Voter Privacy: a Transatlantic Comparison of Electoral Systems

Total Page:16

File Type:pdf, Size:1020Kb

Voter Privacy: a Transatlantic Comparison of Electoral Systems VOTER PRIVACY: A TRANSATLANTIC COMPARISON OF ELECTORAL SYSTEMS A Thesis submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Master of Arts in Communication, Culture, and Technology By Catherine Jones Boardman, B.A. Washington, D.C. April 22, 2019 Copyright 2019 by Catherine Jones Boardman All Rights Reserved ii VOTER PRIVACY: A TRANSATLANTIC COMPARISON OF ELECTORAL SYSTEMS Catherine Jones Boardman, B.A. Thesis Advisor: Meg Leta Jones , Ph.D. ABSTRACT Protecting voter privacy in modern democratic elections involves a highly complex sociotechnical system made up of interconnected people, technologies, legal frameworks, political cultures, and procedural practices. Elections in the United States stand out among all other Western democracies not only for their recent controversies, but also for their decentralized system of voting technologies, electoral administrations, and electoral laws. This paper will compare national elections in Estonia, Finland, Spain, and the United Kingdom to expose the strengths and weaknesses of the United States voting system and to show how voter privacy is an integral ingredient to democratic elections. Each of the selected countries implement different structures of electoral authority, utilize different voting technologies, follow different procedures, and operate within different legal frameworks and political cultures. Unlike in European democracies, the experience of voting in the United States differs depending on which state the voter is from. Although the U.S.’s patchwork system of electoral practices obstructs the voting process from adequately and equally protecting voter privacy, the system fits the unique circumstances of the American political system. The goal of this paper is to illustrate how voter privacy is of constitutive and instrumental use to the puzzle that is democracy. iii ACKNOWLEDGEMENTS This thesis would not have been possible without the help and inspiration of Dr. Jones. Working with you on this project has been such an honor. I never thought a first day of class homework assignment would evolve into a one-hundred-page thesis, but here we are! Thank you for forcing me to overcome my fear of emailing strangers, for cold calling us in 505, for constantly encouraging me to think across disciplines, and for opening me up to the world of privacy. Thank you, Dr. Koliska, not only for being my second reader, but also for pushing me to become a better writer. Each of your classes pushed me to reconsider my conceptions of truth and reality, and to challenge taken-for-granted assumptions. Thank you for your constant encouragement and for inspiring me to think critically and thoughtfully! To my Mom, thank you for not helping me with my science projects for me when I was a kid. This paper, I hope, shows you it was worth it. To my Dad, thank you for the long phone calls, for reading every one of my papers, and for encouraging me to read everything and anything. To my brother and sister, sorry for bringing up elections and voting at every family holiday. I can’t promise I’ll stop, but I love you! Lastly, thank you to all my family, friends, and everyone at CCT who had to hear me rant about voting machines. Many thanks, Catherine Jones Boardman iv TABLE OF CONTENTS I. Introduction ..................................................................................................... 1 II. Literature Review........................................................................................... 6 History of the Secret Ballot........................................................................ 6 Arguments Against Secrecy in Elections ................................................... 8 Arguments in Favor of The Secret Ballot .................................................. 9 A Sociological Perspective ........................................................................ 9 Voter Privacy ........................................................................................... 11 Threats to Voter Privacy .......................................................................... 14 Arguments Against Electronic Voting ..................................................... 16 Postal Voting ............................................................................................ 18 Effects of Electoral Reform ..................................................................... 20 Voting as a System................................................................................... 23 III. Method ......................................................................................................... 25 Why Compare Transatlantically .............................................................. 26 Selected Case Studies .............................................................................. 28 IV. Analysis........................................................................................................ 33 Estonia...................................................................................................... 33 Context ....................................................................................... 33 e-Estonia .................................................................................... 33 i-Voting ...................................................................................... 36 v Secrecy ....................................................................................... 38 Legal Framework ....................................................................... 40 Election Administration ............................................................. 42 Conclusion ................................................................................. 44 Finland ..................................................................................................... 44 Context ....................................................................................... 44 Election Administration ............................................................. 45 Legal Framework ....................................................................... 47 Voting Technologies .................................................................. 47 Secrecy ....................................................................................... 49 Conclusion ................................................................................. 51 Spain ........................................................................................................ 52 Context ....................................................................................... 52 Legal Framework ....................................................................... 52 Electoral Management ............................................................... 53 Secrecy ....................................................................................... 55 Voting Technology .................................................................... 58 Conclusion ................................................................................. 59 United Kingdom....................................................................................... 59 Context ....................................................................................... 59 Legal Framework ....................................................................... 61 Electoral Commission ................................................................ 62 vi Secrecy ....................................................................................... 63 Electronic Voting ....................................................................... 66 Conclusion ................................................................................. 68 United States ............................................................................................ 69 Political System ......................................................................... 69 Context ....................................................................................... 70 Legal Framework of the United States ...................................... 71 The Secret Ballot in the Law ..................................................... 72 The 2000 United States Presidential Election ............................ 74 Electoral Administrations .......................................................... 76 Voting Technologies .................................................................. 79 The Decentralizing Effect .......................................................... 82 Conclusion ................................................................................. 84 V. Discussion .................................................................................................... 87 Figures............................................................................................................................ 92 References .................................................................................................................... 101 vii LIST OF FIGURES Figure 1. Optical Scan Voting Machine ........................................................................ 92 Figure 2. Direct Recording Electronic Voting Machine ................................................ 92 Figure 3. Model of a Voting System .............................................................................. 93 Figure 4. Summary of Each Country’s Voting System ................................................
Recommended publications
  • Introduction Voting In-Person Through Physical Secret Ballot
    CL 166/13 – Information Note 1 – April 2021 Alternative Voting Modalities for Election by Secret Ballot Introduction 1. This note presents an update on the options for alternative voting modalities for conducting a Secret Ballot at the 42nd Session of the Conference. At the Informal Meeting of the Independent Chairperson with the Chairpersons and Vice-Chairpersons of the Regional Groups on 18 March 2021, Members identified two possible, viable options to conduct a Secret Ballot while holding the 42nd Conference in virtual modality. Namely, physical in-person voting and an online voting system. A third option of voting by postal correspondence was also presented to the Chairpersons and Vice- chairpersons for their consideration. 2. These options have since been further elaborated in Appendix B of document CL 166/13 Arrangements for the 42nd Session of the Conference, for Council’s consideration at its 166th Session under item 13 of its Agenda. During discussions under item 13, Members not only sought further information on the practicalities of adopting one of the aforementioned options but also introduced a further alternative voting option: a hybrid of in-person and online voting. 3. In aiming to facilitate a more informed decision by Members, this note provides additional information on the previously identified voting options on which Members have already received preliminary information, and introduces the possibility of a hybrid voting option by combining in- person and online voting to create a hybrid option. 4. This Information Note further adds information on the conduct of a roll call vote through the Zoom system. Such a vote will be required at the beginning of the Conference for the endorsement of the special procedures outlined in Appendix A under item 3, Adoption of the Agenda and Arrangements for the Session, following their consideration by the General Committee of the Conference at its first meeting.
    [Show full text]
  • Why Ballot Selfies Are Protected by the First Amendment
    Science and Technology Law Review Volume 18 Number 3 Article 3 2015 A Picture's Worth a Thousand Words: Why Ballot Selfies are Protected by the First Amendment Daniel A. Horwitz Follow this and additional works at: https://scholar.smu.edu/scitech Recommended Citation Daniel A. Horwitz, A Picture's Worth a Thousand Words: Why Ballot Selfies are Protected by the First Amendment, 18 SMU SCI. & TECH. L. REV. 247 (2015) https://scholar.smu.edu/scitech/vol18/iss3/3 This Article is brought to you for free and open access by the Law Journals at SMU Scholar. It has been accepted for inclusion in Science and Technology Law Review by an authorized administrator of SMU Scholar. For more information, please visit http://digitalrepository.smu.edu. A Picture's Worth a Thousand Words: Why Ballot Selfies are Protected by the First Amendment Daniel A. Horwitz* On September 9, 2014, Andrew Langlois walked into his polling place disgusted with the candidates who were running for U.S. Senate in the New Hampshire Republican Primary., Rather than voting for one of the ten candi- dates who appeared on his ballot, Mr. Langlois instead decided to vote for "his recently-deceased dog, 'Akira,'" whom he selected as a write-in candi- date.2 Thereafter, Mr. Langlois whipped out his smartphone, snapped a photo of his completed ballot, and posted the photo to his Facebook page along with the caption: "Because all of the candidates SUCK, I did a write-in of Akira."3 Unfortunately for Mr. Langlois, the election did not go his way.
    [Show full text]
  • The Effects of Secret Voting Procedures on Political Behavior
    UC San Diego UC San Diego Electronic Theses and Dissertations Title Voting Alone: The Effects of Secret Voting Procedures on Political Behavior Permalink https://escholarship.org/uc/item/50p7t4xg Author Guenther, Scott Publication Date 2016 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, SAN DIEGO Voting Alone: The Effects of Secret Voting Procedures on Political Behavior A Dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Political Science by Scott M. Guenther Committee in charge: Professor James Fowler, Chair Professor Samuel Kernell, Co-Chair Professor Julie Cullen Professor Seth Hill Professor Thad Kousser 2016 Copyright Scott M. Guenther, 2016 All rights reserved. The Dissertation of Scott M. Guenther is approved, and it is acceptable in quality and form for publication on microfilm and electronically: Co-Chair Chair University of California, San Diego 2016 iii DEDICATION To my parents. iv EPIGRAPH Three may keep a secret, if two of them are dead. { Benjamin Franklin v TABLE OF CONTENTS Signature Page................................... iii Dedication...................................... iv Epigraph......................................v Table of Contents.................................. vi List of Figures................................... viii List of Tables.................................... ix Acknowledgements.................................x Vita........................................
    [Show full text]
  • Open-Secret Voting
    ISSN 1936-5349 (print) ISSN 1936-5357 (online) HARVARD JOHN M. OLIN CENTER FOR LAW, ECONOMICS, AND BUSINESS OPEN-SECRET VOTING Adrian Vermeule Discussion Paper No. 674 07/2010 Harvard Law School Cambridge, MA 02138 This paper can be downloaded without charge from: The Harvard John M. Olin Discussion Paper Series: http://www.law.harvard.edu/programs/olin_center/ The Social Science Research Network Electronic Paper Collection: http://ssrn.com/ OPEN-SECRET VOTING Adrian Vermeule* Stock debates about transparency and secrecy usually assume that open voting and secret voting are mutually exclusive. But these positions present a false alternative; open and secret voting can be employed as complements in a larger decision-procedure. In what follows I will propose a hybrid or dual procedure of open-secret voting, and attempt to specify the conditions under which that procedure works well. I suggest that open-secret voting can best be justified as an institutional means of obtaining a second opinion from the voting group. A second opinion of this sort might produce informational benefits either for the members of the voting group itself, for outside parties, or for both. (This is a companion paper to Adrian Vermeule, “Second Opinions,” available on SSRN). * John H. Watson Professor of Law, Harvard Law School. Prepared for a symposium on “Scrutin secret et vote public, huis clos et débat ouvert” at the College de France, June 3-4, 2010. Thanks to Jacob Gersen, Don Herzog, Adriaan Lanni, Daryl Levinson, Eric Posner, Melissa Schwartzberg, Philippe Urfalino, and the conference participants for helpful comments, and to Michael Kenneally for helpful research assistance.
    [Show full text]
  • Adapting Helios for Provable Ballot Privacy
    Adapting Helios for provable ballot privacy David Bernhard1, V´eronique Cortier2, Olivier Pereira3, Ben Smyth2, Bogdan Warinschi1 1 University of Bristol, England 2 LORIA - CNRS, France 3 Universit´eCatholique de Louvain, Belgium Abstract. Recent results show that the current implementation of He- lios, a practical e-voting protocol, does not ensure independence of the cast votes, and demonstrate the impact of this lack of independence on vote privacy. Some simple fixes seem to be available and security of the revised scheme has been studied with respect to symbolic models. In this paper we study the security of Helios using computational models. Our first contribution is a model for the property known as ballot privacy that generalizes and extends several existing ones. Using this model, we investigate an abstract voting scheme (of which the revised Helios is an instantiation) built from an arbitrary encryp- tion scheme with certain functional properties. We prove, generically, that whenever this encryption scheme falls in the class of voting-friendly schemes that we define, the resulting voting scheme provably satisfies ballot privacy. We explain how our general result yields cryptographic security guaran- tees for the revised version of Helios (albeit from non-standard assump- tions). Furthermore, we show (by giving two distinct constructions) that it is possible to construct voting-friendly encryption, and therefore voting schemes, using only standard cryptographic tools. We detail an instan- tiation based on ElGamal encryption and Fiat-Shamir non-interactive zero-knowledge proofs that closely resembles Helios and which provably satisfies ballot privacy. 1 Introduction Electronic voting protocols have the potential to offer efficient and sound tallying with the added convenience of remote voting.
    [Show full text]
  • Revista Junio-10.Qxp12/5/1018:56Página205 European Union Regulation, Politicalnews, Pluralism, Key Words: Publicbroadcasters, Countries Studied
    Revista junio-10.qxp 12/5/10 18:56 Página 205 NÚRIA ALMIRON, MARÍA CAPURRO Y PABLO SANTCOVSKY [email protected], [email protected] y COMUNICACIÓN Y SOCIEDAD [email protected] Vol. XXIII • Núm. 1 • 2010 • 205-236 View metadata, citation and similar papers at core.ac.uk brought to you by CORE Núria Almirón. Media Structure Lecturer. Pompeu provided by Dadun, University of Navarra Fabra University. Department of Communication. Journalism Studies. 08018 Barcelona. Spain. María Capurro. Researcher. Autonomous University of Barcelona. Institute of Communication (InCom- UAB). 08193 Bellaterra. Spain. Pablo Santcovsky. Researcher. Autonomous University of Barcelona. Institute of Communication (InCom-UAB). 08193 Bellaterra. Spain. The Regulation of Public Broadcasters’ News Coverage of Political Actors in Ten European Union Countries La regulación de la información sobre los actores políti- cos en los medios públicos de diez países de la Unión Europea Recibido: 2 de septiembre de 2009 Aceptado: 29 de septiembre de 2009 205 ABSTRACT: : This article presents the RESUMEN: Este artículo presenta los re- results of a comparative research sultados de una investigación com- study on the regulation of public parada realizada sobre la regulación Vol. XXIII • Nº 1 C y S 2010 Vol. broadcasters’ political news coverage de la cobertura de la información po- in ten European countries. The aim of lítica en diez operadores públicos eu- the study was to establish whether ropeos. En concreto, el estudio inves- any regulation of political pluralism is tiga si existe regulación del pluralis- applied to daily news programmes in mo político, tanto para períodos elec- both electoral and non-electoral torales como ordinarios, aplicable a periods.
    [Show full text]
  • Electoral Laws, Administration and Management Review Report
    NEPAL Electoral Laws, Administration and Management Review Report /fli6«o lgjf{rg ko{j]If0f ;ldlt -lgof]s_ National Election Observation Committee (NEOC) Disclaimer: “This publication has been produced with the assistance of the European Union. The contents of this publication are sole responsibility of the assessment team and/ or NEOC and can in no way be taken to reflect the views of the European Union.” Electoral Laws, Administration And Management Review Report Editor : Dr. Gopal Krishna Siwakoti Advisors : Surya Prasad Shrestha Prof. Kapil Shrestha Bhawani Prasad Kharel Researchers : Dr. Chandra Kanta Gyawali Shree Krishna Subedi Rana Bahadur Thebe Special Contribution : Diana Garcia Alcubilla Jakub Smutny Translator : Rabin Subedi Assistance : Bikal Shrestha Deepika Naidu Narendra Ghimire Binod Kumar Vishwakarma Gita Bista Publisher : National Election Observation Committee (NEOC) Year of Publication : 2013 No. of Copies : 250 Copyright© : NEOC Financial Assistance : European Union (EU) Layout/design : Unigraphics, Tel.: 01 691 2152 Printing : Ganga Jamuna Press Pvt. Ltd., Tel.: 01 438 6934 Chairperson’s Note As credible election is the fundamental prerequisite of democracy and human rights, it is imperative that the elections should be conducted in a free, fair and independent manner. Elections should not be treated merely as a one-day fiesta of selecting the representatives. In the pursuit of ensuring the freedom of elections, it is equally important to conduct the study, investigation, analysis and implementation of different
    [Show full text]
  • Union Elections by Secret Ballot Protect Workers' Rights
    February 27, 2007 Union Elections by Secret Ballot Protect Workers’ Rights Executive Summary • The United States has a rich tradition of Americans choosing their elected representatives by secret ballot. The secret ballot election process in deciding union representation (administered by the National Labor Relations Board (NLRB)) ensures that a worker can freely express his or her desire to join a union, without intimidation or fear. • In the face of declining union membership, Democrats have made elimination of the secret-ballot election in union representation one of their top legislative priorities. In the House, H.R. 800, the “Employee Free Choice Act,” has been reported out of committee and has over 230 cosponsors. • Support for the secret ballot, one of the cornerstones of democracy, is strong: o In 2002, Congress reaffirmed these rights in the passage of the Help America Vote Act (HAVA). In setting requirements for voting and voter-registration system, HAVA required that systems must maintain voter privacy and ballot confidentiality. o The AFL-CIO supports secret-ballot elections when it comes to decertification of a union. It argued before the NLRB that in decertification petitions, secret- ballot elections provide the surest means of avoiding decisions that are the result of coercion. o Some House Democrats who support card-check authorization (the acceptance of signed cards for union representation rights in lieu of a secret-ballot election) in the U.S. support the use of the secret ballot in other countries. o Both the NLRB and the Supreme Court have long recognized that a Board- conducted, secret-ballot election is the most satisfactory, preferred method of ascertaining employee support for a union.
    [Show full text]
  • The Secret Ballot Protection Act Reduce Coercion in Union Organizing; Protect Employee Privacy
    ! The Secret Ballot Protection Act Reduce Coercion in Union Organizing; Protect Employee Privacy Employees should have the right to voluntarily choose—or not choose—union representation. This decision should be without intimidation or coercion by union organizers or employers. T he most widely accepted method to insure a fair outcome is for employees to vote by secret ballot. However, labor unions have increasingly sought to organize through a “card check” process which is characterized by union organizers using strong-arm tactics. In the last Congress, labor unions attempted to permanently deprive employees of a secret ballot through the deceptively-named “Employee Free Choice Act” (“EFCA”). To protect against ongoing and future attempts to rob employees of their ability to vote in private, Rep. Phil Roe (R-TN) and Sen. Jim DeMint (R-SC) recently introduced the Secret Ballot Protection Act (H.R. 972, S. 217) (“SBPA”). The SBPA will guarantee that employees can cast a vote in private regarding the critical decision of whether to choose or not choose union representation. I. Why is Secret Ballot Voting in Union Elections Important? The annals of NLRB case law are packed full of examples where the use of card check has been challenged because of coercion, misrepresentation, forgery, fraud, peer pressure, and promised benefits.1 In testimony before the House Subcommittee on Workforce Protections, an employee described the various misrepresentations and coercive tactics used by union organizers utilizing card check. The tactics included threats of termination, deportation, and loss of 401(k) and health benefits for not signing a card; and promises of green cards, termination of supervisors, and free turkeys for employees who did sign cards.2 It is no wonder then that federal courts have questioned the reliability of card check procedures.
    [Show full text]
  • Impact Assessment Report
    COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 12.12.2006 SEC(2006) 1646 COMMISSION STAFF WORKING DOCUMENT Accompanying document to the COMMUNICATION FROM THE COMMISSION European elections 2004 Commission report on the participation of European Union citizens in the Member State of residence (Directive 93/109/EC) and on the electoral arrangements (Decision 76/787/EC as amended by Decision 2002/772/EC) IMPACT ASSESSMENT REPORT for a possible amendment of Council Directive 93/109/EC laying down detailed arrangements for exercising the right to vote and stand as a candidate in elections to the European Parliament for citizens of the Union residing in a Member State of which they are not nationals {COM(2006) 790 final} {SEC(2006) 1645} {SEC(2006) 1647} 1 SUMMARY 1 POLICY BACKGROUND AND PROBLEM DEFINITION.......................................................... 5 1.1 Introduction .............................................................................................................................. 5 1.2 Current legal provisions in the EU in relation to EU citizenship and right to vote in EP elections ................................................................................................................................... 5 1.2.1 Participating in European Parliament elections .................................................................... 6 1.2.2 Context of the Impact Assessment on a possible amendment to Directive 93/109/EC ....... 7 2 PROBLEM ASSESSMENT .......................................................................................................
    [Show full text]
  • Amicus Briefs Have Been Filed with the Clerk’S Office
    No. 16-1435 In the Supreme Court of the United States MINNESOTA VOTERS ALLIANCE, ET AL., Petitioners, v. JOE MANSKY, ET AL., Respondents. On Writ of Certiorari to the United States Court of Appeals for the Eighth Circuit BRIEF OF NATIONAL ASSOCIATION OF COUNTIES, NATIONAL LEAGUE OF CITIES, U.S. CONFERENCE OF MAYORS, INTERNATIONAL CITY/COUNTY MANAGEMENT ASSOCIATION, AND INTERNATIONAL MUNICIPAL LAWYERS ASSOCIATION AS AMICI CURIAE IN SUPPORT OF RESPONDENTS LISA SORONEN CHARLES A. ROTHFELD State & Local Legal Center Counsel of Record 444 N. Capital St. N.W. ANDREW J. PINCUS Washington, DC 20001 MICHAEL B. KIMBERLY PAUL W. HUGHES EUGENE R. FIDELL Mayer Brown LLP Yale Law School 1999 K Street, NW Supreme Court Clinic Washington, DC 20006 127 Wall Street (202) 263-3000 New Haven, CT 06511 crothfeld@ mayerbrown.com Counsel for Amici Curiae ii TABLE OF CONTENTS Table of Authorities................................................... iii Interest of Amici Curiae..............................................1 Introduction and Summary of Argument...................2 Argument.....................................................................4 I. State regulation of campaign related expression at the polling place has been key to establishing orderly and peaceful elections................................................................4 II. Disruption at polling places remains a significant problem. .............................................8 A. Polling places sometimes experience serious disruptions. ........................................9 B.
    [Show full text]
  • Incompatibilities and Immunity of the Members of the European Parliament
    Handbook DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS LEGAL AFFAIRS Handbook on the incompatibilities and immunity of the Members of the European Parliament August 2014 STUDY Abstract Upon request by the Legal Affairs Committee, this handbook describes the national rules on the composition of the governments and parliaments of each of the Member States of the European Union and provides an overview of the national rules on parliamentary immunities. It further lists the national authorities that are competent to request the waiver of MEPs immunity, as identified after consultation with the Member States. This text will be updated regularly, on the basis of information received; please hold as reference the date of edition. PE 493.029 EN DOCUMENT REQUESTED BY THE COMMITTEE ON LEGAL AFFAIRS RESPONSIBLE ADMINISTRATOR Ms Rosa RAFFAELLI Policy Department C - Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] LINGUISTIC VERSIONS Original: EN ABOUT THE EDITOR Policy Departments provide in-house and external expertise to support EP committees and other parliamentary bodies in shaping legislation and exercising democratic scrutiny over EU internal policies. To contact the Policy Department or to subscribe to its monthly newsletter please write to: [email protected] European Parliament, manuscript completed in August 2014. © European Union, Brussels, 2014. This document is available on the Internet at: http://www.europarl.europa.eu/studies DISCLAIMER The opinions expressed in this document are the sole responsibility of the author and do not necessarily represent the official position of the European Parliament.
    [Show full text]