Research published on GodsFiveStones.com has uncovered secret cryptographic algorithms in the official voter registration databases of New York, Ohio, and Wisconsin. Unreported findings indicate similar algorithms exist in New Jersey, Pennsylvania, and Texas.
Our investigations have revealed similar algorithms embedded in nearly every state examined. Despite this, Secretaries of State across these jurisdictions are reluctant to acknowledge or address the issue. While Ohio’s Secretary of State agreed to investigate our claims, no official corrective action has been announced.
Our investigation into New York’s voter registration database revealed well-hidden algorithms that potentially violate several state and federal laws. This cryptographic scheme is a dual-use technology: while it might have legitimate applications, it can also be used to satisfy malicious objectives. We believe one such nefarious use could be to facilitate mail-in ballot election fraud. In disclosing the existence of the algorithm in the New York state Board of Elections voter registration database, we stressed the following:
The algorithmic sort order creates the appearance of compliance with public disclosure laws while concealing attribute information. The attribute information is uniquely available to keyholders, much as a card cheat has unique access to a straight flush. Concealing information in plain sight, as was done in New York’s voter rolls, is called ‘steganography’ (Kaur & Rani 2016). In combination with known fraudulent registration records, The Spiral algorithm presents the possibility that it has been inserted into voter roll software, or used to alter the NYSBOE voter roll database, for nefarious reasons. The Spiral can be used to identify fraudulent records quickly and covertly by repositioning records into key positions. Records of interest can then be extracted by software designed to recognize the algorithmically modified data structure.“
Our evidence of cryptographic algorithms in voter rolls raises serious concerns about state election officials’ inaction. This could constitute negligence—potentially criminal negligence if officials were involved in creating these algorithms or if their inaction deliberately preserves them for election fraud. We distinguish this “election fraud”—a systematic effort to embed voting rolls with sophisticated ciphers to facilitate election theft—from “voter fraud,” which refers to individual voters attempting to cheat.
Ohio Secretary of State Frank LaRose’s suggestion to focus only on identifying specific voters who committed fraud is particularly troubling. This stance mischaracterizes systemic “election fraud” as individual “voter fraud,” while downplaying the undisputed presence of a cryptographic algorithm in Ohio’s voter registration file. Once deciphered, such an algorithm’s existence is irrefutable due to its evident and methodical alteration of data. This is analogous to the Pythagorean theorem in Euclidean geometry—a fundamental principle that once postulated cannot be ignored or dismissed by serious students.
Assuming the algorithms in voter registration databases were placed with nefarious intent, it’s reasonable to believe the perpetrators aimed to avoid detection. Our analysis of New York state voter rolls revealed nearly 2 million “clone” (duplicate) records and thousands of excess votes assigned to individuals with multiple ID numbers. We also identified a list of suspected “ghost” (likely fabricated) voters, each with 10 or more registrations. Through canvassing, we confirmed three cases of “ghost” voters, accounting for 57 ID numbers. Importantly, we uncovered the presence of cryptographic algorithms within the voter rolls.
However, voter rolls alone cannot prove fraud in mail-in or absentee voting. To identify fraudulent mail-in ballots would require additional steps beyond voter roll analysis. These include forensic investigation of individual ballot cover sheets to authenticate voter signatures and field canvassing to verify the existence and eligibility of voters at addresses associated with mail-in ballots. These steps are typically not made available by state authorities, creating a gap between what can be observed in voter rolls and what would be needed to conclusively prove fraud in mail-in voting.
Misunderstanding of Preventative Measures: The Secretary’s stance demonstrates a fundamental misunderstanding of the importance of preventative measures in maintaining election integrity. Waiting for evidence of voter fraud before investigating system vulnerabilities is akin to waiting for a security breach before fixing known weaknesses in a computer system.
Circular Logic: There’s a circular logic problem here. If the algorithms could potentially be used for covert manipulation of voter data, any fraud resulting from such manipulation might be undetectable through normal means. Requiring proof of fraud before investigating the very system that could be hiding such fraud is paradoxical.
Ignoring Systemic Risks: The presence of unexplained, complex algorithms in a critical system like voter registration databases is itself a significant concern, regardless of whether fraud has been detected. These algorithms introduce unnecessary complexity and opacity into a system that should be transparent and straightforward.
Public Trust: The existence of these unexplained algorithms, once known, could erode public trust in the election system. Refusing to investigate without proof of fraud could further damage this trust.
GodsFiveStones.com is a tax-deductible 501(c)3 foundation created by Jerome R. Corsi, Ph.D., and Karladine Graves, M.D., managed by Capstone Legacy Foundation.