Electoral fraud

Political corruption

Corruption Perceptions Index, 2010
Concepts

Bribery · Cronyism · [[Economics of corruption]Electoral fraud · Nepotism · Slush fund

Corruption by country

Angola · Armenia · Bahrain · Canada · Chile · China
Colombia · Cuba · Ghana · India · Iran
Ireland · Kenya · Nigeria · Pakistan
Paraguay · Philippines · Russia
South Africa · Ukraine · Corruption in Venezuela|Venezuela]]

Electoral fraud is illegal interference with the process of an election. Acts of fraud affect vote counts to bring about an election result, whether by increasing the vote share of the favored candidate, depressing the vote share of the rival candidates or both. Also called voter fraud, the mechanisms involved include illegal voter registration, intimidation at polls and improper vote counting. What electoral fraud is under law varies from country to country.

Many kinds of voter fraud are outlawed in electoral legislation but others are in violation of general laws such as those banning assault, harassment or libel. Although technically the term 'electoral fraud' covers only those acts which are illegal, the term is sometimes used to describe acts which although legal, are considered to be morally unacceptable, outside the spirit of electoral laws or in violation of the principles of democracy. Show elections, in which only one candidate can win, are sometimes considered to be electoral fraud although they may comply with the law.

In national elections, successful electoral fraud can have the effect of a coup d'état or corruption of democracy. In a narrow election a small amount of fraud may be enough to change the result. If the result is not affected, fraud can still have a damaging effect if not punished, as it can reduce voters' confidence in democracy. Even the perception of fraud can be damaging as it makes people less inclined to accept election results. This can lead to the breakdown of democracy and the establishment of a dictatorship.

Electoral fraud is not limited to political polls and can happen in any election where the potential gain is worth the risk for the cheater; as in elections for labor union officials, student councils, sports judging, and the awarding of merit to books, films, music or television programmes.

Despite many instances of electoral fraud, it remains a difficult phenomenon to study. This follows from its inherent illegality. Harsh penalties aimed at deterring electoral fraud make it likely that individuals who perpetrate fraud do so with the expectation that it either will not be discovered or will be excused.

Contents

Techniques

Electoral fraud can occur at any stage in the democratic process, but most commonly occurs during election campaigns, voter registration or during vote-counting. The two main types of electoral fraud are preventing eligible voters from casting their vote freely (or voting at all); and altering the results. A list of threats to voting systems, or electoral fraud methods, is kept by the National Institute of Standards and Technology.[1]

Electorate manipulation

Most electoral fraud takes place during or immediately after election campaigns, by interfering with the voting process or the counting of votes. However it can also occur far in advance, by altering the composition of the electorate. In many cases this is not illegal and thus technically not electoral fraud, although it is sometimes considered to be a violation of principles of democracy.[2]

Gerrymandering

Gerrymandering is the drawing of electorate boundaries in order to produce a particular result. Typically, electorates will be organized so that one group of people (for example poor people or a particular ethnic or religious group) is concentrated into a small number of electorates. This means that parties favoured by that group will win by a large majority in those electorates, but lose more narrowly in a larger number of electorates. This may result in one party gaining the most votes overall but still losing the election. Gerrymandering is most common under plurality voting systems, in which the winner must win the most electorates rather than the most votes overall.

In many cases gerrymandering occurs within, or is the result of, electoral law. However it may sometimes take the form of true electoral fraud, for example if laws governing the drawing of electoral boundaries are broken, or officials are bribed or otherwise coerced into altering boundaries in a way which favours a particular group.

Manipulation of demography

In many cases it is possible for authorities to artificially control the composition of an electorate in order to produce a foregone result. One way of doing this is to move a large number of voters into the electorate prior to an election, for example by temporarily assigning them land or lodging them in flophouses.[3][4] Many countries prevent this with rules stipulating that a voter must have lived in an electorate for a minimum period (for example, six months) in order to be eligible to vote there. However, such laws can themselves be used for demographic manipulation as they tend to disenfranchise those with no fixed address, such as the homeless, travellers, Roma, students (studying full time away from home) and some casual workers.

Another strategy is to permanently move people into an electorate, usually through public housing. If people eligible for public housing are likely to vote for a particular party, then they can either be concentrated into one electorate, thus making their votes count for less, or moved into marginal electorates, where they may tip the balance towards their preferred party. One notable example of this occurred in the City of Westminster under Shirley Porter.[5] In this case the electoral fraud relied on gaming the United Kingdom's first past the post electoral system, as in such a system it does not matter how much a party wins or loses by. The fraudsters calculated which wards they had no hope of winning, which they were sure of winning and which wards were marginal. By manipulating Westminster Council's public housing stock the fraudsters were able to move voters more likely to vote for their electoral enemies from marginal wards to the wards that they were going to lose anyway. In the ensuing elections the opposition could only win their safe seats with the small Conservative leads in the marginal wards being enough for them to win these wards, and therefore maintain their majority position and control of the council. In her defence Porter raised the history of the provision of public housing in London and the context of Herbert Morrison's boast to "...build the Conservatives out of London" by building new public housing in marginal Conservative seats.[5]

Immigration law may also be used to manipulate electoral demography. An example of this happened in Malaysia when immigrants from neighbouring Philippines and Indonesia were given citizenship together with voting rights in order for a political party to "dominate" the state of Sabah in a controversial process referred to as Project IC.[6]

A method of manipulating primary contests and other elections of party leaders is related to this. People who support one party may temporarily join another party in order to help elect a weak candidate for that party's leadership, in the hope that they will be defeated by the leader of the party that they secretly support.

Disenfranchisement

The composition of an electorate may also be altered by disenfranchising some types of people, rendering them unable to vote. In some cases this may be done at a legislative level, for example by passing a law banning convicted felons, recent immigrants or members of a particular ethnic or religious group from voting, or by instituting a literacy or other test which members of some groups are more likely to fail. Since this is done by lawmakers, it cannot be election fraud, but may subvert the purposes of democracy. This is especially so if members of the disenfranchised group were particularly likely to vote a certain way.

In some cases voters may be invalidly disenfranchised, which is true electoral fraud. For example a legitimate voter may be 'accidentally' removed from the electoral roll, making it difficult or impossible for them to vote. Corrupt election officials may misuse voting regulations such as a literacy test or requirement for proof of identity or address in such a way as to make it difficult or impossible for their targets to cast a vote. If such practices discriminate against a religious or ethnic group, they may so distort the political process that the political order becomes grossly unrepresentative, as in the post-Reconstruction or Jim Crow era until the Voting Rights Act of 1965.

Groups may also be disenfranchised by rules which make it impractical or impossible for them to cast a vote. For example, requiring people to vote within their electorate may disenfranchise serving military personnel, prison inmates, students, hospital patients or anyone else who cannot return to their homes. Polling can be set for inconvenient days such as midweek or on Holy Days (example: Sabbath or other holy days of a religious group whose teachings determine that voting is a prohibited on such a day) in order to make voting difficult for those studying or working away from home. Communities may also be effectively disenfranchised if polling places are not provided within reasonable proximity (rural communities are especially vulnerable to this) or situated in areas perceived by some voters as unsafe.

A particular example of this strategy is the Canadian federal election of 1917, where the Union government passed the Military Voters Act and the Wartime Elections Act. The Military Voters Act permitted any active military personnel to vote by party only and allow that party to decide in which electoral district to place that vote. It also enfranchised women who were directly related or married to an active soldier. These groups were widely assumed to be disproportionately in favour of the Union government, as that party was campaigning in favour of conscription. The Wartime Elections Act, conversely, disenfranchised particular ethnic groups assumed to be disproportionately in favour of the opposition Liberal Party.

Intimidation

Voter intimidation involves putting undue pressure on a voter or group of voters so that they will vote a particular way, or not at all. Absentee and other remote voting can be more open to some forms of intimidation as the voter does not have the protection and privacy of the polling location. Intimidation can take a range of forms.

Vote buying

The most famous episodes of vote buying came in 18th century England, when two or more rich aristocrats spent whatever money it took to win. The notorious "Spendthrift election" came in Northamptonshire in 1768, when three earls spent over ₤100,000 each to win a seat.[12]

Voters may be given money or other rewards for voting in a particular way, or not voting. In some jurisdictions, the offer or giving of other rewards is referred to as "electoral treating".[13] In Mexico, Queensland and several other places, voters willing to sell their vote are asked to take a picture of their ballot with a cellphone camera to validate their payment. Vote buying may also be done indirectly, for example by paying clergymen to tell their parishioners to vote for a particular party or candidate. Vote buying is generally avoided by not providing a "receipt" for the counted vote, even if it's technically possible to do so.

Electoral treating remains legal in some jurisdictions, such as in the Seneca Nation of Indians.[14]

Misinformation

People may distribute false or misleading information in order to affect the outcome of the election. Most commonly, smear campaigns (the circulation of false rumours) are made against a particular candidate or party. Smear campaigns are not necessarily illegal and can therefore not always be considered election fraud. However in some countries smear campaigns may violate libel or slander laws and in others, as the Philippines, such campaigns are specifically illegal. In 2007 British politician Miranda Grell was convicted under the Representation of the People Act 1983 for making a false statement about another candidate in order to gain electoral advantage.

Another way in which misinformation can be used in voter fraud is to give voters incorrect information about the time or place of polling, thus causing them to miss their chance to vote. One such example occurred in August 2011 when Americans for Prosperity, a Republican-leaning political advocacy group funded by David H. Koch and Charles G. Koch of Koch Industries, distributed fliers in Democrat-leaning Wisconsin districts which advised voters to send in their votes two days after the election deadline.[15]

Misleading or confusing ballot papers

Ballot papers may be used to discourage votes for a particular party or candidate, using design or other features which confuse voters into voting for a different candidate. For example, in the 2000 U.S. presidential election, Florida's butterfly ballot paper was criticised as confusing some voters into giving their vote to the wrong candidate. Ironically, however, the ballot was designed by a Democrat, the party most harmed by this design.[16] Poor or misleading design is not usually illegal and therefore not technically election fraud, but can subvert the principles of democracy.

A similar approach has been used in Sweden, where a system with separate ballots for each party is used. Ballots from Sweden Democrats have there been mixed with ballots from the bigger Swedish Social Democratic Party, which used a very similar font for the party name written on the top of the ballot.

Another method of confusing people into voting for the wrong candidate is to run candidates or create political parties with similar names or symbols as an existing candidate or party. The aim is that enough voters will be misled into voting for the false candidate or party to influence the results.[17] Such tactics may be particularly effective when a large proportion of voters have limited literacy in the language used on the ballot paper. Again, such tactics are usually not illegal but often work against the principles of democracy.

Ballot stuffing

Ballot stuffing occurs when a person casts more votes than they are entitled to. In its simplest form, ballot stuffing literally involves 'stuffing' multiple ballot papers into the ballot box. Another method is for voters to cast votes at multiple booths, on each occasion claiming that it is their only vote. In some countries such as India, El Salvador, Namibia or Afghanistan voters get a finger marked with election ink to prevent multiple votes. In Afghanistan's elections of 2005, this method failed as the ink used could easily be removed.

A more subtle technique is personation, in which a person pretends to be someone else. The person whose vote is being used may be legitimately enrolled but absent, a real but deceased person, or entirely fictitious.[18] A particularly unsubtle form of ballot stuffing, known as booth capturing, sometimes occurs in India. In these cases a gang of thugs will 'capture' a polling place and cast votes in the names of legitimate voters, who are prevented from voting themselves.

In jurisdictions with absentee balloting, an individual or a campaign may fill in and forge a signature on an absentee ballot intended for a voter in that jurisdiction, thus passing off the ballot as having been filled out by that voter. Such cases of voter fraud have resulted in criminal charges in the past.

Misrecording of votes

Many elections feature multiple opportunities for unscrupulous officials or 'helpers' to record an elector's vote differently from their intentions. Voters who require assistance to cast their votes are particularly vulnerable to having their votes stolen in this way. For example, a blind person or one who cannot read the language of the ballot paper may be told that they have voted for one party when in fact they have been led to vote for another. This is similar to the misuse of proxy votes; however in this case the voter will be under the impression that they have voted with the assistance of the other person, rather than having the other person voting on their behalf.

Where votes are recorded through electronic or mechanical means, the voting machinery may be altered so that a vote intended for one candidate is recorded for another.

Misuse of proxy votes

Proxy voting is particularly vulnerable to election fraud due to the amount of trust placed in the person who casts the vote. In several countries there have been allegations of retirement home residents being asked to fill out 'absentee voter' forms. When the forms are signed and gathered, they are then secretly rewritten as applications for proxy votes, naming party activists or their friends and relatives as the proxies. These people, unknown to the voter, then cast the vote for the party of their choice. This trick relies on elderly care home residents typically being absent-minded, or suffering from dementia. In the United Kingdom, this is known as 'granny farming' and has been restricted in recent years by a change in the law which prevents a single voter acting as a proxy for more than two non-family members therefore requiring more people to be involved in any fraud.

Destruction or invalidation of ballots

One of the simplest methods of electoral fraud is to simply destroy ballots for the 'wrong' candidate or party. This is unusual in functioning democracies as it is difficult to do without attracting attention. However in a very close election it might be possible to destroy a very small number of ballot papers without detection, thereby changing the overall result. Blatant destruction of ballot papers can render an election invalid and force it to be re-run. If a party can improve its vote on the re-run election, it can benefit from such destruction as long as it is not linked to it.

A more subtle, and easily achieved, method is to make it appear that the voter has spoiled their ballot thus rendering it invalid. Typically this would be done by adding an additional mark to the paper, making it appear that the voter has voted for more candidates than they were entitled to. It would be difficult to do this to a large number of papers without detection, but in a close election may prove decisive.

Vote fraud in legislature

Vote fraud can also take place in legislatures. Some of the forms used in national elections can also be used in parliaments, particularly intimidation and vote-buying. Because of the much smaller number of voters, however, election fraud in legislature is qualitatively different in many ways. Fewer people are needed to 'swing' the election, and therefore specific people can be targeted in ways impractical on a larger scale. For example, Adolf Hitler achieved his dictatorial powers due to the Enabling Act of 1933, and achieved the necessary two-thirds majority to pass the Act by arresting members of the opposition. Later, the Reichstag was packed with Nazi party members who voted for the Act's renewal.

In many legislatures, voting is public, in contrast to the secret ballot used in most modern public elections. This may make their elections more vulnerable to some forms of fraud, since a politician can be pressured by others who will know how he or she has voted. However, it may also protect against bribery and blackmail since the public and media will be aware if a politician votes in an unexpected way. Since voters and parties are entitled to pressure politicians to vote a particular way, the line between legitimate and fraudulent pressure is not always clear.

As in public elections, proxy votes are particularly prone to fraud. In some systems, parties may vote on behalf of any member who is not present in parliament. This protects those people from missing out on voting if they are prevented from attending parliament, but also allows their party to prevent them from voting against its wishes. In some legislatures, proxy voting is not allowed, but politicians may rig voting buttons or otherwise illegally cast 'ghost votes' while absent.[19]

Fraud prevention

The two main fraud prevention techniques can, ironically, be summarised as secrecy and openness. The secret ballot prevents many kinds of intimidation and vote selling, while transparency at all other levels of the electoral process prevents most interference.

Secret ballot

The secret ballot, in which the general public does not know how individuals have voted, is a crucial part of ensuring free and fair through preventing voter intimidation or retribution. Although it was sometimes practiced in ancient Greece and was a part of the French Constitution of 1795, it only became common in the nineteenth century. Secret balloting appears to have been first implemented in the former British colony -- now an Australian state -- of Tasmania on 7 February 1856. By the turn of the century the practice had spread to most Western democracies. Before this it was common for candidates to intimidate or bribe voters, as they always knew who had voted which way.

Transparency

Most methods of preventing electoral fraud involve making the election process completely transparent to all voters, from nomination of candidates through casting of the votes and tabulation.[20] A key feature in insuring the integrity of any part of the electoral process is a strict chain of custody.

To prevent fraud in central tabulation, there has to be a public list of the results from every single polling place. This is the only way for voters to prove that the results they witnessed in their election office are correctly incorporated into the totals.

End-to-end auditable voting systems provide voters with a receipt to allow them to verify their vote was cast correctly, and an audit mechanism to verify that the results were tabulated correctly and all votes were cast by valid voters. However, the ballot receipt does not permit voters to prove to others how they voted, since this would open the door towards forced voting and blackmail. End-to-end systems include Punchscan and Scantegrity, the latter being an add-on to optical scan systems instead of a replacement.

In many cases, election observers are used to help prevent fraud and assure voters that the election is fair. International observers (bilateral and multilateral) may be invited to observe the elections (examples include election observation by the Organization for Security and Cooperation in Europe (OSCE), European Union election observation missions, observation missions of the Commonwealth of Independent States (CIS), as well as international observation organized by NGOs, such as European Network of Election Monitoring Organizations (ENEMO), etc.). Some countries also invite foreign observers (i.e. bi-lateral observation, as opposed to multi-lateral observation by international observers).

In addition, national legislatures of countries often permit domestic observation. Domestic election observers can be either partisan (i.e. representing interests of one or a group of election contestants) or non-partisan (usually done by civil society groups). Legislations of different countries permit various forms and extents of international and domestic election observation.

Election observation is also prescribed by various international legal instruments. For example, paragraph 8 of the 1990 Copenhagen Document states that "The [OSCE] participating States consider that the presence of observers, both foreign and domestic, can enhance the electoral process for States in which elections are taking place. They therefore invite observers from any other CSCE participating States and any appropriate private institutions and organizations who may wish to do so to observe the course of their national election proceedings, to the extent permitted by law. They will also endeavour to facilitate similar access for election proceedings held below the national level. Such observers will undertake not to interfere in the electoral proceedings".

Critics note that observers cannot spot certain types of election fraud like targeted voter suppression or manipulated software of voting machines.

Statistical indicators

Various forms of statistics can be indicators for election fraud e.g. exit polls which diverge from the final results. Well-conducted exit polls serve as a deterrent to electoral fraud. However, exit polls are still notoriously imprecise. For instance, in the Czech Republic, some voters are afraid or ashamed to admit that they voted for the Communist Party (exit polls in 2002 gave the Communist party 2-3 percentage points less than the actual result).

When elections are marred by ballot-box stuffing (e.g., the Armenian presidential elections of 1996 and 1998), the affected polling stations will show abnormally high voter turnouts with results favoring a single candidate. By graphing the number of votes against turnout percentage (i.e., aggregating polling stations results within a given turnout range), the divergence from bell-curve distribution gives an indication of the extent of the fraud.[21] Stuffing votes in favor of a single candidate affects votes vs. turnout distributions for that candidate and other candidates differently; this difference could be used to quantitatively assess the amount of votes stuffed. Also, these distributions sometimes exhibit spikes at round-number turnout percentage values.[22][23] High numbers of invalid ballots, overvoting or undervoting are other potential indicators.

Prosecution

In countries with strong laws and effective legal systems, lawsuits can be brought against those who have allegedly committed fraud; but determent with legal prosecution would not be enough. Although the penalties for getting caught may be severe, the rewards for succeeding are likely to be worth the risk. The rewards range from benefits in contracting to total control of a country.

In Germany there are currently calls for reform of these laws because lawsuits can be and are usually prolonged by the newly elected Bundestag.[24]

In the United States one such case was in Pennsylvania where Bill Stinson won an election based on fraudulent absentee ballots. The courts ruled that his opponent be seated in the state Senate as a result.[25]

In the Philippines, former President Gloria Macapagal-Arroyo was arrested in 2011 following the filing of criminal charges against her for electoral sabotage, in connection with the 2007 Philippine general elections|2007 general elections. She was accused of conspiring with election officials to ensure the victory of her party's senatorial slate in the province of Maguindanao, through the tampering of election returns.[26]

Electoral fraud and voting machines

All voting systems face threats of some form of electoral fraud. The types of threats that affect voting machines can vary from other forms of voting systems, some threats may be prevented and others introduced."Threat Analyses & Papers". National Institute of Standards and Technology. October 7, 2005. http://vote.nist.gov/threats/papers.htm. Retrieved 5 March 2011. 

Means of electoral fraud through electronic voting machines

Some forms of electoral fraud specific to electronic voting machines are listed below. Although most believe that tampering with an electronic voting machine is extremely hard to do, recent research at Argonne National Laboratories demonstrates that if a malicious actor is able to gain physical access to a voting machine, it can be a simple process to manipulate certain electronic voting machines, such as the Diebold Accuvote TS, by inserting inexpensive, readily available electronic components inside the machine. [27][28]

Means of prevention

One method for verifying voting machine accuracy is Parallel Testing, the process of using an independent set of results compared against the original machine results. Parallel testing can be done prior to or during an election. During an election, one form of parallel testing is the VVPAT. This method is only effective if statistically significant numbers of voters verify that their intended vote matches both the electronic and paper votes.

On election day, a statistically significant number of voting machines can be randomly selected from polling locations and used for testing. This can be used to detect potential fraud or malfunction unless manipulated software would only start to cheat after a certain event like a voter pressing a special key combination (Or a machine might cheat only if someone doesn't perform the combination, which requires more insider access but fewer voters).

Another form of testing is Logic & Accuracy Testing (L&A), pre-election testing of voting machines using test votes to determine if they are functioning correctly.

Another method to insure the integrity of electronic voting machines is independent software verification and certification.[20] Once software is certified, code signing can insure the software certified is identical to that which is used on election day. Some argue certification would be more effective if voting machine software was publicly available or open source.

Certification and testing processes conducted publicly and with oversight from interested parties can promote transparency in the election process. The integrity of those conducting testing can be questioned.

Testing and certification can prevent voting machines from being a black box where voters can not be sure that counting inside is done as intended.[20]

One method that people have argued would help prevent these machines from being tampered with would be for the companies that produce the machines to share the source code, which displays and captures the ballots, with computer scientists. This would allow external sources to make sure that the machines are working correctly.[32]

2000 Election in Florida and Help America Vote Act

During the 2000 Presidential Election on November 14, all counties in Florida were ordered to turn in all certified ballots by a certain time. There were two controversies concerning this recount: whether it was legal for some counties to do a manual recount, and whether it was legal for the Secretary of State to reject the recounts if they came in past the deadline.

Republicans argued that a recount is error prone and Democrats argued that manual counts have been done for centuries. The Florida Supreme Court heard two and a half hours of debate. Democrats argued that since a President does not need to be in office until Dec. 12 they should have until then to recount. Republicans replied that more time means the more chances of fraud.

The Court ruled that the recount would occur but the deadline would be Nov. 26 at 5:00p.m. When all the votes were counted, Bush won by 537 votes and by 25 electoral votes. There was a second appeal and the case jumped back and forth from the US Supreme Court to Florida’s Supreme Court. Due to all of this controversy and chaos over ballots in the 2000 election, the Help America Vote Act was created to enforce regulations to make future elections run smoother since almost 2 million ballots were disqualified in this election.[35]

The Help America Vote Act (HAVA) was instituted in 2002 and helps to regulate how states conduct federal elections. It created a committee known as the EAC (Election Assistance Commission) which monitors the states and provides information on regulations for voting. The act is also responsible for replacing punch card voting systems and funding elections. By 2004, HAVA mandated that all voting booths will have touch screen electronic voting machines.

The 2000 election highlighted the problem of whether or not ballot stuffing had occurred. The 2 million ballots that were disqualified could have been legitimate. This is the risk with paper ballots and that’s why HAVA pushed for electronic voting in order to decrease the ability of fraud with ballot stuffing. Punch card voting also played a role in the disqualified ballots. People were not punching all the way and so the optical scanner could not read the votes.

Attempting to record votes manually poses a challenge and so the belief was that electronically recorded votes are more reliable. However, without a paper ballot, totally electronic balloting may be subject to viruses, tampering and deletion.[36][37][38]

See also

References

  1. ^ Threats to Voting Systems (NIST).
  2. ^ See, for example the National Voting Rights Institute report on New York State incarceration policies: [1]
  3. ^ Williamson, Chilton (1968). American Suffrage from Property to Democracy. Princeton, NJ: Princeton U. Press. ASIN B000FMPMK6. 
  4. ^ Saltman, Roy G. (January 2006). The History and Politics of Voting Technology. Palgrave Macmillan. ISBN 1-4039-6392-4. http://www.palgrave-usa.com/catalog/product.aspx?isbn=1403963924. 
  5. ^ a b Johnston, Phillip; David Millward (Friday May 10, 1996). "Strategy to win votes topped lunch menu at Dame Shirley's". The Daily Telegraph (London). http://www.telegraph.co.uk/htmlContent.jhtml?html=/archive/1996/05/10/nwes10.html. Retrieved 10 December 2008. 
  6. ^ Sadiq, Kamal (2005). "When States Prefer Non-Citizens Over Citizens: Conflict Over Illegal Immigration into Malaysia" (PDF). International Studies Quarterly 49: 101–122. doi:10.1111/j.0020-8833.2005.00336.x. http://www.cri.uci.edu/pdf/ISQ2005FinalCopy.pdf. Retrieved 2008-04-23. 
  7. ^ Did bomb threat stifle vote? (Capital Times)
  8. ^ Sullivan, Joseph F. (1993-11-13). "Florio's Defeat Revives Memories of G.O.P. Activities in 1981". New York Times. http://query.nytimes.com/gst/fullpage.html?res=9F0CE6D91638F932A25752C1A965958260. Retrieved 2008-10-07. 
  9. ^ a b Intimidation and Deceptive Practices EP365
  10. ^ Intimidation and Deceptive Practices
  11. ^ Incidents Of Voter Intimidation & Suppression
  12. ^ Joseph Grego, A history of parliamentary elections and electioneering in the old days (1886) pp 226-28 online
  13. ^ Parliamentary Electorates And Elections Act 1912 - Section 149, New South Wales Consolidated Acts
  14. ^ Herbeck, Dan (November 15, 2011). Resentments abound in Seneca power struggle. The Buffalo News. Retrieved November 16, 2011.
  15. ^ Wisconsin Democratic voters targeted with Koch-funded absentee ballot notices advising them to vote two days after the recall election. 2 August 2011. http://boingboing.net/2011/08/02/wisconsin-democratic-voters-targeted-with-koch-funded-absentee-ballot-notices-advising-them-to-vote-2-days-after-the-recall-election.html
  16. ^ Lacayo, Richard. "Florida recount: In the eye of the storm". CNN. http://archives.cnn.com/2000/ALLPOLITICS/stories/11/13/recount.tm/index.html. 
  17. ^ Hicks, Jonathon (July 24, 2004). "Seeing Double on Ballot: Similar Names Sow Confusion". The New York Times (The New York Times Company). http://query.nytimes.com/gst/fullpage.html?res=9901E7D9173DF937A15754C0A9629C8B63&n=Top/Reference/Times%20Topics/Organizations/B/Board%20of%20Elections. Retrieved 18 December 2008. 
  18. ^ Stealing Elections, Revised and Updated: How Voter Fraud Threatens Our Democracy / John Fund (2008) ISBN 1-59403-224-6.
  19. ^ Is "Ghost" Voting Acceptable?
  20. ^ a b c Lundin, Leigh (2008-08-17). "Dangerous Ideas". Voting Fiasco, Part 279.236(a). Criminal Brief. http://criminalbrief.com/?p=1892. Retrieved 2010-10-07. 
  21. ^ Kiesling, John Brady, "Charting Electoral Fraud: Turnout Distribution Analysis as a Tool for Election Assessment"; [2]
  22. ^ Shpilkin, Sergey, Mathematics of Elections [3] [4]
  23. ^ Walter R. Mebane, Jr., Kirill Kalinin, Comparative Election Fraud Detection; [5]
  24. ^ Reform der Wahlprüfung (German).
  25. ^ Vote Fraud Ruling Shifts Pennsylvania Senate New York Times, February 19, 1994.
  26. ^ Jeannette I. Andrade (2011-11-18). "Electoral sabotage case filed vs Arroyo, Ampatuan, Bedol". Philippine Daily Inquirer. http://newsinfo.inquirer.net/96265/comelec-files-poll-sabotage-raps-vs-arroyo. 
  27. ^ http://www.computerworld.com/s/article/9220356/Argonne_researchers_hack_Diebold_e_voting_system_
  28. ^ Layton, J.. "How can someone tamper with an electronic voting machine". http://people.howstuffworks.com/vote-tampering.htm. Retrieved 2011-02-27. 
  29. ^ Security Analysis of the Diebold AccuVote-TS Voting Machine.
  30. ^ Nedap/Groenendaal ES3B voting computer a security analysis.
  31. ^ Test run for voting (Miami Herald, 10/31/2006).
  32. ^ a b Bonsor and Strickland, Kevin and Jonathan. "How E-Voting Works". http://people.howstuffworks.com/e-voting2.htm. Retrieved 2011-02-27. 
  33. ^ Nedap/Groenendaal ES3B voting computer a security analysis (chapter 7.1).
  34. ^ Kohno, T.. "Analysis of Electronic Voting System". http://people.howstuffworks.com/framed.htm?parent=vote-tampering.htm&url=http://avirubin.com/vote.pdf#search=%22electronic%20voting%20tampering%22. Retrieved 2011-02-27. 
  35. ^ Mount, S.. "The Election of 2000". http://www.usconstitution.net/elec2000.html. Retrieved 2011-02-27. 
  36. ^ Gill, K.. "Help America Vote Act - HAVA". http://uspolitics.about.com/od/elections/a/hava.htm. Retrieved 2011-02-27. 
  37. ^ http://www.geoffmetcalf.com/qa/21756.html
  38. ^ http://www.computerworld.com/s/article/9220356/Argonne_researchers_hack_Diebold_e_voting_system_

Further reading

External links