Integrity & Observation
The Vote phase must be credible under adversarial conditions. This chapter defines the integrity safeguards and observation architecture required to make outcomes defensible.
Objectives
Prevent or deter coercion, fraud, and manipulation.
Provide independent evidence about process integrity.
Detect anomalies early enough to correct them.
Create a record that can withstand post-result contestation.
Integrity Threats (Baseline Assumptions)
Design should assume:
intimidation and retaliation threats against voters and officials,
administrative manipulation (selective exclusion, “missing” registrants),
disinformation and fabricated incident claims,
cyberattacks on registration, reporting, or tabulation systems,
physical disruption of polling and transport.
Observation Mission: Requirements
An observation mission must have:
1. Independence
Governance that prevents capture.
Funding and logistics that avoid single-party dependence.
2. Access
Freedom to visit polling sites, counting sites, and registration centers.
Ability to interview stakeholders without intimidation.
Access to key documents and procedures (within privacy limits).
3. Coverage and Sampling Plan
Deployment coverage targets (e.g., % of sites covered).
Statistically meaningful sampling where full coverage is impossible.
Explicit monitoring of high-risk areas and displaced voting sites.
4. Reporting Authority
Right to publish findings on a defined schedule.
Ability to flag urgent integrity concerns in real-time.
Transparent methodology disclosures (what was observed, how, and limitations).
5. Coordination with Security and Monitoring Systems
Channels to report threats and intimidation incidents.
Integration with Freeze monitoring when violence affects voting safety.
Anti-Coercion Package (Minimum)
A credible anti-coercion design includes:
Secret ballot protections (procedural and physical).
Safeguards against “supervised voting” by coercers.
Protections for election workers and observers.
Rapid response for intimidation claims (hotline + investigation).
Safe reporting mechanisms for vulnerable groups.
Rules for invalidating or re-running compromised precincts.
Track coercion with:
Complaint volume and category breakdown.
Geographic clustering of threats.
Incident severity and recurrence.
Correlation with turnout anomalies (as a flag).
Audit and Integrity Checks (Minimum)
Even with observers, you need auditability:
Chain-of-custody documentation for ballots/records.
Reconciliation checks (issued vs returned vs counted).
Risk-limiting audit or defined recount triggers.
Independent review of tabulation software (if used).
Logs that are tamper-evident and time-stamped (where feasible).
Transparency: What Should Be Published
Publish, at minimum:
Rulebook and procedures (version-locked).
Observer mission methodology and reports.
Aggregate participation and turnout statistics.
Incident and complaint summaries (privacy-protected).
Audit results and reconciliation summaries.
Final results with clear aggregation logic.
Keep restricted:
Personally identifiable voter data.
Information that increases physical security risk.
Sensitive cyber defense details.
(See Data Governance )
Integration with Dispute Resolution
Integrity findings must have procedural consequences:
Observer flags can trigger investigations.
Defined thresholds trigger recounts or reruns.
Timelines are enforced to prevent indefinite contestation.
See: Dispute Resolution
© 2026 InitKoa. Architected by Réjean McCormick .