A Newly Discovered Algorithm in Wisconsin Voter File is Indisputable Evidence of Criminal Election Fraud
Andrew Paquette, Ph.D., has discovered a never-before-seen algorithm in the Wisconsin Election Commission’s (WEC) voter registration database, leaving no doubt someone has penetrated the WEC’s computer system to impose a criminal reordering on the voter files. This finding alone should draw the attention of Director of National Intelligence Tulsi Gabbard, Attorney General Pam Bondi, and FBI Director Kash Patel. Yet, to date, we see no action whatsoever from the DOJ or the FBI investigating criminal election fraud.
Paquette first observed that the WEC voter role had an unusually high number of voter records that ended in zero. Assuming that the WEC voter roll assigned voter ID numbers sequentially, without breaks or outside manipulation, records ending in 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9 should appear with equal distribution. As seen in Table 1, voter records ending in zero occurred in 30.6 percent of the voter records, while those ending in numbers 1 through 9 ended with each number appearing equally at 7.7 percent of the time.
Paquette previously found in the WEC voter database. “Modified duplicates” involve making multiple voter records for the same voter, which can be done, for instance, by assigning a different birthdate or address to each duplicated record. Because duplicated voters each have different dates of birth or other addresses, the “modified duplicates” appear to be different people.
The point of the “modified duplicate” scheme is to create false voters, all of whom nevertheless get legitimate state voter ID numbers. The non-existent “multiple duplicate” voters can then be hidden back in the voter role, identifiable to the criminals by “algorithm locator numbers,” so they are available for use in fraudulent mail-in ballot schemes.
Why the “doubles” scheme assigns the same voter ID number to two different voters is more difficult to figure out. What is also not clear is whether one or both of the “doubles” are real voters or if both of the “doubles” voters could be fictitious.
A scheme this complicated must operate through a computer algorithm that creates “doubles” for every voter ID record ending in zero in a WEC database of over 7 million voters. That is, whatever rule is applied to pick the two voters who constitute the “doubles” in a database with over 7 million voters needs an algorithm if the scheme is to be applied, monitored, and updated on an ongoing basis.
Put another way, this cannot be random. Because there’s numerical consistency when it comes to all zero-ending records involving doubles and all duplicate voters having only zero-ending voter IDs, that implies a set of programming instructions (i.e., an algorithm) telling the system to create these records in formulaic fashion.
The probability that a scheme this complicated, consistent, and massive could happen by chance is near zero. The only logical conclusion is that someone penetrated the WEC server to embed the rule that would consistently alter the entire WEC voter registration database.
previously argued that President Trump has chosen to elevate the election fraud investigation into a national security matter by bypassing a DOJ criminal investigation with Director of National Intelligence Tulsi Gabbard at the helm. The Department of Homeland Security has exercised authority in Arizona to review Arizona’s state voter roll to verify the citizenship of voters under the authority of President Trump’s Executive Order.
On April 23, 2025, Tulsi Gabbard referred two members of the intelligence community for criminal prosecution by the DOJ for leaking classified information to the Washington Post and the New York Times. This was information about the U.S. military strike on Houthi rebels. The leak was intended to harm Secretary of Defense Pete Hegseth. Gabbard indicated that her action would “serve as a warning” to those “deep-state criminals” who “for partisan political purposes” sought “to undermine President Trump’s agenda.”
In that spirit, and in the absence of aggressive DOJ/FBI efforts to investigate deep-state criminals, Gabbard may have found a methodology that has a chance of spurring Bondi and Patel to action.
We now have abundant evidence that the WEC maintains a criminally infected voter registration database that was used in the 2024 general election and in the recent 2025 election for a seat on the Wisconsin State Supreme Court. Bondi needs to appoint a DOJ election integrity Task Force that will give Patel’s FBI sufficient subpoena power to seize WEC computers, voter registration files, and relevant internal documents, including emails. What’s holding Bondi and Patel back?
GodsFiveStones.com is a tax-deductible 501(c)3 foundation created by Jerome R. Corsi, Ph.D., and Karladine Graves, M.D., managed by Capstone Legacy Foundation. As reported on GodsFiveStones.com, Andrew Paquette, Ph.D., has discovered cryptographic algorithms in the State Board of Elections voter registration databases in New York, Ohio, Pennsylvania, Georgia, Arizona, Florida, New Jersey, and Oklahoma.