Introduction Voting In-Person Through Physical Secret Ballot
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Suppose You Want to Vote Strategically
DONALD SAARI Suppose You Want to Vote Strategically e honest. There have been times when you voted strate- To check, suppose five voters prefer the candidates Anita, Bgically to try to force a personally better election result; Bonnie, and Candy in that order, denoted by ABC, six oth- I have. The role of manipulative behavior received brief ers prefer CBA, and the last four prefer ACB. While it doesnt attention during the 2000 US Presidential Primary Season seem like anything can go wrong, lets check. when the Governor of Michigan failed on his promise to • By voting for one candidate, the commonly used plural- deliver his states Republican primary vote for George Bush. ity system, Anita wins with a 60% landslide; the ACB out- His excuse was that the winner, John McCain, strategically come has the 9:6:0 tally. attracted cross-over votes of independents and Democrats. • Bonnie failed to receive a single plurality vote, yet she McCains strategy was just the accepted behavior of en- wins when each voter votes for her top two candidates couraging supporters who can vote, to vote. But lets pursue where the BCA outcome has the 11:10:9 tally. this issue further; lets question whether the power of math- • Candy? She wins with the procedure offering 5 and 4 ematics can help identify when and how you can strategically points, respectively, to a voters first and second choices; alter the election outcome of your fraternity, sorority, social the CAB outcome has a 46: 45: 44 tally. group, or department to force a personally better conclusion. -
Randomocracy
Randomocracy A Citizen’s Guide to Electoral Reform in British Columbia Why the B.C. Citizens Assembly recommends the single transferable-vote system Jack MacDonald An Ipsos-Reid poll taken in February 2005 revealed that half of British Columbians had never heard of the upcoming referendum on electoral reform to take place on May 17, 2005, in conjunction with the provincial election. Randomocracy Of the half who had heard of it—and the even smaller percentage who said they had a good understanding of the B.C. Citizens Assembly’s recommendation to change to a single transferable-vote system (STV)—more than 66% said they intend to vote yes to STV. Randomocracy describes the process and explains the thinking that led to the Citizens Assembly’s recommendation that the voting system in British Columbia should be changed from first-past-the-post to a single transferable-vote system. Jack MacDonald was one of the 161 members of the B.C. Citizens Assembly on Electoral Reform. ISBN 0-9737829-0-0 NON-FICTION $8 CAN FCG Publications www.bcelectoralreform.ca RANDOMOCRACY A Citizen’s Guide to Electoral Reform in British Columbia Jack MacDonald FCG Publications Victoria, British Columbia, Canada Copyright © 2005 by Jack MacDonald All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by an information storage and retrieval system, now known or to be invented, without permission in writing from the publisher. First published in 2005 by FCG Publications FCG Publications 2010 Runnymede Ave Victoria, British Columbia Canada V8S 2V6 E-mail: [email protected] Includes bibliographical references. -
Setting up Polling Place on Election
ELECTION JUDGE/COORDINATOR HANDBOOK | GENERAL ELECTION 2020 CHAPTER 4 SETTING UP THE POLLING PLACE ON ELECTION DAY ELECTION DAY - 5:00 AM TO 6:00 AM Chapter 5 includes step-by-step instructions on all the procedures you need to know to set up the polling place on Election 5 Day. Please review this chapter very carefully. You only have one hour on Election Day to set up and organize all the equipment and materials. IMPORTANT! Before you open the doors SETTING UP THE POLLING PLACE - STEP BY STEP to the polling place, you MUST do the Do you have all the materials and equipment? following: Review the diagram of the ESC in Chapter 4 on page 20 to see where materials and equipment are • Set up the e-poll books (see step 8). located. For a listing of Election Day materials and equipment, see the Supply List (Form 21) in the • Begin the update of the e-poll books by sleeve of the door of the ESC. 5:15 am. • Check the equipment is labeled for your Do you know what you need to do? precinct and ward. First, read the quick overview of all the procedures, steps #1-18. Then, go on to the detailed instructions for each of the steps starting on the next page. Rules for Election Coordinators & All Judges Quick Overview: Setting Up the Polling Place • You MUST report to the polling place by 5:00 am and no later. ❏ 1. Check the polling place for a portable ramp. • Let poll watchers with proper credentials ❏ 2. -
The Effects of Secret Voting Procedures on Political Behavior
UC San Diego UC San Diego Electronic Theses and Dissertations Title Voting Alone: The Effects of Secret Voting Procedures on Political Behavior Permalink https://escholarship.org/uc/item/50p7t4xg Author Guenther, Scott Publication Date 2016 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, SAN DIEGO Voting Alone: The Effects of Secret Voting Procedures on Political Behavior A Dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Political Science by Scott M. Guenther Committee in charge: Professor James Fowler, Chair Professor Samuel Kernell, Co-Chair Professor Julie Cullen Professor Seth Hill Professor Thad Kousser 2016 Copyright Scott M. Guenther, 2016 All rights reserved. The Dissertation of Scott M. Guenther is approved, and it is acceptable in quality and form for publication on microfilm and electronically: Co-Chair Chair University of California, San Diego 2016 iii DEDICATION To my parents. iv EPIGRAPH Three may keep a secret, if two of them are dead. { Benjamin Franklin v TABLE OF CONTENTS Signature Page................................... iii Dedication...................................... iv Epigraph......................................v Table of Contents.................................. vi List of Figures................................... viii List of Tables.................................... ix Acknowledgements.................................x Vita........................................ -
Rhode Island Voter Information Handbook 2020 What’S in This Guide
Voter Information Handbook A Guide to State Referenda and Voting Procedures in Rhode Island General Election November 3, 2020 B A L LO T B A L L O T Nellie M. Gorbea Secretary of State Be Voter Ready! Message from the Secretary BALLOT Dear Rhode Island Voter: As your Secretary of State, it is my responsibility to make sure you are able to exercise your right to vote safely and securely. The social Preview a sample ballot distancing practices that help us prevent the spread of COVID-19 Your choice of candidates depends have forced us to change many aspects of our lives but we can still on where you live. be united in casting our votes. I am sending you this guide to make it Locally, there are 21 communities in easy for you to be informed, be engaged, and be a voter in 2020. which you will be asked to approve or reject municipal ballot questions. As a Rhode Island voter, you have the power to help move our great You can see a sample of your local state forward. You have three options for safely and securely casting ballot by visiting the online Voter a ballot this year and this guide offers more information on each of Information Center at vote.ri.gov. these voting methods. I urge you to make your voice heard. If you have applied for a mail ballot, be sure to fill out your ballot and return it as quickly as possible (see page 5). Ballot Your guide also contains information about a very important state question you will see on your ballot. -
Black Box Voting Report
330 SW 43rd St Suite K PMB-547 Renton WA 98055 425-793-1030 – [email protected] http://www.blackboxvoting.org The Black Box Report SECURITY ALERT: July 4, 2005 Critical Security Issues with Diebold Optical Scan Design Prepared by: Harri Hursti [email protected] Special thanks to Kalle Kaukonen for pre-publication review On behalf of Black Box Voting, Inc. A nonprofit, nonpartisan, 501c(3) consumer protection group for elections Executive Summary The findings of this study indicate that the architecture of the Diebold Precinct-Based Optical Scan 1.94w voting system inherently supports the alteration of its basic functionality, and thus the alteration of the produced results each time an election is prepared. The fundamental design of the Diebold Precinct-Based Optical Scan 1.94w system (AV OS) includes the optical scan machine, with an embedded system containing firmware, and the removable media (memory card), which should contain only the ballot box, the ballot design and the race definitions, but also contains a living thing – an executable program which acts on the vote data. Changing this executable program on the memory card can change the way the optical scan machine functions and the way the votes are reported. The system won’t work without this program on the memory card. Whereas we would expect to see vote data in a sealed, passive environment, this system places votes into an open active environment. With this architecture, every time an election is conducted it is necessary to reinstall part of the functionality into the Optical Scan system via memory card, making it possible to introduce program functions (either authorized or unauthorized), either wholesale or in a targeted manner, with no way to verify that the certified or even standard functionality is maintained from one voting machine to the next. -
Open-Secret Voting
ISSN 1936-5349 (print) ISSN 1936-5357 (online) HARVARD JOHN M. OLIN CENTER FOR LAW, ECONOMICS, AND BUSINESS OPEN-SECRET VOTING Adrian Vermeule Discussion Paper No. 674 07/2010 Harvard Law School Cambridge, MA 02138 This paper can be downloaded without charge from: The Harvard John M. Olin Discussion Paper Series: http://www.law.harvard.edu/programs/olin_center/ The Social Science Research Network Electronic Paper Collection: http://ssrn.com/ OPEN-SECRET VOTING Adrian Vermeule* Stock debates about transparency and secrecy usually assume that open voting and secret voting are mutually exclusive. But these positions present a false alternative; open and secret voting can be employed as complements in a larger decision-procedure. In what follows I will propose a hybrid or dual procedure of open-secret voting, and attempt to specify the conditions under which that procedure works well. I suggest that open-secret voting can best be justified as an institutional means of obtaining a second opinion from the voting group. A second opinion of this sort might produce informational benefits either for the members of the voting group itself, for outside parties, or for both. (This is a companion paper to Adrian Vermeule, “Second Opinions,” available on SSRN). * John H. Watson Professor of Law, Harvard Law School. Prepared for a symposium on “Scrutin secret et vote public, huis clos et débat ouvert” at the College de France, June 3-4, 2010. Thanks to Jacob Gersen, Don Herzog, Adriaan Lanni, Daryl Levinson, Eric Posner, Melissa Schwartzberg, Philippe Urfalino, and the conference participants for helpful comments, and to Michael Kenneally for helpful research assistance. -
Adapting Helios for Provable Ballot Privacy
Adapting Helios for provable ballot privacy David Bernhard1, V´eronique Cortier2, Olivier Pereira3, Ben Smyth2, Bogdan Warinschi1 1 University of Bristol, England 2 LORIA - CNRS, France 3 Universit´eCatholique de Louvain, Belgium Abstract. Recent results show that the current implementation of He- lios, a practical e-voting protocol, does not ensure independence of the cast votes, and demonstrate the impact of this lack of independence on vote privacy. Some simple fixes seem to be available and security of the revised scheme has been studied with respect to symbolic models. In this paper we study the security of Helios using computational models. Our first contribution is a model for the property known as ballot privacy that generalizes and extends several existing ones. Using this model, we investigate an abstract voting scheme (of which the revised Helios is an instantiation) built from an arbitrary encryp- tion scheme with certain functional properties. We prove, generically, that whenever this encryption scheme falls in the class of voting-friendly schemes that we define, the resulting voting scheme provably satisfies ballot privacy. We explain how our general result yields cryptographic security guaran- tees for the revised version of Helios (albeit from non-standard assump- tions). Furthermore, we show (by giving two distinct constructions) that it is possible to construct voting-friendly encryption, and therefore voting schemes, using only standard cryptographic tools. We detail an instan- tiation based on ElGamal encryption and Fiat-Shamir non-interactive zero-knowledge proofs that closely resembles Helios and which provably satisfies ballot privacy. 1 Introduction Electronic voting protocols have the potential to offer efficient and sound tallying with the added convenience of remote voting. -
Union Elections by Secret Ballot Protect Workers' Rights
February 27, 2007 Union Elections by Secret Ballot Protect Workers’ Rights Executive Summary • The United States has a rich tradition of Americans choosing their elected representatives by secret ballot. The secret ballot election process in deciding union representation (administered by the National Labor Relations Board (NLRB)) ensures that a worker can freely express his or her desire to join a union, without intimidation or fear. • In the face of declining union membership, Democrats have made elimination of the secret-ballot election in union representation one of their top legislative priorities. In the House, H.R. 800, the “Employee Free Choice Act,” has been reported out of committee and has over 230 cosponsors. • Support for the secret ballot, one of the cornerstones of democracy, is strong: o In 2002, Congress reaffirmed these rights in the passage of the Help America Vote Act (HAVA). In setting requirements for voting and voter-registration system, HAVA required that systems must maintain voter privacy and ballot confidentiality. o The AFL-CIO supports secret-ballot elections when it comes to decertification of a union. It argued before the NLRB that in decertification petitions, secret- ballot elections provide the surest means of avoiding decisions that are the result of coercion. o Some House Democrats who support card-check authorization (the acceptance of signed cards for union representation rights in lieu of a secret-ballot election) in the U.S. support the use of the secret ballot in other countries. o Both the NLRB and the Supreme Court have long recognized that a Board- conducted, secret-ballot election is the most satisfactory, preferred method of ascertaining employee support for a union. -
The Secret Ballot Protection Act Reduce Coercion in Union Organizing; Protect Employee Privacy
! The Secret Ballot Protection Act Reduce Coercion in Union Organizing; Protect Employee Privacy Employees should have the right to voluntarily choose—or not choose—union representation. This decision should be without intimidation or coercion by union organizers or employers. T he most widely accepted method to insure a fair outcome is for employees to vote by secret ballot. However, labor unions have increasingly sought to organize through a “card check” process which is characterized by union organizers using strong-arm tactics. In the last Congress, labor unions attempted to permanently deprive employees of a secret ballot through the deceptively-named “Employee Free Choice Act” (“EFCA”). To protect against ongoing and future attempts to rob employees of their ability to vote in private, Rep. Phil Roe (R-TN) and Sen. Jim DeMint (R-SC) recently introduced the Secret Ballot Protection Act (H.R. 972, S. 217) (“SBPA”). The SBPA will guarantee that employees can cast a vote in private regarding the critical decision of whether to choose or not choose union representation. I. Why is Secret Ballot Voting in Union Elections Important? The annals of NLRB case law are packed full of examples where the use of card check has been challenged because of coercion, misrepresentation, forgery, fraud, peer pressure, and promised benefits.1 In testimony before the House Subcommittee on Workforce Protections, an employee described the various misrepresentations and coercive tactics used by union organizers utilizing card check. The tactics included threats of termination, deportation, and loss of 401(k) and health benefits for not signing a card; and promises of green cards, termination of supervisors, and free turkeys for employees who did sign cards.2 It is no wonder then that federal courts have questioned the reliability of card check procedures. -
End-To-End Verifiable Voting with Prêt `A Voter
End-to-end verifiable voting with Pr^et `aVoter David Bismark Dissertation for the degree of Doctor of Philosophy Computing University of Surrey Department of Computing Declaration This thesis and the work to which it refers are the results of my own effort. Any ideas, data, images or text resulting from the work of others (whether published or un- published) are fully identified as such within the work and attributed to their originator in text, bibliography or in footnotes. This thesis has not been submitted in whole or in part for any other academic degree or professional qualification. I agree that the University has the right to submit my work to the plagiarism detection service Turniti- nUK for originality checks. Whether or not drafts have been so-assessed, the University reserves the right to require an electronic version of the final document (as submitted) for assessment as above. David Bismark October 2010 Cover-5 To Sophie, my beloved wife. And Lotus, the cat responsible for all the topos. End-to-end verifiable voting with Pr^et `aVoter David Bismark University of Surrey UK [email protected] 20th October 2010 Abstract Transparent and verifiable elections can be achieved by end-to-end veri- fiable electronic voting systems. The purpose of such systems is to enable voters to verify the inclusion of their vote in the final tally while keeping the votes secret. Achieving verifiability and secrecy at the same time is hard and this thesis explores the properties of verifiable electronic voting systems and describes a set of developments to the end-to-end verifiable electronic voting system Pr^et`aVoter to achieve these. -
American Secret Ballot Decisions
THE AMERICAN LAW REGISTER AND REVIEW. FEBRUARY, 1893. AMERICAN SECRET BALLOT DECISIONS. By -CHARLES CHAUNCEY BINNEY, Es. THAT the ballot, which for years has been used in every election district in this country, except for general elections in Kentucky, was employed in order to secure secrecy, and that its use implied secrecy, has been repeatedly decided by our courts, 2 while the benefit which this secrecy conferred upon the individual voter and the community at large has often been dwelt upon by text-writers.3 The theory of the old form of ballot was that the voter prepared or By the new constitution of Kentucky viva voce voting at general elections is abolished, and all elections are by ballot. It is in curious contrast to the conservatism which retained viva voce voting for so long that the first American secret ballot law, a very effective adaptation of the Australian system, was the Louisville election law of February 24, 1883, under which the first American election by secret ballot took place December 4, 1888. 2 See Jones z'. Glidewell, 53 Ark., 16r; Williams v. Stein, 38 Ind., 89; People v. Cicott, 16 Mich., 283; Common Council v. Rush, 82 Id.; 532; Brisbin z. Cleary, 26 Minn., 1o; Commonwealth v. Wcelper, 3 S. & R. (Pa.), 29, 37; Kneass' Case, 2 Pars. Eq. (Pa.), 553, 585: Temple v. Mead, 4 Vt., 535, 541; State v. Hilmantel, 23 Wis., 422. 3 See Cooley's Const. Lims. (6th Ed.), 76o. 102 AMERICAN SECRET BALLOT DECISIONS. provided it himself, so that he alone knew its contents, but the inevitable assumption by party organizations of the task of preparing and distributing the printed ballots used has for many decades done away with almost every vestige of actual secrecy, all legal theory to the contrary notwith- standing.