Ask yourself, why would Edward Snowden (NSA Whistleblower) put up a tweet showing the public just how easy it is to hack the official vote count?
It’s pretty much ‘hacked anyways’ with more people becoming aware of the Electoral College, a body that elects the President and Vice President of the United States every four years. Citizens of the United States do not directly elect the president or the vice president; instead they choose “electors”, who usually pledge to vote for particular candidates.
And when you make that connection, think about who is backing Hillary Clinton? The big banks. Follow the money, see for yourself, and learn more about that here.
Hillary Clinton’s paid speeches to Goldman Sachs, Deutsche Bank, Morgan Stanley, and other banks leaked online by WikiLeaks are evidence of that, along with the other 100,000 plus documents.
A great quote come to mind by Former US President Theodor Roosevelt, one that I’ve used many times.
“Political parties exist to secure responsible government and to execute the will of the people.
From these great tasks both of the old parties have turned aside. Instead of instruments to promote the general welfare, they have become the tools of corrupt interests which use them impartially to serve their selfish purposes. Behind the ostensible government sits enthroned an invisible government, owing no allegiance and acknowledging no responsibility to the people.
To destroy this invisible government, to dissolve the unholy alliance between corrupt business and corrupt politics is the first task of the statesmanship of the day.” (source)
Researchers at Cylance Inc., an American software firm founded in 2012 used a modified flash memory card costing £24 to tamper with the machine.
According to them:
The following proof of concept video demonstrates the techniques Cylance researchers used to compromise a Sequoia AVC Edge Mk1 voting machine.
The video shows how easy it is for a third party to reflash the firmware with a PCMCIA card, and directly manipulate the voting tallies in memory.
Additionally, the video demonstrates how vote tallies can be manipulated on both the Public Counter and the Protective Counter, which was designed to act as a redundant verification system to ensure results are valid.
Similar methods of exploitation have been proposed on a theoretical basis by other researchers, such as those in the 2007 paper ‘Source Code Review of the Sequoia Voting System‘ (PDF), and then later discussed in the Politico article ‘How to Hack an Election in 7 Minutes‘, but Cylance is the first to demonstrate an exploit in a real-world scenario.
Here’s the explanation.
Over 150,000 people have participated in the 5 Days of You Challenge helping bring them inward, gain clarity on who they are, why they are here, and what is next for them...
Watch the daily videos, complete the worksheets, and enter to win a trip to Toronto to meet the CE team at their Luminous Retreat Centre.
Change starts within. Are You Ready?Click here to register for free!