity alleged
it was a misprint.[18][19][20] As part of the 2011 Canadian federal election voter suppression scandal, Elections
Canada traced fraudulent phone calls telling voters that
their polling stations had been moved to a telecommunications company which worked for the Conservative
Party.[21] More recently in 2014, Americans for Prosperity were again accused of distributing voter misinformation, by mailing out incorrect or misleading information
to hundreds of thousands of mailers which included the
wrong deadline for voter registration and other inaccurate
information.[22] Americans for Prosperity Deputy Director Donald Bryson claimed the mailings were a mistake
and that they had not paid enough attention to detail.[23]
1 SPECIFIC METHODS
1.6
Ballot stung
Ballot stung is when one person submits multiple Many elections feature multiple opportunities for unballots during a vote in which only one ballot per person scrupulous ocials or 'helpers to record an electors vote
is permitted. The name originates from the earliest days dierently from their intentions. Voters who require as-
1.10
Where votes are recorded through electronic or mechan- Some forms of electoral fraud specic to electronic votical means, the voting machinery may be altered so that a ing machines are listed below. Recent research at Arvote intended for one candidate is recorded for another. gonne National Laboratories demonstrates that if a malicious actor is able to gain physical access to a voting
machine, it can be a simple process to manipulate certain
electronic voting machines, such as the Diebold Accuvote
1.8 Misuse of proxy votes
TS, by inserting inexpensive, readily available electronic
components inside the machine.[27][28]
Proxy voting is particularly vulnerable to election fraud,
due to the amount of trust placed in the person who casts
Tampering with the software of a voting machine to
the vote. In several countries there have been allegations
add malicious code altering vote totals or favor any
of retirement home residents being asked to ll out 'abcandidate.
sentee voter' forms. When the forms are signed and gathered, they are then secretly rewritten as applications for
Multiple groups have demonstrated this
proxy votes, naming party activists or their friends and
possibility.[29][30][31]
relatives as the proxies. These people, unknown to the
Private companies manufacture these mavoter, then cast the vote for the party of their choice. This
chines. Many companies will not allow public
trick relies on elderly care home residents typically beaccess or review of the machines source code,
ing absent-minded, or suering from dementia. In the
claiming
fear of exposing trade secrets.[32]
United Kingdom, this is known as 'granny farming' and
has been restricted in recent years by a change in the law
Tampering with the hardware of the voting machine
which prevents a single voter acting as a proxy for more
to alter vote totals or favor any candidate.[30]
than two non-family members therefore requiring more
people to be involved in any fraud.
Some of these machines require a smartcard
to activate the machine and vote. However,
a fraudulent smart card could attempt to gain
access to vote multiple times.[33]
1.9 Destruction or invalidation of ballots
One of the simplest methods of electoral fraud is to simply destroy ballots for the 'wrong' candidate or party. This
is unusual in functioning democracies, as it is dicult to
do without attracting attention. However in a very close
election it might be possible to destroy a very small number of ballot papers without detection, thereby changing
the overall result. Blatant destruction of ballot papers can
render an election invalid and force it to be re-run. If a
party can improve its vote on the re-run election, it can
benet from such destruction as long as it is not linked to
it.
A more subtle, and easily achieved, method is to make it
appear that the voter has spoiled his or her ballot, thus
rendering it invalid. Typically this would be done by
adding another mark to the paper, making it appear that
the voter has voted for more candidates than they were
entitled to. It would be dicult to do this to a large number of papers without detection, but in a close election
may prove decisive.
PREVENTION
The secret ballot, in which only the voter knows how individuals have voted, is a crucial part of ensuring free and
fair elections through preventing voter intimidation or retribution. Although it was sometimes practiced in ancient
Greece and was a part of the French Constitution of 1795,
it only became common in the nineteenth century. Secret balloting appears to have been rst implemented in
the former British colonynow an Australian stateof
Tasmania on 7 February 1856. By the turn of the century the practice had spread to most Western democraAs in public elections, proxy votes are particularly prone cies. Before this, it was common for candidates to intimto fraud. In some systems, parties may vote on behalf of idate or bribe voters, as they would always know who had
any member who is not present in parliament. This pro- voted which way.
tects those people from missing out on voting if they are
prevented from attending parliament, but also allows their
party to prevent them from voting against its wishes. In 3.3 Transparency
some legislatures, proxy voting is not allowed, but politicians may rig voting buttons or otherwise illegally cast Most methods of preventing electoral fraud involve mak'ghost votes while absent.[35]
ing the election process completely transparent to all voters, from nomination of candidates through casting of the
votes and tabulation.[37] A key feature in ensuring the integrity of any part of the electoral process is a strict chain
3 Prevention
of custody.
The two main strategies for the prevention of electoral
fraud in society are: 1) deterrence through consistent and
eective prosecution; 2) Cultivation of mores that discourage corruption. The two main fraud prevention tactics, ironically, can be summarized as secrecy and openness. The secret ballot prevents many kinds of intimidation and vote selling, while transparency at all other levels
of the electoral process prevents and detects most interference.
3.5
Prosecution
invited to observe the elections (examples include election observation by the Organization for Security and Cooperation in Europe (OSCE), European Union election
observation missions, observation missions of the Commonwealth of Independent States (CIS), as well as international observation organized by NGOs, such as CISEMO, European Network of Election Monitoring Organizations (ENEMO), etc.). Some countries also invite
foreign observers (i.e. bi-lateral observation, as opposed
to multi-lateral observation by international observers).
7
titatively assess the amount of votes stued. Also, these
distributions sometimes exhibit spikes at round-number
turnout percentage values.[38][39][40] High numbers of invalid ballots, overvoting or undervoting are other potential indicators.
3.5 Prosecution
In countries with strong laws and eective legal systems,
lawsuits can be brought against those who have allegedly
committed fraud; but the deterrent of legal prosecution
would not be enough. Although the penalties for getting caught may be severe, the rewards for succeeding
are likely to be worth the risk. The rewards range from
benets in contracting to total control of a country.
In addition, national legislatures of countries often permit domestic observation. Domestic election observers
can be either partisan (i.e. representing interests of one
or a group of election contestants) or non-partisan (usually done by civil society groups). Legislations of dierent countries permit various forms and extents of international and domestic election observation.
In Germany there are currently calls for reform of these
Election observation is also prescribed by various in- laws because lawsuits can be and are usually prolonged by
ternational legal instruments. For example, paragraph the newly elected Bundestag.
8 of the 1990 Copenhagen Document states that The
[OSCE] participating States consider that the presence
of observers, both foreign and domestic, can enhance the
electoral process for States in which elections are taking
place. They therefore invite observers from any other
CSCE participating States and any appropriate private institutions and organizations who may wish to do so to observe the course of their national election proceedings, to
the extent permitted by law. They will also endeavor to
facilitate similar access for election proceedings held below the national level. Such observers will undertake not
to interfere in the electoral proceedings.
3.4
Statistical indicators
NOTABLE LEGISLATION
Another method to insure the integrity of electronic voting machines is independent software verication and
certication.[37] Once software is certied, code signing
can insure the software certied is identical to that which
is used on election day. Some argue certication would
be more eective if voting machine software was publicly
available or open source.
Notable legislation
4.1
4.2
4.3
9
Philippine presidential election, 1986 (see also
People Power Revolution)
Philippine general election, 2004 (see also Hello
Garci scandal)
Ukrainian presidential election, 2004
Postal voting
Show election
Smear campaign
Electoral integrity
6.1 General
6.2 Australia
6 Further reading
election,
[70][71][72][73][74][74][75][73][75][75][76][73][73][76][77][75][77][73][78][79][79][57][60][58][59][60][80][81][82][83][84][85][86][87][88][89]
6.3 Canada
See also
Administrative resource
American Center for Voting Rights
Atkinson, Michael M., and Gerald Bierling. Politicians, the public and political ethics: Worlds apart.
Canadian Journal of Political Science (2005) 38#4
pp 1003.
Branch stacking
Caging list
Cooping
Electoral integrity
Florida Central Voter File (purging controversy)
Gerrymandering
List of controversial elections
List of UK Parliamentary election petitions
Political corruption
6.4 France
Ebhardt, Christian. In Search of a Political Ofce: Railway Directors and Electoral Corruption in
Britain and France, 1820-1870. Journal of Modern
European History (2013) 11#1 pp 7287.
6.5 Germany
Anderson, Margaret Lavinia. Practicing Democracy: Elections and Political Culture in Imperial Germany (2000)[90]
10
REFERENCES
Meyersson, Erik. Capital Fraud in Turkey? Evidence from Citizen Initiatives (2014)[95]
Great Britain
Fackler, Tim, and Tse-min Lin. Political corruption and presidential elections, 1929-1992. Journal
of Politics 57 (1995): 971-993.[97]
Mayeld, Loomis.
Voting Fraud in Early
Twentieth-Century Pittsburgh, Journal of Interdisciplinary History (1993) 29#1 59-84[98]
6.7
Latin America
Hartlyn, Jonathan, and Arturo Valenzuela, Democracy in Latin America since 1930, in Leslie Bethell,
ed. Latin America: Politics and Society since 1930
(1998), 3-66.
Molina, Ivn and Fabrice Lehoucq. Political Competition and Electoral Fraud: A Latin American
Case Study, Journal of Interdisciplinary History
(1999) 30#2 pp 199234[92]
Posada-Carb, Eduardo. Electoral Juggling: A
Comparative History of the Corruption of Surage
in Latin America, 1830-1930. Journal of Latin
American Studies (2000): 611-644.
Ricci, Paolo. "Beheading, Rule Manipulation and
Fraud: The Approval of Election Results in Brazil,
18941930. Journal of Latin American Studies
(2012) 44#3 pp 495-521.
Silva, Marcos Fernandes da. The political economy
of corruption in Brazil. Revista de Administrao de
Empresas (1999) 39#3 pp 2641.
6.8
Turkey
7 References
[1] Myagkov, Mikhail G.; Peter C. Ordeshook; Dimitri
Shakin (2009-05-31). The forensics of election fraud:
Russia and Ukraine. Cambridge University Press. ISBN
978-0-521-76470-4.Alvarez, Michael; Hall, Thad; Hyde,
Susan (2008). Election Fraud: Detecting and Deterring
Electoral Manipulation.
[2]
[3] Archived November 11, 2007 at the Wayback Machine
[4] Williamson, Chilton (1968). American Surage from
Property to Democracy. Princeton, NJ: Princeton U.
Press. ASIN B000FMPMK6.
[5] Saltman, Roy G. (January 2006). The History and Politics of Voting Technology. Palgrave Macmillan. ISBN
1-4039-6392-4.
[6] Magill v. Porter Magill v. Weeks, H=House of Lords Judgments, 13 December 2001. Accessed 2012-02-16.
11
[12]
[32] Bonsor and Strickland, Kevin and Jonathan. How EVoting Works. Retrieved 2011-02-27.
[34] ""Man in the Middle Attacks to Subvert the Vote. Electiondefensealliance.org. Retrieved 2015-05-29.
[15] Parliamentary Electorates And Elections Act 1912 Section 149, New South Wales Consolidated Acts.
Austlii.edu.au. Retrieved 2012-05-03.
[16] Herbeck, Dan (November 15, 2011). Resentments
abound in Seneca power struggle. The Bualo News. Retrieved November 16, 2011.
[17] Church Report (Covert Action in Chile 1963-1973),
United States Senate Church Committee, 1975
[18] Catanese, David (August 2, 2011). Americans for Prosperity: Wrong date a 'printing mistake'". Politico. Retrieved March 24, 2015.
[19] Vaughn, Alexa (2011-11-02).
Conservative group
launches ad campaign on Solyndra loan. The Los Angeles Times.
[20] Catanese, David (August 1, 2011). AFP Wisconsin ballots have late return date. Politico. Retrieved March 24,
2015.
[21] Fraudulent election calls traced to Racknine Inc., an Edmonton rm with Tory links | News | National Post.
News.nationalpost.com. Retrieved 2012-05-03.
[22] Roth, Zachary (2014-09-29). Koch group investigated
for faulty mailers. MSNBC. MSNBC. Retrieved 201505-29.
[23] Ramsey, David (Sep 30, 2014). Americans for Prosperity sends out hundreds of thousands of mailers with
fake voter registration information in North Carolina.
Arkansas Times. Retrieved 2014-11-16.
[24] Lacayo, Richard. Florida recount: In the eye of the
storm. CNN.
[25] Hicks, Jonathon (July 24, 2004). Seeing Double on Ballot: Similar Names Sow Confusion. The New York Times
(The New York Times Company). Retrieved 18 December 2008.
12
REFERENCES
[72] Election day glitches see Ukip candidate David Hodgson missed o ballot papers. Westerndailypress.co.uk.
2015-05-07. Retrieved 2015-05-29.
[51]
[58] Tower Hamlets count resumed amid accusations of intimidation. London24.com. Retrieved 2015-05-29.
[59] Rahman faces fresh election intimidation claims. Lgcplus.com. Retrieved 2015-05-29.
[60] Poll intimidation claims investigated by Electoral Commission. Telegraph.co.uk. 27 May 2014.
Wrecsam-
[82] The Scottish Nasty Party and how its growing intimidation and intolerance of dissent reeks of fascism - Daily
Mail Online. Mail Online.
[83] Senior Labour gures complained of 'intimidation' in
East Kilbride Labour. Herald Scotland.
[84] Election live - 1 May - BBC News. Bbc.co.uk. Retrieved
2015-05-29.
[85] Kevin McKenna. Welcome to Scotland, the SNPs police
state. the Guardian.
[86] SNP accused of using 'intimidation' tactics after urging
supporters to post pictures of Labour activists on internet Daily Record : ukpolitics. Reddit.com. Retrieved 201505-29.
[87] Eddie Izzard and Jim Murphy abused by Scottish nationalists at Labour general election event. Telegraph.co.uk.
4 May 2015. Retrieved 2015-05-29.
[68] General election 2015: Ukip supporters 'intimidate voters outside South Thanet polling stations,' Labour claims.
The Independent. Retrieved 2015-05-29.
[69] Press Association 2014. Galloway opens poll legal challenge. Dorset Echo. Retrieved 2015-05-29.
13
[90] Practicing Democracy: Elections and Political Culture in Imperial Germany: Margaret Lavinia Anderson:
9780691048543. Amazon.com. Retrieved 2015-05-29.
[91] Philip Harling (May 1995). Rethinking Old Corruption"". Past & Present (Oxford University Press) 147:
127158.
[92] Political Competition and Electoral Fraud: A Latin
American Case Study (PDF). Libres.uncg.edu. Retrieved 2015-05-29.
[93] Is Something Rotten In Ankaras Mayoral Election?
A Very Preliminary Statistical Analysis. Erikmeyersson.com. 2014-04-01. Retrieved 2015-05-29.
[94] Trouble in Turkeys Elections. Erikmeyersson.com.
2014-04-06. Retrieved 2015-05-29.
[95] Capital Fraud in Turkey? Evidence from Citizen Initiatives. Erikmeyersson.com. 2014-04-11. Retrieved
2015-05-29.
[96] Peter H. Argersinger (1986). New Perspectives on Election Fraud in the Gilded Age. Political Science Quarterly
(The Academy of Political Science) 100: 669687.
[97] Political Corruption and Presidential Elections, 1929
1992 (PDF). Repositories2.lib.utexas.edu. Retrieved
2015-05-29.
[98] Loomis Mayeld (1993).
Voting Fraud in Early
Twentieth-Century Pittsburgh. The Journal of Interdisciplinary History (The MIT Press) 24: 5984.
[99] Fraud of the Century: Rutherford B. Hayes, Samuel
Tilden, and the Stolen Election of 1876 eBook: Roy Morris Jr.. Amazon.com. Retrieved 2015-05-29.
[100] Mark Wahlgren Summers (Author). Party Games: Getting, Keeping, and Using Power in Gilded Age Politics: Mark Wahlgren Summers: 9780807855379. Amazon.com. Retrieved 2015-05-29.
External links
Voter Fraud - an article from the ACE Project
Independent Verication: Essential Action to Assure Integrity in the Voting Process, Roy G. Saltman, August 22, 2006
Legal provisions to prevent Electoral Fraud - an article from the ACE Project
Was the 2004 Election Stolen? by Robert F. Kennedy
Jr., June 1, 2006.
Article referencing four-legged voting
14
9.1
Text
9.2
Images
Public domain
9.3
Content license