The Law of Cyber-Space

Total Page:16

File Type:pdf, Size:1020Kb

The Law of Cyber-Space THE LAW OF CYBER-SPACE AN INVITATION TO THE TABLE OF NEGOTIATIONS AHMAD KAMAL UNITAR United Nations Institute of Training and Research Published by the United Nations Institute for Training and Research Palais des Nations CH 1211 Geneva 10 Switzerland First Edition: October 2005 ISBN: 92-9182-038-8 The opinions expressed in this book are those of the author and do not necessarily reflect the views of the United Nations or of any other United Nations organs and agencies referred to in this book. © All rights reserved by the author No part of the material in this book may be reproduced without due attribution to the author. PREFACE This book is presented to the Member States of the United Nations by the United Nations Institute for Training and Research (UNITAR) as part of its programmes in the field of Information Technology. It is, as the title indicates, an invitation to consider the importance of starting negotiations in a sector which has been much ignored over the past few years. Hopefully, its importance and depth will be duly appreciated, and the material in it actually used for negotiations on a Law of Cyber-Space. Marcel Boisard United Nations Assistant Secretary-General Executive Director, UNITAR TABLE OF CONTENTS Foreword 001 Introduction 003 Chapter 01: Definitions 006 Chapter 02: The Right to Access 017 Chapter 03: Anonymity 023 Chapter 04: Data Protection 028 Chapter 05: Software, including Encryption 036 Chapter 06: Malicious Code 040 Chapter 07: Spam 044 Chapter 08: Cyber-Hooliganism 052 Chapter 09: Cyber-Stalking 055 Chapter 10: Identity Theft 061 Chapter 11: Cyber-Terrorism 066 Chapter 12: Cyber-War 076 Chapter 13: Distance Contracting 085 Chapter 14: Intellectual Property 111 Chapter 15: Obscene Publications 121 Chapter 16: Digital Signatures 128 Chapter 17: Civil Liberties 138 Chapter 18: Civil Liability 149 Chapter 19: Civil Remedies 161 Chapter 20: Criminal Liability 170 Chapter 21: Criminal Penalties 190 Chapter 22: Sovereignty and Jurisdiction 197 Chapter 23: Standards of Evidence 206 Chapter 24: Trans-National Extradition 215 Chapter 25: Telecommunications Regulation 223 Chapter 26: Regulatory and Investigatory Powers 234 Chapter 27: Dispute Resolution 244 Chapter 28: Treaty Secretariat 254 Bibliography 262 THE LAW OF CYBER-SPACE FOREWORD FOREWORD This book is a sequel to the earlier work on Information Insecurity, in which it had been argued that the absence of globally harmonized legislation was turning cyber-space into an area of ever increasing dangers and worries. In many ways, this situation is similar to the problems faced in dealing with the high seas, where the absence of consensus legislation was also creating an avoidable and acute vacuum. The international community finally woke up to the challenge, and started negotiations on the Law of the Sea. Those negotiations went on for almost a decade, but did finally succeed. The world is much better off as a result. In the case of cyber-space, the challenge is far greater. The speed of change is phenomenal, the dangers affect all countries without exception, new shoals and icebergs appear every day, and global responses are sporadic or non-existent. There can be no doubt whatsoever that a globally negotiated and comprehensive Law of Cyber-Space is essential. A complication arises from the fact that there are three distinct parties whose agreement would be necessary in any negotiations, namely, the governments, the private sector, and civil society. Each has an interest in the outcome, and each is a legitimate and absolutely essential stake-holder. Governments have the obvious power to legislate and to enforce laws. The private sector is the engine of all research and development in the sector of information technology, and knows the intimate details of the hardware and software on which its architecture is based. Civil society is the ultimate end- user, and benefits or suffers from its use and misuse. All three have somehow to be fully involved in the negotiations, in an atmosphere of mutual trust and respect, in which no one of the three tries to impose its weight on the other two. The question is where these essential negotiations can be conducted. It would appesar that only the United Nations can provide the neutral and legitimate forum for this task. It is the only truly universal multi-lateral organization that we have, and its stamp of legitimacy is unequalled. Care would have to be taken, however, to ensure that the location of the negotiation in the United Nations is not interpreted as turning it into a purely inter-government negotiation. That will just not work. All three stakeholders must be full participants in the exercise. This book is thus presented as a working manual for a tri-partite negotiation. It attempts to list the known aspects of the problem, to analyze the piece-meal manner in which different countries have addressed some of its component parts so far, and to offer some solutions for further work. An effort has been made to identify the different known legal problems and to classify them under twenty-eight specific chapters. Chapters 01 to 16 form one part which describes what are the subjects of the criminal conduit 1 THE LAW OF CYBER-SPACE FOREWORD in cyber-space, while chapters 17 to 28 explain where, why and how these misconducts can fit into the present legal framework. The classification is rather arbitrary, and is only meant to help in slicing the overall problem into some component elements. Thre are overlaps and inter-linkages, which future negotiators would have to unravel. The pattern followed for each of these chapters is identical. A first part attempts to identify the parameters of the problem, a second part brings together most of the existing texts on the subject, a third part tries to spot the loopholes that still remain to be plugged, and a final and fourth part suggests some possible solutions. The latter are merely suggestions, as it will be for the negotiators to agree on and determine the actual content of a comprehensive Law of Cyber-Space. This analysis is, unfortunately, seriously constrained by the fact that technological advances in cyber-space are hurtling forward at break-neck speed. In fact not a day passes without the discovery of new facts, new dangers, new insecurities. That makes for a highly dynamic situation. As opposed to that, the book being presented is static, because it is being written and published at a specific point of time. Due note has thus to be taken of the need to compensate for the gap that will inevitably exist between this publication and all new developments. A number of individuals have to be thanked for the enormous effort that has been expended in preparing this book. In the first place stand Professor Ehab Al-Shaer of the School of Computer Science, Telecommunications and Information Systems, Professor Katherine Strandberg of the College of Law, and Professor Patricia Szczerba of the School for New Learning, all from DePaul University in Chicago, and a large group of their students, who first researched the laws and regulations adopted by different countries. Then come two young students from Fairleigh Dickinson University in New Jersey, Kate Dumont and Max Burkey, who helped sift and classify the vast amount of material that had been gathered. Finally, my deepest and most grateful acknowledgement of the assistance received from Mr. Florin Butunoi, a young lawyer from Romania, currently, undergoing advanced studies at Seton Hall University in New Jersey, whose inputs have been invaluable. The manuscript was reviewed by Professor Ehab Al-Shaer, Professor Katherine Strandberg, and Professor Barry Kellman, as also by Ambassador Henning Wegener, the Chairman of the Permanent Monitoring Panel on Information Security of the World Federation of Scientists. All gave valuable suggestions for improvement and I am most grateful to them for their time and effort. 2 THE LAW OF CYBER-SPACE INTRODUCTION INTRODUCTION By any reckoning, the phenomenal growth of the global information technology infra-structure has been one of the most decisive events which distinguishes our contemporary times. In just over the past five years, the number of Internet users has sky-rocketed from 0.5 million to 6.5 million – a thirteen fold increase1. In the process, an entirely new universe has been created – the World of Cyber-Space. In many ways, this new frontier parallels the Wild West, with very few laws or norms to regulate human behavior, and innumerable outlaws only too willing to exploit the virgin territory of this vacuum. It is increasingly clear that the benefits of this World of Cyber-Space cannot be enjoyed without drafting a comprehensive legislation, or without harmonizing the isolated laws which exist here and there. Here are some reasons why it is necessary more than ever before to start work on this Law of Cyber-Space: · Every day, more than 30,000 personal computers are being recruited into secret networks that spread spam and viruses2. · With the help of computers and access to the Internet, intellectual property continues to face high levels of piracy in key markets throughout the world. Economic damage is estimated at $25-$30 billion globally3. · Data on 50 million credit cards and personal information has been stolen in just the first half of 2005 in the USA alone. · Twenty percent of people responding to a 2004 survey in the USA reported that they have personally been victims of identity fraud or theft. If this data is projected, the results suggest that close to 50 million individuals have already been victims of identity fraud or theft in this one country alone. · An innovative and burgeoning sector of the economy – eCommerce – is now endangered.
Recommended publications
  • The Challenges and Aspirations of the Digital Transformation of the State Council of Egypt
    American University in Cairo AUC Knowledge Fountain Theses and Dissertations Student Research Summer 6-15-2021 The Challenges and Aspirations of the Digital Transformation of the State Council of Egypt Moustafa Ahmad Kamal Mahmoud Ahmad [email protected] Follow this and additional works at: https://fount.aucegypt.edu/etds Part of the Courts Commons, and the Litigation Commons Recommended Citation APA Citation Ahmad Kamal Mahmoud Ahmad, M. (2021).The Challenges and Aspirations of the Digital Transformation of the State Council of Egypt [Master's Thesis, the American University in Cairo]. AUC Knowledge Fountain. https://fount.aucegypt.edu/etds/1637 MLA Citation Ahmad Kamal Mahmoud Ahmad, Moustafa. The Challenges and Aspirations of the Digital Transformation of the State Council of Egypt. 2021. American University in Cairo, Master's Thesis. AUC Knowledge Fountain. https://fount.aucegypt.edu/etds/1637 This Master's Thesis is brought to you for free and open access by the Student Research at AUC Knowledge Fountain. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of AUC Knowledge Fountain. For more information, please contact [email protected]. The American University in Cairo School of Global Affairs and Public Policy THE CHALLENGES AND ASPIRATIONS OF THE DIGITAL TRANSFORMATION OF THE STATE COUNCIL OF EGYPT A Thesis Submitted to The Department of Law In partial fulfillment of the requirement for LL.M. Degree in International and Comparative Law By Moustafa Ahmad Kamal Mahmoud Ahmad Spring 2021 The American University in Cairo School of Global Affairs and Public Policy Department of Law THE CHALLENGES AND ASPIRATIONS OF THE DIGITAL TRANSFORMATION OF THE STATE COUNCIL OF EGYPT A Thesis Submitted by Moustafa Ahmad Kamal Mahmoud Ahmad to the Department of Law Spring 2021 in partial fulfillment of the requirements for the LL.M.
    [Show full text]
  • Introduction Voting In-Person Through Physical Secret Ballot
    CL 166/13 – Information Note 1 – April 2021 Alternative Voting Modalities for Election by Secret Ballot Introduction 1. This note presents an update on the options for alternative voting modalities for conducting a Secret Ballot at the 42nd Session of the Conference. At the Informal Meeting of the Independent Chairperson with the Chairpersons and Vice-Chairpersons of the Regional Groups on 18 March 2021, Members identified two possible, viable options to conduct a Secret Ballot while holding the 42nd Conference in virtual modality. Namely, physical in-person voting and an online voting system. A third option of voting by postal correspondence was also presented to the Chairpersons and Vice- chairpersons for their consideration. 2. These options have since been further elaborated in Appendix B of document CL 166/13 Arrangements for the 42nd Session of the Conference, for Council’s consideration at its 166th Session under item 13 of its Agenda. During discussions under item 13, Members not only sought further information on the practicalities of adopting one of the aforementioned options but also introduced a further alternative voting option: a hybrid of in-person and online voting. 3. In aiming to facilitate a more informed decision by Members, this note provides additional information on the previously identified voting options on which Members have already received preliminary information, and introduces the possibility of a hybrid voting option by combining in- person and online voting to create a hybrid option. 4. This Information Note further adds information on the conduct of a roll call vote through the Zoom system. Such a vote will be required at the beginning of the Conference for the endorsement of the special procedures outlined in Appendix A under item 3, Adoption of the Agenda and Arrangements for the Session, following their consideration by the General Committee of the Conference at its first meeting.
    [Show full text]
  • The Effects of Secret Voting Procedures on Political Behavior
    UC San Diego UC San Diego Electronic Theses and Dissertations Title Voting Alone: The Effects of Secret Voting Procedures on Political Behavior Permalink https://escholarship.org/uc/item/50p7t4xg Author Guenther, Scott Publication Date 2016 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, SAN DIEGO Voting Alone: The Effects of Secret Voting Procedures on Political Behavior A Dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Political Science by Scott M. Guenther Committee in charge: Professor James Fowler, Chair Professor Samuel Kernell, Co-Chair Professor Julie Cullen Professor Seth Hill Professor Thad Kousser 2016 Copyright Scott M. Guenther, 2016 All rights reserved. The Dissertation of Scott M. Guenther is approved, and it is acceptable in quality and form for publication on microfilm and electronically: Co-Chair Chair University of California, San Diego 2016 iii DEDICATION To my parents. iv EPIGRAPH Three may keep a secret, if two of them are dead. { Benjamin Franklin v TABLE OF CONTENTS Signature Page................................... iii Dedication...................................... iv Epigraph......................................v Table of Contents.................................. vi List of Figures................................... viii List of Tables.................................... ix Acknowledgements.................................x Vita........................................
    [Show full text]
  • Open-Secret Voting
    ISSN 1936-5349 (print) ISSN 1936-5357 (online) HARVARD JOHN M. OLIN CENTER FOR LAW, ECONOMICS, AND BUSINESS OPEN-SECRET VOTING Adrian Vermeule Discussion Paper No. 674 07/2010 Harvard Law School Cambridge, MA 02138 This paper can be downloaded without charge from: The Harvard John M. Olin Discussion Paper Series: http://www.law.harvard.edu/programs/olin_center/ The Social Science Research Network Electronic Paper Collection: http://ssrn.com/ OPEN-SECRET VOTING Adrian Vermeule* Stock debates about transparency and secrecy usually assume that open voting and secret voting are mutually exclusive. But these positions present a false alternative; open and secret voting can be employed as complements in a larger decision-procedure. In what follows I will propose a hybrid or dual procedure of open-secret voting, and attempt to specify the conditions under which that procedure works well. I suggest that open-secret voting can best be justified as an institutional means of obtaining a second opinion from the voting group. A second opinion of this sort might produce informational benefits either for the members of the voting group itself, for outside parties, or for both. (This is a companion paper to Adrian Vermeule, “Second Opinions,” available on SSRN). * John H. Watson Professor of Law, Harvard Law School. Prepared for a symposium on “Scrutin secret et vote public, huis clos et débat ouvert” at the College de France, June 3-4, 2010. Thanks to Jacob Gersen, Don Herzog, Adriaan Lanni, Daryl Levinson, Eric Posner, Melissa Schwartzberg, Philippe Urfalino, and the conference participants for helpful comments, and to Michael Kenneally for helpful research assistance.
    [Show full text]
  • Adapting Helios for Provable Ballot Privacy
    Adapting Helios for provable ballot privacy David Bernhard1, V´eronique Cortier2, Olivier Pereira3, Ben Smyth2, Bogdan Warinschi1 1 University of Bristol, England 2 LORIA - CNRS, France 3 Universit´eCatholique de Louvain, Belgium Abstract. Recent results show that the current implementation of He- lios, a practical e-voting protocol, does not ensure independence of the cast votes, and demonstrate the impact of this lack of independence on vote privacy. Some simple fixes seem to be available and security of the revised scheme has been studied with respect to symbolic models. In this paper we study the security of Helios using computational models. Our first contribution is a model for the property known as ballot privacy that generalizes and extends several existing ones. Using this model, we investigate an abstract voting scheme (of which the revised Helios is an instantiation) built from an arbitrary encryp- tion scheme with certain functional properties. We prove, generically, that whenever this encryption scheme falls in the class of voting-friendly schemes that we define, the resulting voting scheme provably satisfies ballot privacy. We explain how our general result yields cryptographic security guaran- tees for the revised version of Helios (albeit from non-standard assump- tions). Furthermore, we show (by giving two distinct constructions) that it is possible to construct voting-friendly encryption, and therefore voting schemes, using only standard cryptographic tools. We detail an instan- tiation based on ElGamal encryption and Fiat-Shamir non-interactive zero-knowledge proofs that closely resembles Helios and which provably satisfies ballot privacy. 1 Introduction Electronic voting protocols have the potential to offer efficient and sound tallying with the added convenience of remote voting.
    [Show full text]
  • Union Elections by Secret Ballot Protect Workers' Rights
    February 27, 2007 Union Elections by Secret Ballot Protect Workers’ Rights Executive Summary • The United States has a rich tradition of Americans choosing their elected representatives by secret ballot. The secret ballot election process in deciding union representation (administered by the National Labor Relations Board (NLRB)) ensures that a worker can freely express his or her desire to join a union, without intimidation or fear. • In the face of declining union membership, Democrats have made elimination of the secret-ballot election in union representation one of their top legislative priorities. In the House, H.R. 800, the “Employee Free Choice Act,” has been reported out of committee and has over 230 cosponsors. • Support for the secret ballot, one of the cornerstones of democracy, is strong: o In 2002, Congress reaffirmed these rights in the passage of the Help America Vote Act (HAVA). In setting requirements for voting and voter-registration system, HAVA required that systems must maintain voter privacy and ballot confidentiality. o The AFL-CIO supports secret-ballot elections when it comes to decertification of a union. It argued before the NLRB that in decertification petitions, secret- ballot elections provide the surest means of avoiding decisions that are the result of coercion. o Some House Democrats who support card-check authorization (the acceptance of signed cards for union representation rights in lieu of a secret-ballot election) in the U.S. support the use of the secret ballot in other countries. o Both the NLRB and the Supreme Court have long recognized that a Board- conducted, secret-ballot election is the most satisfactory, preferred method of ascertaining employee support for a union.
    [Show full text]
  • The Secret Ballot Protection Act Reduce Coercion in Union Organizing; Protect Employee Privacy
    ! The Secret Ballot Protection Act Reduce Coercion in Union Organizing; Protect Employee Privacy Employees should have the right to voluntarily choose—or not choose—union representation. This decision should be without intimidation or coercion by union organizers or employers. T he most widely accepted method to insure a fair outcome is for employees to vote by secret ballot. However, labor unions have increasingly sought to organize through a “card check” process which is characterized by union organizers using strong-arm tactics. In the last Congress, labor unions attempted to permanently deprive employees of a secret ballot through the deceptively-named “Employee Free Choice Act” (“EFCA”). To protect against ongoing and future attempts to rob employees of their ability to vote in private, Rep. Phil Roe (R-TN) and Sen. Jim DeMint (R-SC) recently introduced the Secret Ballot Protection Act (H.R. 972, S. 217) (“SBPA”). The SBPA will guarantee that employees can cast a vote in private regarding the critical decision of whether to choose or not choose union representation. I. Why is Secret Ballot Voting in Union Elections Important? The annals of NLRB case law are packed full of examples where the use of card check has been challenged because of coercion, misrepresentation, forgery, fraud, peer pressure, and promised benefits.1 In testimony before the House Subcommittee on Workforce Protections, an employee described the various misrepresentations and coercive tactics used by union organizers utilizing card check. The tactics included threats of termination, deportation, and loss of 401(k) and health benefits for not signing a card; and promises of green cards, termination of supervisors, and free turkeys for employees who did sign cards.2 It is no wonder then that federal courts have questioned the reliability of card check procedures.
    [Show full text]
  • Policies and Models for Planning the Economic Development of the Non-Oil Sector in Saudi Arabia Ahmad Kamal Katanani Iowa State University
    Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1971 Policies and models for planning the economic development of the non-oil sector in Saudi Arabia Ahmad Kamal Katanani Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Agricultural and Resource Economics Commons, and the Agricultural Economics Commons Recommended Citation Katanani, Ahmad Kamal, "Policies and models for planning the economic development of the non-oil sector in Saudi Arabia " (1971). Retrospective Theses and Dissertations. 4551. https://lib.dr.iastate.edu/rtd/4551 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. 72-12,562 KATMANI, Ahmad Kamal, 1939- POLICIES AND MODELS FOR PLANNING THE ECONOMIC DEVELOPMENT OF .ffi NON-OIL SECTOR IN SAUDI ARABIA. Iowa State University, Ph.D., 1971 Economics, agricultural I University Microfilms, A XERDK Company, Ann Arbor. Michigan I THIS DISSERTATION HAS BEEN MICROFILMED EXACTLY AS RECEIVED Policies and models for planning the economic development of the non-oil sector in Saudi Arabia by Ahmad Kamal Katanani A Dissertation Submitted to the Graduate Faculty in Partial Fulfillment of The Requirements for the Degree of DOCTOR OF PHILOSOPHY Major Subject: Economics Approved: Signature was redacted for privacy. In Charge of Major Work Signature was redacted for privacy. For the Major Department Signature was redacted for privacy.
    [Show full text]
  • General Agreement on Tariffs and Trade Accord
    RESTRICTED GENERAL AGREEMENT ON TARIFFS AND TRADE Spec(92)18 ACCORD GENERAL SUR LES TARIFS DOUANIERS ET LE COMMERCE 9 June 1992 ACUERDO GENERAL SOBRE ARANCELES ADUANEROS Y COMERCIO COUNCIL CONSEIL C0NSEJ0 Trade Policy Review Mechanism Mécanisme d'examen Mecanismo de examen de las Bangladesh 9-10 June 1992 des politiques commerciales polîticas comerciales Bangladesh 9-10 juin 1992 Bangladesh 9-10 de junio de 1992 LIST OF REPRESENTATIVES/LISTE DES REPRESENTANTS/ LISTA DE REPRESENTANTES Chairman; Président: H.E. Mr. B.K. Zutshi (India) Présidente: ARGENTINA Représentante Sr. Alberto A. Alvarez Secretario, Misiôn Permanente ante la Oficina de las Naciones Unidas en Ginebra AUSTRALIA Representative Dr. Meredith Anne Borthwick Counsellor, Permanent Mission to the United Nations Office at Geneva AUSTRIA Representative Mr. Richard HochOrtler Minister, Deputy Permanent Representative to GATT BANGLADESH Representative Dr. M. Ishaq Talukdar Minister (Economic Affairs), Permanent Mission to the United Nations Office at Geneva BARBADOS (list not received) 92-0774 Spec(92)18 Page 2 BOLIVIA (no se ha recibido la lista) BRAZIL Repre s entative Ms. Renata Saint-Clair Pimentel Third Secretary, Permanent Mission to the United Nations Office at Geneva CAMEROUN Représentant M. Victorine Mbette Conseiller, Mission permanente auprès de l'Office des Nations Unies à Genève CANADA Representatives Mr. Mark E. Bailey Counsellor, Permanent Mission to the United Nations Office at Geneva Mr. Wray Koepke Counsellor, Department of External Affairs and International Trade REPUBLIQUE CENTRAFRICAINE (liste non reçue) CHILE (no se ha recibido la lista) COLOMBIA (no se ha recibido la lista) Spec(92)18 Page 3 COMMUNAUTES EUROPEENNES COMMISSION Représentants M. Ivan Klaric Conseiller, Délégation permanente à Genève M.
    [Show full text]
  • UNDERSTANDING CHINA a Diplomatic and Cultural Monograph of Fairleigh Dickinson University
    UNDERSTANDING CHINA a Diplomatic and Cultural Monograph of Fairleigh Dickinson University by Amanuel Ajawin Ahmed Al-Muharraqi Talah Hamad Alyaqoobi Hamad Alzaabi Molor-Erdene Amarsanaa Baya Bensmail Lorena Gimenez Zina Ibrahem Haig Kuplian Jose Mendoza-Nasser Abdelghani Merabet Alice Mungwa Seddiq Rasuli Fabrizio Trezza Editor Ahmad Kamal Published by: Fairleigh Dickinson University 1000 River Road Teaneck, NJ 07666 USA April 2011 ISBN: 978-1-457-6945-7 The opinions expressed in this book are those of the authors alone, and should not be taken as necessarily reflecting the views of Fairleigh Dickinson University, or of any other institution or entity. © All rights reserved by the authors No part of the material in this book may be reproduced without due attribution to its specific author. THE AUTHORS Amanuel Ajawin is a diplomat from Sudan Ahmed Al-Muharraqi is a graduate student from Bahrain Talah Hamad Alyaqoobi is a diplomat from Oman Hamad Alzaabi a diplomat from the UAE Molor Amarsanaa is a graduate student from Mongolia Baya Bensmail is a graduate student from Algeria Lorena Gimenez is a diplomat from Venezuela Zina Ibrahem is a graduate student from Iraq Ahmad Kamal is a Senior Fellow at the United Nations Haig Kuplian is a graduate student from the United States Jose Mendoza-Nasser is a graduate student from Honduras Abdelghani Merabet is a graduate student from Algeria Alice Mungwa is a graduate student from Cameroon Seddiq Rasuli is a graduate student from Afghanistan Fabrizio Trezza is a graduate student from Italy INDEX OF
    [Show full text]
  • American Secret Ballot Decisions
    THE AMERICAN LAW REGISTER AND REVIEW. FEBRUARY, 1893. AMERICAN SECRET BALLOT DECISIONS. By -CHARLES CHAUNCEY BINNEY, Es. THAT the ballot, which for years has been used in every election district in this country, except for general elections in Kentucky, was employed in order to secure secrecy, and that its use implied secrecy, has been repeatedly decided by our courts, 2 while the benefit which this secrecy conferred upon the individual voter and the community at large has often been dwelt upon by text-writers.3 The theory of the old form of ballot was that the voter prepared or By the new constitution of Kentucky viva voce voting at general elections is abolished, and all elections are by ballot. It is in curious contrast to the conservatism which retained viva voce voting for so long that the first American secret ballot law, a very effective adaptation of the Australian system, was the Louisville election law of February 24, 1883, under which the first American election by secret ballot took place December 4, 1888. 2 See Jones z'. Glidewell, 53 Ark., 16r; Williams v. Stein, 38 Ind., 89; People v. Cicott, 16 Mich., 283; Common Council v. Rush, 82 Id.; 532; Brisbin z. Cleary, 26 Minn., 1o; Commonwealth v. Wcelper, 3 S. & R. (Pa.), 29, 37; Kneass' Case, 2 Pars. Eq. (Pa.), 553, 585: Temple v. Mead, 4 Vt., 535, 541; State v. Hilmantel, 23 Wis., 422. 3 See Cooley's Const. Lims. (6th Ed.), 76o. 102 AMERICAN SECRET BALLOT DECISIONS. provided it himself, so that he alone knew its contents, but the inevitable assumption by party organizations of the task of preparing and distributing the printed ballots used has for many decades done away with almost every vestige of actual secrecy, all legal theory to the contrary notwith- standing.
    [Show full text]
  • Negative Vote Buying and the Secret Ballot"
    Negative Vote Buying and the Secret Ballot John Morgan Haas School of Business and Department of Economics University of California, Berkeley Felix Várdyy International Monetary Fund Washington, DC June 2008 Abstract We o¤er a model of “negative vote buying”—paying voters to abstain. While negative vote buying is feasible under the open ballot, it is never opti- mal. In contrast, a combination of positive and negative vote buying is optimal under the secret ballot: Lukewarm supporters are paid to show up at the polls, while lukewarm opponents are paid to stay home. Surprisingly, the imposition of the secret ballot increases the amount of vote buying— a greater fraction of the electorate votes insincerely than under the open ballot. Moreover, the secret ballot may reduce the costs of buying an election. JEL #s: D71, D72, D78. Keywords: Negative vote buying, lobbying, abstention, secret ballot, elec- tions. The …rst author thanks the International Monetary Fund Institute for its generous hospitality and inspiration during the …rst draft of this paper. Morgan also gratefully acknowledges the …nancial support of the National Science Foundation. The opinions expressed in this paper are those of the authors and should not be attributed to the International Monetary Fund, its Executive Board, or its Management. yCorresponding author. Email: [email protected] 1 1 Introduction The use of voting to make collective decisions inevitably brings with it the possibility of vote buying. Thus, a crucial aspect of designing voting procedures is to ensure that election outcomes re‡ect the will of the electorate, rather than the wallets of interest groups.
    [Show full text]