Subscribe

voter fraud, unicorn
Voter Fraud: A problem slightly more common than unicorns. Photo credit: DonkeyHotey / WhoWhatWhy, see complete attribution below.

Putting problematic politicians under a microscope for one thing can turn up entirely different wrongdoing, as disgraced former Alabama Governor Robert Bentley recently learned.

An impeachment investigation led by the Alabama House’s Judiciary Committee found the budget justifications Bentley used to rationalize DMV closures were decoys. An underlying political agenda would have disproportionately restricted voting access in African-American communities had the plans not stalled following federal investigation.

Activists fighting to maintain the integrity of the election process are not the least bit surprised by the findings; they have been leveling similar claims for years. It is rare, however, to see a government-backed report publicly confirm their suspicions. And it is probably fair to assume that if similar scrutiny were applied to other politicians’ motives elsewhere, this story would not be an isolated case.

These were hardly the first Republican-backed voter ID laws and anti-accessibility measures that threatened the voting rights of a vulnerable, left-leaning population. But lawmakers have always weaseled out of accountability by maintaining the purity of their intentions.

This report delivers a hard, non-partisan blow against Republicans’ “pure intentions” defense, while lending support to critics’ allegations that voter suppression tactics are written into the GOP playbook.

“Wherever Republicans have recently had control of the legislative process, they have passed laws restricting ballot access,” Stephanie Singer, a data analyst who, until 2016, served on the Philadelphia County Board of Elections, told WhoWhatWhy. She supports the claim that one particular party is to blame for these obstacles to voter access.

Jonathan Simon, co-founder and director of the Election Defense Alliance, argued this practice is “pretty much [standard operating procedure] for states with GOP trifecta control.”

“That may be overstating it, but not by a whole lot,” Simon stated.

Kathay Feng, executive director at Common Cause who defends minority communities from disenfranchisement, told WhoWhatWhy, “Governor Bentley’s closure of 31 drivers’ license offices is part of a larger, stridently partisan effort to shut down voter access, in ways that disproportionately impact lower-income and minority voters.”

“Sadly,” says voter protection attorney Denise Lieberman, “Alabama is not the outlier.”

Similar voting restrictions in Texas, Wisconsin, North Carolina, Florida, Arizona, Georgia, and Kansas suggest lawmaker-sponsored efforts to keep certain voters out of the booth have become common.

vote here
Photo credit: Hadley Paul Garland / Flickr (CC BY-SA 2.0)

“We have actually seen a significant uptick in efforts to restrict voter access in states across the country,” Feng says. “Following the 2010 elections, we saw a dramatic rise in state legislatures and secretaries of state introducing voter ID laws, rolling back the days that early voting is provided, making voter registration laws more restrictive, engaging in more aggressive purges of voter lists and other actions.

“This was part of a coordinated effort to [not only] affect the outcome of state elections, but also to lay the ground to change the electoral math of the 2012 presidential elections.”

But legislation is just phase one. The real damage, Singer says, occurs when law is coupled with inconvenience and obstruction, as was the case in Alabama.

“The one-two punch tactic [in which Republicans] first require an ID from the driver’s license office, then close certain drivers license offices, or simply tolerate limited hours or long lines that make driver’s license offices difficult for working people to access, has been quite effective.”

But until someone can verify legislators’ intent when crafting these laws, it is next to impossible to validate these claims. In the meantime, the accused usually fall back on talking points about the “threat” of voter fraud — a threat which numerous studies suggests is rare. Indeed, one such estimate from the Brennan Center places the national incidence of voter fraud in the range of .0003 to .0025 percent.

As the Brennan Center report puts it: There is a greater risk that an American “will be struck by lightning than that he will impersonate another voter at the polls.”

Unfortunately, demonstrating intent is a tall order; it is not every day that Republicans openly brag about the political benefits these laws yield their party, or GOP staffers go on Facebook to call out colleagues for their unbridled enthusiasm in shutting down voting rights.

While anecdotal support has never been hard to come by, the report from Bentley’s impeachment investigation, spearheaded by Alabama’s House Judiciary Committee, is the sort of legitimate evidence that might finally validate claims that Republican “voter protection” measures are thinly-veiled bids to keep Democrats out of the voting booth.

Still, real reform cannot occur until the court has its say. And as we have already seen, that process is neither easy nor expeditious. For proof, see the case against Texas’ voter ID laws, which stood for more than five years before a federal judge overturned them earlier this month.

While similar rulings in Wisconsin and North Carolina, and a pending federal lawsuit in Georgia, may indicate a turning tide, Lieberman reminds us the battle is far from over. In fact, in some states, it is just getting started.

“While the courts have struck some of these photo ID laws, many states are feeling emboldened to propose new restrictions on voting,” says Lieberman. “At last count, I believe there were nearly two dozen restrictive voting proposals pending in states around the country.”

Image attribution: Adapted by WhoWhatWhy from Unicorn (el cajon yacht club / Flickr – CC BY 2.0),  lamp (Denise Chan / Flickr – CC BY-SA 2.0),  GOP logo (Republican Party / Wikimedia), frame (Piotr Siedlecki / PublicDomainPictures.net), Paul Weyrich (c.berlet/publiceye.org / Wikimedia – CC BY-SA 3.0).

Author

Comments are closed.