Technology can be used to assist voter identification processes undertaken by election management bodies (EMBs) during voter registration.
The level of required proof of identity varies considerably between jurisdictions. Some jurisdictions simply require voters to sign a declaration stating their eligibility when registering to vote. Others require voters to provide documentary proof of identity. Some jurisdictions record evidence of identity such as fingerprints or portrait photographs for use during the voting process.
The following topics examine issues associated with voter identification during voter registration:
- identity checks for fraud control
- electronic proof of identity
- technology to verify and record identities of voters
EMBs may issue identity documents or proof of registration documents to registered voters. Technology can be used to automate this process.
Voter register databases can be used to generate the data to be printed on an electoral identity document. Where photographs, signatures or finger/thumb prints have been digitised and stored in a database, they can also be printed on identity documents generated by the voter register database.
Identity documents containing photographs, signatures or finger/thumb prints can also be generated using specialised systems designed to produce identity cards while the subject is present. In these cases, textual information is printed on hardcopy (using data either provided on the spot or data extracted from a database). The voter usually signs this hardcopy record, and/or makes a fingerprint or thumbprint. The operator places the hardcopy printout, including the signature and/or finger/thumb print in the device, and takes a photograph of the person. The device then prints an identity card including a copy of the printed data, the signature and/or finger/thumb print and the photograph. The card is usually laminated and can include tamper-evident security devices such as holograms or embedded print to make it difficult to forge or alter the card.
Identity cards can also be produced that do more than simply show images of text and pictures. “Smart cards” incorporating magnetic strips or data chips can also store electronic data about the person who is the subject of the card. This data can include bio-identification data, so that smart cards can be used with smart card readers and bio-identification readers (such as finger print scanners) to automatically verify a person's identity.
Smart cards can be “read only” cards that simply contain information about the subject. Other types of smart cards can be “read-write” cards, which have the information contained on the card updated as the cards are used. For example, a read-write card used to verify a person's right to vote could, once used, be recorded as having been used for that election, so that it could not be used for voting in that election again.
Where smart cards are used in polling places, they could be used to replace current methods of recording that a person has voted. Where a voter uses a smart card at a polling place to verify his or her right to vote, the smart card reader could at the same time record that that person had voted and transmit that data to a central database during or after polling.
The provision of smart cards to voters and smart card readers to polling places is expensive, so an EMB needs to determine if the advantages are worth the expense.
Smart cards incorporating an electronic identity could also be used for voter registration or voting by computer over the Internet or at a computer kiosk, provided the computer was equipped with a smart card reader.
Computer software can be used to perform a range of tasks that can assist an EMB in reducing instances of fraudulent registration or voting and to identify and delete instances of duplicated voter registration records.
There are various types of techniques and technologies to verify and record identities of voters, namely:
- matching techniques and comparison routines
- signature recognition techniques
- bio-identification systems
- identity documents produced by election management bodies
- electronic proof of identity
Proving identity during an electronic transaction emerged as an identity issue in the 1990s and the 2000s. Particularly with moves towards electronic voter registration and voting over the Internet, the issue of proving that the person sending an electronic transaction is the person named in the transaction has become important. Various strategies such as the provision of electronic signatures, public key encryption and the use of Personal Identity Numbers (PINs) are being developed. This field is still in its infancy, however, it is evolving rapidly and improvements can be expected in the 2000s.
Matching techniques and comparison routines
Software can perform various comparison routines to determine whether a person applying for registration is already registered, perhaps at another address. Electronic searches can be programmed into voter registration databases to identify whether a person applying for registration is already on the register. Since people do not always use the exact same name every time they complete a form, software comparison routines need to make use of “fuzzy matching” techniques to help identify possible duplicates. Using fields other than names can also assist, particularly date of birth records. Even with dates of birth, people can show different dates on forms over time, and “fuzzy matching” may also be needed when comparing birth dates.
“Fuzzy matching” involves programming a computer system to search for matching data by applying various criteria. For example, a possible match could be identified where a name differs by only one letter. Possible matches could also be identified where first names and surnames matched but middle names did not match or were absent in one record but not in another.
Names can also be matched using aliases. A system can be set up that compares different variations on the same name, which could be used by a person at different times. For example, aliases for John could include Jon, Jonathon or Johnstone; aliases for Catherine could include Katherine, Caterine, Katerine, Kate, Cate and so on.
Matching techniques also need to take account of people changing names. In some societies, a woman typically changes her surname when she marries. People also change their names by deed poll. Where this occurs, matching by surname will generally not find a match with an earlier record using the old name. In these cases, matches can be found using first name or given name fields and dates of birth. To assist with this process, it is desirable to ask voters on their registration forms whether they have changed their names since their last registration, and to ask for their previous registered address. This data, if supplied, can greatly assist in finding out of date entries.
Fuzzy matching programs often produce several possible matches with a current record, some or all of which may not be actual matches with the person concerned. A human operator should be used at this point to determine whether these are actual matches and to alter the relevant records as necessary.
Signature recognition techniques
Scanning technology can be used to electronically capture handwritten signatures. These digitised images of signatures can be made available to EMB staff over a computer network, so that they can perform visual comparisons of digitised signatures with signatures provided on later documents.
Digitised signatures can also be automatically analysed and compared using appropriate software. This software compares patterns in digitised signatures and can flag possible mismatches for a human operator to investigate.
Digitized photographs
Digitized photographs of people's faces can be used as a method of determining whether one individual has registered more than once. Computer software can be used to compare different photographs to determine whether the same person appears in more than one photograph. This technique could be used for voter registration purposes to determine whether a person had fraudulently registered more than once, if all registered voters have their photographs taken and digitised.
Bio-identification systems
Bio-identification systems can be divided into two main types: visual and electronic.
Visual bio-identification methods include use of photographs, signatures and/or finger or thumb prints on identity cards. These are relatively low cost to implement and administer. Many off-the-shelf identity card issuing systems incorporate inclusion of photographs and signatures. At polling places, polling staff are expected to compare the photographs, signatures and/or finger or thumb prints on the identity cards with the voters.
This process has its weaknesses, as signature and finger print comparison is a highly skilled process that polling staff can not be expected to master, and a person's appearance can often change significantly from that contained in an identity photograph, particularly if the photograph is not updated regularly. Nevertheless, this kind of identity system will probably suffice in most cases where the risk of voting fraud is not unacceptably high.
If visual bio-identification systems are not considered secure enough, electronic bio-identification systems can be used. Electronic bio-identification systems can include digitised voice, hand print, finger/thumb print, or retinal (eye) images. Using these systems, digital records of a person's voice or physical features are stored on disk or smartcard and compared to the actual features of the person using some form of electronic reader. Access is only provided where there is an exact match.
Electronic bio-identification systems are expensive to acquire and administer, and may not be practical for use with the general voting population (although this may change as the relevant technology becomes more widespread and cheaper). However, they are a feasible option for providing security at sensitive locations, such as work places and counting centres.