This is already available in most systems. Laws are already on the books to authorize you to do this. It costs almost nothing and enables almost everyone to authenticate computerized voting system results. All that remains is cooperation (or court-ordered coercion) of public officials to force them to honor your rights. It is a one-two punch which makes it very…
Black Box Voting 2.0 – a curated nonpartisan reporting and public education site for elections.
The Emmy-nominated HBO documentary, Hacking Democracy, has recently been made available for streaming on Amazon Video. Most people don’t realize that the producers of this film are independent filmmakers from Great Britain — they dug deep into their own pockets, and credit cards, to produce a film that was so controversial it was not at all certain whether it would…
Guest Author: Richard Hayes Phillips, Ph.D.: [Updated July 20 to include full detail report] It has been widely noted that the unadjusted CNN exit polls for the 2016 Democratic presidential primaries, in many states, are at variance with the official results. Some believe the exit polls are accurate, and the official results are fraudulent. Others believe the exit polls are…
Guest Author – Richard Hayes Phillips, Ph.D.: Ohio citizens conducted, under my direction, a genuine audit of the 2004 presidential election. This was no mere “spot check” of randomly selected precincts, and no mere “recount” of the same ballots previously run through the electronic tabulators. We learned to ask for everything: ballots, poll books, voter signature books, ballot accounting charts,…
6 – Middlemen, Inside Access and Manipulation – A fractional voting framework is treacherous because it can be scaled to run across multiple jurisdictions very quickly. False results precisely mimic known patterns to appear plausible. In the demonstration we performed, Smith’s one-size-fits-all utility showed that a person without any programming skills at all could seize control of election results in…
1 – Summary – This report summarizes the results of our review of the GEMS election management system, which counts approximately 25 percent of all votes in the United States. The results of this study demonstrate that a fractional vote feature is embedded in each GEMS application which can be used to invisibly, yet radically, alter election outcomes by pre-setting…
2 — Totals dropping mid-count; poll tapes don’t match; missing single-votes like round-off errors; e-mails from programmers; and voters being personally “weighted” for unequal value — In August 2014 Bennie Smith was approached by a number of candidates who insisted that their elections had been stolen. He disagreed with the group and offered to look into how the system works….
3 – Programming to treat votes as decimals – The term “DOUBLE” means to store and process numbers with “double precision floating points” – in other words, to enable large numbers of decimal values. In contrast, the term “INT” instructs the program to treat numbers as whole integers. Source Code: Below are clips from GEMS source code showing that it…
4 – Proof of Concept: Election Night Results – We used the GEMS fractional vote feature to alter an actual statewide vote database, rewriting all the polling place votes in the state of Alaska for the 2004 presidential election to change the outcome. This database was obtained by the Alaska Democratic Party in 2006 pursuant to a court order. Below is…