X

What can Uncle Sam do to stop voter fraud?

LexisNexis' Norman Willox envisions a future marked by the widespread deployment of information-based identity authentication.

4 min read
America was fortunate this year to avoid the drawn-out legal battles of the 2000 presidential election.

Still, the close margins in some key states, coupled with concerns over inconsistent election standards, illustrate the continued risk of having election processes that vary from state to state, and often from county to county.

With future elections likely to be close calls, our democratic process is particularly vulnerable to voter fraud and abuse that we are not yet doing enough to stop.

Voter fraud has a long and storied history in the United States. However, the opportunities to commit fraud expanded substantially in the 1990s as a result of the National Voter Registration Act, aka the Motor Voter Act. That provision allows driver's license applicants to self-affirm their eligibility to vote with no more than a check mark and a signature.

Voter fraud has a long and storied history in the United States.

This lack of safeguards has resulted in extremely inaccurate voter rolls in many states. Individuals who are deceased or who have moved are in many cases simply kept on the rolls, providing an opportunity for fraudsters to corrupt the system simply by assuming different identities.

Furthermore, states do not share or coordinate their voter rolls. Therefore, there's no way for a state to know that the John Smith who showed up at an Orlando polling place is the same John Smith who voted with an absentee ballot in his home state of Pennsylvania. Allowing voters to register on the day of the election, as some states do, only exacerbates this problem.

Recognizing that there were serious issues to address after the last election, Congress passed the Help America Vote Act, or HAVA, which mandated the creation of the Election Assistance Commission (EAC) to conduct public studies that would examine the myriad weaknesses of the federal electoral system and develop best practices and standards for voting systems to guarantee the integrity of elections.

Not surprisingly, the commission made the determination that verifying a voter's identity was a crucial component of its overall mandate to restore trust in the way elections are conducted and administered in the United States.

In many ways, the challenge we now face is similar to one resolved years ago by financial institutions, credit issuers and insurance companies. In order to verify the identity of individuals opening new accounts, these businesses worked closely with information solution providers to develop systems to perform what's known as information-based identity authentication.

These systems perform an independent assessment of what a person represents about his identity, based on an analysis of available information. The applicant provides information, which is checked against proven information tools to ascertain if it is real (not fictitious) and if it is linked to other data (such as names and addresses). Using a well-tested analytical model based on historical data, the system can then provide a score that indicates the likelihood that the person is who he claims to be.

In many ways, the challenge we now face is similar to one resolved years ago by financial institutions, credit issuers and insurance companies.

Automated identity authentication at the time of voter registration would be a good place to start. Requiring the voter-to-be to provide certain basic information would allow the state to screen out fraudulent registrations. By using an information-based identity authentication system on the "front end" of the voting process, states could deter the use of false or stolen identities by fraudsters.

In addition, the identity authentication process could easily be expanded by individual states on a case-by-case basis to screen for other eligibility criteria, such as age, citizenship and residency requirements. Combining advanced analytical processes and tools, along with policy-based, information-driven technology, it is possible to put in place an identity management system that provides authentication, security and enhanced privacy protections.

Putting such a system in place would allow for the standardization of state voter lists, eliminating many opportunities for fraud and abuse. The next step would be to develop a system for states to share information on voters, ensuring that the principle of "one person, one vote" is not undermined by would-be fraudsters.

States already possess much of the information that would be needed for such a system, in the form of motor vehicle databases. However, these systems could only be truly effective when combined with the kind of information and tools that power predictive models used in the insurance or mobile-phone industries to verify the identity of applicants. There are numerous examples of this technology already in use--in a way that safeguards society's interests while protecting the privacy of individual citizens.

Ultimately, the principle of democratic governance is at stake in voter fraud and abuse. Though information-based identity authentication will not provide a magic bullet to solve the problem of voter fraud, it does provide one vital component of a comprehensive system to ensure that elections are carried out in a fair and accurate manner.