1 archived article on absentee fraud by insiders in Atlantic County NJ:
Each of the above instances was prosecuted in New Jersey during a time when absentee voting was need-only. The checks and balances in place with need-only absentee voting enabled New Jersey officials to catch the absentee fraud. So what did New Jersey do? It loosened its restrictions, removing the very checks and balances that allowed the two situations above to be caught.
DATABASE WARS: You can't secure a computer from its own administrator. I expect to see two kinds of database wars in play for the November 2010 election: Voter list database manipulation, and vote-by-mail database tampering.
The extraordinary risks with vote-by-mail are the customized databases. Vote-by-mail databases are fluid, changeable, and control who can and cannot vote. Blocs of data can be switched by the administrator. Databases control signature files used for matching. Databases control who gets ballots and which returned ballots are accepted. Vote by mail databases are unregulated & uncertified.
The primary architect for current vote-by-mail computer software was Jeffrey Dean, an embezzler who specialized in computer crime. Dean's Dept. of Corrections papers:
Court transcripts showing Dean's key role in vote-by-mail software:
* For more on the two convicted felons known to have been involved in US vote-by-mail systems, see bottom of this article.
But even if convicted felons were not involved, vote by mail still transfers power to whatever IT person is involved in manipulating the data used to select and authenticate absentee voters. Vote by mail still conceals who actually voted, and whether the votes counted are the real ones.
PRINTING OPERATIONS: Printing operations control how many ballots and envelopes are printed, and often do the mail processing and mailing as well. The number of ballots and envelopes created at the print shop is not reviewable by public citizens or political parties, because the print shop is a private business, not subject to public records requests.
Printing operations with an exceptional level of access and, ultimately, control, over ballot printing, vote-counting machines, and/or mailing include Runbeck (Arizona and Florida), and Harp Enterprises, which has assumed near-total middleman control over Kentucky.
CHECKS AND BALANCES ARE A MAGIC SHOW
"Don't look there, look here!" When we ask about vote by mail checks and balances, our eyes are directed to what happens to signatures that don't match, a small number. But our eyes need to be on the signatures that DO match.
Large vote by mail systems compare electronic
signature databases. Human eyes never see the pen and ink. Electronic databases can be adjusted to compare signatures to themselves, or to bypass signature comparisons altogether.
A DOG VOTED IN WASHINGTON In Washington, a dog named Duncan was registered to vote using a paw-print for a signature, and he made it through two elections without the signature verification catching it. (The owner of the dog finally reported this).
LAKE COUNTY INDIANA REACTIVATED REJECTED ABSENTEE BALLOTS
In Lake County Indiana, after the election but before certification, a number of rejected absentee ballots were somehow re-validated. A private contractor admitted to doing this by remoting into the Lake County database. The firm said it was "testing something." Archived article: