Those who want to diminish the importance of finding cryptographic algorithms embedded in state boards of election (SBOE) voter registration databases typically demand proof the algorithms have resulted in fraudulent votes or suggest that legitimate purposes can explain the algorithms. However, they’re focusing on the wrong things.
This article argues that cryptographic algorithms in SBOE voter registration databases may violate state and federal laws, potentially indicating improper practices or even criminal activity. Election officials who fail to investigate and address unauthorized algorithms once discovered could risk civil and possibly criminal liabilities, depending on specific circumstances and applicable laws.
Consider the following legal requirements that secretly embedded algorithms appear to violate:
Dr. Paquette’s initial review of the Ohio voter rolls, attached, shows that voter identification numbers in certain counties are assigned by an algorithm that permits a hidden means of tracking voter registrations. His work, while preliminary and not comprehensive, is consistent with his extensive review of the New York voter rolls that showed an algorithm that also permitted such tracking, which his analysis showed was tied to false registrations. This hidden tracking structure effectively functions as a third ID number in New York and appears to present a significant election system risk. It also appears to violate the requirements of the Help America Vote Act and related Ohio statute which provide that all election officials be able to obtain immediate access to the information contained in statewide voter registration lists.
The following considerations mitigate against the likelihood that cryptographic algorithms found in SBOE voter registration databases have legitimate explanations:
The following factors suggest that the placing and maintenance of complex cryptographic algorithms in SBOE voter registration databases may indicate serious irregularities or potential legal violations:
Dr. Paquette continues to uncover complex algorithms in various state voter ID systems. These intelligence-grade cryptographic methods share three key characteristics: 1) they segregate voter data, 2) they conceal their operational methods, and 3) they add hidden attributes to voter records. The algorithms obscure straightforward relationships between IDs and registration dates through multi-stage processes and intricate mathematical schemes. The sophistication and opacity of these expensive-to-implement systems suggest a purpose beyond normal administrative needs.
Conclusion: The finding of an algorithm in a SBOE voter registration database should be sufficient evidence to contaminate the use of that SBOE voter registration database to certify any election, opening up challenges by candidate demanding proof they were defeated by the voters, not by the algorithms.
GodsFiveStones.com is a tax-deductible 501(c)3 foundation created by Jerome R. Corsi, Ph.D., and Karladine Graves, M.D., managed by Capstone Legacy Foundation.