Evidence of Sophisticated ID Assignment Algorithm in Harris County Voter Registration System: A Security Analysis

Abstract:
This study examines algorithmic patterns in Harris County, Texas (U.S.) voter registration data, revealing a sophisticated base-8 modular algorithm controlling ID assignment for 2.3 million voters. Analysis of 18 million state records shows this algorithm employs bifurcated distribution patterns that deviate from standard practices and mirror patterns identified in Ohio. Comparative analysis with Tarrant County confirms Harris County’s patterns represent deliberate implementation rather than natural database behavior. The algorithm enables covert record attribution while providing no legitimate benefits in public databases. These findings raise concerns under the National Voter Registration Act of 1993’s transparency requirements and meet SEC materiality standards, affecting more than 5% of records with engineered modifications that would alter integrity assessments. This research shows how information warfare may target democratic institutions through seemingly benign database management practices.
AUTHORS

Independent Researcher
New York, New York, USA
Dr. Andrew Paquette is a researcher specializing in the identification and description of voter ID number assignment algorithms in state voter roll databases. With a background in digital visual analysis from the computer graphics industry, including work at Epic Games, Universal Studios, and Sony, Paquette applies pattern recognition techniques developed during his career in animation and art direction to identify anomalies in electoral data systems. He holds a PhD from King's College London and previously co-founded the International Game Architecture and Design Academy at NHTV (now Breda University of Applied Sciences), where he taught from 2006 to 2018. His current research contributes to understanding the structure and implementation of algorithmic systems in election infrastructure.
Published In
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive