Algorithm Analysis

Analysis of Wisconsin Voter Rolls Reveals Evidence of Exploited Systemic Vulnerabilities

Abstract:

This analysis investigates whether Wisconsin’s voter registration database exhibits structural vulnerabilities or evidence of exploitation. Findings reveal three significant deviations from standard practice: systematic duplication of voter identifiers affecting over 874,000 records; mathematically precise interlaced ID patterns with statistically impossible distributions; and dual ID systems where one functions as a hidden identifier. Documentation shows these vulnerabilities have been exploited, with 141 confirmed cases of duplicate voting in the analysed subset. These characteristics suggest deliberate implementation rather than accidental error, enabling covert record classification and compromised election integrity consistent with non-kinetic information warfare methods.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com