« GRITZ Home | Email msg. | Reply to msg. | Post new | Board info. Previous | Home | Next

A Newly Discovered Algorithm in Wisconsin Voter File is Indisputable Evidence of Criminal Election Fraud 

By: De_Composed in GRITZ | Recommend this post (1)
Mon, 28 Apr 25 4:37 PM | 14 view(s)
Boardmark this board | Grits Breakfast of Champeens!
Msg. 07506 of 07522
Jump:
Jump to board:
Jump to msg. #

April 28, 2025

A Newly Discovered Algorithm in Wisconsin Voter File is Indisputable Evidence of Criminal Election Fraud

by Jerome R. Corsi
AmericanThinker.com


Andrew Paquette, Ph.D., has discovered a never-before-seen algorithm in the Wisconsin Election Commission’s (WEC) voter registration database, leaving no doubt someone has penetrated the WEC’s computer system to impose a criminal reordering on the voter files. This finding alone should draw the attention of Director of National Intelligence Tulsi Gabbard, Attorney General Pam Bondi, and FBI Director Kash Patel. Yet, to date, we see no action whatsoever from the DOJ or the FBI investigating criminal election fraud.

Paquette first observed that the WEC voter role had an unusually high number of voter records that ended in zero. Assuming that the WEC voter roll assigned voter ID numbers sequentially, without breaks or outside manipulation, records ending in 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9 should appear with equal distribution. As seen in Table 1, voter records ending in zero occurred in 30.6 percent of the voter records, while those ending in numbers 1 through 9 ended with each number appearing equally at 7.7 percent of the time.



Paquette was at a loss to explain this irregularity until he realized that every voter ID record ending in zero had two different Wisconsin voters assigned the same voter ID number. In searching the database, Paquette confirmed that in every case where the same voter ID number was assigned to two different voters, the voter record ended in zero.

We have labeled the two voter IDs tied to WEC voter records ending in zero as “doubles,” a term devised to distinguish this phenomenon from the “modified duplicates” that Paquette previously found in the WEC voter database. “Modified duplicates” involve making multiple voter records for the same voter, which can be done, for instance, by assigning a different birthdate or address to each duplicated record. Because duplicated voters each have different dates of birth or other addresses, the “modified duplicates” appear to be different people.

The point of the “modified duplicate” scheme is to create false voters, all of whom nevertheless get legitimate state voter ID numbers. The non-existent “multiple duplicate” voters can then be hidden back in the voter role, identifiable to the criminals by “algorithm locator numbers,” so they are available for use in fraudulent mail-in ballot schemes.

Why the “doubles” scheme assigns the same voter ID number to two different voters is more difficult to figure out. What is also not clear is whether one or both of the “doubles” are real voters or if both of the “doubles” voters could be fictitious.

A scheme this complicated must operate through a computer algorithm that creates “doubles” for every voter ID record ending in zero in a WEC database of over 7 million voters. That is, whatever rule is applied to pick the two voters who constitute the “doubles” in a database with over 7 million voters needs an algorithm if the scheme is to be applied, monitored, and updated on an ongoing basis.

Put another way, this cannot be random. Because there’s numerical consistency when it comes to all zero-ending records involving doubles and all duplicate voters having only zero-ending voter IDs, that implies a set of programming instructions (i.e., an algorithm) telling the system to create these records in formulaic fashion.

The probability that a scheme this complicated, consistent, and massive could happen by chance is near zero. The only logical conclusion is that someone penetrated the WEC server to embed the rule that would consistently alter the entire WEC voter registration database.

Image by AI.
The WEC “doubles” scheme violates the Help America Vote Act (HAVA, 2002), which requires that each voter have a unique voter ID number and that no coded information not readily perceptible to election workers may be embedded secretly in the state voter roll database. Given the HAVA mandate that each registered voter must have a unique voter ID number, there is no administrative necessity justifying the fact that, as it now stands, every record in the WEC voter database with a voter numbering ending in zero is associated with two distinct voters.

We have previously argued that President Trump has chosen to elevate the election fraud investigation into a national security matter by bypassing a DOJ criminal investigation with Director of National Intelligence Tulsi Gabbard at the helm. The Department of Homeland Security has exercised authority in Arizona to review Arizona’s state voter roll to verify the citizenship of voters unde the authority of President Trump’s Executive Order.

On April 23, 2025, Tulsi Gabbard referred two members of the intelligence community for criminal prosecution by the DOJ for leaking classified information to the Washington Post and the New York Times. This was information about the U.S. military strike on Houthi rebels. The leak was intended to harm Secretary of Defense Pete Hegseth. Gabbard indicated that her action would “serve as a warning” to those “deep-state criminals” who “for partisan political purposes” sought “to undermine President Trump’s agenda.”

In that spirit, and in the absence of aggressive DOJ/FBI efforts to investigate deep-state criminals, Gabbard may have found a methodology that has a chance of spurring Bondi and Patel to action.

We now have abundant evidence that the WEC maintains a criminally infected voter registration database that was used in the 2024 general election and in the recent 2025 election for a seat on the Wisconsin State Supreme Court. Bondi needs to appoint a DOJ election integrity Task Force that will give Patel’s FBI sufficient subpoena power to seize WEC computers, voter registration files, and relevant internal documents, including emails. What’s holding Bondi and Patel back?

http://www.americanthinker.com/articles/2025/04/a_newly_discovered_algorithm_in_wisconsin_voter_file_is_indisputable_evidence_of_criminal_election_fraud.html


- - - - -
View Replies (1) »



» You can also:
« GRITZ Home | Email msg. | Reply to msg. | Post new | Board info. Previous | Home | Next