Law
Because U.S. states have primary responsibility for conducting elections, including federal elections, many forms of electoral fraud are prosecuted as state crimes. State election offenses include voter impersonation, double voting, ballot stuffing, tampering with voting machines, and fraudulent registration. Penalties vary widely by state and can include fines, imprisonment, loss of voting rights, and disqualification from holding public office. The U.S. federal government prosecutes electoral crimes including voter intimidation, conspiracy to commit election fraud, bribery, interference with the right to vote, and fraud related to absentee ballots in federal elections. In France, someone guilty may be fined and/or imprisoned for not more than one year, or two years if the person is a public official.Electorate manipulation
Electoral fraud can occur in advance of voting if the composition of the electorate is altered. The legality of this type of manipulation varies across jurisdictions. Deliberate manipulation of election outcomes is widely considered a violation of the principles of democracy.Artificial migration or party membership
In many cases, it is possible for authorities to artificially control the composition of an electorate in order to produce a foregone result. One way of doing this is to move a large number of voters into the electorate prior to an election, for example by temporarily assigning them land or lodging them in flophouses. Many countries prevent this with rules stipulating that a voter must have lived in an electoral district for a minimum period (for example, six months) in order to be eligible to vote there. However, such laws can also be used for demographic manipulation as they tend to disenfranchise those with no fixed address, such as the homeless, travelers, Roma, students (studying full-time away from home), and some casual workers. Another strategy is to permanently move people into an electoral district, usually through public housing. If people eligible for public housing are likely to vote for a particular party, then they can either be concentrated into one area, thus making their votes count for less, or moved into marginal seats, where they may tip the balance towards their preferred party. One example of this was the 1986–1990 Homes for votes scandal in the City of Westminster in England under Shirley Porter. Immigration law may also be used to manipulate electoral demography. For instance,Disenfranchisement
The composition of an electorate may also be altered by disenfranchising some classes of people, rendering them unable to vote. In some cases, states had passed provisions that raised general barriers to voter registration, such as poll taxes, literacy and comprehension tests, and record-keeping requirements, which in practice were applied against minority populations to discriminatory effect. From the turn of the century into the late 1960s, most African Americans in the southern states comprising the former Confederacy were disenfranchised by such measures. Corrupt election officials may misuse voting regulations such as a literacy test or requirement for proof of identity or address in such a way as to make it difficult or impossible for their targets to cast a vote. If such practices discriminate against a religious or ethnic group, they may so distort the political process that the political order becomes grossly unrepresentative, as in the post- Reconstruction or Jim Crow era until the Voting Rights Act of 1965. Felons have been disenfranchised in many states as a strategy to prevent African Americans from voting. Groups may also be disenfranchised by rules which make it impractical or impossible for them to cast a vote. For example, requiring people to vote within their electorate may disenfranchise serving military personnel, prison inmates, students, hospital patients or anyone else who cannot return to their homes. Polling can be set for inconvenient days, such as midweek or on holy days of religious groups: for example on the Sabbath or other holy days of a religious group whose teachings determine that voting is prohibited on such a day. Communities may also be effectively disenfranchised if polling places are situated in areas perceived by voters as unsafe, or are not provided within reasonable proximity (rural communities are especially vulnerable to this). In some cases, voters may be invalidly disenfranchised, which is true electoral fraud. For example, a legitimate voter may be "accidentally" removed from the electoral roll, making it difficult or impossible for the person to vote. In the Canadian federal election of 1917, during the Great War, the Canadian government, led by the Union Party, passed the '' Military Voters Act'' and the '' Wartime Elections Act''. The ''Military Voters Act'' permitted any active military personnel to vote by party only and allowed that party to decide in which electoral district to place that vote. It also enfranchised those women who were directly related or married to an active soldier. These groups were believed to be disproportionately in favor of the Union government, as that party was campaigning in favor of conscription. The ''Wartime Elections Act'', conversely, disenfranchised particular ethnic groups assumed to be disproportionately in favour of the opposition Liberal Party.Division of opposition support
Stanford University professor Beatriz Magaloni described a model governing the behaviour of autocratic regimes. She proposed that ruling parties can maintain political control under a democratic system without actively manipulating votes or coercing the electorate. Under the right conditions, the democratic system is maneuvered into an equilibrium in which divided opposition parties act as unwitting accomplices to single-party rule. This permits the ruling regime to abstain from illegal electoral fraud. Preferential voting systems such as score voting and single transferable vote, and in some cases,Intimidation
Voter intimidation involves putting undue pressure on a voter or group of voters so that they will vote a particular way, or not at all. Absentee and other remote voting can be more open to some forms of intimidation as the voter does not have the protection and privacy of the polling location. Intimidation can take a range of forms including verbal, physical, or coercion. This was so common that in 1887, a Kansas Supreme Court in ''New Perspectives on Election Fraud in The Gilded Age'' said " ..physical retaliation constituted only a slight disturbance and would not vitiate an election."Violence or threats of violence
In its simplest form, voters from a particular demographic or known to support a particular party or candidate are directly threatened by supporters of another party or candidate or by those hired by them. In other cases, supporters of a particular party make it known that if a particular village or neighborhood is found to have voted the 'wrong' way, reprisals will be made against that community. Another method is to make a general threat of violence, for example, a bomb threat which has the effect of closing a particular polling place, thus making it difficult for people in that area to vote. One notable example of outright violence was the 1984 Rajneeshee bioterror attack, where followers of Bhagwan Shree Rajneesh deliberately contaminated salad bars in The Dalles, Oregon, in an attempt to weaken political opposition during county elections. Historically, this tactic included Lynching in the United States to terrorize potential African American voters in some areas. Polling places in an area known to support a particular party or candidate may be targeted for vandalism, destruction or threats, thus making it difficult or impossible for people in that area to vote.Legal threats
In this case, voters will be made to believe, accurately or otherwise, that they are not legally entitled to vote, or that they are legally obliged to vote a particular way. Voters who are not confident about their entitlement to vote may also be intimidated by real or implied authority figures who suggest that those who vote when they are not entitled to will be imprisoned, deported or otherwise punished. For example, in 2004, in Wisconsin and elsewhere voters allegedly received flyers that said, "If you already voted in any election this year, you can't vote in the Presidential Election", implying that those who had voted in earlier primary elections were ineligible to vote. Also, "If anybody in your family has ever been found guilty of anything you can't vote in the Presidential Election." Finally, "If you violate any of these laws, you can get 10 years in prison and your children will be taken away from you."Coercion
Employers can coerce the voters' decision, through strategies such as explicit or implicit threats of job loss.Disinformation
People may distribute false or misleading information in order to affect the outcome of an election. For example, in the Chilean presidential election of 1970, the U.S. government's Central Intelligence Agency used "black propaganda"—materials purporting to be from various political parties—to sow discord between members of a coalition between socialists and communists. Another method, allegedly used in Cook County, Illinois, in 2004, is to falsely tell particular people that they are not eligible to vote In 1981 in New Jersey, the Republican National Committee created the Ballot Security Task Force to discourage voting among Latino and African-American citizens of New Jersey. The task force identified voters from an old registration list and challenged their credentials. It also paid off-duty police officers to patrol polling sites in Newark and Trenton, and posted signs saying that falsifying a ballot is a crime. Another use of disinformation is to give voters incorrect information about the time or place of polling, thus causing them to miss their chance to vote. As part of the 2011 Canadian federal election voter suppression scandal, Elections Canada traced fraudulent phone calls, telling voters that their polling stations had been moved, to a telecommunications company that worked with the Conservative Party. Similarly in the United States, right-wing political operatives Jacob Wohl and Jack Burkman were indicted on several counts of bribery and election fraud in October 2020 regarding a voter disinformation scheme they undertook in the months prior to theFalse claims of fraud
Dead people voting
Dead people voting refers to instances where ballots are fraudulently cast in the name of deceased individuals. While concerns about this type of electoral fraud often arise, studies suggest that such cases are extremely rare. In many democratic systems, safeguards exist to prevent this, such as regularly updating voter rolls and requiring identification at polling stations. However, in some cases, fraudulent actors may exploit outdated records or use the identification of deceased individuals to attempt illegal voting. In Indonesia, dead people voting occurred during the 2020 local elections and the 2024 general election. There have been similar incidents reported in smaller regional elections.Vote buying
Vote buying occurs when a political party or candidate seeks to buy the vote of a voter in an upcoming election. Vote buying can take various forms such as a monetary exchange, as well as an exchange for necessary goods or services.Voting process and results
A list of threats to voting systems, or electoral fraud methods considered as sabotage are kept by theMisleading or confusing ballot papers
Ballot papers may be used to discourage votes for a particular party or candidate, using the design or other features which confuse voters into voting for a different candidate. For example, in the 2000 U.S. presidential election, Florida's butterfly ballot paper was criticized as poorly designed, leading some voters to vote for the wrong candidate. While the ballot itself was designed by a Democrat, it was the Democratic candidate, Al Gore, who was most harmed by voter errors because of this design. Poor or misleading design is usually not illegal and therefore not technically election fraud, but it can nevertheless subvert the principles of democracy.Ballot stuffing
Ballot stuffing, or "ballot-box stuffing", is the illegal practice of one person submitting multiple ballots during a vote in which only one ballot per person is permitted. * In the 1883 election for the district of Cook, in Queensland, Australia, arrests were made in connection with accusations of ballot stuffing, and the election committee subsequently changed the result of the election * A 2006 version of the Sequoia touchscreen voting machine had a yellow service "back" button on the back that could allow repeated voting under specific circumstances *During the 2014 Afghan presidential election, Afghanistan's National Directorate of Security (NDS) recorded Ziaul Haq Amarkhel, the secretary of Afghanistan's Independent Election Commission, telling local officials to "take sheep to the mountains, stuff them, and bring them back", in an apparent reference to ballot stuffing * During the 2018 Russian presidential election, there were multiple instances, some caught on camera, throughout Russia of voters and polling staff alike stuffing multiple votes in the ballot box *Misrecording of votes
Votes may be misrecorded at source, on a ballot paper or voting machine, or later in misrecording totals. TheMisuse of proxy votes
Proxy voting is particularly vulnerable to election fraud, due to the amount of trust placed in the person who casts the vote. In several countries, there have been allegations of retirement home residents being asked to fill out 'absentee voter' forms. When the forms are signed and gathered, they are secretly rewritten as applications for proxy votes, naming party activists or their friends and relatives as the proxies. These people, unknown to the voter, cast the vote for the party of their choice. In theDestruction of ballots
One of methods of electoral fraud is to destroy ballots for an opposing candidate or party. While mass destruction of ballots can be difficult to achieve without drawing attention to it, in a very close election it may be possible to destroy a small number of ballot papers without detection, thereby changing the overall result. Blatant destruction of ballot papers can render an election invalid and force it to be re-run. If a party can improve its vote on the re-run election, it can benefit from such destruction as long as it is not linked to it. During the Bourbon Restoration in late 19th century Spain, the organized “loss” of voting slips ('' pucherazo'') was used to maintain the agreed alternation between the Liberals and the Conservatives. This system of local political domination, especially rooted in rural areas and small cities, was known as '' caciquismo''.Invalidation of ballots
Another method is to make it appear that the voter has spoiled his or her ballot, thus rendering it invalid. Typically this would be done by adding another mark to the paper, making it appear that the voter has voted for more candidates than entitled, for instance. It would be difficult to do this to a large number of paper ballots without detection in some locales, but altogether too simple in others, especially jurisdictions where legitimate ballot spoiling by voter would serve a clear and reasonable aim: for example emulating protest votes in jurisdictions that have recently had and since abolished a "none of the above" or "against all" voting option; civil disobedience where voting is mandatory; and attempts at discrediting or invalidating an election. An unusually large share of invalidated ballots may be attributed to loyal supporters of candidates that lost in primaries or previous rounds, did not run or did not qualify to do so, or some manner of protest movement or organized boycott. In 2016, during the EU membership referendum, Leave-supporting voters in the UK alleged without evidence that the pencils supplied by voting stations would allow votes to be erased their votes from the ballot.Tampering with electronic voting systems
General tampering
All voting systems face threats of some form of electoral fraud. The types of threats that affect voting machines vary. Research at Argonne National Laboratories revealed that a single individual with physical access to a machine, such as a Diebold Accuvote TS, can install inexpensive, readily available electronic components to manipulate its functions. Other approaches include: * Tampering with theSouth Africa
In 1994, the election which brought majority rule and put Nelson Mandela in office, South Africa's election compilation system was hacked, so they re-tabulated by hand.Ukraine
In 2014, Ukraine's central election system was hacked. Officials found and removed a virus and said the totals were correct.Voter impersonation
United Kingdom
Academic research has generally found voter impersonation to be 'exceptionally rare' in the UK. TheUnited States
Voter impersonation is considered extremely rare in the US by experts. Since 2013, several states have passed voter ID laws to counter voter impersonation. Voter ID requirements are generally popular among Americans and proponents have argued that it can be difficult to detect voter impersonation without them. Voter ID laws' effectiveness given the rarity of voter impersonation, and their potential to disenfranchise citizens without the right ID have created controversy. By August 2016, four federal court rulings (Texas, North Carolina, Wisconsin, and North Dakota) overturned laws or parts of such laws because they placed undue burdens on minorities. Allegations of widespread voter impersonation often turn out to be false. The North Carolina Board of Elections reported in 2017 that out of 4,769,640 votes cast in the November 2016 election in North Carolina, only one illegal vote would potentially have been blocked by the voter ID law. The investigation found fewer than 500 incidences of invalid ballots cast, the vast majority of which were cast by individuals on probation forArtificial results
In particularly corrupt regimes, the voting process may be nothing more than a sham, to the point that officials simply announce whatever results they want, sometimes without even bothering to count the votes. While such practices tend to draw international condemnation, voters typically have little if any recourse, as there would seldom be any ways to remove the fraudulent winner from power, short of a revolution. In Turkmenistan, incumbent President Gurbanguly Berdymukhamedov received 97.69% of votes in the 2017 election, with his sole opponent, who was seen as pro-government, in fact being appointed by Berdymukhamedov. In Georgia, Mikheil Saakashvili received 96.2% of votes in the election following the Rose Revolution while his ally Nino Burjanadze was an interim head of state.Postal ballot fraud
In both the United Kingdom and the United States, experts estimate that voting fraud by mail has affected only a few local elections, without likely any impact at the national level. In April 2020, a 20-year voter fraud study by theNon-citizen voting
Canada
In 2019, Elections Canada identified 103,000 non-citizens who were illegally on Canada's federal voters register. It subsequently identified roughly 3,500 cases of potential non-citizens who voted in 2019, but noted that it was not a coordinated effort and did not affect the result in any riding. "But almost a year after Canadians headed to the polls, the agency says it's still trying to determine how many of those cases — if any — involved non-Canadian citizens casting ballots."United States
Illegal non-citizen voting is considered extremely rare in the United States by most experts due to the severe penalties associated with the practice including deportation, incarceration or fines in addition to jeopardizing their attempt to naturalize. The federal form to register a voter does not require proof of citizenship, though non-citizens have been found to vote only in very small numbers.In legislature
Vote fraud can also take place in legislatures. Some of the forms used in national elections can also be used in parliaments, particularly intimidation and vote-buying. Because of the much smaller number of voters, however, election fraud in legislatures is qualitatively different in many ways. Fewer people are needed to 'swing' the election, and therefore specific people can be targeted in ways impractical on a larger scale. For example,Detection and prevention
The three main strategies for the prevention of electoral fraud in society are: # Auditing the election process # Deterrence through consistent and effective prosecution # Cultivation of mores that discourage corruption Some of the main fraud prevention tactics can be summarised as secrecy and openness. The secret ballot prevents many kinds of intimidation and vote selling, while transparency at all other levels of the electoral process prevents and allows detection of most interference. Electoral fraud is generally considered difficult to prove, as perpetrators are highly motivated to conceal their acts. Researchers must often rely on inferential methods to uncover unusual patterns that could indicate election fraud, as fraud often cannot be observed directly.Election audits
Election auditing refers to any review conducted after polls close for the purpose of determining whether the votes were counted accurately (a results audit) or whether proper procedures were followed (a process audit), or both. Audits vary and can include checking that the number of voters signed in at the polls matches the number of ballots, seals on ballot boxes and storage rooms are intact, computer counts (if used) match hand counts, and counts are accurately totaled. Election recounts are a specific type of audit, with elements of both results and process audits.Prosecution
In the United States the goal of prosecutions is not to stop fraud or keep fraudulent winners out of office; it is to deter and punish years later. The Justice Department has published ''Federal Prosecution of Election Offenses'' in eight editions from 1976 to 2017, under Presidents Ford, Carter, Reagan, Clinton, Bush and Trump. It says, "Department does not have authority to directly intercede in the election process itself. ... overt criminal investigative measures should not ordinarily be taken ... until the election in question has been concluded, its results certified, and all recounts and election contests concluded." Sentencing guidelines provide a range of 0–21 months in prison for a first offender; offense levels range from 8 to 14. Investigation, prosecution and appeals can take over 10 years. In theSecret ballot
The secret ballot, in which only the voter knows how they have voted, is believed by many to be a crucial part of ensuring free and fair elections through preventing voter intimidation or retribution. Others argue that the secret ballot enables election fraud (because it makes it harder to verify that votes have been counted correctly) and that it discourages voter participation. Although the secret ballot was sometimes practiced inTransparency
Most methods of preventing electoral fraud involve making the election process completely transparent to all voters, from nomination of candidates through casting of the votes and tabulation. A key feature in ensuring the integrity of any part of the electoral process is a strict chain of custody. To prevent fraud in central tabulation, there has to be a public list of the results from every single polling place. This is the only way for voters to prove that the results they witnessed in their election office are correctly incorporated into the totals. End-to-end auditable voting systems provide voters with a receipt to allow them to verify their vote was cast correctly, and an audit mechanism to verify that the results were tabulated correctly and all votes were cast by valid voters. However, the ballot receipt does not permit voters to prove to others how they voted, since this would open the door towards forced voting and blackmail. End-to-end systems include Punchscan and Scantegrity, the latter being an add-on to optical scan systems instead of a replacement. In many cases, election observers are used to help prevent fraud and assure voters that the election is fair. International observers (bilateral and multilateral) may be invited to observe the elections (examples include election observation by the Organisation for Security and Cooperation in Europe (OSCE), European Union election observation missions, observation missions of the Commonwealth of Independent States (CIS), as well as international observation organised by NGOs, such as CIS-EMO, European Network of Election Monitoring Organizations (ENEMO), etc.). Some countries also invite foreign observers (i.e. bi-lateral observation, as opposed to multi-lateral observation by international observers). In addition, national legislatures of countries often permit domestic observation. Domestic election observers can be either partisan (i.e. representing interests of one or a group of election contestants) or non-partisan (usually done by civil society groups). Legislations of different countries permit various forms and extents of international and domestic election observation. Election observation is also prescribed by various international legal instruments. For example, paragraph 8 of the 1990 Copenhagen Document states that "The SCEparticipating States consider that the presence of observers, both foreign and domestic, can enhance the electoral process for States in which elections are taking place. They, therefore, invite observers from any other CSCE participating States and any appropriate private institutions and organisations who may wish to do so to observe the course of their national election proceedings, to the extent permitted by law. They will also endeavour to facilitate similar access for election proceedings held below the national level. Such observers will undertake not to interfere in the electoral proceedings". Critics note that observers cannot spot certain types of election fraud like targeted voter suppression or manipulated software of voting machines.Statistical indicators and election forensics
Various forms of statistics can be indicators of election fraud—e.g., exit polls which diverge from the final results. Well-conducted exit polls serve as a deterrent to electoral fraud. However, exit polls are still notoriously imprecise. For instance, in the Czech Republic, some voters are afraid or ashamed to admit that they voted for the Communist Party (exit polls in 2002 gave the Communist party 2–3 percentage points less than the actual result). Variations in willingness to participate in an exit poll may result in an unrepresentative sample compared to the overall voting population. When elections are marred by ballot-box stuffing (e.g., the Armenian presidential elections of 1996 and 1998), the affected polling stations will show abnormally high voter turnouts with results favouring a single candidate. By graphing the number of votes against turnout percentage (i.e., aggregating polling stations results within a given turnout range), the divergence from bell-curve distribution gives an indication of the extent of the fraud. Stuffing votes in favour of a single candidate affects votes vs. turnout distributions for that candidate and other candidates differently; this difference could be used to quantitatively assess the number of votes stuffed. Also, these distributions sometimes exhibit spikes at round-number turnout percentage values. High numbers of invalid ballots, overvoting or undervoting are other potential indicators. Risk-limiting audits are methods to assess the validity of an election result statistically without the effort of a full election recount. Though election forensics can determine if election results are anomalous, the statistical results still need to be interpreted. Alan Hicken and Walter R. Mebane describe the results of election forensic analyses as not providing "definitive proof" of fraud. Election forensics can be combined with other fraud detection and prevention strategies, such as in-person monitoring.Voting machine integrity
One method for verifying voting machine accuracy is 'parallel testing', the process of using an independent set of results compared to the original machine results. Parallel testing can be done prior to or during an election. During an election, one form of parallel testing is the voter-verified paper audit trail (VVPAT) or verified paper record (VPR). A VVPAT is intended as an independent verification system for voting machines designed to allow voters to verify that their vote was cast correctly, to detect possible election fraud or malfunction, and to provide a means to audit the stored electronic results. This method is only effective if statistically significant numbers of voters verify that their intended vote matches both the electronic and paper votes. On election day, a statistically significant number of voting machines can be randomly selected from polling locations and used for testing. This can be used to detect potential fraud or malfunction unless manipulated software would only start to cheat after a certain event like a voter pressing a special key combination (Or a machine might cheat only if someone does not perform the combination, which requires more insider access but fewer voters). Another form of testing is 'Logic & Accuracy Testing (L&A)', pre-election testing of voting machines using test votes to determine if they are functioning correctly.Open source
Another method to ensure the integrity of electronic voting machines is independent software verification and certification. Once a software is certified, code signing can ensure the software certified is identical to that which is used on election day. Some argue certification would be more effective if voting machine software was publicly available or open source. VotingWorks has created an open-source voting system in the United States. Certification and testing processes conducted publicly and with oversight from interested parties can promote transparency in the election process. The integrity of those conducting testing can be questioned. Testing and certification can prevent voting machines from being a black box where voters cannot be sure that counting inside is done as intended. One method that people have argued would help prevent these machines from being tampered with would be for the companies that produce the machines to share the source code, which displays and captures the ballots, with computer scientists. This would allow external sources to make sure that the machines are working correctly.See also
* Administrative resource * Branch stacking * Carousel voting * Cooping * Election ink * Electoral fraud in the United States * Electoral integrity * Foreign electoral intervention * Gerrymandering * Identity document forgeryFurther reading
General
* Simpser, Alberto. ''Why Governments and Parties Manipulate Elections: Theory, Practice, and Implications'' (Cambridge University Press, 2013) * Schaffer, Frederic Charles. ''The hidden costs of clean election reform'' (Cornell University Press, 2008) * Lehoucq, Fabrice. "Electoral fraud: Causes, types, and consequences". ''Annual review of political science'' (2003) 6#1 pp. 233–256.Latin America
* Posada-Carbó, Eduardo. "Electoral Juggling: A Comparative History of the Corruption of Suffrage in Latin America, 1830–1930". ''Journal of Latin American Studies'' (2000). pp. 611–644. * Silva, Marcos Fernandes da. "The political economy of corruption in Brazil". ''Revista de Administração de Empresas'' (1999) 39#3 pp. 26–41. * Molina, Iván and Fabrice Lehoucq. "Political Competition and Electoral Fraud: A Latin American Case Study", ''Journal of Interdisciplinary History'' (1999) 30#2 pp. 199–234Russia
* Reuter, O., & Szakonyi, D. (2021).United Kingdom
* Harling, Philip. "Rethinking "Old Corruption", ''Past & Present'' (1995) No. 147 pp. 127–158 * O'Gorman, Frank. ''Voters, Patrons and Parties: The Unreformed Electoral System of Hanoverian England, 1734–1832'' (Oxford, 1989). * O'Leary, Cornelius. ''The elimination of corrupt practices in British elections, 1868–1911'' (Clarendon Press, 1962)United States
* * * *References
External links
{{Fraud Organized crime activity Fraud Voter suppression