Profile image
Story Views

Last Hour:
Last 24 Hours:

Cylance Video Demonstrates How Easy It Is to Change Vote Tally and Paper Trail Using (Soros) Sequoia Electronic Voting Machine

Tuesday, November 8, 2016 1:48
% of readers think this story is Fact. Add your two cents.

Cylance Video Demonstrates How Easy It Is to Change Vote Tally and Paper Trail Using (Soros) Sequoia Electronic Voting Machine

GermanySpainNetherlandsFranceFussiaFedFlag23h35wUkraine flagEstonia FlagCzechRepublicFlag23h35w Slovakia flag 23hPoland FlagIndia Flag 23hGreece FlagPortugal FlagItaly FlagFinland FlagSweden FlagRomania FlagNorway FlagTurkey FlagHungary FlagBulgaria Flag

From Ken Adachi, Editor
November 7, 2016

Cylance Video Demonstrates How Easy It Is to Change Vote Tally and Paper Trail Using (Soros) Sequoia Electronic Voting Machine (Nov. 7, 2016)

Facebook Censorship
To post this article on Facebook, link to the TinyUrl seen below. Facebook will remove any article identified as coming from

Bev Harris recorded an intervniew with Alex Jones on October 31, 2016 (see further below) in which she explained how the vote tallies of electronic voting machines are EASILY changed because ALL electronic voting machines employ a GEM software that uses decimal points and fractions of a whole number instead of being limited exclusively to whole number counts. She called it “Fractional Magic.” In the video seen below, Cylance researchers demonstarte how a California built voting machine called Sequoia AVC Edge can easily be manipulated with a PCMCIA card to change the vote tallies and the paper trail printout to any result desired. Sequoia was purchased by Smartmatic, a Soros connected company, in 2005. Sequoia voting machines are used in 23 California counties and in at least 16 other states. Once the vote tally and the paper trails are changed, there is no way to determine that the machine was manipulated after the fact. While some argue that electronic voting machines can be “hardened” to increase its security, the best answer is to discard all electronic voting macines and go back to mechanical voting machines or paper ballots, or both. Mechanical voting machines are much harder to rig since the zero count can be verified and sealed just before the election polls open. Then the count is wtinessed and verfied by all parties involved after the polls close to verfiy the machine represents an honest count. It was done this way for 80 years in America and it insured a more honest vote count.

It’s fairly obvious that Soros and the Illuminated Deep State are going to steal the election for Hillary, but an unprecedented landslide vote for Trump, will be detected by exit polls and the percentage of pro-Trump paper/absentee ballots. This will provide the evidence necessary to overturn a stolen election by the manipulation of electronic voting machines, which we now know is certain to take place. I think it’s wisest to ask for a paper ballot when you go to vote. If they won’t provide one, then request that your vote be verified and recorded for you. If you vote with an electronic machine, take a cell phone or smart phone photo of your vote before leaving the voting booth. If enough people did this, it would create a record that could be used to contest the stolen election in court.

Ken Adachi

Quoting from:

LOrd Mark Malloch-BrownThe chairman of Smartmatic is Lord Mark Malloch-Brown, who sits in the British House of Lords and on the board of George Soros’s Open Society Foundations. He was formerly the vice-chairman of Soros’s Investment Funds and even the deputy secretary-general of the United Nations when he worked as chief of staff to Kofi Annan.

Malloch-Brown’s resume includes stints as vice-president of the UN World Bank and in British Prime Minister Gordon Brown’s cabinet.

Lord Mark Malloch-BrownIn addition to a close relationship with Soros, Malloch-Brown has worked with consulting firms that are well-connected to Bill and Hillary Clinton. He was an international partner with the Sawyer-Miller consulting firm and was a senior adviser to FTI Consulting.

One of Sawyer-Miller’s alumni is Mandy Grunwald, who ran the firm’s communication contract for Bill Clinton’s 1992 presidential run. She was also the head of communications for Hillary Clinton’s unsuccessful 2008 presidential bid.

Jackson Dunn, who is a senior managing director with FTI Consulting, spent 15 years in Washington where he worked as an aide to President Bill Clinton and Sen. Hilllary Clinton.

Smartmatic has already encountered controversy in the ongoing presidential contest. It ran the online balloting for the Utah Republican caucus last March, when many critics said it was impossible to secure personal electronic devices that are used to register and vote.”

Cylance Discloses Voting Machine Vulnerability
By The Cylance Team    November 4, 2016

The following proof of concept video demonstrates the techniques Cylance researchers used to compromise a Sequoia AVC Edge Mk1 voting machine.

The video shows how easy it is for a third party to reflash the firmware with a PCMCIA card, and directly manipulate the voting tallies in memory.

Additionally, the video demonstrates how vote tallies can be manipulated on both the Public Counter and the Protective Counter, which was designed to act as a redundant verification system to ensure results are valid. 

Similar methods of exploitation have been proposed on a theoretical basis by other researchers, such as those in the 2007 paper ’Source Code Review of the Sequoia Voting System‘ (PDF), and then later discussed in the Politico article ‘How to Hack an Election in 7 Minutes‘, but Cylance is the first to demonstrate an exploit in a real-world scenario.

What Can be Done to Mitigate These Risks?

In the short term, for the upcoming 2016 election, Cylance recommends:

•  Increased supervision/ monitoring of physical access to electronic voting machines, especially as it pertains to any interfaces or ports except for the Voter Activation Card slot (typically found on the front)

•  Frequent verification of hardware or software errors, such as those displayed on operator screens (e.g.: the LCD on the back of a Sequoia voting machine)

•  Monitoring and verification of tamper-proof and/or tamper-evident seals (typically used to prevent or at least indicate tampering) surrounding the devices, ports, latches, etc.

In the long term, phasing out and replacing deprecated, insecure machines – namely those without robust, hardware-based firmware and data verification mechanisms is recommended. Also, additional due diligence of polling place volunteers, workers, and officers may help mitigate possible collusion for tampering by these groups.


Cylance has provided details of the vulnerabilities to both the manufacturer Sequoia and government authorities, as well as provided suggestions for mitigation.

The decision to announce the research findings was intended to encourage remediation of the vulnerabilities prior to Election Day Hacking.

Bev Harris with Alex Jones on October 31, 2016

How electronic voting machines can be manipulated to steal an election

Part 1

Part 2

**Important New Information** This video reveals the key to
Election Theft using electronic voting machines

Bev Harris (interviewed above with Alex Jones on Oct. 31) of explains how
elections are stolen with electronic voting machines using “Fraction Magic” (The solution to
stopping election theft is also available using existing “screen snapshot” capabilities found in
electronic voting machines and recording the serial number of your vote.)

Free Download: Bev Harris’ 2004 book unveils the story of invisible election vote rigging using electronic voting machines
Black Box Voting, Ballot Tampering in the 21st Century

Download Instructions for the Doo Wop Generation:
1. Right click the above link and choose “Save link as” to save the zip file into the folder of your choice or on your Desktop
2. Once downloaded, right click the zip file and choose “Extract files here” to unzip the pdf files into the same folder as the
zip file is located. Each of the 16 chapters is viewable as a separate pdf file, along with the appendix, index, and footnotes.
You can delete the zip file after unzipping the pdf files if desired.

Published on Oct 31, 2016
A real-time demo of the most devastating election theft mechanism yet found, with context and explanation
. Demonstration uses a real voting system and real vote databases and takes place in seconds across multiple
jurisdictions. Over 5000 subcontractors and middlemen have the access to perform this for any or all clients.
It can give contract signing authority to whoever the user chooses. All political power can be converted to the
hands of a few anonymous subcontractors. It’s a product. It’s scaleable. It learns its environment and can adjust
to any political environment, any demographic. It runs silently, invisibly, and can produce plausible results that really
pass for the real thing.

© Copyright 2016  All Rights Reserved.

We encourage you to Share our Reports, Analyses, Breaking News and Videos. Simply Click your Favorite Social Media Button and Share.

Report abuse
The contributor has disabled comments for this story
Top Stories
Recent Stories



Top Global

Top Alternative



Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.