Complex Voter ID Algorithm in Ohio Counties Reveals Potential for Covert Data Classification

Abstract:
This paper presents evidence of algorithmic manipulation in Ohio voter registration databases through a Modulo 8-based deterministic numbering scheme embedded in County ID assignments. This is the third state reviewed in a survey of twelve. Analysis of County ID gap frequency distributions reveals that Franklin, Lucas, and Montgomery counties employ sophisticated mathematical structures in ID number assignment that is absent in Ohio’s other 85 counties. The structures manifest in cyclical Modulo-8 patterns in gap frequency distributions, forming precise mathematical relationships that cannot result from standard operations. This implementation exemplifies what information warfare doctrine defines as a ‘subliminal channel’—a steganographic mechanism enabling hidden communication within critical electoral infrastructure. Such capabilities could permit targeted manipulation of voter records without detection, representing a significant vulnerability in democratic systems.
AUTHORS

Independent Researcher
New York, New York, USA
Dr. Andrew Paquette is a researcher specializing in the identification and description of voter ID number assignment algorithms in state voter roll databases. With a background in digital visual analysis from the computer graphics industry, including work at Epic Games, Universal Studios, and Sony, Paquette applies pattern recognition techniques developed during his career in animation and art direction to identify anomalies in electoral data systems. He holds a PhD from King's College London and previously co-founded the International Game Architecture and Design Academy at NHTV (now Breda University of Applied Sciences), where he taught from 2006 to 2018. His current research contributes to understanding the structure and implementation of algorithmic systems in election infrastructure.
Published In
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive

