Search This Blog

Tuesday, July 20, 2021

Corruption

From Wikipedia, the free encyclopedia

A 1902 cartoon depicts a police officer whose eyes are covered with a cloth labelled "bribes",

Corruption, as it is defined by the World Bank, is a form of dishonesty or a criminal offense which is undertaken by a person or an organization which is entrusted with a position of authority, in order to acquire illicit benefits or abuse power for one's private gain. Corruption may involve many activities which include bribery and embezzlement, and it may also involve practices which are legal in many countries. Political corruption occurs when an office-holder or other governmental employee acts in an official capacity for personal gain. Corruption is most common in kleptocracies, oligarchies, narco-states, and mafia states.

Corruption and crime are endemic sociological occurrences which appear with regular frequency in virtually all countries on a global scale in varying degrees and proportions. Each individual nation allocates domestic resources for the control and regulation of corruption and the deterrence of crime. Strategies which are undertaken in order to counter corruption are often summarized under the umbrella term anti-corruption. Additionally, global initiatives like the United Nations Sustainable Development Goal 16 also have a targeted goal which is supposed to substantially reduce corruption in all of its forms.

Definitions and scales

A billboard in Zambia exhorting the public to "Just say no to corruption".

Stephen D. Morris, a professor of politics, wrote that political corruption is the illegitimate use of public power to benefit a private interest. Economist Ian Senior defined corruption as an action to secretly provide a good or a service to a third party so that he or she can influence certain actions which benefit the corrupt, a third party, or both in which the corrupt agent has authority. World Bank economist Daniel Kaufmann extended the concept to include "legal corruption" in which power is abused within the confines of the law—as those with power often have the ability to make laws for their protection. The effect of corruption in infrastructure is to increase costs and construction time, lower the quality and decrease the benefit.

Corruption can occur on different scales. Corruption ranges from small favors between a small number of people (petty corruption), to corruption that affects the government on a large scale (grand corruption), and corruption that is so prevalent that it is part of the everyday structure of society, including corruption as one of the symptoms of organized crime (Systemic corruption).

A number of indicators and tools have been developed which can measure different forms of corruption with increasing accuracy; but when those are impractical, one study suggests looking at bodyfat as a rough guide after finding that obesity of cabinet ministers in post-Soviet states was highly correlated with more accurate measures of corruption.

Petty corruption

Petty corruption occurs at a smaller scale and takes place at the implementation end of public services when public officials meet the public. For example, in many small places such as registration offices, police stations, state licensing boards, and many other private and government sectors.

Grand corruption

Grand corruption is defined as corruption occurring at the highest levels of government in a way that requires significant subversion of the political, legal and economic systems. Such corruption is commonly found in countries with authoritarian or dictatorial governments but also in those without adequate policing of corruption.

The government system in many countries is divided into the legislative, executive and judicial branches in an attempt to provide independent services that are less subject to grand corruption due to their independence from one another.

Systemic corruption

Systemic corruption (or endemic corruption) is corruption which is primarily due to the weaknesses of an organization or process. It can be contrasted with individual officials or agents who act corruptly within the system.

Factors which encourage systemic corruption include conflicting incentives, discretionary powers; monopolistic powers; lack of transparency; low pay; and a culture of impunity. Specific acts of corruption include "bribery, extortion, and embezzlement" in a system where "corruption becomes the rule rather than the exception." Scholars distinguish between centralized and decentralized systemic corruption, depending on which level of state or government corruption takes place; in countries such as the Post-Soviet states both types occur. Some scholars argue that there is a negative duty of western governments to protect against systematic corruption of underdeveloped governments.

Corruption has been a major issue in China, where society depends heavily on personal relationships. By the late 20th century that combined with the new lust for wealth, produced escalating corruption. Historian Keith Schoppa says that bribery was only one of the tools of Chinese corruption, which also included, "embezzlement, nepotism, smuggling, extortion, cronyism, kickbacks, deception, fraud, squandering public monies, illegal business transactions, stock manipulation and real estate fraud." Given the repeated anti-corruption campaigns it was a prudent precaution to move as much of the fraudulent money as possible overseas.

As a Post-Soviet Union country - Armenia is also facing corruption-related issues. This has been transferred to Armenia as well as other Soviet Union Member Republics as a heritage. Armenia was a pleasant exception. After the Armenian Velvet Revolution in 2018 new government made the fight against corruption an official top priority.  'Anti-corruption Strategy' seemed to give results as it upgraded from 105th place in CPI score to 60th in just two years. 

In Latin American countries, corruption is permitted as a result of the cultural norms of the institution. In countries like the United States, there is a relatively strong sense of trust among strangers, one that is not found in Latin American countries. In Latin American countries, this trust does not exist, whereas the social norms imply that no stranger is responsible for the wellbeing or happiness of another stranger. Instead, the trust is found in acquaintances. Acquaintances are treated with trust and respect—a level of trust that is not found among acquaintances in countries like the United States. This is what permits for corruption in Latin American countries. If there is a strong enough trust within an administration that no one will betray the rest, corruptive policies will take place with ease. In the United States, this could not occur, as there is not a strong enough trust among the members of an administration to allow for corruption. In Latin American countries, there is a stronger value in individuality, which includes that of acquaintances, unlike in countries like the United States, which fails to include acquaintances. 

Causes

Per R. Klitgaard corruption will occur if the corrupt gain is greater than the penalty multiplied by the likelihood of being caught and prosecuted:

Corrupt gain > Penalty × Likelihood of being caught and prosecuted

Klitgaard has also coined a metaphorical formula to illustrate how the amount of corruption depends on three variables: monopoly (M) on the supply of a good or service, the discretion (D) enjoyed by suppliers, and the supplier's accountability and transparency (A) to others. The amount of corruption (C) could be expressed as:

C = M + D – A.

Since a high degree of monopoly and discretion accompanied by a low degree of transparency does not automatically lead to corruption, a fourth variable of "morality" or "integrity" has been introduced by others. The moral dimension has an intrinsic component and refers to a "mentality problem", and an extrinsic component referring to circumstances like poverty, inadequate remuneration, inappropriate work conditions and inoperable or over-complicated procedures which demoralize people and let them search for "alternative" solutions. Hence the amended Klitgaard equation is

Degree of corruption = Monopoly + Discretion – Transparency – Morality

According to a 2017 survey study, the following factors have been attributed as causes of corruption:

  • Greed of money, desires.
  • Higher levels of market and political monopolization
  • Low levels of democracy, weak civil participation and low political transparency
  • Higher levels of bureaucracy and inefficient administrative structures
  • Low press freedom
  • Low economic freedom
  • Large ethnic divisions and high levels of in-group favoritism
  • Gender inequality
  • Poverty
  • Political instability
  • Weak property rights
  • Contagion from corrupt neighboring countries
  • Low levels of education
  • Lack of commitment to society
  • Extravagant family

It has been noted that in a comparison of the most corrupt with the least corrupt countries, the former group contains nations with huge socio-economic inequalities, and the latter contains nations with a high degree of social and economic justice.

In different sectors

Corruption can occur in many sectors, whether they be public or private industry or even NGOs (especially in public sector). However, only in democratically controlled institutions is there an interest of the public (owner) to develop internal mechanisms to fight active or passive corruption, whereas in private industry as well as in NGOs there is no public control. Therefore, the owners' investors' or sponsors' profits are largely decisive.

Government/public sector

Public corruption includes corruption of the political process and of government agencies such as tax collectors and the police, as well as corruption in processes of allocating public funds for contracts, grants, and hiring. Recent research by the World Bank suggests that who makes policy decisions (elected officials or bureaucrats) can be critical in determining the level of corruption because of the incentives different policy-makers face.

Within the political system

A political cartoon from Harper's Weekly, 26 January 1878, depicting U.S. Secretary of the Interior Carl Schurz investigating the Indian Bureau at the U.S. Department of the Interior. The original caption for the cartoon is: "THE SECRETARY OF THE INTERIOR INVESTIGATING THE INDIAN BUREAU. GIVE HIM HIS DUE, AND GIVE THEM THEIR DUES."

Political corruption is the abuse of public power, office, or resources by elected government officials for personal gain, by extortion, soliciting or offering bribes. It can also take the form of office holders maintaining themselves in office by purchasing votes by enacting laws which use taxpayers' money. Evidence suggests that corruption can have political consequences- with citizens being asked for bribes becoming less likely to identify with their country or region.

The political act of graft (American English), is a well known and now global form of political corruption, being the unscrupulous and illegal use of a politician's authority for personal gain, when funds intended for public projects are intentionally misdirected in order to maximize the benefits to illegally private interests of the corrupted individual(s) and their cronies. In some cases government institutions are "repurposed" or shifted away from their official mandate to serve other, often corrupt purposes.

The Kaunas "Golden Toilet".

The Kaunas golden toilet case was a major Lithuanian scandal. In 2009, the municipality of Kaunas (led by mayor Andrius Kupčinskas) ordered that a shipping container was to be converted into an outdoor toilet at a cost of 500,000 litai (around 150,000 euros). It was to also require 5,000 litai (1,500 euros) in monthly maintenance costs. At the same time when Kaunas's "Golden Toilet" was built, Kėdainiai tennis club acquired a very similar, but more advanced solution for 4,500 euros. Because of the inflated cost of the outdoor toilet, it was nicknamed the "Golden Toilet". Despite the investment, the "Golden Toilet" remained closed for years due to the dysfunctionality and was a subject of a lengthy anti-corruption investigation into those who had created it and the local municipality even considered demolishing the building at one point. The group of public servants involved in the toilet's procurement received various prison sentences for recklessness, malfeasance, misuse of power and document falsifications in a 2012 court case, but were cleared of their corruption charges and received compensation, which pushed the total construction cost and subsequent related financial losses to 352,000 euros.

On 7 July 2020, Carnegie Endowment for International Peace, a global think tank, released a report claiming the Emirati city, Dubai, of being an enabler of global corruption, crime and illicit financial flows. It stated that the global corrupt and criminal actors either operated through or from Dubai. The city was also called a haven for trade-based money laundering, as it gives space to free trade zones, with minimal regulatory laws and customs enforcement.

Within the police

Police corruption is a specific form of police misconduct designed to obtain financial benefits, personal gain, career advancement for a police officer or officers in exchange for not pursuing or selectively pursuing an investigation or arrest or aspects of the "thin blue line" itself where force members collude in lies to protect their precincts, unions and/or other law enforcement members from accountability. One common form of police corruption is soliciting or accepting bribes in exchange for not reporting organized drug or prostitution rings or other illegal activities. When civilians become witnesses to police brutality, officers are often known to respond by harassing and intimidating the witnesses as retribution for reporting the misconduct. Whistleblowing is not common in law enforcement, one of the main reasons being because officers who do so, normally face reprisal by being fired, being forced to transfer to another department, being demoted, being shunned, losing friends, not being given back-up during emergencies, receiving professional or even physical threats as well as having threats be made against friends or relatives of theirs or having their own misconduct exposed, in response to reporting the misconduct of other officers. In America another common form of police corruption, is when white supremacist groups, such as Neo-Nazi Skinheads or Neo-Confederates (such as the Ku Klux Klan), recruit members of law enforcement into their ranks or encourage their members to join local police departments to repress minorities and covertly promote white supremacy.

Another example is police officers flouting the police code of conduct in order to secure convictions of suspects—for example, through the use of surveillance abuse, false confessions, police perjury and/or falsified evidence. Police officers have also been known to sell forms of contraband that were taken during seizers (such as confiscated drugs, stolen property or weapons). Corruption and misconduct can also be done by prison officers, such as the smuggling of contraband (such as drugs or electronics) into jails and prisons for inmates or the abuse of prisoners. Another form of misconduct is probation officers taking bribes in exchange for allowing paroles to violate the terms of their probation or abusing their paroles.  More rarely, police officers may deliberately and systematically participate in organized crime themselves, either while on the job or during off hours. In most major cities, there are internal affairs sections to investigate suspected police corruption or misconduct. Similar entities include the British Independent Police Complaints Commission.

In the judicial system

In the Renaissance fresco The Good and the Bad Judge (Monsaraz, Portugal), the Bad Judge, depicted as having two faces, is shown taking bribes: the nobleman to the right offers him gold coins from a purse, and the villein to the left gives him a pair of partridges.

Judicial corruption refers to the corruption-related misconduct of judges, through the receiving or giving of bribes, the improper sentencing of convicted criminals, bias in the hearing and judgement of arguments and other forms of misconduct. Judicial corruption can also be conducted by prosecutors and defense attorneys. An example of prosecutorial misconduct, occurs when a politician or a crime boss bribes a prosecutor to open investigations and file charges against an opposing politician or a rival crime boss, in order to hurt the competition. An example of attorney misconduct, would be a defense attorney refusing to represent a client for political or professional motives.

Governmental corruption of the judiciary is broadly known in many transitional and developing countries because the budget is almost completely controlled by the executive. The latter critically undermines the separation of powers, because it fosters financial dependence on the judiciary. The proper distribution of a nation's wealth, including its government's spending on the judiciary, is subject to constitutional economics.

It is important to draw distinctions between the two methods which are used to corrupt the judiciary: the government (through budget planning and various privileges), and the private. Judicial corruption can be difficult to completely eradicate, even in developed countries. Corruption in judiciary also involves the government in power using the judicial arm of government to oppress the opposition parties in the detriments of the state.

Within the military

Military corruption refers to the abuse of power by members in the armed forces, in order for career advancement or for personal gain by a soldier or soldiers. One form of military corruption in the United States Armed Forces, is a military soldier being promoted in rank or being given better treatment than their colleagues by their officers, due to their race, sexual orientation, ethnicity, gender, religious beliefs, social class or personal relationships with higher-ranking officers in spite of their merit. In addition to that, the US military has also had many instances of officers sexually assaulting fellow officers and in many cases, there were allegations that many of the attacks were covered up and victims were coerced to remain silent by officers of the same rank or of higher rank.

Another example of military corruption, is a military officer or officers using the power of their positions to commit activities that are illegal, such as skimming logistical supplies such as food, medicine, fuel, body armor or weapons to sell on the local black market. There have also been instances of military officials, providing equipment and combat support to criminal syndicates, private military companies and terrorist groups, without approval from their superiors. As a result, many countries have a military police force to ensure that the military officers follow the laws and conduct of their respective countries but sometimes the military police have levels of corruption themselves.

In healthcare

Corruption, the abuse of entrusted power for private gain, as defined by Transparency International is systemic in the health sector. The characteristics of health systems with their concentrated supply of a service, high discretionary power of its members controlling the supply, and low accountability to others are the exact constellation of the variables described by Klitgaard, on which corruption depends.

Corruption in health care is more dangerous than in any other sector, because it affects health outcomes and is literally deadly. It is widespread and yet, little has been published in medical journals about this topic and as of 2019 there is no evidence on what might reduce corruption in the health sector. Corruption occurs within the private and public health sectors and may appear as theft, embezzlement, nepotism, bribery up til extortion, or as undue influence, and occurs anywhere within the sector, be it in service provision, purchasing, construction and hiring. In 2019, Transparency International has described the 6 most common ways of service corruption as follows: absenteeism, informal payments from patients, embezzlement, inflating services and the costs of services, favouritism and manipulation of data (billing for goods and services that were never sent or done).

Corporate corruption

Petrobras headquarters in downtown Rio de Janeiro.

In criminology, corporate crime refers to crimes committed either by a corporation (i.e., a business entity having a separate legal personality from the natural persons that manage its activities), or by individuals acting on behalf of a corporation or other business entity (see vicarious liability and corporate liability). Some negative behaviours by corporations may not be criminal; laws vary between jurisdictions. For example, some jurisdictions allow insider trading.

Petróleo Brasileiro S.A. — Petrobras, more commonly known as simply Petrobras (Portuguese pronunciation: [ˌpɛtɾoˈbɾas]), is a semi-public Brazilian multinational corporation in the petroleum industry headquartered in Rio de Janeiro, Brazil. The company's name translates to Brazilian Petroleum Corporation – Petrobras. The company was ranked No. 58 in the 2016 Fortune Global 500 list. It is being investigated over corporate and political collusion and corruption.

Odebrecht is a privately held Brazilian conglomerate consisting of businesses in the fields of engineering, real estate, construction, chemicals and petrochemicals. The company was founded in 1944 in Salvador da Bahia by Norberto Odebrecht, and the firm is now present in South America, Central America, North America, the Caribbean, Africa, Europe and the Middle East. Its leading company is Norberto Odebrecht Construtora [pt]. Odebrecht is one of the 25 largest international construction companies and led by Odebrecht family.

In 2016, the firm's executives were examined during Operation Car Wash part of an investigation over Odebrecht Organization bribes to executives of Petrobras, in exchange for contracts and influence. Operation Car Wash is an ongoing criminal money laundering and bribes related corporate crime investigation being carried out by the Federal Police of Brazil, Curitiba Branch, and judicially commanded by Judge Sérgio Moro since 17 March 2014.

In the education system

Corruption in education is a worldwide phenomenon. Corruption in admissions to universities is traditionally considered as one of the most corrupt areas of the education sector. Recent attempts in some countries, such as Russia and Ukraine, to curb corruption in admissions through the abolition of university entrance examinations and introduction of standardized computer-graded tests have met backlash from part of society, while other appreciate changes. Vouchers for university entrants have never materialized. The cost of corruption is in that it impedes sustainable economic growth.

Endemic corruption in educational institutions leads to the formation of sustainable corrupt hierarchies. While higher education in Russia is distinct with widespread bribery, corruption in the US and the UK features a significant amount of fraud. The US is distinct with grey areas and institutional corruption in the higher education sector. Authoritarian regimes, including those in the former Soviet republics, encourage educational corruption and control universities, especially during the election campaigns. This is typical for Russia, Ukraine, and Central Asian regimes, among others. The general public is well aware of the high level of corruption in colleges and universities, including thanks to the media. Doctoral education is no exception, with dissertations and doctoral degrees available for sale, including for politicians. Russian Parliament is notorious for "highly educated" MPs High levels of corruption are a result of universities not being able to break away from their Stalinist past, over bureaucratization, and a clear lack of university autonomy. Both quantitative and qualitative methodologies are employed to study education corruption, but the topic remains largely unattended by the scholars. In many societies and international organizations, education corruption remains a taboo. In some countries, such as certain eastern European countries, some Balkan countries and certain Asian countries, corruption occurs frequently in universities. This can include bribes to bypass bureaucratic procedures and bribing faculty for a grade. The willingness to engage in corruption such as accepting bribe money in exchange for grades decreases if individuals perceive such behavior as very objectionable, i.e. a violation of social norms and if they fear sanctions regarding the severity and probability of sanctions.

Within labor unions

The Teamsters (International Brotherhood of Teamsters) is an example of how the civil RICO process can be used. For decades, the Teamsters had been substantially controlled by La Cosa Nostra. Since 1957, four of eight Teamster presidents were indicted, yet the union continued to be controlled by organized crime elements. The federal government has been successful at removing the criminal influence from this 1.4 million-member union by using the civil process.

In religion

The history of religion includes numerous examples of religious leaders calling attention to the corruption which existed in the religious practices and institutions of their time. The Jewish prophets Isaiah and Amos berate the rabbinical establishment of Ancient Judea for failing to live up to the ideals of the Torah. In the New Testament, Jesus accuses the rabbinical establishment of his time of hypocritically following only the ceremonial parts of the Torah and neglecting the more important elements of justice, mercy and faithfulness. Corruption was one of the important issues which led to the Investiture Controversy. In 1517, Martin Luther accused the Catholic Church of widespread corruption, including the selling of indulgences.

In 2015, Princeton University professor Kevin M. Kruse advances the thesis that business leaders in the 1930s and 1940s collaborated with clergymen, including James W. Fifield Jr., in order to develop and promote a new hermeneutical approach to Scripture which would de-emphasize the social Gospel and emphasize themes, such as individual salvation, which were more congenial to free enterprise.

Business leaders, of course, had long been working to "merchandise" themselves through the appropriation of religion. In organizations such as Spiritual Mobilization, the prayer breakfast groups, and the Freedoms Foundation, they had linked capitalism and Christianity and, at the same time, they likened the welfare state to godless paganism.

In philosophy

The 19th-century German philosopher Arthur Schopenhauer acknowledged that academics, including philosophers, are subject to the same sources of corruption as the societies which they inhabit. He distinguished the corrupt "university" philosophers, whose "real concern is to earn with credit an honest livelihood for themselves and ... to enjoy a certain prestige in the eyes of the public" from the genuine philosopher, whose sole motive is to discover and bear witness to the truth.

To be a philosopher, that is to say, a lover of wisdom (for wisdom is nothing but truth), it is not enough for a man to love truth, in so far as it is compatible with his own interest, with the will of his superiors, with the dogmas of the church, or with the prejudices and tastes of his contemporaries; so long as he rests content with this position, he is only a φίλαυτος [lover of self], not a φιλόσοφος [lover of wisdom]. For this title of honor is well and wisely conceived precisely by its stating that one should love the truth earnestly and with one’s whole heart, and thus unconditionally and unreservedly, above all else, and, if need be, in defiance of all else. Now the reason for this is the one previously stated that the intellect has become free, and in this state, it does not even know or understand any other interest than that of truth.

Arms for cash

"Arms for cash" can be done by either a state-sanctioned arms dealer, firm or state itself to another party it just regards as only a good business partner and not political kindred or allies, thus making them no better than regular gun runners. Arms smugglers, who are already into arms trafficking may work for them on the ground or with shipment. The money is often laundered and records are often destroyed.  It often breaks UN, national or international law. Payment can also be in strange or indirect ways like arms paid for in post-war oil contracts, post-war hotel ownership, conflict diamonds, corporate shares or the long term post-war promises of superfus future contracts between the parties involved in it, etc...

In 2006 Transparency International ranked Angola a lowly 142 out of 163 countries in the Corruption Perception Index just after Venezuela and before the Republic of the Congo with a 2.2 rating. Angola was at 168th place (out of 178 countries) on Transparency International's Corruption Perceptions Index (CPI), receiving a 1.9 on a scale from 0 to 10. On the World Bank's 2009 Worldwide Governance Index, Angola had done very poorly on all six aspects of governance assessed. While its score for political stability improved to 35.8 in 2009 (on a 100-point scale) from 19.2 in 2004, Angola earned especially low scores for accountability, regulatory standards, and rule of law. The score for corruption declined from an extremely low 6.3 in 2004 to 5.2 in 2009.

The country is regarded poorly and that corruption is wounding the economy badly despite the emerging oil industries wealth.

The Mitterrand–Pasqua affair, also known informally as Angolagate, was an international political scandal over the secret and illegal sale and shipment of arms from the nations of Central Europe to the government of Angola by the Government of France in the 1990s. It led to arrests and judiciary actions in the 2000s, involved an illegal arms sale to Angola despite a UN embargo, with business interests in France and elsewhere improperly obtaining a share of Angolan oil revenues. The scandal has subsequently been tied to several prominent figures in French politics.

42 individuals, including: 42 people, including Jean-Christophe Mitterrand, Jacques Attali, Charles Pasqua and Jean-Charles Marchiani, Pierre Falcone. Arcadi Gaydamak, Paul-Loup Sulitzer, Union for a Popular Movement deputy Georges Fenech, Philippe Courroye [fr] the son of François Mitterrand and a former French Minister of the Interior, were charged, accused, indicted or convicted with illegal arms trading, tax fraud, embezzlement, money laundering and other crimes.

Natural resources

Within less democratic countries, the presence of resources such as diamonds, gold, oil, and forestry increases the prevalence of corruption. Corruption includes industrial corruption, consisting of large bribes, as well as petty corruption such as a poacher paying off a park ranger to ignore poaching. The presence of fuel extraction and export is unambiguously associated with corruption, whereas mineral exports only increased corruption in poorer countries. In wealthier countries, mineral exports such as gold and diamonds are actually associated with reduced corruption. The international Extractive Industries Transparency Initiative seeks to create best practices for good governance of gas, oil, and minerals, particularly focusing on the state management of revenue from these resources. Any valued natural resource can be affected by corruption, including water for irrigation, land for livestock grazing, forests for hunting and logging, and fisheries.

The presence or perception of corruption also undermines environmental initiatives. In Kenya, farmers blame poor agricultural productivity on corruption, and thus are less likely to undertake soil conservation measures to prevent soil erosion and loss of nutrients. In Benin, mistrust of government due to perceived corruption led small farmers to reject the adaptation of measures to combat climate change.

Methods

In systemic corruption and grand corruption, multiple methods of corruption are used concurrently with similar aims.

Bribery

An election leaflet with money stapled to it.

Bribery involves the improper use of gifts and favours in exchange for personal gain. This is also known as kickbacks or, in the Middle East, as baksheesh. It is a common form of corruption. The types of favors given are diverse and may include money, gifts, real estate, promotions, sexual favors, employee benefits, company shares, privileges, entertainment, employment and political benefits. The personal gain that is given can be anything from actively giving preferential treatment to having an indiscretion or crime overlooked.

Bribery can sometimes form a part of the systemic use of corruption for other ends, for example to perpetrate further corruption. Bribery can make officials more susceptible to blackmail or to extortion.

Embezzlement, theft and fraud

Embezzlement and theft involve someone with access to funds or assets illegally taking control of them. Fraud involves using deception to convince the owner of funds or assets to give them up to an unauthorized party.

Examples include the misdirection of company funds into "shadow companies" (and then into the pockets of corrupt employees), the skimming of foreign aid money, scams, electoral fraud and other corrupt activity.

Graft

The political act of graft is when funds intended for public projects are intentionally misdirected to maximize the benefits to private interests of the corrupt individuals.

Extortion and blackmail

While bribery is the use of positive inducements for corrupt aims, extortion and blackmail centre around the use of threats. This can be the threat of physical violence or false imprisonment as well as exposure of an individual's secrets or prior crimes.

This includes such behavior as an influential person threatening to go to the media if they do not receive speedy medical treatment (at the expense of other patients), threatening a public official with exposure of their secrets if they do not vote in a particular manner, or demanding money in exchange for continued secrecy. Another example can be a police officer being threatened with the loss of their job by their superiors, if they continued with investigating a high-ranking official.

Influence peddling

Influence peddling is the illegal practice of using one's influence in government or connections with persons in authority to obtain favors or preferential treatment, usually in return for payment.

Networking

Networking (both Business and Personal) can be an effective way for job-seekers to gain a competitive edge over others in the job-market. The idea is to cultivate personal relationships with prospective employers, selection panelists, and others, in the hope that these personal affections will influence future hiring decisions. This form of networking has been described as an attempt to corrupt formal hiring processes, where all candidates are given an equal opportunity to demonstrate their merits to selectors. The networker is accused of seeking non-meritocratic advantage over other candidates; advantage that is based on personal fondness rather than on any objective appraisal of which candidate is most qualified for the position.

Euro bank notes hidden in sleeve.

Abuse of discretion

Abuse of discretion refers to the misuse of one's powers and decision-making facilities. Examples include a judge improperly dismissing a criminal case or a customs official using their discretion to allow a banned substance through a port.

Favoritism, nepotism and clientelism

Favouritism, nepotism and clientelism involve the favouring of not the perpetrator of corruption but someone related to them, such as a friend, family member or member of an association. Examples would include hiring or promoting a family member or staff member to a role they are not qualified for, who belongs to the same political party as you, regardless of merit.

Relationship to economic growth

Corruption is strongly negatively associated with the share of private investment and, hence, it lowers the rate of economic growth.

Corruption reduces the returns of productive activities. If the returns to production fall faster than the returns to corruption and rent-seeking activities, resources will flow from productive activities to corruption activities over time. This will result in a lower stock of producible inputs like human capital in corrupted countries.

Corruption creates the opportunity for increased inequality, reduces the return of productive activities, and, hence, makes rentseeking and corruption activities more attractive. This opportunity for increased inequality not only generates psychological frustration to the underprivileged but also reduces productivity growth, investment, and job opportunities.

Prevention

According to the amended Klitgaard equation, limitation of monopoly and regulator discretion of individuals and a high degree of transparency through independent oversight by non-governmental organisations (NGOs) and the media plus public access to reliable information could reduce the problem. Djankov and other researchers have independently addressed the role information plays in fighting corruption with evidence from both developing and developed countries. Disclosing financial information of government officials to the public is associated with improving institutional accountability and eliminating misbehavior such as vote buying. The effect is specifically remarkable when the disclosures concern politicians' income sources, liabilities and asset level instead of just income level. Any extrinsic aspects that might reduce morality should be eliminated. Additionally, a country should establish a culture of ethical conduct in society with the government setting the good example in order to enhance the intrinsic morality.

In 1969, Christian anarchist Dorothy Day argued that God will resolve economic abuses such as corruption. She wrote,

Fortunately, the Papal States were wrested from the Church in the last century, but there is still the problem of investment of papal funds. It is always a cheering thought to me that if we have good will and are still unable to find remedies for the economic abuses of our time, in our family, our parish, and the mighty church as a whole, God will take matters in hand and do the job for us.

Enhancing civil society participation

Creating bottom-up mechanisms, promoting citizens participation and encouraging the values of integrity, accountability, and transparency are crucial components of fighting corruption. As of 2012, the implementation of the "Advocacy and Legal Advice Centres (ALACs)” in Europe had led to a significant increase in the number of citizen complaints against acts of corruption received and documented and also to the development of strategies for good governance by involving citizens willing to fight against corruption.

Anti-corruption programmes

The Foreign Corrupt Practices Act (FCPA, USA 1977) was an early paradigmatic law for many western countries i.e. industrial countries of the OECD. There, for the first time the old principal-agent approach was moved back where mainly the victim (a society, private or public) and a passive corrupt member (an individual) were considered, whereas the active corrupt part was not in the focus of legal prosecution. Unprecedented, the law of an industrial country directly condemned active corruption, particularly in international business transactions, which was at that time in contradiction to anti-bribery activities of the World Bank and its spin-off organization Transparency International.

As early as 1989 the OECD had established an ad hoc Working Group in order to explore "...the concepts fundamental to the offense of corruption, and the exercise of national jurisdiction over offenses committed wholly or partially abroad." Based on the FCPA concept, the Working Group presented in 1994 the then "OECD Anti-Bribery Recommendation" as precursor for the OECD Convention on Combating Bribery of Foreign Public Officials in International Business Transactions which was signed in 1997 by all member countries and came finally into force in 1999. However, because of ongoing concealed corruption in international transactions several instruments of Country Monitoring have been developed since then by the OECD in order to foster and evaluate related national activities in combating foreign corrupt practices. One survey shows that after the implementation of heightened review of multinational firms under the convention in 2010 firms from countries that had signed the convention were less likely to use bribery.

In 2013, a document produced by the economic and private sector professional evidence and applied knowledge services help-desk discusses some of the existing practices on anti-corruption. They found:

  • The theories behind the fight against corruption are moving from a Principal agent approach to a collective action problem. Principal-agent theories seem not to be suitable to target systemic corruption.
  • The role of multilateral institutions has been crucial in the fight against corruption. UNCAC provides a common guideline for countries around the world. Both Transparency International and the World Bank provide assistance to national governments in term of diagnostic and design of anti-corruption policies.
  • The use of anti-corruption agencies have proliferated in recent years after the signing of UNCAC. They found no convincing evidence on the extent of their contribution, or the best way to structure them.
  • Traditionally anti-corruption policies have been based on success experiences and common sense. In recent years there has been an effort to provide a more systematic evaluation of the effectiveness of anti-corruption policies. They found that this literature is still in its infancy.
  • Anti-corruption policies that may be in general recommended to developing countries may not be suitable for post-conflict countries. Anti-corruption policies in fragile states have to be carefully tailored.
  • Anti-corruption policies can improve the business environment. There is evidence that lower corruption may facilitate doing business and improve firm's productivity. Rwanda in the last decade has made tremendous progress in improving governance and the business environment providing a model to follow for post-conflict countries.
  • The Republic of Armenia aims to achieve zero corruption through raising awareness on the societal hazards. After the lavish spending accusations on the Armenian anti-corruption council, through action strategies with implementation and observing instruments progress is noticeable.

In popular culture

In some countries people travel to corruption hot spots or a specialist tour company takes them on corruption city tours, as it is the case in Prague. Corruption tours have also occurred in Chicago, and Mexico City

Films about corruption include Runaway Jury, The Firm, Syriana, The Constant Gardener, and All the President's Men.

Legal corruption

Though corruption is often viewed as illegal, a concept of legal corruption has been described by Daniel Kaufmann and Pedro Vicente. It might be termed as processes which are corrupt, but are protected by a legal (that is, specifically permitted, or at least not proscribed by law) framework.

Examples

In 1994, the German Parliamentary Financial Commission in Bonn presented a comparative study on "legal corruption" in industrialized OECD countries They reported that in most industrial countries foreign corruption was legal, and that their foreign corrupt practices ranged from simple, through governmental subsidization (tax deduction), up to extreme cases as in Germany, where foreign corruption was fostered, whereas domestic was legally prosecuted. The German Parliamentary Financial Commission rejected a Parliamentary Proposal by the opposition, which had been aiming to limit German foreign corruption on the basis of the US Foreign Corrupt Practices Act (FCPA from 1977), thus fostering national export corporations. In 1997 a corresponding OECD Anti-Bribery Convention was signed by its members. It took until 1999, after the OECD Anti-Bribery Convention came into force, that Germany withdrew the legalization of foreign corruption.

Foreign corrupt practices of industrialized OECD countries 1994 study

The Foreign corrupt practices of industrialized OECD countries 1994 (Parliamentary Financial Commission study, Bonn).

Belgium: bribe payments are generally tax deductible as business expenses if the name and address of the beneficiary is disclosed. Under the following conditions kickbacks in connection with exports abroad are permitted for deduction even without proof of the receiver:

  • Payments must be necessary in order to be able to survive against foreign competition
  • They must be common in the industry
  • A corresponding application must be made to the Treasury each year
  • Payments must be appropriate
  • The payer has to pay a lump-sum to the tax office to be fixed by the Finance Minister (at least 20% of the amount paid).

In the absence of the required conditions, for corporate taxable companies paying bribes without proof of the receiver, a special tax of 200% is charged. This special tax may, however, be abated along with the bribe amount as an operating expense.

Denmark: bribe payments are deductible when a clear operational context exists and its adequacy is maintained.

France: basically all operating expenses can be deducted. However, staff costs must correspond to an actual work done and must not be excessive compared to the operational significance. This also applies to payments to foreign parties. Here, the receiver shall specify the name and address, unless the total amount in payments per beneficiary does not exceed 500 FF. If the receiver is not disclosed the payments are considered "rémunérations occult" and are associated with the following disadvantages:

  • The business expense deduction (of the bribe money) is eliminated.
  • For corporations and other legal entities, a tax penalty of 100% of the "rémunérations occult" and 75% for voluntary post declaration is to be paid.
  • There may be a general fine of up 200 FF fixed per case.

Japan: in Japan, bribes are deductible as business expenses that are justified by the operation (of the company) if the name and address of the recipient is specified. This also applies to payments to foreigners. If the indication of the name is refused, the expenses claimed are not recognized as operating expenses.

Canada: there is no general rule on the deductibility or non-deductibility of kickbacks and bribes. Hence the rule is that necessary expenses for obtaining the income (contract) are deductible. Payments to members of the public service and domestic administration of justice, to officers and employees and those charged with the collection of fees, entrance fees etc. for the purpose to entice the recipient to the violation of his official duties, can not be abated as business expenses as well as illegal payments according to the Criminal Code.

Luxembourg: bribes, justified by the operation (of a company) are deductible as business expenses. However, the tax authorities may require that the payer is to designate the receiver by name. If not, the expenses are not recognized as operating expenses.

Netherlands: all expenses that are directly or closely related to the business are deductible. This also applies to expenditure outside the actual business operations if they are considered beneficial as to the operation for good reasons by the management. What counts is the good merchant custom. Neither the law nor the administration is authorized to determine which expenses are not operationally justified and therefore not deductible. For the business expense deduction it is not a requirement that the recipient is specified. It is sufficient to elucidate to the satisfaction of the tax authorities that the payments are in the interest of the operation.

Austria: bribes justified by the operation (of a company) are deductible as business expenses. However, the tax authority may require that the payer names the recipient of the deducted payments exactly. If the indication of the name is denied e.g. because of business comity, the expenses claimed are not recognized as operating expenses. This principle also applies to payments to foreigners.

Switzerland: bribe payments are tax deductible if it is clearly operation initiated and the consignee is indicated.

US: (rough résumé: "generally operational expenses are deductible if they are not illegal according to the FCPA")

UK: kickbacks and bribes are deductible if they have been paid for operating purposes. The tax authority may request the name and address of the recipient."

"Specific" legal corruption: exclusively against foreign countries

Referring to the recommendation of the above-mentioned Parliamentary Financial Commission's study, the then Kohl administration (1991–1994) decided to maintain the legality of corruption against officials exclusively in foreign transactions and confirmed the full deductibility of bribe money, co-financing thus a specific nationalistic corruption practice (§4 Abs. 5 Nr. 10 EStG, valid until 19 March 1999) in contradiction to the 1994 OECD recommendation. The respective law was not changed before the OECD Convention also in Germany came into force (1999). According to the Parliamentary Financial Commission's study, however, in 1994 most countries' corruption practices were not nationalistic and much more limited by the respective laws compared to Germany.

Development of the shadow economy in (West-) Germany 1975–2015. Original shadow economy data from Friedrich Schneider, University Linz.

Particularly, the non-disclosure of the bribe money recipients' name in tax declarations had been a powerful instrument for Legal Corruption during the 1990s for German corporations, enabling them to block foreign legal jurisdictions which intended to fight corruption in their countries. Hence, they uncontrolled established a strong network of clientelism around Europe (e.g. SIEMENS) along with the formation of the European Single Market in the upcoming European Union and the Eurozone. Moreover, in order to further strengthen active corruption the prosecution of tax evasion during that decade had been severely limited. German tax authorities were instructed to refuse any disclosure of bribe recipients' names from tax declarations to the German criminal prosecution. As a result, German corporations have been systematically increasing their informal economy from 1980 until today up to 350 bn € per annum (see diagram on the right), thus continuously feeding their black money reserves.

Siemens corruption case

In 2007, Siemens was convicted in the District Court of Darmstadt of criminal corruption against the Italian corporation Enel Power SpA. Siemens had paid almost €3.5 million in bribes to be selected for a €200 million project from the Italian corporation, partially owned by the government. The deal was handled through black money accounts in Switzerland and Liechtenstein that were established specifically for such purposes. Because the crime was committed in 1999, after the OECD convention had come into force, this foreign corrupt practice could be prosecuted. It was the first time a German court of law convicted foreign corrupt practices like a national practice, although the corresponding law did not yet protect foreign competitors in business.

During the judicial proceedings it was disclosed that numerous such black accounts had been established in the past decades.

Historical responses in philosophical and religious thought

Philosophers and religious thinkers have responded to the inescapable reality of corruption in different ways. Plato, in The Republic, acknowledges the corrupt nature of political institutions, and recommends that philosophers "shelter behind a wall" to avoid senselessly martyring themselves.

Disciples of philosophy ... have tasted how sweet and blessed a possession philosophy is, and have also seen and been satisfied of the madness of the multitude, and known that there is no one who ever acts honestly in the administration of States, nor any helper who will save any one who maintains the cause of the just. Such a savior would be like a man who has fallen among wild beasts—unable to join in the wickedness of his fellows, neither would he be able alone to resist all their fierce natures, and therefore he would be of no use to the State or to his friends, and would have to throw away his life before he had done any good to himself or others. And he reflects upon all this, and holds his peace, and does his own business. He is like one who retires under the shelter of a wall in the storm of dust and sleet which the driving wind hurries along; and when he sees the rest of mankind full of wickedness, he is content if only he can live his own life and be pure from evil or unrighteousness, and depart in peace and good will, with bright hopes.

The New Testament, in keeping with the tradition of Ancient Greek thought, also frankly acknowledges the corruption of the world (ὁ κόσμος) and claims to offer a way of keeping the spirit "unspotted from the world." Paul of Tarsus acknowledges his readers must inevitably "deal with the world," and recommends they adopt an attitude of "as if not" in all their dealings. When they buy a thing, for example, they should relate to it "as if it were not theirs to keep." New Testament readers are advised to refuse to "conform to the present age" and not to be ashamed to be peculiar or singular. They are advised not be friends of the corrupt world, because "friendship with the world is enmity with God." They are advised not to love the corrupt world or the things of the world. The rulers of this world, Paul explains, "are coming to nothing" While readers must obey corrupt rulers in order to live in the world, the spirit is subject to no law but to love God and love our neighbors as ourselves. New Testament readers are advised to adopt a disposition in which they are "in the world, but not of the world." This disposition, Paul claims, shows us a way to escape "slavery to corruption" and experience the freedom and glory of being innocent "children of God".

 

Electoral fraud

From Wikipedia, the free encyclopedia

Forms of electoral fraud, sometimes referred to as election manipulation, voter fraud or vote rigging, involves illegal interference with the process of an election, either by increasing the vote share of a favored candidate, depressing the vote share of rival candidates, or both. It differs from but often goes hand-in-hand with voter suppression. What exactly constitutes electoral fraud varies from country to country.

Electoral legislation outlaws many kinds of election fraud, but other practices violate general laws, such as those banning assault, harassment or libel. Although technically the term "electoral fraud" covers only those acts which are illegal, the term is sometimes used to describe acts which are legal, but considered morally unacceptable, outside the spirit of an election or in violation of the principles of democracy. Show elections, featuring only one candidate, are sometimes classified as electoral fraud, although they may comply with the law and are presented more as referendums/plebiscites.

In national elections, successful electoral fraud on a sufficient scale can have the effect of a coup d'état, protest or corruption of democracy. In a narrow election, a small amount of fraud may suffice to change the result. Even if the outcome is not affected, the revelation of fraud can reduce voters' confidence in democracy.

Electorate manipulation

Electoral fraud can occur in advance of voting if the composition of the electorate is altered. The legality of this type of manipulation varies across jurisdictions. Deliberate manipulation of election outcomes is widely considered a violation of the principles of democracy.

Artificial migration or party membership

In many cases, it is possible for authorities to artificially control the composition of an electorate in order to produce a foregone result. One way of doing this is to move a large number of voters into the electorate prior to an election, for example by temporarily assigning them land or lodging them in flophouses. Many countries prevent this with rules stipulating that a voter must have lived in an electoral district for a minimum period (for example, six months) in order to be eligible to vote there. However, such laws can also be used for demographic manipulation as they tend to disenfranchise those with no fixed address, such as the homeless, travelers, Roma, students (studying full-time away from home), and some casual workers.

Another strategy is to permanently move people into an electoral district, usually through public housing. If people eligible for public housing are likely to vote for a particular party, then they can either be concentrated into one area, thus making their votes count for less, or moved into marginal seats, where they may tip the balance towards their preferred party. One example of this was the 1986–1990 Homes for votes scandal in the City of Westminster in England under Shirley Porter.

Immigration law may also be used to manipulate electoral demography. For instance, Malaysia gave citizenship to immigrants from the neighboring Philippines and Indonesia, together with suffrage, in order for a political party to "dominate" the state of Sabah; this controversial process was known as Project IC.

A method of manipulating primary contests and other elections of party leaders are related to this. People who support one party may temporarily join another party (or vote in a crossover way, when permitted) in order to elect a weak candidate for that party's leadership. The goal ultimately is to defeat the weak candidate in the general election by the leader of the party that the voter truly supports. There were claims that this method was being utilised in the UK Labour Party leadership election in 2015, where Conservative-leaning Toby Young encouraged Conservatives to join Labour and vote for Jeremy Corbyn in order to "consign Labour to electoral oblivion". Shortly after, #ToriesForCorbyn trended on Twitter.

Disenfranchisement

The composition of an electorate may also be altered by disenfranchising some classes of people, rendering them unable to vote. In some cases, states have passed provisions that raised general barriers to voter registration, such as poll taxes, literacy and comprehension tests, and record-keeping requirements, which in practice were applied against minority populations to discriminatory effect. From the turn of the century into the late 1960s, most African Americans in the southern states of the former Confederacy were disenfranchised by such measures. Corrupt election officials may misuse voting regulations such as a literacy test or requirement for proof of identity or address in such a way as to make it difficult or impossible for their targets to cast a vote. If such practices discriminate against a religious or ethnic group, they may so distort the political process that the political order becomes grossly unrepresentative, as in the post-Reconstruction or Jim Crow era until the Voting Rights Act of 1965. Felons have been disenfranchised in many states as a strategy to prevent African Americans from voting.

Groups may also be disenfranchised by rules which make it impractical or impossible for them to cast a vote. For example, requiring people to vote within their electorate may disenfranchise serving military personnel, prison inmates, students, hospital patients or anyone else who cannot return to their homes. Polling can be set for inconvenient days, such as midweek or on holy days of religious groups: for example on the Sabbath or other holy days of a religious group whose teachings determine that voting is prohibited on such a day. Communities may also be effectively disenfranchised if polling places are situated in areas perceived by voters as unsafe, or are not provided within reasonable proximity (rural communities are especially vulnerable to this).

In some cases, voters may be invalidly disenfranchised, which is true electoral fraud. For example, a legitimate voter may be "accidentally" removed from the electoral roll, making it difficult or impossible for the person to vote.

In the Canadian federal election of 1917, during the Great War, the Union government passed the Military Voters Act and the Wartime Elections Act. The Military Voters Act permitted any active military personnel to vote by party only and allowed that party to decide in which electoral district to place that vote. It also enfranchised those women who were directly related or married to an active soldier. These groups were believed to be disproportionately in favor of the Union government, as that party was campaigning in favor of conscription. The Wartime Elections Act, conversely, disenfranchised particular ethnic groups assumed to be disproportionately in favour of the opposition Liberal Party.

Division of opposition support

Stanford University professor Beatriz Magaloni described a model governing the behaviour of autocratic regimes. She proposed that ruling parties can maintain political control under a democratic system without actively manipulating votes or coercing the electorate. Under the right conditions, the democratic system is maneuvered into an equilibrium in which divided opposition parties act as unwitting accomplices to single-party rule. This permits the ruling regime to abstain from illegal electoral fraud.

Preferential voting systems such as score voting, instant-runoff voting, and single transferable vote are designed to prevent systemic electoral manipulation and political duopoly.

Intimidation

Voter intimidation involves putting undue pressure on a voter or group of voters so that they will vote a particular way, or not at all. Absentee and other remote voting can be more open to some forms of intimidation as the voter does not have the protection and privacy of the polling location. Intimidation can take a range of forms including verbal, physical, or coercion. This was so common that in 1887, a Kansas Supreme Court in New Perspectives on Election Fraud in The Gilded Age said "[...] physical retaliation constituted only a slight disturbance and would not vitiate an election."

  • Violence or the threat of violence: In its simplest form, voters from a particular demographic or known to support a particular party or candidate are directly threatened by supporters of another party or candidate or by those hired by them. In other cases, supporters of a particular party make it known that if a particular village or neighborhood is found to have voted the 'wrong' way, reprisals will be made against that community. Another method is to make a general threat of violence, for example, a bomb threat which has the effect of closing a particular polling place, thus making it difficult for people in that area to vote. One notable example of outright violence was the 1984 Rajneeshee bioterror attack, where followers of Bhagwan Shree Rajneesh deliberately contaminated salad bars in The Dalles, Oregon, in an attempt to weaken political opposition during county elections.
  • Attacks on polling places: Polling places in an area known to support a particular party or candidate may be targeted for vandalism, destruction or threats, thus making it difficult or impossible for people in that area to vote.
  • Legal threats: In this case, voters will be made to believe, accurately or otherwise, that they are not legally entitled to vote, or that they are legally obliged to vote a particular way. Voters who are not confident about their entitlement to vote may also be intimidated by real or implied authority figures who suggest that those who vote when they are not entitled to will be imprisoned, deported or otherwise punished.
    • For example, in 2004, in Wisconsin and elsewhere voters allegedly received flyers that said, "If you already voted in any election this year, you can't vote in the Presidential Election", implying that those who had voted in earlier primary elections were ineligible to vote. Also, "If anybody in your family has ever been found guilty of anything you can't vote in the Presidential Election." Finally, "If you violate any of these laws, you can get 10 years in prison and your children will be taken away from you."
    • Another method, allegedly used in Cook County, Illinois in 2004, is to falsely tell particular people that they are not eligible to vote.
    • In 1981 in New Jersey, the Republican National Committee created the Ballot Security Task Force to discourage voting among Latino and African-American citizens of New Jersey. The task force identified voters from an old registration list and challenged their credentials. It also paid off-duty police officers to patrol polling sites in Newark and Trenton, and posted signs saying that falsifying a ballot is a crime.
  • Coercion: The demographic that controlled the voting ballot would try to persuade others to follow them. By singling out those who were against the majority, people would attempt to switch the voters' decision. Their argument could be that since the majority sides with a certain candidate, they should admit defeat and join the winning side. If this did not work, this led to the threatening of violence seen countless times during elections. Coercion, electoral intimidation was seen in the Navy. In 1885 William C. Whitney started an investigation that involved the men in the Navy. As said by Whitney "the vote of the yard was practically coerced and controlled by the foremen. This instance shows how even in the Navy there were still instances of people going to great lengths for the desired elective to win.

Disinformation

People may distribute false or misleading information in order to affect the outcome of an election. For example, in the Chilean presidential election of 1970, the U.S. government's Central Intelligence Agency used "black propaganda"—materials purporting to be from various political parties—to sow discord between members of a coalition between socialists and communists.

Another use of disinformation is to give voters incorrect information about the time or place of polling, thus causing them to miss their chance to vote. As part of the 2011 Canadian federal election voter suppression scandal, Elections Canada traced fraudulent phone calls, telling voters that their polling stations had been moved, to a telecommunications company that worked with the Conservative Party.

Vote buying

Vote buying occurs when a political party or candidate seeks to buy the vote of a voter in an upcoming election. Vote buying can take various forms such as a monetary exchange, as well as an exchange for necessary goods or services. This practice is often used to incentivise or persuade voters to turn out to elections and vote in a particular way. Although this practice is illegal in many countries such as the United States, Argentina, Mexico, Kenya, Brazil and Nigeria, its prevalence remains worldwide.

In some parts of the United States in the mid- and late 19th century, members of competing parties would vie, sometimes openly and other times with much greater secrecy, to buy and sell votes. Voters would be compensated with cash or the covering of one's house/tax payment. To keep the practice of vote buying secret, parties would open fully staffed vote-buying shops. Parties would also hire runners, who would go out into the public and find floating voters and bargain with them to vote for their side.

In England, documentation and stories of vote buying and vote selling are also well known. The most famous episodes of vote buying came in 18th century England when two or more rich aristocrats spent whatever money it took to win. The "Spendthrift election" came in Northamptonshire in 1768, when three earls each spent over £100,000 on their favoured candidates.

Voters may be given money or other rewards for voting in a particular way, or not voting. In some jurisdictions, the offer or giving of other rewards is referred to as "electoral treating". Electoral treating remains legal in some jurisdictions, such as in the Seneca Nation of Indians.

Vote buying can take the form of "turnout buying", where a broker brings many people to the polls, with a background sure to vote one way, and the results are seen in the precinct results.

Whom to target

One of the main concerns with vote buying lies in the question of which population or group of voters are most likely to be susceptible to accepting compensation in exchange for their vote. Scholars such as Stokes argue that weakly opposed voters are the best ones to target for vote buying. This means that in a situation in which there are two parties running for office, for example, the voters who are not inclined to vote one way or the other are the best to target.

Other scholars argue that it is people of lower income status who are the best group to target, as they are the most likely to be receptive to monetary or other forms of compensation. This has proven to be the case in both Argentina and Nigeria. Since the wealthy are presumably not in need of money, goods or services, it would require a much larger compensation in order to sway their vote. However, as seen in the case of Argentina for example, citizens who reside within poor communities are in great need of income, or medical services, for example, to feed their families and keep them in good health. With that being said, a much smaller sum of cash or a medical prescription would be of much greater value and thus their political support can be much easier to purchase.

How to monitor

When postal ballots are mailed to voters, the buyer can fill them out or see how they are filled out. Monitoring is harder when ballots are cast secretly at a polling place. In some cases, there have been instances of voter tickets, or monitoring by individuals. Voters seeking to be compensated for their votes would use specially-provided voter ballots, or would fold their ballot in a particular way in order to indicate that they voted for the candidate they were paid to vote for.

If a buyer is able to obtain a blank ballot (by theft, counterfeit, or a legitimate absentee ballot) the buyer can then mark the ballot for their chosen candidates and pay a voter to take the pre-marked ballot to a polling station, exchange it for the blank ballot issued and return the blank ballot to the attacker. This is known as chain voting. It can be controlled in polling places by issuing each ballot with a unique number, which is checked and torn off as the ballot is placed in the ballot box.

Another strategy has been to invoke personalized social norms to make voters honor their contracts at the voting booth. Such social norms could include personal obligation such as moral debts, social obligations to the buyers, or a threat of withholding or ceasing to produce necessary resources. This is made more effective when the rewards are delivered personally by the candidate or someone close to them, in order to create a sense of gratitude on behalf of the voters towards the candidate.

Consequences

There are several negative consequences that arise from the practice of vote buying. The presence of vote buying in democratic states poses a threat to democracy itself, as it interferes with the ability to rely on a popular vote as a measure of people's support for potential governments' policies.

Another noted consequence is that the autonomy of voters is undermined. Since getting paid or receiving rewards for their votes generates a form of income that they may need to support themselves or their families, they have no autonomy to cast the vote that they truly want. This is extremely problematic because if it is the most corrupt politicians who are engaging in vote buying, then it is their interests that remain the ones that dictate how the country is going to be run. This, in turn, perpetuates corruption in the system even further creating a cycle.

Thirdly, vote buying can create a dependency of voters on the income or goods that they are receiving for their votes, and can further perpetuate a type of poverty trap. If they are receiving medicine from their communities' broker for example, if this tie is cut off then they may no longer have access to this necessity. It can be true that the broker in that community has no interest or incentive to actually increase the standards of living of the community members, as it is very possible that they are only interested in getting whatever share of the profit they are entitled to for working for the party. Additionally, if the goods or money are coming directly from a candidate, this candidate's only wish is to maintain their power. That being said, they may provide services but their real interest may lie in keeping the voters dependent on the rewards they are providing in order to stay in power.

Latin America

The 2010 and 2012 surveys for the Americas Barometer showed that 15% of surveyed voters in Latin America had been offered something of value in exchange for voting a particular way.

Argentina

Vote buying and the overall practice of clientelism is widespread in Argentina. According to Simeon Nichter, one of the main perpetrators of these illegal activities were the Peronist party. The relationship between voters and Peronist candidates allegedly are such that voters are offered particular goods, services, favours or monetary compensation in exchange for their political support for the party. These rewards could include a job, medicine, a roof, clothing, foods, and other goods or services. The case of Argentina in particular in that it relies heavily on face-to-face and day-to-day interactions between "brokers" who act as middlemen and voters. Since many of the communities in Argentina are ridden with poverty and are in need of these particular resources, it is these communities that have statistically shown to be in a certain demographic that were targeted for voted buying. Additionally, vote buying in this region focuses on citizens who are not strongly in favour or opposed to the political machine, and whose political loyalty does not necessarily lie with one party or another. In this way, vote buying acts as a mechanism to sway the decisions of weakly opposed voters. In a study done by Susan C. Stokes, she finds that the brokers in these communities are known to all the citizens and have access to the necessary resources from the municipality. They maintain relationships with the voters and grant them rewards and favours continuously in order to keep the party they work for in the office. This is one main explanation for why many lower-income voters are seen voting for populist leaders, as well as authoritarian ones. Many citizens view these brokers as positive pillars in their lives and have the utmost respect for the help they distribute. However, others view them as hands of corruption. Stokes further explains that the capacity of these brokers is constrained due to the fact that they can only maintain this type of transactional relationship with a limited number of voters. Furthermore, the brokers have the additional responsibility of maintaining trusting and solid relationships with their resource suppliers. Without these strong ties, they would have no means through which to carry out vote-buying practices.

Mexico

Similarly to Argentina, it has been found that vote-buying in Mexico is most likely in rural and poor regions of the country. There are many instances of vote buying that have occurred in the history of Mexican elections, however, there are two main instances of fund in the literature that occurred in the last two decades. The first was the 2006 Mexican election, where it was found that 8.8% of the population that was not a beneficiary of a specific social program was offered compensation for their vote. Similarly, a corruption inquiry arrested Andrés Granier Melo for embezzlement of funds in the state of Tabasco during his governorship: among other things, some of these funds were used for vote-buying (although Melo has denied all accusations).

Venezuela

Carnet de la Patria, a digital ID based on China's Social Credit System. The card allows the government to monitor citizen behavior such as social media presence, political party membership, and whether or not they voted.

During the 2018 Venezuelan presidential election, reports of vote buying were prevalent during the presidential campaigning. Venezuelans suffering from hunger were pressured to vote for Maduro, with the government bribing potential supporters with food. Maduro promised rewards for citizens who scanned their Carnet de la Patria at the voting booth, which would allow the government to monitor the political party of their citizens and whether or not they had voted. These prizes were reportedly never delivered.

Everyone who has a Carnet de la Patria has to go to vote on 20 May. ... I am thinking of giving a prize to the people of Venezuela who go out to vote that day with the Carnet de la Patria

— President Nicolás Maduro, 28 April 2018

In a visit to Delta Amacuro, president and reelection candidate Nicolás Maduro gave away eight motor boats, nine ambulances, and reopened the "Antonio Díaz" Tucupita Airport, among other announcements, violating Article 223 of the Organic Law of Electoral Processes which forbids the use of state resources during election campaigns, as well as one of the prerogatives in the Agreement of Electoral Guarantees signed by the presidential candidates to the CNE. On 8 May Maduro again violated the electoral law during an electoral act in the Amazonas state by promising to give fuel to the entity in exchange for votes.

Africa

The fifth Afrobarometer survey showed that 48% of voters in 33 African countries feared violence during elections, and 16% of voters were offered money or other goods in exchange for voting a particular way in the most recent election.

Nigeria

On a self-reported survey that was conducted, 1 in 5 Nigerian has experienced an offer for their vote. The rewards offered by Nigerian politicians include money, commodities such as food and clothing, or a job. Although the practice of vote buying is widespread, 58% of Nigerians surveyed at the time of the 2007 election viewed vote buying as immoral. Despite this, when asked if they thought it was wrong to accept rewards or monetary compensation for your vote, 78% said no. One factor that needs to be iterated when it comes to studies that are based on surveys is that since vote buying is illegal in most countries, a researcher's ability to collect accurate data is hindered. This is because many citizens may not feel comfortable revealing their experience or involvement with corrupt activities, or fear that they will suffer repercussions from their governments for coming forward with such information.

Kenya

Since the 1990s, Kenya has had regular multiparty elections in which vote buying has played a central role. In his article, scholar Eric Kramon states that: "According to the data gathered by the Coalition for Accountable Political Finance in Kenya, cash handouts to voters represents around 40% of the average parliamentary candidates' campaign budget, making up the largest budget item." These handouts are made in various ways including stops on the campaign trail, and at-large campaign rallies. "In the 2002 election, 40% of surveyed adult Kenyans reported having accepted a bribe in exchange for their vote, and 22% for the 2007 elections."

It is noted by Kramen that access to information is a huge factor in determining the success of vote buying in Kenya. If the voters have little access to political information or lack political knowledge then they are more likely to be swayed by clientelistic reasoning. Moreover, if the voter does have access to information about an incumbent, then the price to sway their vote is more likely to go up. Additionally, Kramon notes that citizens of Kenya tend to value candidates who provide rewards because their ability to do so points to how great their abilities will be once they are in office.

Asia

Indonesia

In Indonesian, vote buying is often known as politik uang [id] (lit. 'money politics'). According to a survey of 440 respondents by Institut Riset Indonesia in January–March 2020 in areas that will have local elections in 2020, 60 percent of respondents said that they will allow their vote to be bought. Reasons for accepting vote buying include considering it as a gift that can not be rejected (35–46 percent), compensation for not working on the election day (25–30 percent), and supporting daily needs (9–16 percent). One of the common tactics of vote buying is serangan fajar [id] (lit. 'dawn attack'), which is giving money a day or two before the election day. The amount ranges from Rp30,000 to Rp50,000. According to Burhanuddin Muhtadi in his book Kuasa Uang; Politik Uang dalam Pemilu Pasca-Orde Baru, vote buying in Indonesia is done by individual candidates instead of political parties because of intense intraparty competition, forcing candidates to rely on their own networks instead of relying on the party machine.

Philippines

Despite the Commission on Elections's (COMELEC) tight campaign against vote buying in the Philippines, it was rampant across the country, especially near the election period. According to the Philippine National Police, vote buying commenced in the dark, where people gathered to receive a sample ballot with the money, usually at least 500 attached to it. However, the authorities have since apprehended those who were involved.

Voting process and results

A list of threats to voting systems, or electoral fraud methods considered as sabotage are kept by the National Institute of Standards and Technology.

Misleading or confusing ballot papers

Ballot papers may be used to discourage votes for a particular party or candidate, using the design or other features which confuse voters into voting for a different candidate. For example, in the 2000 U.S. presidential election, Florida's butterfly ballot paper was criticized as poorly designed, leading some voters to vote for the wrong candidate. While ballot was designed by a Democrat, it was the Democrat, Al Gore, who was most harmed by voter errors because of this design. Poor or misleading design is usually not illegal and therefore not technically election fraud, but it can nevertheless subvert the principles of democracy.

Sweden has a system with separate ballots used for each party, to reduce confusion among candidates. However, ballots from small parties such as Piratpartiet, Junilistan and Feministiskt initiativ have been omitted or placed on a separate table in the election to the EU parliament in 2009. Ballots from Sweden Democrats have been mixed with ballots from the larger Swedish Social Democratic Party, which used a very similar font for the party name written on the top of the ballot.

Another method of confusing people into voting for a different candidate than intended is to run candidates or create political parties with similar names or symbols as an existing candidate or party. The goal is to mislead voters into voting for the false candidate or party to influence the results. Such tactics may be particularly effective when a large proportion of voters have limited literacy in the language used on the ballot. Again, such tactics are usually not illegal but often work against the principles of democracy.

Another type of possible electoral confusion is multiple variations of voting by different electoral systems. This may cause ballots to be counted as invalid if the wrong system is used. For instance, if a voter puts a first-past-the-post cross in a numbered single transferable vote ballot paper, it is invalidated. For example, in Scotland and other parts of the United Kingdom, up to four different voting systems and types of ballots may be used, based on the jurisdictional level of elections for candidates. Local elections are determined by single transferable votes; Scottish parliamentary elections by the additional member system; national elections for the UK Parliament by first-past-the-post; and elections to the European Parliament by a party list system.

Ballot stuffing

Transparent ballot box used in Ukraine to prevent election officials from pre-stuffing the box with fake ballots.
 
A specialised ballot box used to assist ballot stuffing, featured in Frank Leslie's Illustrated Newspaper in 1856.

Ballot stuffing, or "ballot-box stuffing", is the illegal practice of one person submitting multiple ballots during a vote in which only one ballot per person is permitted.

  • In the 1883 election for the district of Cook, in Queensland, Australia, arrests were made in connection with accusations of ballot stuffing, and the election committee subsequently changed the result of the election.
  • A 2006 version of the Sequoia touchscreen voting machine had a yellow service "back" button on the back that could allow repeated voting under specific circumstances.
  • During the 2018 Russian Presidential Election, there were multiple instances, some caught on camera, throughout Russia of voters and polling staff alike stuffing multiple votes for incumbent President Vladimir Putin in the ballot box.

In Major League Baseball's All Star Game

Major League Baseball's All-Star Game has had problems with ballot stuffing on occasion.

  • In 1957, Cincinnati Reds fans aided by a local newspaper arranged for seven of the eight elected starting fielders to be Reds players.
  • In 1999, the online ballot was stuffed by computer programmer Chris Nandor in favor of Boston Red Sox shortstop Nomar Garciaparra. Nandor created a program that enabled him to vote multiple times for Garciaparra and his teammates before his ballots—which were submitted through a dial-up connection—were traced back to him.
  • In 2015, MLB annulled 65 million (out of a total of 620 million) online ballots after it was reported that eight out of the starting nine positions for the American League would have been Kansas City Royals players.

Misrecording of votes

Votes may be misrecorded at source, on a ballot paper or voting machine, or later in misrecording totals. The 2019 Malawian general election was nullified by the Constitutional Court in 2020 because many results were changed by use of correction fluid, as well as duplicate, unverified and unsigned results forms. California allows correction fluid and tape, so changes can be made after the ballot leaves the voter.

Where votes are recorded through electronic or mechanical means, the voting machinery may be altered so that a vote intended for one candidate is recorded for another, or electronic results are duplicated or lost, and there is rarely evidence whether the cause was fraud or error.

Many elections feature multiple opportunities for unscrupulous officials or 'helpers' to record an elector's vote differently from their intentions. Voters who require assistance to cast their votes are particularly vulnerable to having their votes stolen in this way. For example, a blind or illiterate person may be told that they have voted for one party when in fact they have been led to vote for another.

Misuse of proxy votes

Proxy voting is particularly vulnerable to election fraud, due to the amount of trust placed in the person who casts the vote. In several countries, there have been allegations of retirement home residents being asked to fill out 'absentee voter' forms. When the forms are signed and gathered, they are secretly rewritten as applications for proxy votes, naming party activists or their friends and relatives as the proxies. These people, unknown to the voter, cast the vote for the party of their choice. In the United Kingdom, this is known as 'granny farming.'

Destruction or invalidation of ballots

One of the simplest methods of electoral fraud is to destroy ballots for an opposing candidate or party. While mass destruction of ballots can be difficult to execute without drawing attention, in a very close election, it may be possible to destroy a very small number of ballot papers without detection, thereby changing the overall result. Blatant destruction of ballot papers can render an election invalid and force it to be re-run. If a party can improve its vote on the re-run election, it can benefit from such destruction as long as it is not linked to it.

Another method is to make it appear that the voter has spoiled his or her ballot, thus rendering it invalid. Typically this would be done by adding another mark to the paper, making it appear that the voter has voted for more candidates than entitled, for instance. It would be difficult to do this to a large number of paper ballots without detection in some locales, but altogether too simple in others, especially jurisdictions where legitimate ballot spoiling by voter would serve a clear and reasonable aim. Examples may include emulating protest votes in jurisdictions that have recently had and since abolished a "none of the above" or "against all" voting option, civil disobedience where voting is mandatory, and attempts at discrediting or invalidating an election. An unusually large share of invalidated ballots may be attributed to loyal supporters of candidates that lost in primaries or previous rounds, did not run or did not qualify to do so, or some manner of protest movement or organized boycott.

In 2016, during the EU membership referendum, Leave-supporting voters in the UK alleged without evidence that the pencils supplied by voting stations would allow the referendum to be rigged in favour of Remain by MI5 erasing their votes from the ballot. This has been described as the "use pens" conspiracy theory.

Tampering with electronic voting systems

General tampering

All voting systems face threats of some form of electoral fraud. The types of threats that affect voting machines vary. Research at Argonne National Laboratories revealed that a single individual with physical access to a machine, such as a Diebold Accuvote TS, can install inexpensive, readily-available electronic components to manipulate its functions.

Other approaches include:

  • Tampering with the software of a voting machine to add malicious code that alters vote totals or favors a candidate in any way.
    • Multiple groups have demonstrated this possibility.
    • Private companies manufacture these machines. Many companies will not allow public access or review of the machines' source code, claiming fear of exposing trade secrets.
  • Tampering with the hardware of the voting machine to alter vote totals or favor any candidate.
    • Some of these machines require a smart card to activate the machine and vote. However, a fraudulent smart card could attempt to gain access to voting multiple times or be pre-loaded with negative votes to favor one candidate over another, as has been demonstrated.
  • Abusing the administrative access to the machine by election officials might also allow individuals to vote multiple times.
  • Election results that are sent directly over the internet from the polling place centre to the vote-counting authority can be vulnerable to a man-in-the-middle attack, where they are diverted to an intermediate website where the man in the middle flips the votes in favour of a certain candidate and then immediately forwards them on to the vote-counting authority. All votes sent over the internet violate the chain of custody and hence should be avoided by driving or flying memory cards in locked metal containers to the vote-counters. For purposes of getting quick preliminary total results on election night, encrypted votes can be sent over the internet, but final official results should be tabulated the next day only after the actual memory cards arrive in secure metal containers and are counted.

United States

In 2014–2017, an intruder had control of the state computer in Georgia which programmed vote-counting machines for all counties. The same computer also held voter registration records. The intrusion exposed all election files in Georgia since then to compromise and malware. The FBI studied that computer in 2017, and public disclosure came in 2020 from a court case. Georgia did not have paper ballots to measure the amount of error in electronic tallies.

In October 2016, Russians accessed the internal computers of VR Systems, which provides election services, including compilation of election results and their release on the web, in 8 states. The intruders damaged 10 computers. The NSA prepared a classified report in May 2017, and it was leaked in June 2017. Whether the damage affected vote tallies has not been revealed.

During the 2020 presidential election, incumbent President Donald Trump made numerous false allegations of electoral fraud by Democratic candidate Joe Biden. The Trump campaign filed numerous legal challenges to the results, making unsubstantiated allegations accusing democrats of manipulating the votes in favor of Biden. The campaign lost 64 of 65 lawsuits. Election security experts, officials, and analysts have found no evidence of widespread voter fraud.

Ukraine

In 2014, Ukraine's central election system was hacked. Officials found and removed a virus and said the totals were correct.

South Africa

In 1994, the election which brought majority rule and put Nelson Mandela in office, South Africa's election compilation system was hacked, so they re-tabulated by hand.

Voter impersonation

United States

Some commentators, such as former Federal Election Commission member Hans von Spakovsky, have claimed that voter impersonation fraud, in which one person votes by impersonating another, eligible voter, is widespread, but documentation has been scarce and prosecutions rare. Numerous others, such as Professor Larry Sabato, and a variety of studies have shown this to be "relatively rare" in the USA. Since 2013, when the US Supreme Court ruled that a provision of the Voting Rights Act was no longer enforceable, several states have passed voter ID laws, ostensibly to counter the alleged fraud. But many experts counter that voter ID laws are not very effective against some forms of impersonation. These ID laws have been challenged by minority groups that claimed to be disadvantaged by the changes. By August 2016, four federal court rulings overturned laws or parts of such laws because they placed undue burdens on minority populations, including African Americans and Native Americans. In each case: Texas, North Carolina, Wisconsin, and North Dakota, and may adversely affect minority voters. The states were required to accept alternatives for the November 2016 elections. These cases are expected to reach the US Supreme Court for hearings. In April 2020, a 20-year voter fraud study by MIT University found the level of fraud "exceedingly rare" since it occurs only in "0.00006 percent" of instances nationally, and, in one state, "0.000004 percent—about five times less likely than getting hit by lightning in the United States.

Allegations of widespread voter fraud in the 2016 United States presidential election by busing out-of-state voters to New Hampshire were found to be false. Suspicions of hacking of electronic voting machines in Wisconsin, Michigan, and Pennsylvania were determined to be unfounded.

The N.C. Board of Elections reported in 2017 on questions of voter fraud and the state's proposed voter ID law. The report showed that out of 4,769,640 votes cast in the November 2016 election in North Carolina, only one illegal vote would potentially have been blocked by the voter ID law. The investigation found fewer than 500 incidences of invalid ballots cast, the vast majority of which were cast by individuals on probation for felony who were likely not aware that this status disqualified them from voting, and the total number of invalid votes was far too small to have affected the outcome of any race in North Carolina in the 2016 election.

United Kingdom

Concerns about voter impersonation have led the UK government to propose the Electoral Integrity Bill. Academic research shows very little evidence of personation, however.

Artificial results

In particularly corrupt regimes, the voting process may be nothing more than a sham, to the point that officials simply announce whatever results they want, sometimes without even bothering to count the votes. While such practices tend to draw international condemnation, voters typically have little if any recourse, as there would seldom be any ways to remove the fraudulent winner from power, short of a revolution.

In Turkmenistan, incumbent President Gurbanguly Berdymukhamedov received 97.69% of votes in the 2017 election, with his sole opponent, who was seen as pro-government, in fact being appointed by Berdymukhamedov.

Postal ballot fraud

Fraud with absentee or postal ballots has been found occasionally in the United Kingdom, and the United States and has been alleged in Malaysia. In both the United Kingdom and the United States, experts estimate there is more fraud with postal ballots than in-person voting, and that even so it has affected only a few local elections.

Types of fraud have included pressure on voters from family or others, since the ballot is not cast in secret; collection of ballots by dishonest collectors who mark votes or fail to deliver ballots; and insiders changing or destroying ballots after they arrive.

A significant measure to prevent some types of fraud has been to require the voter's signature on the outer envelope, which is compared to one or more signatures on file before taking the ballot out of the envelope and counting it. Not all places have standards for signature review, and there have been calls to update signatures more often to improve this review. While any level of strictness involves rejecting some valid votes and accepting some invalid votes, there have been concerns that signatures are improperly rejected from young and minority voters at higher rates than others, with no or limited ability of voters to appeal the rejection.

Some problems have inherently limited scope, such as family pressure, while others can affect several percent of the vote, such as dishonest collectors and signature verification.

In legislature

Vote fraud can also take place in legislatures. Some of the forms used in national elections can also be used in parliaments, particularly intimidation and vote-buying. Because of the much smaller number of voters, however, election fraud in legislatures is qualitatively different in many ways. Fewer people are needed to 'swing' the election, and therefore specific people can be targeted in ways impractical on a larger scale. For example, Adolf Hitler achieved his dictatorial powers due to the Enabling Act of 1933. He attempted to achieve the necessary two-thirds majority to pass the Act by arresting members of the opposition, though this turned out to be unnecessary to attain the needed majority. Later, the Reichstag was packed with Nazi party members who voted for the Act's renewal.

In many legislatures, voting is public, in contrast to the secret ballot used in most modern public elections. This may make their elections more vulnerable to some forms of fraud since a politician can be pressured by others who will know how he or she has voted. However, it may also protect against bribery and blackmail, since the public and media will be aware if a politician votes in an unexpected way. Since voters and parties are entitled to pressure politicians to vote a particular way, the line between legitimate and fraudulent pressure is not always clear.

As in public elections, proxy votes are particularly prone to fraud. In some systems, parties may vote on behalf of any member who is not present in parliament. This protects those members from missing out on voting if prevented from attending parliament, but it also allows their party to prevent them from voting against its wishes. In some legislatures, proxy voting is not allowed, but politicians may rig voting buttons or otherwise illegally cast "ghost votes" while absent.

Detection and prevention

The three main strategies for the prevention of electoral fraud in society are:

  1. Auditing the election process
  2. Deterrence through consistent and effective prosecution
  3. Cultivation of mores that discourage corruption.

Some of the main fraud prevention tactics can be summarised as secrecy and openness. The secret ballot prevents many kinds of intimidation and vote selling, while transparency at all other levels of the electoral process prevents and allows detection of most interference.

Election audits

Election auditing refers to any review conducted after polls close for the purpose of determining whether the votes were counted accurately (a results audit) or whether proper procedures were followed (a process audit), or both.

Audits vary and can include checking that the number of voters signed in at the polls matches the number of ballots, seals on ballot boxes and storage rooms are intact, computer counts (if used) match hand counts, and counts are accurately totaled.

Election recounts are a specific type of audit, with elements of both results and process audits.

Prosecution

In the United States the goal of prosecutions is not to stop fraud or keep fraudulent winners out of office; it is to deter and punish years later. The Justice Department has published Federal Prosecution of Election Offenses in eight editions from 1976 to 2017, under Presidents Ford, Carter, Reagan, Clinton, Bush and Trump. It says, "Department does not have authority to directly intercede in the election process itself. ... overt criminal investigative measures should not ordinarily be taken ... until the election in question has been concluded, its results certified, and all recounts and election contests concluded." Sentencing guidelines provide a range of 0–21 months in prison for a first offender; offense levels range from 8 to 14. Investigation, prosecution and appeals can take over 10 years.

In the Philippines, former President Gloria Macapagal Arroyo was arrested in 2011 following the filing of criminal charges against her for electoral sabotage, in connection with the 2007 Philippine general election. She was accused of conspiring with election officials to ensure the victory of her party's senatorial slate in the province of Maguindanao, through the tampering of election returns.

Mores

The patterns of conventional behaviour in a society, or mores, are an effective means for preventing electoral fraud and corruption in general. A good example is Sweden, where the culture has a strong tendency toward positive values, resulting in a low incidence of political corruption. Until recently Canada had a similar reputation. The In and Out scandal of 2008 and the Robocall scandal of 2011 has tarnished Canada's electoral integrity.

An advantage of cultivating positive mores as a prevention strategy is that it is effective across all electoral systems and devices. A disadvantage is that it makes other prevention and detection efforts more difficult to implement because members of society generally have more trust and less of a sense for fraudulent methods.

Secret ballot

The secret ballot, in which only the voter knows how they have voted, is believed by many to be a crucial part of ensuring free and fair elections through preventing voter intimidation or retribution. Others argue that the secret ballot enables election fraud (because it makes it harder to verify that votes have been counted correctly) and that it discourages voter participation. Although the secret ballot was sometimes practiced in ancient Greece and was a part of the Constitution of the Year III of 1795, it only became common in the nineteenth century. Secret balloting appears to have been first implemented in the former British colony—now an Australian state—of Tasmania on 7 February 1856. By the turn of the century, the practice had spread to most Western democracies.

In the United States, the popularity of the Australian ballot grew as reformers in the late 19th century sought to reduce the problems of election fraud. Groups such as the Greenbackers, Nationalist, and more fought for those who yearned to vote, but were exiled for their safety. George Walthew, Greenback, helped initiate one of the first secret ballots in America in Michigan in 1885. Even George Walthew had a predecessor in John Seitz, Greenback, who campaigned a bill to " preserve the purity of elections" in 1879 after the discovery of Ohio's electoral fraud in congressional elections.

The efforts of many helped accomplish this and led to the spread of other secret ballots all across the country. As mentioned on February 18, 1890, in the Galveston News "The Australian ballot has come to stay. It protects the independence of the voter and largely puts a stop to vote to buy." Before this, it was common for candidates to intimidate or bribe voters, as they would always know who had voted which way.

Transparency

Most methods of preventing electoral fraud involve making the election process completely transparent to all voters, from nomination of candidates through casting of the votes and tabulation. A key feature in ensuring the integrity of any part of the electoral process is a strict chain of custody.

To prevent fraud in central tabulation, there has to be a public list of the results from every single polling place. This is the only way for voters to prove that the results they witnessed in their election office are correctly incorporated into the totals.

End-to-end auditable voting systems provide voters with a receipt to allow them to verify their vote was cast correctly, and an audit mechanism to verify that the results were tabulated correctly and all votes were cast by valid voters. However, the ballot receipt does not permit voters to prove to others how they voted, since this would open the door towards forced voting and blackmail. End-to-end systems include Punchscan and Scantegrity, the latter being an add-on to optical scan systems instead of a replacement.

In many cases, election observers are used to help prevent fraud and assure voters that the election is fair. International observers (bilateral and multilateral) may be invited to observe the elections (examples include election observation by the Organisation for Security and Cooperation in Europe (OSCE), European Union election observation missions, observation missions of the Commonwealth of Independent States (CIS), as well as international observation organised by NGOs, such as CIS-EMO, European Network of Election Monitoring Organizations (ENEMO), etc.). Some countries also invite foreign observers (i.e. bi-lateral observation, as opposed to multi-lateral observation by international observers).

In addition, national legislatures of countries often permit domestic observation. Domestic election observers can be either partisan (i.e. representing interests of one or a group of election contestants) or non-partisan (usually done by civil society groups). Legislations of different countries permit various forms and extents of international and domestic election observation.

Election observation is also prescribed by various international legal instruments. For example, paragraph 8 of the 1990 Copenhagen Document states that "The [OSCE] participating States consider that the presence of observers, both foreign and domestic, can enhance the electoral process for States in which elections are taking place. They, therefore, invite observers from any other CSCE participating States and any appropriate private institutions and organisations who may wish to do so to observe the course of their national election proceedings, to the extent permitted by law. They will also endeavour to facilitate similar access for election proceedings held below the national level. Such observers will undertake not to interfere in the electoral proceedings".

Critics note that observers cannot spot certain types of election fraud like targeted voter suppression or manipulated software of voting machines.

Statistical indicators and election forensics

Various forms of statistics can be indicators of election fraud – e.g., exit polls which diverge from the final results. Well-conducted exit polls serve as a deterrent to electoral fraud. However, exit polls are still notoriously imprecise. For instance, in the Czech Republic, some voters are afraid or ashamed to admit that they voted for the Communist Party (exit polls in 2002 gave the Communist party 2–3 percentage points less than the actual result). Variations in willingness to participate in an exit poll may result in an unrepresentative sample compared to the overall voting population.

When elections are marred by ballot-box stuffing (e.g., the Armenian presidential elections of 1996 and 1998), the affected polling stations will show abnormally high voter turnouts with results favouring a single candidate. By graphing the number of votes against turnout percentage (i.e., aggregating polling stations results within a given turnout range), the divergence from bell-curve distribution gives an indication of the extent of the fraud. Stuffing votes in favour of a single candidate affects votes vs. turnout distributions for that candidate and other candidates differently; this difference could be used to quantitatively assess the number of votes stuffed. Also, these distributions sometimes exhibit spikes at round-number turnout percentage values. High numbers of invalid ballots, overvoting or undervoting are other potential indicators. Risk-limiting audits are methods to assess the validity of an election result statistically without the effort of a full election recount.

Though election forensics can determine if election results are anomalous, the statistics themselves are not indicative of fraud. Election forensics can be combined with other fraud detection and prevention strategies, such as in-person monitoring.

Voting machine integrity

One method for verifying voting machine accuracy is Parallel Testing, the process of using an independent set of results compared to the original machine results. Parallel testing can be done prior to or during an election. During an election, one form of parallel testing is the VVPAT. Voter-verified paper audit trail (VVPAT) or verified paper record (VPR) is a method of providing feedback to voters using a ballotless voting system. A VVPAT is intended as an independent verification system for voting machines designed to allow voters to verify that their vote was cast correctly, to detect possible election fraud or malfunction, and to provide a means to audit the stored electronic results. This method is only effective if statistically significant numbers of voters verify that their intended vote matches both the electronic and paper votes.

On election day, a statistically significant number of voting machines can be randomly selected from polling locations and used for testing. This can be used to detect potential fraud or malfunction unless manipulated software would only start to cheat after a certain event like a voter pressing a special key combination (Or a machine might cheat only if someone does not perform the combination, which requires more insider access but fewer voters).

Another form of testing is Logic & Accuracy Testing (L&A), pre-election testing of voting machines using test votes to determine if they are functioning correctly.

Another method to ensure the integrity of electronic voting machines is independent software verification and certification. Once a software is certified, code signing can ensure the software certified is identical to that which is used on election day. Some argue certification would be more effective if voting machine software was publicly available or open source.

Certification and testing processes conducted publicly and with oversight from interested parties can promote transparency in the election process. The integrity of those conducting testing can be questioned.

Testing and certification can prevent voting machines from being a black box where voters cannot be sure that counting inside is done as intended.

One method that people have argued would help prevent these machines from being tampered with would be for the companies that produce the machines to share the source code, which displays and captures the ballots, with computer scientists. This would allow external sources to make sure that the machines are working correctly.

Notable United States legislation

Help America Vote Act

The Help America Vote Act (Pub.L. 107–252 (text) (pdf)), or HAVA, is a United States federal law enacted on October 29, 2002. It was drafted (at least in part) in reaction to the controversy surrounding the 2000 U.S. presidential election. The goals of HAVA are: to replace punchcard and lever-based voting systems; create the Election Assistance Commission to assist in the administration of Federal elections; and establish minimum election administration standards.

Voting Rights Act of 1965

This was the most important federal legislation of the 20th century to protect voting rights, especially of ethnic and language minorities who had been disenfranchised for decades by states' constitutions and practices. Initially, it was particularly important for enforcing the constitutional right of African Americans in the South to vote, where millions of people had been mostly disenfranchised since the turn of the 20th century and excluded from politics. The law has also protected other ethnicities, such as Hispanics, Asians, Native Americans, and language minorities in other states, who have been discriminated against at various times, especially in the process of voter registration and electoral practices.

Civil Rights Act of 1964

The Civil Rights Act of 1964 (Pub.L. 88–352, 78 Stat. 241, enacted July 2, 1964) was a landmark piece of legislation in the United States that outlawed major forms of discrimination against African Americans and other minorities.

Operator (computer programming)

From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Operator_(computer_programmin...