One Person, One Vote: Estimating the Prevalence of Double Voting in U.S. Presidential Elections

Beliefs about the incidence of voter fraud inform how people view the trade-off between electoral integrity and voter accessibility. To better inform such beliefs about the rate of double voting, we develop and apply a method to estimate how many people voted twice in the 2012 presidential election. We estimate that about one in 4,000 voters cast two ballots, although an audit suggests that the true rate may be lower due to small errors in electronic vote records. We corroborate our estimates and extend our analysis using data from a subset of states that share social security numbers, making it easier to quantify who may have voted twice. For this subset of states, we find that one suggested strategy to reduce double voting—removing the registration with an earlier registration date when two share the same name and birthdate—could impede approximately 300 legitimate votes for each double vote prevented.

[1]  Ivan P. Fellegi,et al.  A Theory for Record Linkage , 1969 .

[2]  Gary W. Cox,et al.  Turnout and Rural Corruption: New York as a Test Case , 1981 .

[3]  Correcting for Fraud: A Quantitative Reassessment of the Mississippi Ratification Election of 1868 , 1989 .

[4]  D. Baum Pinpointing Apparent Fraud in the 1861 Texas Secession Referendum , 1991 .

[5]  Edward MacNeal One Person-One Vote , 1999 .

[6]  Jonathan N. Wand,et al.  The Butterfly Did It: The Aberrant Vote for Buchanan in Palm Beach County, Florida , 2001, American Political Science Review.

[7]  Ronald F. King,et al.  Counting the Votes: South Carolina's Stolen Election of 1876 , 2001, Journal of Interdisciplinary History.

[8]  Larry M. Bartels Beyond the Running Tally: Partisan Bias in Political Perceptions , 2002 .

[9]  P. Ivax,et al.  A THEORY FOR RECORD LINKAGE , 2004 .

[10]  John H. Fund Stealing Elections: How Voter Fraud Threatens Our Democracy , 2004 .

[11]  M. Barreto,et al.  Do Absentee Voters Differ from Polling Place Voters? New Evidence from California , 2006 .

[12]  Walter R. Mebane,et al.  Election Forensics: The Second-digit Benford's Law Test and Recent American Presidential Elections , 2006 .

[13]  Ahmed K. Elmagarmid,et al.  Duplicate Record Detection: A Survey , 2007, IEEE Transactions on Knowledge and Data Engineering.

[14]  Michael P. McDonald,et al.  Seeing Double Voting: An Extension of the Birthday Problem , 2007 .

[15]  Justin Levitt,et al.  The Truth About Voter Fraud , 2007 .

[16]  Michael P. McDonald The True Electorate A Cross-Validation of Voter Registration Files and Election Survey Demographics , 2007 .

[17]  Vincent J. Carey,et al.  Supervised Machine Learning , 2008 .

[18]  S. Ansolabehere,et al.  Vote Fraud in the Eye of the Beholder: The Role of Public Opinion in the Challenge to Voter Identification Requirements , 2008 .

[19]  R. Michael Alvarez,et al.  Election Fraud: Detecting and Deterring Electoral Manipulation , 2009 .

[20]  Expected Number of Random Duplications Within or Between Lists , 2010 .

[21]  Lorraine C. Minnite The Myth of Voter Fraud , 2010 .

[22]  Peter C. Ordeshook,et al.  Benford's Law and the Detection of Election Fraud , 2011, Political Analysis.

[23]  Y. Horiuchi,et al.  Making Outsiders' Votes Count: Detecting Electoral Fraud through a Natural Experiment , 2011, American Political Science Review.

[24]  W. Mebane Comment on “Benford's Law and the Detection of Election Fraud” , 2011, Political Analysis.

[25]  Sebastian M. Saiegh,et al.  Fraudulent Democracy? An Analysis of Argentina's Infamous Decade Using Supervised Machine Learning , 2011, Political Analysis.

[26]  Bernd Beber,et al.  What the Numbers Say: A Digit-Based Test for Election Fraud , 2012, Political Analysis.

[27]  Richard L. Hasen The Voting Wars , 2012 .

[28]  They Just Do Not Vote Like They Used To: A Methodology to Empirically Assess Election Fraud* , 2012 .

[29]  Erin O’Brien,et al.  Jim Crow 2.0? Why States Consider and Adopt Restrictive Voter Access Policies , 2013, Perspectives on Politics.

[30]  Lessons from the 2012 Election Administration and Voting Survey , 2013 .

[31]  R. Goodin,et al.  Double Voting , 2014 .

[32]  S AhlquistJohn,et al.  Alien Abduction and Voter Impersonation in the 2012 U.S. General Election: Evidence from a Survey List Experiment , 2014 .

[33]  Ray Christensen,et al.  Identifying Election Fraud Using Orphan and Low Propensity Voters , 2014 .

[34]  Joshua D. Potter,et al.  An Informed Forensics Approach to Detecting Vote Irregularities , 2015, Political Analysis.

[35]  Seth C. McKee,et al.  A Principle or a Strategy? Voter Identification Laws and Partisan Competition in the American States , 2015 .

[36]  Mauricio Sadinle,et al.  Bayesian Estimation of Bipartite Matchings for Record Linkage , 2016, 1601.06630.

[37]  Rob Hall,et al.  A Bayesian Approach to Graphical Record Linkage and Deduplication , 2016 .

[38]  S. Ansolabehere,et al.  Revisiting Public Opinion on Voter Identification and Voter Fraud in an Era of Increasing Partisan Polarization , 2016 .

[39]  Legitimität: eine zentrale Kategorie unter der Lupe , 2016 .

[40]  Peter Miller,et al.  Overcoming Voting Obstacles , 2016 .

[41]  Stephen Ansolabehere,et al.  ADGN: An Algorithm for Record Linkage Using Address, Date of Birth, Gender, and Name , 2017 .

[42]  M. Meredith,et al.  Voting But for the Law: Evidence from Virginia on Photo Identification Requirements , 2017 .

[43]  Jared S. Murray,et al.  Practical Bayesian Inference for Record Linkage , 2017, 1710.10558.

[44]  Michael C. Herron,et al.  An exploration of Donald Trump's allegations of massive voter fraud in the 2016 General Election , 2017 .

[45]  Ted Enamorado,et al.  Using a Probabilistic Model to Assist Merging of Large-Scale Administrative Records , 2018, American Political Science Review.