Here’s How Deep State Stole the Election from Roy Moore

David Samuels
Alabama Election Investigative Report

QUESTION: How does Moore stay at an equal percentage away from Jones when ONLY Democrat area votes are being counted, all the way up the last 14 percent of votes? YOU GUESS! Obviously, even when a majority of Democrats voted for Moore, they did not allow Moore even that part of that vote.

The electronic voting machines have a hidden table that can be managed remotely to CAP a percentage. The way this table works is like this:

You enter the percentage for:

1. First Quarter of early votes
2. Second Quarter of votes
3. Third Quarter of votes
4. Fourth Quarter of votes

When a new vote is counted, the percentage is allocated according to the hidden table. So one vote is actually allocated according to a percentage. This would explain how this occurred.

In 2016, the GEMS table structure was in 99% of voting machines in the United States. The GEMS table allows peer remote into the voting database and in order to run a script.

Here is the link to the video:
Fraction Magic – Detailed Vote Rigging Demonstration (Video)

Now here’s the special report filed by vote-rigging Bev Harris on the criminal process by which votes are systematically tampered with across America.  It’s obvious that there are only so many ways to steal the vote; and this exposé reveals the perp’s preferred way in order to avoid detection.

Fraction Magic – Detailed Vote Rigging Demonstration

by Bev Harris

This report summarizes the results of our review of the GEMS election management system, which counts approximately 25 percent of all votes in the United States. The results of this study demonstrate that a fractional vote feature is embedded in each GEMS application which can be used to invisibly, yet radically, alter election outcomes by pre-setting desired vote percentages to redistribute votes. This tampering is not visible to election observers, even if they are standing in the room and watching the computer. Use of the decimalized vote feature is unlikely to be detected by auditing or canvass procedures, and can be applied across large jurisdictions in less than 60 seconds.

gems-usaGEMS vote-counting systems are and have been operated under five trade names: Global Election Systems, Diebold Election Systems, Premier Election Systems, Dominion Voting Systems, and Election Systems & Software, in addition to a number of private regional subcontractors. At the time of this writing, this system is used statewide in Alaska, Connecticut, Georgia, Mississippi, New Hampshire, Utah and Vermont, and for counties in Arizona, California, Colorado, Florida, Illinois, Indiana, Iowa, Kansas, Kentucky, Massachusetts, Michigan, Missouri, Ohio, Pennsylvania, Tennessee, Texas, Virginia, Washington, Wisconsin and Wyoming. It is also used in Canada.

Fractionalized vote:

Instead of “1” the vote is allowed to be 1/2,  or 1+7/8, or any other value that is not a whole number.

What fractionalized votes can do:

They allow “weighting” of races. Weighting a race removes the principle of “one person-one vote” to allow some votes to be counted as less than one or more than one. Regardless of what the real votes are, candidates can receive a set percentage of votes. Results can be controlled. For example, Candidate A can be assigned 44% of the votes, Candidate B 51%, and Candidate C the rest.

GEMS fractionalizes votes in three places:

1) The “Summary” vote tally, which provides overall election totals for each race on Election Night
2) The “Statement of Votes Cast”, which provides detailed results by precinct and voting method (ie. Polling, absentee, early, provisional)
3) The “undervote” count

Fractions in results reports are not visible.Votes containing decimals are reported as whole numbers unless specifically instructed to reveal decimals (which is not the default setting). All evidence that fractional values ever existed can be removed instantly even from the underlying database using a setting in the GEMS data tables, in which case even instructing GEMS to show the decimals will fail to reveal they were used.

Source code: Instructions to treat votes as decimal values instead of whole numbers are inserted multiple times in the GEMS source code itself; thus, this feature cannot have been created by accident.

Fractionalizing the votes which create the Summary Results allows alteration of Election Night Web results and results sent to the Secretary of State, as well as results available at and local election officials.

Fractionalizing the “Statement of Votes Cast” allows an extraordinary amount of precision, enabling alteration of results by specific voting machine, absentee batch, or precinct. Vote results can be altered for polling places in predominantly Black neighborhoods, and can parse out precincts within a mixed batch of early or absentee votes.

Fractionalizing the undervote category allows reallocation of valid votes into undervotes.

Voting rights abomination

According to programmer notes, a weighted race feature was designed which not only gives some votes more weight than others, but does so based on the voter’s identity. Ballots are connected to voters, weights are assigned to each voter per race, stored in an external table not visible in GEMS. Our testing shows that one vote can be counted 25 times, another only one one-thousandth of a time, effectively converting some votes to zero.

The study was prompted by two issues: (1) Anomalies in elections in Shelby County, Tennessee, which uses the GEMS election management system, in which inconsistencies were observed in reporting of results by GEMS; and (2) Concerns raised regarding the presence of middlemen during the election process, such that a single individual gains remote access to the election management program, in some cases in multiple jurisdictions.

The questions we examine are these:

Can election outcomes be controlled with enough versatility to allow a national impact? Does any mechanism exist that would enable a political consultant or technician to capture elections for repeat customers?

If the necessary features exist within the election management system to facilitate this:

Were such features embedded accidentally or on purpose; for what stated purpose were such features installed; if a reason was given, is that reason justifiable?

How might risks associated with inside access be mitigated?


Part 2: Context, Background, Deeper, Worse


Part 1: Votes are being counted as fractions instead of as whole numbers
Part 2: Context, Background, Deeper, Worse
Part 3: Proof of code
Part 4: Presidential race in an entire state switched in four seconds
Part 5: Masters of the Universe
Part 6: Execution capacity – coming –
Part 7: Solutions and Mitigations – coming –

Source link:

This entry was posted in Uncategorized. Bookmark the permalink.