Skip to main content

Every election, voters are trapped into provisional voting by rules they don’t know (mail ballot surrender at the polls, registration deadline Oct. 22, only your precinct has you on the rolls and may not be the one near you.) This year, voting provisional has bad consequences due to a 2017 CA law, AB 840, that exempted the computer count of provisional ballots from our state’s mandatory hand-audit, by which counties must randomly select 1% of precincts and hand-count 100% of their ballots to check the computer count’s accuracy.

California Voters Midterm Self-Defense Manual

Also exempted from audit by AB 840 are mail ballots arriving too late to be processed into the Election Night precinct count – and that includes all mail ballots dropped off at the polls! If the federal balance of power (these famously tight races to “flip” House districts) comes down to unaudited computer counts, that’s trouble. Computers can change votes without evidence if no post-scan hand-audit is done.

See Appendix A for how it can be done – and done to avoid audited batches. Bad guys are aware of AB 840. Stay out of unaudited ballot batches this year! Use CA VOTER SELF-DEFENSE: learn the rules, teach ‘em, and keep ‘em.


At state site:

and/or LA County:

alex padilla

Check your registration more than once.! If it disappears, or there are changes you didn’t make, report asap. (LA #: (800) 815-2666.) CA has “Conditional Registration’ this year (if you miss deadline Oct. 22) but it comes at a price: Provisional Voting, because your data can’t be verified on the spot. Register or make changes NOW so that voters creating data logjams aren’t blamed for why we’re all not on the rolls by Election Day! Don’t get into the provisional count!

  1. Take a screenshot of your correct registration data. This is from (personal info removed):
voter verification

Check at too. Here’s how that looks (identifying data changed.) A software mismatch between state&county dropped 118,000 from the voter rolls in LA’s June primary. 92,000 provisionals created instantly. A dry run for some hard-fought congressional races this November?

Print the screenshots, date them, and take them if you vote at the polls. If you’re not at the rolls at your correct precinct, or your status is different, you’ve got evidence the mistake isn’t yours. You’ll still vote provisional but you can demand accountability later.

vrv 2

If you’re YES on ‘permanent vote by mail’ look for your ballot to arrive around Oct. 15 AT YOUR REGISTERED ADDRESS! If it doesn’t, contact your county, which must send you another and VOID the first. Stealing or slowing mail ballots is a political dirty trick. Don’t fall prey: vote and mail early. No postage required this year- YAY. Once, it was thought more secure to drop it off at a polling place election day. This year that gets you into the unaudited computer count of late mail ballots! Better therefore to “Surrender” the mail ballot unvoted, at the polls, for a regular ballot. Your vote will be counted Election Night, protected by hand-audit law.

  1. FIND the correct precinct for your registered address! That’s the only place you’ll be on the rolls and don’t have to vote provisional! Don’t rely on family or friends or neighbors. Their registered address may be different from yours!

State site:

La county:

Next page: an LA County Provisional Envelope, Back and Front. See the reasons for provisional voting and avoid them. A provisional ballot looks like any other dotted Inka-Vote ballot. The voter fills it out. But instead of putting it into the Precinct Ballot Reader’s ballot box beneath, voter must return it to the Provisional Clerk pollworker who puts it a pink envelope. You must sign it. Provisional signatures must match your registration card signature. After it’s matched, the anonymous ballot is removed and counted – long after the election is usually decided. This year, however, tight races may come down to provisional votes – which is why “games” might create a lot of them. Their results are computer results with no hand check-or-balance. DON’T GET GAMED.

purple 1
purple 2


Mimi Kennedy interviews Bennie Smith who shows how unaudited computer election results can be changed without detection.

The 30-minutes shows Bennie demonstrating “Fraction Magic,” his proof-of-concept app to show that fraction counting exists in most US election tabulation and can change votes undetectably, so it can always be said, “There’s no evidence any votes were changed.” He uses a GEMS election administrator database that was obtained through court discovery in a case in Shelby County, TN. (Shelby, TN, is not infamous Shelby, Alabama, of Shelby v. Holder, which gutted the Voting Rights Act!) The database shows a completed election, but Bennie explains that his app can operate in real time - while votes are being counted – if there is a live ‘Fixer” with access to the tabulator, or a program that was inserted before the election to re-allocate vote fractions according to percentages that will achieve the desired outcome. Election officials don’t even have to know it’s running. They can only protect results by doing a post-scan percentage hand-audit of the paper ballots. Pre-scan and post-scan “tests” are not enough. Decades-long scams of smog tests by Volkswagen showed that software testing can’t reveal what happens in regular operation.

When fraction counting was found by activists, vendors defended it as necessary for “weighted elections” in which some voters hold more stake than others by virtue of residence (water rights, taxation.) For these rare elections, they marketed a financial-style fraction menu in election software, betraying the bedrock principle of one person, one vote, and endangering all elections.

Here are markers and quotes from Bennie Smith’s Fraction Magic demo. Our audience was at “Let Me Vote, County My Vote” in Broward County, FL, on September 17, 2018.

Scroll to Continue

Recommended Articles

At 2:44

Mimi: “You’re gonna see what happens undetectably.”

Bennie:The anomalies that I started studying, and the infrastructure that she’s referring to, is that our elections systems count us like cents on the dollar…. I started finding things that I see in finance that are really common when you’re dealing with - in finance- with what they call allocations. So I started seeing these anomalies show up in voting results…. after I did the research and I got there, I saw that this framework was intentionally inside of the voting applications. I got this morbid feeling, and then the intrigue made me say, well ‘Why was that there?’ "

Mimi:…. “You’re going to see Bennie apply a program that he reversed engineered according a hunch he had which was possible given that he found fraction counting inside vote tabulators…once he found the fractions he said ‘Oh my God, would THIS be possible?’…. What we want you to understand is that the capacity to do this exists in all our tabulators. So software counts alone - Logic and Accuracy tests notwithstanding, they don’t work against this —this is what can happen.” 

At 15:55 —

Mimi:‘Did you predetermine the percentages? Did you say ‘I want Zach Wamp by—to have — 57%?"

Bennie:“Not 57% exactly. You have to mimic something that’s realistic. So what I have to do is use an enormous amount of political savvy to understand demographics - which you would get from a poll book. I would have to look at election history — which you would get from a poll book…. you have to have the voter rolls to know where your political strongholds are…I did a blend of things and I did it at the precinct level. There are precincts that you can’t touch. There are precincts that get audited. And for those ones you can just skip them.”

At 17:42 - (database shows voting results expressed in fractions)

Bennie: “And we left some goodies there so you can understand what I was talking about….

Mimi:...that’s how you know. It was at work. That’s the fraction capacity…. *

Bennie: …. Why is that there? That’s the main thing that makes what I’m talking about possible. I just conducted a weighted election. Where I gave the weight to the candidate I wanted to win. And the candidates in the fray, they adjusted as far along the number line to make my percentage real.”

*Mimi’s note: It was seeing fractions showing in a real database, because someone at that moment of tabulation had apparently forgotten to close the affected votes back into whole numbers, that set Bennie on his research)


Mimi: “I would prefer to ask a few practical questions, May I? I wanna know when you would insert this program into a tabulator; how much access you’d have to have, whether you’re a physical guy - or a woman --or a cyberspace person, how would you do it?”

Bennie: "You need about 20 seconds of access to connect some type of way to the computer. You got spearfishing attempts, you got malware, you have inside access, you have some way where you get something that you can control onto this actual PC…”


Bennie:“In my study that Bloomberg wrote about I went to a polling place that my predictions program told me would have the most dense turnout…if you wanted to take any results you have to take it where you can’t get caught, you have to take it in the most dense areas where if you’re taking votes away it’s not as noticeable….I took a picture with my blackberry phone and the poling tape that I took in the window on election night, my poll tape (that I took a picture of) had 548 people participating. The tabulator results had 330 people participating…and if you look at this one right here… (21:50) This looks like we’re talking about how much money somebody has.” *

Mimi: ...Ohhh - and they’re different! You can do Fraction Magic to the absentees only, for instance, if that’s on your mind. Or maybe only on the provisionals if that’s what you wanted…you can just touch something that’s not audited! Like late-arriving mail ballots and provisionals in California this year. Nobody’s lookin’ and nobody’s gonna catch it! I didn’t know they broke it down like that. You can do Fraction Magic as a breakdown choice."

The GEMS database migrated from Diebold through almost every tabulation software used in the US.

The only deterrence and mitigation is paper ballots and audits. The audits can be done using ballot images BUT NOT THE IMAGES ALONE.

IMAGES ALONE can be effectively cyber-manipulated to achieve fixed outcomes. But images matched randomly to their paper sources create severe difficulties for cyber manipulators and even those who would attempt to use inside access to fix outcomes. Severe difficulty is great deterrence!


Mimi Kennedy