HOW TO COMBAT VOTER FRAUD IN 6 NOT-SO-EASY STEPS

A recent Brennan Center for Justice report by Myrna Pérez suggests six measures to ensure honest elections and protect voters. Read the full report here: https://www.brennancenter.org/publication/election-integrity-pro-voter-agenda
  1. 1.
    Goodbye, ink and paper registration. Hello, automatic and online registration.
    Inaccurate voter rolls cause confusion, expense, and disenfranchisement. What’s needed is a paradigm shift: The government should assume the duty of registering voters and maintaining accurate voter registration lists. A big problem to tackle: the reliance on outdated registration technology, specifically ink and paper.
  2. 2.
    Make sure our voting machines are secure and reliable.
    Remember the hanging chads of 2000? Dysfunctional voting machines breed mistrust. More troubling: Today’s generation of voting machines remains vulnerable to deliberate manipulation.
  3. 3.
    Don't allow online voting until security is proven.
    Some of the biggest skeptics of Internet voting are computer security experts. The recent high-profile cyberattacks on Sony Pictures, Target, and others shows how private sector and major federal agency computer networks, which have many more resources than local election administrators, are far from invulnerable.
  4. 4.
    Adopt only common-sense voter identification proposals.
    Strict voter ID laws place barriers in front of the ballot box for many eligible Americans. A Brennan Center survey showed that up to 11% of eligible voters — more than 21 million citizens — do not have the kind of identification required by these strict laws.
  5. 5.
    Increase security of mail-in ballots.
    Vote-by-mail raises election integrity issues because of concerns that ballots can be filled out improperly or manipulated for ballot stuffing. In fact, the first known cyberattack on a voting system involved mail-in ballots.
  6. 6.
    Protect against insider wrongdoing.
    Election officials and workers should receive special attention because their insider status increases their opportunity to both abuse the system and avoid detection.