AUDIT USA Americans United for Democracy, Integrity and Transparency in Elections
  • Elections belong to the people
  • Ballot Images Project
    • Project Overview
    • Understanding Ballot Images and Related Documents
    • Get Involved
    • North Carolina Voting Systems
    • Legal Action
    • For Candidates and Campaign Leaders
    • States/Counties that Use Ballot Images from Paper Ballots
    • Documentation and Manuals for ES&S DS850’s and DS200’s
  • About
    • About AUDIT Elections USA
    • Our Team
  • Media
    • Media Inquiries
    • News
    • Archive
  • Blog
  • Donate
  • Contact
  • Elections belong to the people
  • Ballot Images Project
    • Project Overview
    • Understanding Ballot Images and Related Documents
    • Get Involved
    • North Carolina Voting Systems
    • Legal Action
    • For Candidates and Campaign Leaders
    • States/Counties that Use Ballot Images from Paper Ballots
    • Documentation and Manuals for ES&S DS850’s and DS200’s
  • About
    • About AUDIT Elections USA
    • Our Team
  • Media
    • Media Inquiries
    • News
    • Archive
  • Blog
  • Donate
  • Contact
June 14, 2016  |  By John Brakey In Election Fraud, Forced Agenda, Fractionalized Votes, U.S. Complicity, Voter Disenfranchisement

ITS OUT! Part 6 – How the heist works, wholesale election fraud!

fraction-magic-6

fraction-magic-6

6 – Middlemen, Inside Access and the Manipulation Script –

A fractional voting framework is treacherous because it can be scaled to run across multiple jurisdictions very quickly. False results precisely mimic known patterns to appear plausible. In the demonstration we performed, Smith’s one-size-fits-all utility showed that a person without any programming skills at all could seize control of election results in several counties at a time, even though each county had different precincts, races, and candidates. Vendors and well-placed middlemen can alter results in multiple states. GEMS’ unique design offers both product and service.

We have discussed two ways to weight a race:

a. By candidate (assign percent to candidate)
b. By voter (assign weight to each voter)

Weight by candidate allows the greatest breadth of execution.

What is needed to weight by candidate?

1. A set of desired percentages;
2. An insider manipulation utility;
3. A trifling moment of access to the GEMS election database.

1. Creating desired percentages

Such information is gathered for various reasons, such as targeting voters for advertising and get-out-the-vote efforts. Percentages can be shaved or enhanced, then cut and pasted into a fractional voting utility.

Continue Reading

Please share
Bennie Smith Bev Harris John Brakey
Previous StoryJohn Brakey on Election Fraud: I’m Hoping We Have Crossed the Rubicon
Next StoryIn California, Ballots from Likely Clinton Voters Were Counted First While Unaudited Sanders-heavy Batches Came in Later

Related Articles

  • North Carolina Faced with Unverifiable Elections
  • Error message on computer screen
    Government Technology: Florida’s Election Hardware Troubles Are Nothing New

Leave your comment Cancel Reply

(will not be shared)

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Search This Site

Categories

Stay Connected with AUDIT-USA

Donate to Support AUDIT-USA

Blog Calendar

June 2016
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« May   Jul »

Recent Posts

  • North Carolina Faced with Unverifiable Elections
  • California To County Election Officials: You Must Preserve Digital Ballot Images from Voting Machines
  • Government Technology: Florida’s Election Hardware Troubles Are Nothing New
  • BREAKING NEWS: TRANSPARENCY ADVOCATES SCORE VICTORY IN FLORIDA
  • Here’s How the Country Could Actually Secure Our Elections If Politicians Actually Cared to Try
  • Home
  • Get Involved
  • Donate
  • Blog
  • Media Inquiries
  • Contact
  • Privacy Policy
  • Terms

Copyright ©2018-19 AUDIT-USA. All Rights Reserved

en_USEnglish
en_USEnglish