Published on Oct 31, 2016

Bev Harris, of Back Box Voting ( is a nonpartisan, nonprofit organization dedicated to preserving the integrity of the electoral process.A real-time demo of the most devastating election theft mechanism yet found, with context and explanation. Demonstration uses a real voting system and real vote databases and takes place in seconds across multiple jurisdictions. Over 5000 subcontractors and middlemen have the access to perform this for any or all clients. It can give contract signing authority to whoever the user chooses. All political power can be converted to the hands of a few anonymous subcontractors. It’s a product. It’s scaleable. It learns its environment and can adjust to any political environment, any demographic. It runs silently, invisibly, and can produce plausible results that really pass for the real thing.

This devastating video contains a real-time demo of precise, scaleable, invisible election manipulation which can be performed in multiple counties and states at once. Contains very little explanation – see long version for full context and explanation:

1 – Summary –

This report summarizes the results of our review of the GEMS election management system, which counts approximately 25 percent of all votes in the United States. The results of this study demonstrate that a fractional vote feature is embedded in each GEMS application which can be used to invisibly, yet radically, alter election outcomes by pre-setting desired vote percentages to redistribute votes. This tampering is not visible to election observers, even if they are standing in the room and watching the computer. Use of the decimalized vote feature is unlikely to be detected by auditing or canvass procedures, and can be applied across large jurisdictions in less than 60 seconds.


How Voting Software is Rigged - Fraction Magic

GEMS vote-counting systems are and have been operated under five trade names: Global Election Systems, Diebold Election Systems, Premier Election Systems, Dominion Voting Systems, and Election Systems & Software, in addition to a number of private regional subcontractors. At the time of this writing, this system is used statewide in Alaska, Connecticut, Georgia, Mississippi, New Hampshire, Utah and Vermont, and for counties in Arizona, California, Colorado, Florida, Illinois, Indiana, Iowa, Kansas, Kentucky, Massachusetts, Michigan, Missouri, Ohio, Pennsylvania, Tennessee, Texas, Virginia, Washington, Wisconsin and Wyoming. It is also used in Canada.

Fractionalized vote:

Instead of “1” the vote is allowed to be 1/2, or 1+7/8, or any other value that is not a whole number.

What fractionalized votes can do:

They allow “weighting” of races. Weighting a race removes the principle of “one person-one vote” to allow some votes to be counted as less than one or more than one. Regardless of what the real votes are, candidates can receive a set percentage of votes. Results can be controlled. For example, Candidate A can be assigned 44% of the votes, Candidate B 51%, and Candidate C the rest.

GEMS fractionalizes votes in three places:

How Voting Software is Rigged – Fraction Magic
Bev Harris is a writer and founder of Black Box Voting. She has researched and written about election transparency and computerized voting systems since 2002. Harris was featured in the Emmy-nominated HBO documentary Hacking Democracy, and is the author of Black Box Voting: Ballot Tampering in the 21st Century, a book purchased by the White House Library and also reportedly found on Osama bin Laden’s bookshelf. Harris’s research has been covered in The New York Times, Vanity Fair, Time Magazine, CNN and several international publications, including the Philippine Daily Inquirer and Agence France Presse. Media inquiries: Contact by text (for immediate response) or by phone 206-335-7747.


How Voting Software is Rigged – Fraction Magic

Bennie Smith is a Memphis-based application developer for an electrical manufacturing company. He is also a political strategist who has developed a micro-targeting application that predicts voter turnout. In August 2014 he was approached by a number of candidates who insisted that their elections had been stolen. He disagreed with the group and offered to look into how the system works. After discovering a number of irregularities, Smith began to research how votes that originate from the same source can change once they get into the GEMS vote tabulation program. Smith’s attention to these anomalies uncovered an extraordinarily high-risk tampering mechanism and ultimately provided a new infrastructure for analyzing questionable election results.