Georgia Ballot Integrity Analysis
Georgia Ballot Integrity Analysis
i|Page
Data Source and Initial Processing ...................................................................................................... 11
Conversion to Excel Format................................................................................................................. 12
Creation of Ballot Vote Header ............................................................................................................... 12
Composition of the Signature Header ................................................................................................ 12
Example of a Complete Ballot Vote Header ........................................................................................ 13
Significance in the Analysis Process .................................................................................................... 13
Composition of Signature Body .......................................................................................................... 13
Significance of Ballot Signatures ......................................................................................................... 15
Optical Character Recognition in Ballot Signature Analysis .................................................................... 15
Innovating with Pixel-Perfect OCR ...................................................................................................... 15
The Comma Separated Cast Vote Record (CSV) in Ballot Signature Analysis.......................................... 16
Utilizing CSV for Signature Generation ............................................................................................... 16
Key Features of the CSV Approach: ..................................................................................................... 17
Comparison of Signatures from Different Sources.............................................................................. 17
The JSON Cast Vote Records ................................................................................................................... 18
JSON in Ballot Signature Analysis ........................................................................................................ 18
Limitations and Workarounds: ............................................................................................................ 18
Comparison with CSV Data ................................................................................................................. 19
Application in Fulton Ballot Analysis ................................................................................................... 19
Conclusion ........................................................................................................................................... 19
The Aberration System ................................................................................................................................ 20
Introduction ............................................................................................................................................ 20
Methodology for Comparing Counts .................................................................................................. 20
Discrepancy Types ............................................................................................................................... 20
Count Error and Stray Error................................................................................................................. 21
Outputting the Aberration File ............................................................................................................ 21
Identifying Matching Ballots ................................................................................................................... 21
Procedure for Hand Marked Paper Ballots (HMPB) ............................................................................ 22
Procedure for Ballot Marking Device (BMD) Ballots ........................................................................... 22
Resolving Aberrations ......................................................................................................................... 22
The Gap Count ........................................................................................................................................ 23
Double Scanned Ballots .......................................................................................................................... 24
Using Ballot Finder for Confirmation: ................................................................................................. 24
ii | P a g e
Additional Duplication Checks ............................................................................................................ 25
Identifying 'Jam Doubles’ .................................................................................................................... 25
Completing The Aberration Process ....................................................................................................... 25
Resolution of Precinct Tabs ................................................................................................................. 25
The Final Results ................................................................................................................................. 25
The Counties of Georgia.............................................................................................................................. 27
Introduction ............................................................................................................................................ 27
County Aberration List ............................................................................................................................ 28
Counties With Aberrations...................................................................................................................... 32
Bacon County .......................................................................................................................................... 33
Data Sources and Ballot Counts .......................................................................................................... 33
Initial Observations and Misinterpretations ....................................................................................... 33
Areas for Improvement ....................................................................................................................... 33
Conclusion ........................................................................................................................................... 33
Bartow County ........................................................................................................................................ 34
Context and Overview......................................................................................................................... 34
Investigation into Specific Ballots........................................................................................................ 34
Specific Tabulator and Batches Involved ............................................................................................. 34
Points of Curiosity and Speculation .................................................................................................... 34
Conclusion ........................................................................................................................................... 35
Bibb County ............................................................................................................................................. 36
Challenges in Analysis ......................................................................................................................... 36
Discrepancies Between Counts ........................................................................................................... 36
Additional Ballots in Recount .............................................................................................................. 36
Conclusion ........................................................................................................................................... 36
Catoosa County ....................................................................................................................................... 37
Overview of Ballot Counts................................................................................................................... 37
Analysis of Discrepancies .................................................................................................................... 37
Notable Observations ......................................................................................................................... 37
Conclusion ........................................................................................................................................... 37
Cherokee County ..................................................................................................................................... 38
Key Findings ........................................................................................................................................ 38
Unique Case in Rosecreek Precinct ..................................................................................................... 38
iii | P a g e
Conclusion ........................................................................................................................................... 38
Cobb County............................................................................................................................................ 40
Overview of Ballot Counts................................................................................................................... 40
Challenges in Analysis ......................................................................................................................... 40
Discrepancies Identified ...................................................................................................................... 40
Issues with Duplicate Ballots ............................................................................................................... 40
Conclusion ........................................................................................................................................... 40
DeKalb County......................................................................................................................................... 41
Overview of Ballot Counts................................................................................................................... 41
Discrepancies and Findings ................................................................................................................. 41
Specific Cases of Interest..................................................................................................................... 41
Conclusion ........................................................................................................................................... 41
Floyd County ........................................................................................................................................... 43
Revised Analysis of Ballot Counts in Floyd County.............................................................................. 43
In Machine Count 1 (MC1): ................................................................................................................. 43
In Machine Count 2 (MC2): ................................................................................................................. 43
Distribution of the Missing Votes Among Presidential Candidates: ................................................... 43
Forsyth County ........................................................................................................................................ 45
Ballot Counts Overview ....................................................................................................................... 45
Primary Issue Identified ...................................................................................................................... 45
Discrepancy between CSV and TIF Images.......................................................................................... 45
Limitations in Analysis ......................................................................................................................... 45
Conclusion ........................................................................................................................................... 45
Fulton County .......................................................................................................................................... 46
Overview ............................................................................................................................................. 46
Discrepancies in Ballot Counts ............................................................................................................ 46
Double/Triple Scanned Ballots ............................................................................................................ 46
Stray Ballots......................................................................................................................................... 46
Challenges in Consolidation ................................................................................................................ 46
Additional Complications .................................................................................................................... 47
Grady County .......................................................................................................................................... 48
Key Finding .......................................................................................................................................... 48
Discrepancy Between TIF Images and CSV.......................................................................................... 48
iv | P a g e
Pending Investigation .......................................................................................................................... 48
Conclusion ........................................................................................................................................... 48
Gwinnett County ..................................................................................................................................... 49
Context of Ballot Processing ............................................................................................................... 49
Key Findings ........................................................................................................................................ 49
Recount Specifics ................................................................................................................................ 49
Issue with Constitutional Ballots ......................................................................................................... 49
Conclusion ........................................................................................................................................... 50
Houston County ...................................................................................................................................... 51
Overview of Discrepancies .................................................................................................................. 51
Peculiarities in Ballot Placement ......................................................................................................... 51
Conclusion ........................................................................................................................................... 51
Muscogee County ................................................................................................................................... 52
Overview of Doubled Ballots in First Count ........................................................................................ 52
Discrepancies Between Counts ........................................................................................................... 52
Puzzling Aspects .................................................................................................................................. 52
Discovery of New Ballots in Recount .................................................................................................. 52
Doubled Ballots in Second Count ........................................................................................................ 52
Conclusion ........................................................................................................................................... 53
Upson County.......................................................................................................................................... 54
Overview of Ballot Counts................................................................................................................... 54
Investigating the Narrow Discrepancy ................................................................................................ 54
The Need for a Closer Look ................................................................................................................. 54
Walton County ........................................................................................................................................ 55
Adjudication Findings .......................................................................................................................... 55
Distribution of Additional Votes.......................................................................................................... 55
Conclusion ........................................................................................................................................... 55
Ware County ........................................................................................................................................... 56
Adjudication Findings .......................................................................................................................... 56
Pending Investigation .......................................................................................................................... 56
Database Security Deficiencies ................................................................................................................... 57
Introduction ............................................................................................................................................ 57
Technician & Supervisor Tabulator Passwords ........................................................................................ 58
v|Page
Uncovering the ElectionEvent Table .............................................................................................. 59
The Concerning Fields: ........................................................................................................................ 59
Implications of These Findings: ........................................................................................................... 59
Exploring the TabulatorUser Table.................................................................................................. 60
The Surprising Discovery: .................................................................................................................... 60
Decryption of the Passwords: ............................................................................................................. 60
Critical Security Lapses: ....................................................................................................................... 60
Assessing the AppUser Table................................................................................................................ 62
Table Structure and Findings:.............................................................................................................. 62
Critical Security Concerns: .................................................................................................................. 62
The X509 Certificate Data ....................................................................................................................... 63
Understanding Security Certificates:................................................................................................... 63
The Compromise in the Database: ...................................................................................................... 63
Potential Uses of X509 Certificates in an Election System: ................................................................. 63
The Gravity of the Situation: ............................................................................................................... 64
Ballots on Demand ...................................................................................................................................... 65
Discovery of 'Fuzzy' Ballots ................................................................................................................. 65
The 'Fuzzy' Ballot Phenomenon: A Theory.......................................................................................... 65
Identification of On Demand Ballots ................................................................................................... 65
The Strange Timing of On Demand Ballots ......................................................................................... 66
Case in Point: Tabulator 5162 Batch 387 ............................................................................................ 66
Analyzing Scanning Times: An Anomaly.............................................................................................. 67
Other Security Issues .................................................................................................................................. 69
The SHA Signature Files and Ballot Image Security................................................................................. 69
Understanding the Ballot Images:....................................................................................................... 69
The Security Flaw in the Hashing Method: ......................................................................................... 69
The Adjudication Process and its Impact: ........................................................................................... 69
Recommended Best Practices: ............................................................................................................ 70
Mismatch between Ballot Data and the Database ................................................................................. 71
The Technicality of BMD Ballots:......................................................................................................... 71
The 2022 DeKalb County Commissionaires Race: ............................................................................... 71
Similar Occurrences and Implications: ................................................................................................ 71
Conclusion: .......................................................................................................................................... 71
vi | P a g e
Introduction
In the recent election, questions have arisen regarding the integrity of the ballot counting process in
certain precincts in Georgia. To shed light on these concerns, I embarked on a three-year detailed and
thorough investigation, utilizing my skills as a mathematician and computer programmer to develop a
custom software tool to aid in this process.
Every election represents the collective voice of the people, a democratic process that holds the
potential to shape the future of a nation. The responsibility to ensure that this process is carried out with
utmost integrity falls on the shoulders of those tasked with counting and verifying the ballots.
Rumors and whispers began circulating about possible discrepancies and anomalies in the Georgia ballot
counting process, casting doubt on the sanctity of the democratic procedure that forms the bedrock of
our nation.
These whispers turned into a clarion call for me, drawing me into an investigation fueled by a deep-
seated passion for data analysis and a relentless pursuit of the truth. With my programming prowess as
my ally and a sophisticated software tool that I had developed, I embarked on a journey. My mission was
clear - to delve deep into the electoral abyss and compare the ballot images from the first count to those
of the second count, in search of any irregularities that might have occurred.
The software was built with the capability to import data and analyze it in a way that highlighted any
discrepancies between the first and second counts. This was the key to unlocking the mysteries that lay
hidden within the vast sea of ballot images.
1|Page
Setting the Parameters
Before diving into the analysis, it was essential to set clear parameters that would guide the
investigation. The first step was to establish a system of 'signatures' for each ballot. This involved
identifying unique elements on each ballot, such as the precinct, ballot type, and the votes cast, and
using them to create a signature that would serve as a fingerprint for each ballot.
The signatures were then used to group the ballots by precinct, creating distinct categories that could be
analyzed separately. This was a crucial step, as it ensured that the comparison was carried out in a
systematic and organized manner.
2|Page
Background in Ballot Analysis
Academic and Professional Foundation
I graduated from the University of Texas at Arlington in 1986, earning a Bachelor of Science in
Mathematics with an emphasis on Computer Science. My career in the computer field spans over 38
years, reflecting a deep-seated expertise in technology and data analysis.
My foray into social media began with the creation of video memes, particularly following an incident
where a meme creator was doxed by a news network.
I initiated a Twitter account '@Mad_Liberals', which quickly amassed over 150,000 followers. My content
mainly consisted of humorous mash-ups featuring President Trump and other political figures, with
several videos reaching millions of views.
Following the 2020 election, my account faced suspension for queries about signature verification. This
incident not only fueled my curiosity about the election's integrity but also marked my deeper
involvement in election analysis.
Motivated by a video showing duplicated ballots, I utilized my background in image analysis to explore
ballot images from the Fulton election. This led to the creation of the "Ballot Finder" software, a tool
designed to identify and analyze ballot duplications accurately.
Joining VoterGA, led by Garland Favorito, I gained access to a wider range of ballot images for analysis.
This collaboration provided valuable resources and insights, enhancing the scope of my work.
Eventually, my collaboration with VoterGA concluded, leading to a new partnership with Joe Marolda.
Together, we formed a Discord group with a few other like minded individuals to continue our ballot
analysis efforts.
Our work faced unexpected challenges when Discord banned our account and deleted all our findings.
Undeterred, Joe and I established a Slack channel, whimsically named 'Stacy Abrams Fan Club,' to mask
our true nature and to continue our work in a more secure environment.
3|Page
My start in ballot analysis is a testament to the interplay between technology, political interest, and
social media dynamics. From a background in computer science and image analysis to navigating the
complexities of social media and election integrity, my path reflects a blend of technical acumen and
adaptive strategies in the ever-evolving landscape of political engagement and technological innovation.
4|Page
Terminology
There are some terms that we use in the next section of the document.
Ballot Group
Ballot Group, also known as Counting Group, is the classification system used to record the
method by which a ballot is cast. Before a Machine Count begins, each tabulator is assigned a
specific Ballot Group to ascribe to ballots cast on that machine. The four (4) Ballot Groups can
be summarily defined as:
• Election Day (DAY): In-Person voting on Election Day via BMD
• Advanced Voting (ADV): In-Person voting before Election Day via BMD
• Absentee by Mail (ABM): Absentee voting before Election Day via HMPB
• Provisional (PRO): Absentee voting on Election Day via HMPB
It is important to note that unlike Ballot Type (HMPB/BMD), which is an immutable
characteristic and determined by the physical properties of a ballot, Ballot Group is credited
entirely based on the tabulator used to scan the ballot regardless of the Ballot Type.
5|Page
MC1 – Machine Count 1
Machine Count 1 (MC1) refers to the initial and original counting of the ballots conducted for the 2020
presidential election. This count represents the first systematic tabulation of votes as collected from
various voting methods, including Hand Marked Paper Ballots (HMPB) and Ballot Marking Device (BMD)
ballots. MC1 is crucial as it establishes the baseline figures for the total votes each candidate received in
the first tally of the election. The accuracy and integrity of MC1 are essential for a reliable and
trustworthy electoral process, as it forms the primary record of voter preferences as initially registered
and tabulated.
In the realm of election analysis, the JSON CVR provides a structured and programmer-friendly way to
access and manipulate the detailed voting data captured in the CVR. This format is especially beneficial
for those involved in developing software tools and applications for analyzing and processing election
data, as it allows for straightforward importing, parsing, and handling of complex voting records. The use
of JSON format ensures that the data is not only easily accessible but also compatible with a wide range
of programming environments and data processing tools.
6|Page
CSV CVR – Comma Separated Value Cast Vote Record
The CSV CVR, or Comma Separated Value Cast Vote Record, refers to a format of the Cast Vote Record
(CVR) that is exported as a CSV file. CSV is a simple file format used to store tabular data, such as
numbers and text, in plain text. Each line of the file is a data record, and each record consists of one or
more fields, separated by commas.
However, the DVS Number can be utilized to reverse this scrambling process, effectively restoring the
original order of the ballots. This reordering is significant as it enables analysts to detect and study
patterns in the voting data that would otherwise be concealed due to the scrambling process.
The methodology to reverse the ballot order using the DVS Number was developed by J. Alex
Halderman, a notable figure in the field of election security and computer science. Further information
and details about this process are available at [https://dvsorder.org](https://dvsorder.org), providing a
resource for those interested in understanding and applying this technique in ballot analysis.
Stray Ballots
Stray ballots" refer to ballots that are present in one set of voting records or counts but are absent in
another, under circumstances where they are expected to be consistently accounted for across all
records. They may arise due to various reasons such as administrative errors, handling mistakes, or
issues in ballot processing.
Double-Counted ballots
This refers to ballots that have been scanned and recorded more than once in the vote tallying process,
typically twice or sometimes even thrice. These repetitions occur when the same ballot is erroneously
passed through the scanning machine multiple times. As a result, the same votes get counted more than
once, which can lead to inaccuracies in the final vote tallies. In proper electoral procedures, these double
scanned ballots should be identified and removed to ensure they do not unjustly influence the final vote
count.
Duplicate ballots
This refers to a procedure used to address ballots that are not readable by the tabulating machines. In
this process, a new ballot is created to exactly replicate the voter's original selections from the
unreadable ballot. This duplication is conducted under strict guidelines and proper procedures to ensure
the integrity and accuracy of the voter's intent. Duplicate ballots are a recognized and valid method for
handling ballots that, due to damage, misprints, or other issues, cannot be processed by standard
7|Page
tabulation equipment. The creation of duplicate ballots is an essential practice in election administration
and should not be misconstrued as a problematic or irregular action.
8|Page
Introduction to Ballot Finder Software
Approximately three years ago, my journey in ballot analysis began, sparked by a video showcasing 100
duplicated ballots in Fulton County. This revelation, coupled with my extensive experience of nearly 30
years in fingerprint identification, positioned me uniquely to delve into the intricacies of ballot images.
My expertise in scrutinizing image details drove me to explore this domain further.
Initial Features:
Image Comparison:
- The foundational functionality of the software allowed users to open and closely examine two
images simultaneously, facilitating a side-by-side comparison. This feature included the ability to
scroll and zoom into specific details of each image.
Navigation Tools:
- To enhance user experience, the software was equipped with next/previous image features,
enabling seamless navigation through ballot images.
Lock Feature:
- A pivotal addition was the lock feature, which synchronized the movement of both images. This
was instrumental in identifying and analyzing duplicated ballots that appeared in sequential order.
Reverse Feature:
- Frequently, double-scanned ballots were inserted upside down, resulting in a reversed sequence of
the ballots. Activating the reverse sequence order button in the software enabled the lock feature
to correctly sequence the second set of ballots in this reversed order.
QR Code Reading:
- An important enhancement to the "Ballot Finder" software was the integration of QR code reading
functionality. This feature was specifically designed to handle Ballot Marking Device (BMD) ballots,
which often contain QR codes encoding crucial voting information.
9|Page
Advanced Development in "Ballot Finder"
Software
As "Ballot Finder" evolved, its focus shifted towards harnessing more sophisticated image parsing
capabilities. This progression in development led to significant enhancements in the software, making it
an increasingly powerful tool in ballot analysis.
10 | P a g e
The Ballot Signatures
Introduction
This chapter outlines the methodology employed in the comprehensive analysis of ballots from the 2020
U.S. Presidential election in Georgia. The primary objective of this analysis was to conduct a comparative
study between the results of the initial machine count and the subsequent machine recount, utilizing
identical equipment as in the first count. An effective comparison was crucial, considering the observed
discrepancies between the two counts. These discrepancies included instances of double-counted
ballots, ballots unaccounted for in the original count, discrepancies in recount data, and ballots
exclusively appearing in the second count.
A pivotal challenge in this analysis was devising a method to accurately juxtapose the two counts in the
absence of unique identifiers like serial numbers or barcodes on the ballots. Furthermore, the
investigation had to be adaptable to a variety of data formats obtained from different counties. This
included ballot images, Comma-Separated Values (CSV) exports, and JavaScript Object Notation (JSON)
exports of the voting databases. The latter two formats, collectively referred to as the Cast Vote Record
(CVR), presented a unique set of challenges and opportunities for data analysis.
The focus of this chapter is to detail the strategies and processes utilized to transform these varied data
forms into a coherent and analyzable format. This transformation was imperative to ensure a thorough
and accurate comparison of the ballot counts, thereby underpinning the integrity and reliability of our
analysis.
Ballot Signatures
Introduction
In the realm of election data analysis, the precise interpretation and translation of voter intent from
ballot images into a comprehensible and analyzable format is crucial. This chapter, titled "Ballot
Signatures," delves into the process of converting Cast Vote Records (CVRs) from ballot images into a
structured and analyzable format. The focus here is on creating a unique representation of each voter's
choices, referred to as a "ballot signature," which is instrumental in understanding voting patterns and
behaviors.
11 | P a g e
Conversion to Excel Format
The initial task involves converting these CVRs into an Excel spreadsheet. This step is essential for
transforming the data into an accessible and manipulable format. Each row in the spreadsheet
corresponds to a single ballot, encompassing vital information such as the tabulator number, batch,
ballot ID, and the date of scanning.
Combo Code
- Following the ballot type indicator, the Combo Code is added. This code, labeled as 'Ballot ID' on
the third page of the ballot TIF images, further specifies the ballot's characteristics.
Precinct Identification
- The next component involves the precinct information. For single-precinct ballots, a 'Poll ID' is
included in the Cast Vote Record on the third page.
- However, this Poll ID does not directly correlate with the precinct printed on the ballot. Therefore,
an Optical Character Recognition (OCR) process is employed to read the combo/precinct
information from the top of the first page and match it with the Poll ID. This step, known as
'Precinct Creation', is crucial but time-consuming due to the need for accuracy and correction of
potential OCR errors.
- Once a complete precinct file is established, the Poll ID on the ballots is converted into a human-
readable precinct code.
12 | P a g e
Example of a Complete Ballot Vote Header
For the given image, the Ballot Vote Header would appear as "H308-Catoosa Keith." This header
indicates a Hand Marked Paper Ballot ('H'), with a combo code of '308', and the precinct named 'Catoosa
Keith'.
• Enhanced Precision: The header provides immediate context about the ballot type and its
precinct, offering a more granular level of detail in the analysis.
• Efficient Sorting and Matching: With the header, the matching process can be more efficiently
organized by precinct, facilitating a more streamlined analysis.
• Error Reduction: The process of creating the header, especially through the Precinct Creation
step, minimizes inaccuracies and ensures a higher fidelity in the data.
The Ballot Vote Header is a pivotal addition to our ballot signature system. It not only augments the
uniqueness of each signature but also enriches the data with essential contextual information. This
advancement underscores our commitment to precision and thoroughness in the analysis of election
data, ensuring that every aspect of the voter's choice is accurately captured and represented.
Signature Composition:
- For each race, the first three letters of the candidate's name are concatenated to form a part of the
signature. These segments are separated by colons for clarity and order.
13 | P a g e
• Blank Contests: Races without a selection are marked as 'BLANK CONTEST' in the CVR. In such
cases, "BLA" is used in the signature.
• Overvotes: Instances where more candidates are selected than allowed are marked as
'OVERVOTE'. Here, "OVE" is followed by the first three letters of each overvoted candidate in the
signature.
• Write-in Votes: 'WRITE-IN' votes are accompanied by the candidate's name in the CVR. These
are represented by "WRI" and the first three letters of the write-in candidate's name in the
signature.
14 | P a g e
Significance of Ballot Signatures
The ballot signature concept is revolutionary in its ability to encapsulate the voter's pattern in a concise
yet descriptive manner. It not only provides a unique identifier for each ballot but also maintains an
ordered record of the voter's choices across different races. This semi-unique signature base facilitates
comparative analysis, allowing us to identify patterns and anomalies in voting behaviors.
The process of creating ballot signatures represents a blend of technical precision and innovative
thinking in election data analysis. By converting complex ballot data into a structured and analyzable
format, we pave the way for more insightful and accurate interpretations of voter intentions and election
outcomes. This chapter lays the groundwork for understanding and implementing this crucial aspect of
election data analysis, emphasizing its importance in the broader context of electoral integrity and
democracy.
• Speed: Processing large volumes of ballot data, such as Fulton County's ballots, requires an
immense amount of time, making the process inefficient.
• Accuracy: The reliability of OCR in accurately deciphering the data from the Cast Vote Record
(CVR) on the TIF images is not sufficiently high for precise analysis.
• Uniformity of the Cast Vote Record: Unlike the first two pages, the third page of the ballot,
which contains the CVR, is generated by software, ensuring a consistent and uniform font. This
uniformity is key, as it guarantees that each character, regardless of its position on the page,
maintains the same pixel structure.
• Creation of a Character Dictionary: By collecting each character from the third page, a
comprehensive dictionary of pixel-perfect font characters was developed. This dictionary allows
for precise character recognition by matching each scanned character against the pre-defined
pixel patterns.
• Efficiency and Accuracy: This customized approach significantly enhances both the speed and
accuracy of data extraction. Characters are swiftly and accurately identified, vastly improving
processing time and reliability.
15 | P a g e
• Handling Special Cases with Dipthongs: For instances where character separation is not clear-
cut, 'dipthongs' – combinations of two or more characters – were created to address these
unique scenarios.
• Font Library for Different Tabulators: Recognizing that different tabulators used varying font
programs, a font library accommodating five different font bases was compiled. This adaptability
is crucial for handling the variety of fonts encountered in the adjudication data.
• Success in Fulton County's Data: The effectiveness of this specialized OCR system was
demonstrated in its ability to process the entirety of Fulton County's ballot database in just a few
hours, a significant improvement over the days of processing required by standard OCR.
The development and implementation of this pixel-perfect OCR system marks a significant advancement
in the field of ballot analysis. By creating a tailored solution that addresses the unique challenges of
ballot data, we have significantly enhanced the accuracy and efficiency of the ballot signature extraction
process. This innovation not only streamlines the analysis of large volumes of data but also ensures the
integrity and reliability of the results, which are crucial for accurate electoral analysis and reporting.
16 | P a g e
The CSV, derived from the voting software as a database export, offers a rich dataset that can be pivotal
in generating ballot signatures. This method is particularly useful when full original and recount images
are not available for all counties.
• Adjudicated vs. Original Voting Intention: CSV records often include adjudicated data,
whereas image ballots reflect the original voting intention. Caution is advised when comparing
signatures from these different sources.
• Comparative Analysis: While it is preferable to compare like sources, with careful analysis, it is
possible to draw meaningful comparisons between signatures derived from different sources.
The use of Comma Separated Cast Vote Records in ballot signature analysis provides a valuable
alternative when ballot images are not fully available. This approach not only compensates for the lack
of visual data but also maintains the integrity and consistency of the signature generation process. As
demonstrated, this method can successfully be integrated into the broader framework of ballot analysis,
ensuring comprehensive and accurate election data interpretation even in the face of data limitations.
17 | P a g e
The JSON Cast Vote Records
In the evolving landscape of ballot analysis, different data formats offer varied insights and challenges.
This chapter focuses on the utilization of JSON (JavaScript Object Notation) format for analyzing cast vote
records. JSON, a widely used format for storing and transmitting data, presents a unique opportunity for
ballot signature analysis, particularly when other forms of data, like ballot images, are unavailable or
incomplete.
• Direct Data Dump: The JSON files used in this analysis are direct exports from the cast vote
records in the database, ensuring a high degree of accuracy and completeness in the data.
• Inclusion of Fill Amount: A distinctive feature of the JSON format in this context is the inclusion
of the fill amount per bubble, offering an additional layer of data that can be critical in certain
analyses.
18 | P a g e
Comparison with CSV Data
The JSON and CSV data formats, while different in structure, both originate from the same underlying
database. This similarity ensures that the methods and logic applied in the conversion and analysis
process remain consistent across both formats. The key difference lies in the data representation, with
JSON providing a more hierarchical and structured format compared to the flat structure of CSV.
Conclusion
The exploration of JSON Cast Vote Records in ballot signature analysis underscores the importance of
versatile data handling in election analysis. This format, with its unique features and compatibility with
other data types, enables a thorough and nuanced examination of voting patterns. As demonstrated in
the Fulton County case, the ability to adapt to different data formats is crucial in ensuring a
comprehensive analysis, especially when dealing with incomplete or missing data sources.
19 | P a g e
The Aberration System
Introduction
In the pursuit of accurately identifying voter intent and comparing ballot counts across original tallies
and recounts, a robust methodology is essential. This chapter introduces "The Aberration System," a
sophisticated approach used in the 'Ballot Finder' software to analyze discrepancies in ballot signatures
from the original count to the recount.
The analysis within the software is conducted on a precinct-by-precinct basis, comparing the frequency
of each signature between the original count and the recount. In order to streamline the process,
signatures that exhibit matching frequencies across both counts are immediately excluded from further
scrutiny. Attention is then directed to signatures that display variance in their occurrence counts, which
may signal potential irregularities.
Importantly, the software distinguishes between Ballot Marking Device (BMD) ballots and Hand Marked
Paper Ballots (HMPB), ensuring that comparisons are only made within the same type of ballots. This
distinction is maintained by the first letter of the signature – 'B' for BMD and 'H' for HMPB – preventing
any cross-type signature matching.
Upon completion of this analysis, an 'aberration' Excel spreadsheet is generated. This output file is
comprehensive and includes several key fields for in-depth analysis:
These fields collectively provide a detailed overview of each ballot's process through the counting
process, highlighting areas that require further investigation or verification.
Discrepancy Types
These occurrence discrepancies can arise due to several reasons:
20 | P a g e
1. Adjudication Variations: In some cases, discrepancies result from the adjudication process,
where ballots are reviewed and potentially modified to reflect the voter's intent more accurately.
This can include correcting overvotes, disqualifying write-in votes, or reinstating omitted
candidates.
2. Double or Triple Scanning: Another common source of discrepancy is the multiple scanning of
ballots. Double-scanned ballots result in an additional occurrence, while triple scans lead to two
extra occurrences.
3. Missing Ballots: Variations in ballot occurrences can also stem from stray or missing ballots,
where batches of ballots are included in one count but not the other.
Each precinct's count and stray issues are then sorted into their individual tabs within the spreadsheet.
Armed with the Aberration File, the next step involves a manual review process to delve deeper into the
identified discrepancies, aiming to uncover the underlying causes and implications of these anomalies.
One of the most frequent and benign reasons for occurrence issues is adjudication, particularly in cases
where voters use check marks or small 'x' marks instead of fully filling in the circles as instructed. Such
voting methods often lead to adjudication and/or tabulator interpretation errors. In ballot image
analysis, an adjudicated ballot typically appears as a 'stray' single signature in one count and a
'mismatch' error in the other.
The first step in addressing adjudication involves thoroughly reviewing each precinct’s tab in the
adjudication Excel report. It is advisable to complete adjudication for one precinct before moving on to
the entire document.
21 | P a g e
Procedure for Hand Marked Paper Ballots (HMPB)
When encountering a stray ballot in one count and a mismatch in the other, the corresponding file name
of the stray ballot should be copied into Ballot Finder to view the image. Subsequently, all files with a
similar signature on the other count should also be copied for comparison.
With Ballot Finder's next/previous buttons, users can systematically examine each potential match to the
stray ballot, looking for unique marks or circles characteristic of hand-marked ballots. Pressing the next
button or hitting the F3 button will quickly advance to the next button. To examine a hundred ballots
against a candidate typically takes under a minute.
Upon finding a match, the 'match' button in Ballot Finder should be clicked to record the pairing. The
user will then go into the Aberration Input file, and paste the results into the Excel spreadsheet. This
adds a new ‘Match’ record with both matching ballots in the Aberration Input File.
In instances where previously selected ballots have established a pattern of aberrations predominantly
associated with a specific tabulator, users might choose a ballot from this tabulator as the likely
duplicate. Alternatively, a common approach is to select the ballot with the lowest number in the
sequence as the probable match.
Given the inherent limitations in matching BMD ballots, it's crucial to exercise caution and considerate
judgment when making these selections. The absence of definitive matching criteria means that any
decision to pair ballots as duplicates must be approached with an understanding of the potential for
error, ensuring that the process remains as accurate and reliable as possible within these constraints.
Resolving Aberrations
The process of aberrating ballots involves a methodical, precinct-by-precinct approach to ensure
accuracy and thoroughness in the analysis. Utilizing the Ballot Finder software is essential in this process,
as it provides a visual means to compare and match hand-marked ballots effectively. All identified
matches should be diligently documented in the Aberration Input File. It's important to be prepared for
this to be a time-intensive process, particularly in precincts where there are numerous aberration strays
to resolve.
The Stray Finder algorithm and methodology are structured to facilitate iterative analysis and
refinement. As you identify and categorize ballots as 'match', 'duplicate', or 'stray', and then rerun the
analysis, the system dynamically updates the occurrence counts of each signature. Each time a ballot is
categorized, the occurrence count for that specific signature decreases by one. Consequently, as the
process progresses and more ballots are categorized, the number of signatures with mismatched
occurrences starts to diminish. Signatures with now-equal occurrences across counts cease to appear in
22 | P a g e
the report. This iterative nature of the process is crucial, with the goal of running it multiple times until
all aberrations are effectively resolved.
For every signature that displays a mismatch in occurrences, the system prints out every potential
instance of its use. For example, if a particular ballot signature appears 50 times instead of the expected
49, all 50 instances are displayed. This approach allows human analysts to discern patterns more easily.
Once the additional, or 50th, signature is addressed—either through matching it to another ballot or
identifying it as a stray—the system automatically resolves and removes the other 49 instances from the
report. This method ensures a thorough and systematic approach to resolving discrepancies in ballot
occurrences.
The significance of this feature becomes more apparent in the case of entire batches of stray ballots or
series of double-scanned ballots. In such scenarios, the gap count will consistently show as 1 and will be
displayed in red, providing a clear and distinct signal to the user.
The visual distinction between a batch of stray ballots and double-scanned ballots is made evident
through this system. For example, a sequence of missing ballots typically exhibits multiple single
occurrences of stray ballots. This pattern causes the entire sequence to be highlighted in a yellow font,
signifying stray ballots.
Conversely, double-scanned ballots, by their very nature, are never categorized as stray since they occur
more than once. Therefore, these sequences are displayed in blue, aligning with the 'match' category.
This color-coded system aids in distinguishing double-scanned ballots from stray ballots.
23 | P a g e
Double Scanned Ballots
The analysis of double scanned ballots in election data involves a multi-step process using the Ballot
Finder software, which includes several features designed to facilitate the identification and confirmation
of these discrepancies.
• Identification of Double Scanned Batches: Initially, both the original set of double scanned
batches and the corresponding original set of ballots are flagged. This identification is crucial in
understanding the extent of duplication within a specific batch.
Reverse Order Matching: Often, double scanned ballots are placed in the scanner upside down,
complicating the matching process. The 'reverse order' button in Ballot Finder addresses this challenge
by moving one set of ballots forward and the corresponding set backward, facilitating easier comparison.
Randomized Duplication Patterns: In many cases, the order of the duplicated batch is randomized,
deviating from its original sequence. Sometimes, batches are duplicated by scanning small groups of
previous ballots in both normal and reversed order. This randomness necessitates careful analysis to
identify true matches.
Speculation on Duplication Intent: The randomness in the duplication process raises questions about
whether such occurrences are accidental or intentional attempts to conceal duplication.
24 | P a g e
Additional Duplication Checks
The 'Jaccard' algorithm is used to check if an entire batch is a duplicate of another, even if the order is
randomized.
Another feature performs a detailed check through runs of signatures, seeking similar patterns in other
batches. While more time-consuming, this method can be highly effective, especially when only one set
of cast vote records is available. The results is a list of doubled prints that is ready to copy into your
aberration report.
The stray finder feature is particularly adept at identifying jam doubles, indicating an additional
occurrence of a ballot without a corresponding match. Careful examination of the sequence helps
determine if other ballots in the batch were also duplicated.
Through these methods and tools, the Ballot Finder software provides a comprehensive approach to
identifying and analyzing double scanned ballots, offering insights into their nature and the processes
leading to their occurrence.
- Stray Ballots: A comprehensive list of all the stray ballots you have identified throughout the
process.
- Duplicate Ballots: A detailed listing of all duplicate ballots, including the file names of the original
ballots for cross-reference. The software enhances the verification process by displaying both sets
25 | P a g e
of signatures. When a genuine match is confirmed, the corresponding signature turns green,
providing an additional layer of assurance that the identified doubles are accurate.
With the MC1 and MC2 aberration tabs finalized, your stray analysis is complete. The duration of this
process can vary significantly, ranging from a few hours for less complex counties to several months for
more intricate cases. For instance, resolving Fulton County's aberrations took over five months, including
multiple restarts due to its complexity. This variance in time reflects the diverse challenges and nuances
encountered in different counties, underscoring the thorough nature of the aberration analysis process.
26 | P a g e
The Counties of Georgia
Introduction
In our comprehensive review of the 2020 election data from Georgia, our analysis was focused on those
counties where we had access to both the first machine count (MC1) and the second machine count
(MC2) Cast Vote Records. This availability of data was a crucial criterion for our stray analysis, allowing us
to compare and contrast the voting records effectively. However, this requirement limited our scope to
less than 50 of the 159 counties in Georgia, representing just a fraction of the state's total.
From this subset of counties, more than a third exhibited some form of counting anomaly, which we will
detail in the individual sections for each county. These discrepancies range in nature and magnitude,
shedding light on various aspects of the counting process. It's important to acknowledge the counties
where our analysis found no issues. The following list includes those counties that, according to our
algorithm and criteria, displayed a smooth and consistent counting process without any significant
anomalies. This serves as a baseline, offering a contrast to the more complex situations we encountered
in other counties.
In this comprehensive analysis, we have compiled data from various counties in Georgia, which were
able to provide us with ballots and cast vote records following Open Record Requests. The bulk of the
ballot images were received in TIF format, courtesy of requests made by VoterGA. To delineate between
the initial count and the subsequent recount, these images are identified as TIF1 (original) and TIF2
(recount).
Additionally, the cast vote records were provided in two formats: some as Comma Separated Value lists
(CSV), indicating a straightforward, text-based data format, and others as direct exports from the
database in JSON format (CVR), a more structured data representation.
The data has been meticulously analyzed, and the findings are indicated by a color-coded system in the
accompanying table:
• Counties marked in Green indicate a smooth process with no significant aberrations observed in
the ballot data.
• Red marks counties where there were significant ballot aberrations, notably issues with doubled
and stray ballots.
• Yellow signifies counties for which further information or analysis is needed to reach a definitive
conclusion.
27 | P a g e
County Aberration List
County TIF1 TIF2 CSV1 CSV2 CVR1 CVR2 SOS1 SOS2
APPLING X 8367 8414
ATKINSON X 3170 3172
BACON X X X 4680 4677
BAKER X X X 1559 1559
BALDWIN X X X 18341 18342
BANKS X 8818 8818
BARROW X X X 37975 37975
BARTOW X X X X X 50676 50653
BEN HILL 6580 6593
BERRIEN X X 7765 7765
BIBB X X X X X 71119 71037
BLECKLEY X X X 5729 5730
BRANTLEY X X 7766 7768
BROOKS X 7120 7121
BRYAN X X 21460 21407
BULLOCH X X X 30143 30149
BURKE X X X 10758 10754
BUTTS X X 11820 11824
CALHOUN X 2202 2206
CAMDEN X X 23772 23766
CANDLER X X X 4440 4440
CARROLL X X 54657 54544
CATOOSA X X X X 32724 32723
CHARLTON X X 4576 4576
CHATHAM X X X 134134 134132
CHATTAHOOCHEE 1586 1584
CHATTOOGA X X X 10075 10075
CHEROKEE X X X X 145231 145446
CLARKE X X X 51698 51710
CLAY 1440 1442
CLAYTON 112912 112918
CLINCH X 2876 2871
COBB X X X 394757 394736
COFFEE X 15254 15254
COLQUITT X 16140 16139
COLUMBIA X X X 80928 80930
COOK X X X X 7056 7056
28 | P a g e
COWETA X 77070 77069
CRAWFORD 6128 6128
CRISP X X 8066 8060
DADE X X X 7466 7466
DAWSON X 16122 16122
DECATUR X 11667 11669
DEKALB X X X 372108 373071
DODGE 8088 8089
DOOLY 4122 4123
DOUGHERTY X X 35500 35483
DOUGLAS X X 69412 69422
EARLY X X 5216 5216
ECHOLS X X 1448 1448
EFFINGHAM X X 31658 31669
ELBERT X 9213 9213
EMANUEL X 9531 9551
EVANS X 4256 4256
FANNIN 14883 14882
FAYETTE I X X X 72182 72180
FLOYD X X 41859 41546
FORSYTH X X X 129567 129886
FRANKLIN 10794 10814
FULTON X X X X X X 526676 526236
GILMER X 16574 16573
GLASCOCK X X X 1571 1571
GLYNN X 42155 42189
GORDON X X X X 24068 24068
GRADY X X X X 10741 10741
GREENE X 11314 11311
GWINNETT X X X X X 416064 416133
HABERSHAM X X 20505 20504
HALL X X 90954 90965
HANCOCK X X 4183 4171
HARALSON X X 14289 14291
HARRIS X 20099 20099
HART 12782 12782
HEARD X X 5405 5405
HENRY 123071 123329
HOUSTON X X X 75132 75154
IRWIN X X X 4186 4186
JACKSON X X X 37731 37731
29 | P a g e
JASPER X X 7657 7657
JEFF DAVIS 5780 5785
JEFFERSON X 7672 7680
JENKINS X X 3461 3461
JOHNSON 4111 4111
JONES X 15024 14985
LAMAR 9059 9070
LANIER X X 3591 3591
LAURENS 22821 22822
LEE X X 16766 16764
LIBERTY I X 21478 21480
LINCOLN X 4662 4652
LONG X X 5671 5672
LOWNDES X X X 46523 46521
LUMPKIN X X X 15584 15591
MACON 4675 4683
MADISON X X X 14985 14985
MARION X X X 3645 3645
MCDUFFIE X X 10508 10508
MCINTOSH X 6725 6725
MERIWETHER X 10904 10904
MILLER X 2849 2848
MITCHELL X X X 8990 8989
MONROE X 15653 15651
MONTGOMERY 3974 3975
MORGAN X X X X 11757 11760
MURRAY X X 15416 15416
MUSCOGEE X X X 80954 80900
NEWTON X X 54478 54478
OCONEE X X X 25300 25372
OGLETHORPE X 8163 8163
PAULDING X X X 85630 85663
PEACH 12584 12577
PICKENS X X X 17148 17199
PIERCE X X X 9070 9069
PIKE X X X 10752 10752
POLK X X X 17446 17442
PULASKI X 4074 4090
PUTNAM X X X 11914 11915
QUITMAN X 1116 1116
RABUN X X 9626 9610
30 | P a g e
RANDOLPH X X 3087 3086
RICHMOND X X X 87462 87351
ROCKDALE X X X X 44921 44781
SCHLEY X X X 2284 2284
SCREVEN 6647 6645
SEMINOLE X 3901 3904
SPALDING X X 30203 30339
STEPHENS 11913 11938
STEWART X X 2006 2005
SUMTER X 12199 12175
TALBOT X X X 3542 3542
TALIAFERRO 931 931
TATTNALL X X 8200 8199
TAYLOR 3851 3854
TELFAIR X 4353 4353
TERRELL X X 4437 4431
THOMAS X X 21941 21963
TIFT X X 16350 16326
TOOMBS X 10947 10947
TOWNS X 8016 8016
TREUTLEN 3091 3091
TROUP 30174 30170
TURNER 3809 3808
TWIGGS X 4458 4458
UNION 15613 15620
UPSON X X X 12948 12947
WALKER X X X 29494 29494
WALTON X X X 51286 51274
WARE X X X 14253 14246
WARREN X X X 2663 2663
WASHINGTON 9494 9518
WAYNE X 12798 12798
WEBSTER 1400 1400
WHEELER 2296 2296
WHITE X 14882 14882
WHITFIELD X X X X 36829 36850
WILCOX X X 3291 3289
WILKES 5042 5053
WILKINSON 4784 4783
WORTH X X 9315 9315
31 | P a g e
Counties With Aberrations
In our detailed examination of the 2020 election data, we encountered various counties exhibiting
notable discrepancies in their ballot counts. The following sections present an overview of counties that
displayed significant instances of double ballots or stray ballot aberrations. These aberrations, ranging
from minor irregularities to more pronounced anomalies, provide insight into the complexities and
challenges inherent in the ballot counting and verification processes.
County Double MC1 Stray MC1 Double MC2 Stray MC2 Total
Bacon 0 22 0 22 44
Bibb 0 103 0 22 125
Bullock 0 0 5 1 6
Catoosa 0 0 0 28 28
Chatham 185 32 1,407 27 1,651
Cherokee 125 0 22 127 274
Cobb* 0 482 399 28 909
DeKalb 0 129 0 160 289
Floyd 4 12 0 2,923 2939
Forsyth 0 0 23 0 23
Fulton** 550 5,812 3,930 1,581 11,873
Grady 50 0 0 0 50
Gwinnett 449 963 151 575 2,138
Hall 48 0 12 0 60
Houston 0 4 0 26 30
Muscogee 50 434 455 440 1,379
Paulding 20 26 6 36 88
Pickens 0 1 0 179 180
Upson 0 101 100 0 201
Walton 0 0 0 284 284
Ware 100 2 0 51 153
Whitfield 1 8 0 30 39
Total 1,582 8,131 6,510 6,540 22,763
* Indicates that we do not have the full set of TIF images to complete the aberration study
32 | P a g e
Bacon County
Data Sources and Ballot Counts
In Bacon County, our analysis is grounded in data obtained from multiple sources:
In the recount, there were 23 replacement presidential only ballots appearing sequentially at the end of
the count. These could have been legitimately duplicated, and only the presidential candidate added
since that was all that was counted in the recount. But since the ballot types didn’t match up, not sure if
that was the case. These also could be replacement ‘presidential’ votes that occur in multiple counties
as replacements for ballots that wouldn’t be located.
- Mismatch in Precincts: The precincts for the duplicate ballots did not align with those of the
original ballots. While the original ballots spanned five different precincts, the duplicates were
limited to three. This discrepancy necessitated additional analysis to clarify the situation.
- Adjudication of Write-in Votes: In the initial count, many write-in votes were changed to 'blank',
indicating that the BMD ballots underwent adjudication. This process likely involved the removal of
candidates not meeting qualifications, an additional manual step essential for accurate ballot
analysis.
Conclusion
Bacon County's case highlights the importance of comprehensive ballot analysis. While the initial data
review suggested anomalies, a detailed examination could reveal that the county efficiently managed
challenges such as unscannable ballots. The identified areas for improvement emphasize the need for
attention to detail in every aspect of ballot handling and analysis, ensuring the integrity of the electoral
process.
33 | P a g e
Bartow County
For Bartow County, the source of the information relies on images and data files from the following
sources.
- Sequential Nature of Ballots: The sequential nature of the ballots, particularly in Batches 185 and
190, is intriguing. This suggests a systematic issue rather than random occurrences, which is more
common in such scenarios.
- Concentration in Specific Batches: The fact that the ballots needing recreation came exclusively
from the same tabulator, and specifically from two entire batches, suggests a potential external
factor influencing these batches. Could there have been environmental factors, such as water
damage, that led to the failure of these entire batches?
34 | P a g e
- Comparison with Other Counties: In contrast to other counties where duplicate ballots are
generally random and attributed to printing issues, Bartow's case appears unique. The need to
recreate two full batches of ballots is unusual and warrants further investigation to understand the
underlying cause.
Conclusion
Bartow County's case stands out in the ballot analysis for its specific challenges and the efficient
response in duplicating the affected ballots. However, the peculiar pattern observed in the duplication
process invites curiosity and speculation about the possible causes. Understanding the factors leading to
such a concentrated need for ballot duplication in specific batches can provide valuable insights into the
robustness of the voting process and potential areas for improvement in ballot handling and
preservation.
35 | P a g e
Bibb County
For Bibb County, the source of the information relies on images and data files from the following
sources.
Challenges in Analysis
Missing BMD Ballots: The original batch of ballots lacked some Ballot Marking Device (BMD) ballots,
complicating the analysis.
Conversion of Ballots: A significant number of ballots were converted from Hand Marked Paper Ballots
(HMPB) to BMD ballots. While these converted ballots were properly marked and highly legible, their
interpretation posed challenges.
CVR Misreading: The converted ballots, primarily from absentee and provisional categories, were
initially misinterpreted in the Cast Vote Record (CVR). This misinterpretation led to discrepancies in the
ballot signatures, which were later rectified by adjusting the initial characters in the signatures. The total
number of duplicated ballots in the original count was found to be 402.
Distribution of Stray Ballots: Of the missing ballots, 75 were votes for Joe Biden and 27 for Donald
Trump.
Voting Pattern of New Ballots: Of these ballots, 19 votes were for Joe Biden and 4 for Donald Trump.
Conclusion
The ballot analysis for Bibb County highlighted several challenges, particularly in reconciling
discrepancies between different ballot types and counts. The data indicates a mix of missing and
additional ballots across the original count and the recount, with variations in the distribution of votes
for the presidential candidates.
36 | P a g e
Catoosa County
For Catoosa County, the source of the information relies on images and data files from the following
sources.
Analysis of Discrepancies
New Ballots in Recount: A total of 29 ballots were identified in the recount that were not present in the
original count. The breakdown of these additional ballots is as follows:
Notable Observations
Concentration on Tabulator 320: A significant observation was that the majority of the new ballots
appeared on Tabulator 320, which processed only two batches.
Voting Pattern of New Ballots: These additional ballots predominantly favored Joe Biden.
Order of Ballot Scanning: Contrary to patterns observed in other counties where new ballots typically
appeared at the end of the count, in Catoosa County, these ballots from Tabulator 320 were the first to
be scanned during the recount.
Conclusion
The analysis of Catoosa County's ballots showed a relatively small discrepancy between the original
count and the recount. The additional ballots found in the recount were concentrated in specific batches
and tabulators, notably favoring one presidential candidate.
37 | P a g e
Cherokee County
For Cherokee County, the source of the information relies on images and data files from the following
sources.
Key Findings
Double-Scanned Ballots: The original count included 125 double-scanned ballots, primarily originating
from Tabulators 950 and 955. Notably, these tabulators were responsible for duplicating three batches
from Tabulator 950.
Stray Ballots in Original Count: There were 22 stray ballots identified exclusively in the original count.
The majority of these stray ballots were Ballot Marking Device (BMD) ballots from the Hillside precinct.
Stray Ballots in Recount: Interestingly, the recount presented 127 stray ballots, a figure closely
resembling the number of double-scanned ballots identified in the original count. These additional
ballots were mostly Hand Marked Paper Ballots (HMPB) from the Air Acres and Woodstock precincts.
Conclusion
The ballot analysis in Cherokee County underscores the need for attention to detail in the electoral
process. While the overall discrepancy in ballot counts was minimal, the presence of double-scanned
and stray ballots, as well as the unique case in the Rosecreek precinct, highlight the complexities
involved in ensuring accuracy and integrity in vote tabulation.
38 | P a g e
39 | P a g e
Cobb County
For Cobb County, the source of the information relies on images and data files from the following
sources.
Challenges in Analysis
Lack of Images for First Count: A significant hindrance in the analysis process is the absence of images
from the first machine count. This limitation makes it challenging to conduct a conclusive analysis of the
county. Once the original ballot images are obtained, it is anticipated that several hundred more ballot
issues may be identified, particularly related to signature mismatches.
Discrepancies Identified
Ballots Missing in Recount: There were at least 481 ballots present in the first count that did not
appear in the recount.
Duplicate Ballots in Recount: In the recount, there are indications of at least 428 ballots being
duplicated or not found in the original count:
- Approximately 400 ballots were identified as double-scanned from various previous batches.
- 28 stray ballots were found in the recount that were not part of the original count.
Verification Challenges: The lack of actual ballot images from Cobb County's first count complicates the
verification process of the exact ballots that were duplicated. However, the current analysis is believed to
be very close to accurate, pending the receipt of the original ballot images.
Conclusion
The ballot analysis for Cobb County highlights the importance of having complete data sets, including
original ballot images, for an accurate and thorough analysis.
40 | P a g e
DeKalb County
For DeKalb County, the source of the information relies on images and data files from the following
sources.
New Ballots in Recount: Conversely, the recount added 160 ballots that were not part of the original
count.
Nature of Adjusted Ballots: Most of these adjusted ballots were limited to the presidential vote,
indicated by the signature 'BLA' for blank entries. The coding 'Don' and 'Jos' were used to represent
votes for Donald Trump and Joseph Biden, respectively.
Labeling for Clarity: The labeling of these ballots with ‘Recount’ by a diligent worker played a crucial
role in identifying these unusual additions, providing clarity and transparency in the recount process.
Recreation of Whole Batches: The need to recreate entire batches as ‘recount’ ballots raises questions.
The rationale behind replacing a significant number of ballots from the original count with newly created
‘recount’ ballots remains unclear.
Conclusion
Despite these peculiarities, it is important to acknowledge the overall efficiency of DeKalb County in the
ballot counting process. Considering the challenges posed by a large population, the county performed
commendably in managing and executing the count.
41 | P a g e
The ballot analysis for DeKalb County highlights a few instances of irregularities, particularly in the
creation and inclusion of new ballots marked for recount. These anomalies, while small in number
compared to the total count, underscore the importance of transparent and consistent procedures in
ballot handling and tabulation.
42 | P a g e
Floyd County
For Floyd County, the source of the information relies on images and data files from the following
sources.
Floyd County, Georgia, found itself at the center of attention during a recount in the 2020 presidential
race. This recount unveiled a significant discrepancy in the vote tally, highlighting the challenges and the
importance of accuracy in the electoral process.
As reported in an article by The Atlanta Journal-Constitution, the recount in Floyd County unearthed over
2,600 ballots that had not been included in the original count. This discovery had the potential to slightly
narrow President Donald Trump's 14,000-vote deficit to Joe Biden in the state. The breakdown of these
newfound votes was particularly noteworthy: Trump received an additional 1,643 votes, Biden 865, and
Jo Jorgensen with 9.
The root cause of this discrepancy was attributed to human error rather than a technical malfunction.
The issue stemmed from a failure to upload votes from a memory card in a ballot scanning machine. The
uncounted votes predominantly came from in-person early voting conducted at the Floyd County
Administration Building, which houses the county’s elections office. It was reported that more than half
of the 5,000 ballots cast using an optical scanner at this location were not initially recorded.
Utilizing the count vs. recount detection feature of my software, I identified all new ballots that emerged
in the recount. The comprehensive analysis yielded the following findings:
43 | P a g e
These findings significantly alter the understanding of the vote totals in Floyd County, highlighting the
importance of thorough ballot analysis to ensure accuracy in election results.
44 | P a g e
Forsyth County
For Forsyth County, the source of the information relies on images and data files from the following
sources.
Confirmation in MC2: It was confirmed that these double-counted ballots were included in the MC2
Cast Vote Record, contributing to the count discrepancy.
Limitations in Analysis
Limited Scope of Cast Vote Record: A significant limitation in the analysis for Forsyth County was that
the provided Cast Vote Record only included data for the presidential ballot. This restriction made it
challenging to conduct a comprehensive ballot analysis, as it limited the scope of data available for
review and comparison.
Conclusion
While the overall discrepancy in ballot counts was relatively small, the issue of double-counted records
and the unexplained discrepancy between CSV and TIF images underscore the need for careful
management and verification of voting records. Additionally, the limited scope of the provided Cast Vote
Record for only the presidential ballot presents a challenge in conducting thorough and multifaceted
ballot analysis.
45 | P a g e
Fulton County
For Fulton County, the source of the information relies on images and data files from the following
sources.
Overview
Fulton County presented significant challenges in the analysis of ballot data, with an unusually high
number of discrepancies observed. The complexity and volume of issues in Fulton County were
remarkably higher than those found in any other county examined.
Stray Ballots
- A total of 5,812 stray ballots were identified in the original count but not in the recount.
- Conversely, the recount included 1,581 stray ballots that were not present in the original count.
Challenges in Consolidation
The process of consolidating and analyzing the ballots for Fulton County was particularly daunting due to
several factors:
- Volume of Issues: The sheer number of mismatched ballots in Fulton County surpassed the total
number found in all other counties combined, indicating a high level of complexity in the voting
records.
- Accuracy of Double-Scanned Ballot Count: The count of double-scanned ballots is believed to
be very precise, especially since most of the doubled Hand Marked Paper Ballot (HMPB) images
were available for examination.
- Ongoing Stray Ballot Analysis: The assessment of stray ballots is still a work in progress, with
further study and interpretation ongoing. Therefore, the current figures for stray ballots are subject
to change as the investigation continues.
46 | P a g e
Additional Complications
- Missing Source Ballot Images: Adding to the complexity, most of the source ballot images from
the first Machine Count were missing. This absence has significantly hindered the process of
accurately determining stray versus duplicate ballots.
- Extended Duration of Analysis: Efforts to resolve the aberrations in Fulton County have been
ongoing for several months with limited progress. The extensive number of issues to be addressed
in this county presents a formidable challenge, far exceeding the scope of work required for other
counties.
47 | P a g e
Grady County
For Grady County, the source of the information relies on images and data files from the following
sources.
Key Finding
Double-Scanned Batch: The primary issue in Grady County involved a batch of 49 ballots that were
double-scanned. This occurred in Tabulator 290, Batch 48, which inadvertently duplicated Batch 1. This
instance of double scanning contributed to the discrepancy in the TIF image counts.
Pending Investigation
Unidentified Missing Batch in CSV: There is a need for further investigation to identify the missing
batch in the CSV data. Understanding which ballots were removed and why will be crucial in reconciling
the discrepancies between the different data sources and ensuring the accuracy of the final vote tally.
Conclusion
The analysis of Grady County's ballot data underscores the challenges in maintaining consistency across
different formats of vote tabulation.
48 | P a g e
Gwinnett County
For Gwinnett County, the source of the information relies on images and data files from the following
sources.
Key Findings
Doubled Ballots in First Count: There were 449 ballots identified as doubled in the first count,
originating from nine different batches.
Stray Ballots Analysis: Investigation into stray ballots that were present in the original count but missing
in the recount identified 575 such cases.
Ballots Missing in Recount: A total of 963 ballots present in the original count were not found in the
recount.
Double Scanned Ballots in Recount: The recount also revealed 151 double-scanned ballots.
More records than images: There are 428 more Cast Vote Records in MC2 than ballot images.
Recount Specifics
Removal of Non-Presidential Votes: During the recount, which focused primarily on the presidential
vote, most ballots without a presidential entry were removed from the count. This decision led to a large
number of stray ballots in the original count, though it did not affect the presidential vote tally.
Presidential Vote Proportion: Given the dual ballot system in Gwinnett County, it's important to note
that roughly half of the votes were for a presidential candidate. This aspect is crucial in understanding
49 | P a g e
the distribution and significance of the votes and any discrepancies that arose during the counting
process.
Conclusion
The ballot analysis for Gwinnett County underscores the complexities introduced by using two ballots
per voter and the subsequent separation of these ballots during the recount. The reduction in the ballot
count in the recount, coupled with issues like ballot duplication, stray ballots, and the challenge in
tracking constitutional ballots, highlights the need for a careful and thorough examination of the voting
and recount processes
50 | P a g e
Houston County
For Houston County, the source of the information relies on images and data files from the following
sources.
Overview of Discrepancies
In Houston County, the ballot counts between the initial count and the recount revealed notable
discrepancies, albeit on a smaller scale compared to some other counties.
Missing Ballots in Second Count: There were four ballots from the initial count that were not
accounted for in the recount. This included two Hand Marked Paper Ballots (HMPB) and two Ballot
Marking Device (BMD) ballots.
New Ballots in Recount: Conversely, the recount showed the appearance of 28 new ballots, the
majority of which were BMD ballots. These ballots did not follow any discernible pattern and were found
across various batches.
Uncommon Duplication of BMD Ballots: The duplication of BMD ballots in this manner is uncommon.
BMD ballots are typically more controlled and less prone to duplication compared to HMPB ballots, given
their automated and standardized nature.
Conclusion
The ballot analysis for Houston County points to peculiarities that warrant further investigation,
particularly regarding the scattered placement and the nature of the new ballots in the recount. The lack
of a clear, organized method in the inclusion of these additional ballots, especially the BMD ballots,
raises questions about the ballot handling and tabulation processes.
51 | P a g e
Muscogee County
For Muscogee County, the source of the information relies on images and data files from the following
sources.
- 25 ballots from Tabulator 550, Batch 95 were found to be doubled of those in Batch 92.
- Similarly, 25 ballots from Tabulator 550, Batch 567 doubled those in Batch 566.
Puzzling Aspects
BMD Ballot Discrepancy: The disappearance of 378 BMD ballots in the recount is highly unusual,
especially considering many were write-in ballots from Tabulator 273. The likelihood of these ballots
being separated during the manual recount, while plausible, is uncommon and necessitates further
examination.
52 | P a g e
Conclusion
The ballot analysis for Muscogee County uncovers a complex scenario with multiple layers of
irregularities. The disappearance of a substantial number of ballots in the recount, coupled with the
discovery of new ballots and the peculiar pattern of duplications, raises several questions about the
ballot handling and counting processes.
53 | P a g e
Upson County
For Upson County, the source of the information relies on images and data files from the following
sources.
Upson County presents another case where the interplay of stray and double scanned ballots has led to
an unexpectedly close alignment in vote counts between the original count and the recount. The
apparent accuracy of the final tally, despite the presence of discrepancies in ballot processing, indicates
a need for a deeper dive into the county’s counting methods and practices to fully understand how such
a result was achieved.
54 | P a g e
Walton County
For Walton County, the source of the information relies on images and data files from the following
sources.
Adjudication Findings
Added Ballots in Recount: The adjudication process in Walton County revealed that 284 additional
ballots were incorporated into the recount. This number slightly exceeds the initial discrepancy of 279
ballots identified between the two counts.
Source of New Ballots: It was determined that all the new ballots originated from Ballot Marking
Devices (BMD) machines.
Conclusion
The analysis of Walton County's ballots indicates a fairly straightforward process with a clear addition of
ballots in the recount. The majority of these additional votes favored one presidential candidate. The
exclusive origin of these new ballots from BMD machines highlights the role of these devices in the
voting process and the importance of their accurate functioning and monitoring.
55 | P a g e
Ware County
For Ware County, the source of the information relies on images and data files from the following
sources.
Adjudication Findings
There were 100 ballots that were doubled in the first count.
• 100 ballots from Tabulator 270, Batch 35 matching Tabulator 270, Batch 11
• 2 ballots from Tabulator 270, Batch 32 that were only in the first count.
The increase of 97 ballots in the cast vote record for the recount has not yet been identified.
Pending Investigation
The situation with Ware County presents a curious case of irregularity. The fact that the 100 doubled
ballots were all processed at the very end of the initial count raises eyebrows.
Compounding this mystery is the perplexing absence of Batch 34 from the results. Its conspicuous
absence raises a host of questions: Was it accidentally omitted, or was it deliberately excluded?
The unexplained appearance of new ballots in the recount adds another layer of complexity to the
situation. The seemingly arbitrary addition of 50 ballots to the last batch raises the possibility that these
could be the missing Batch 34.
The last observation is the most curious. The count of the ballots was completed between 11/2/2020
and 11/6/2020.
The doubles were added on 11/11/2020. 75 votes for Biden, 25 for Trump.
56 | P a g e
Database Security Deficiencies
Introduction
In a world increasingly reliant on digital systems, the security of electoral data stands paramount. This
chapter delves into concerning revelations about the security measures—or the lack thereof—
surrounding voter databases in several counties in Georgia. These findings came to light following open
record requests made by VoterGA, a group dedicated to ensuring the integrity and transparency of the
voting process.
Accompanying the requested ballot information, backups of voter databases from four counties—
Appling, Bibb, Jones, and Telfair—were included. Astonishingly, these databases could be accessed
effortlessly using Microsoft's SQL Server Management Studio (SSMS), a standard tool for managing
databases. The absence of security layers or password protection to access these databases was the first
red flag, indicating a fundamental oversight in protecting sensitive electoral data.
Upon exploring the contents of these databases, I made several observations that further underscore the
pressing need for robust security measures in our electoral systems. The lack of basic security protocols,
especially concerning password management and data encryption, was alarming. These vulnerabilities
not only raise questions about the potential for unauthorized access but also bring to light broader
issues of data integrity and trust in our electoral infrastructure.
In this chapter, I will document these security deficiencies in detail, drawing from the insights gained
through the analysis of these voter databases. The aim is to highlight the critical importance of
cybersecurity in the electoral process and to call for immediate action to safeguard our democratic
institutions from digital threats.
57 | P a g e
Technician & Supervisor Tabulator Passwords
Upon successfully accessing the database, my attention turned to a particularly intriguing table named
SystemParameter. This table appeared to be a repository of various system settings and
configurations, an essential aspect of any database. To gain insights specifically into the security
protocols, I formulated and executed the following SQL query:
SELECT paramName, paramValue, description
FROM SystemParameter
WHERE description LIKE 'passcode for%'
The results from this query were both surprising and alarming:
What stood out immediately was the revelation of plaintext passwords within the database, a cardinal
sin in modern cybersecurity practices. These passwords, meant for technicians and supervisors to rezero
and reopen polls, were not only visible without any encryption but also, in many instances, alarmingly
simplistic.
The use of 123456 as a default password is a glaring example of inadequate security measures. Such
passwords are notoriously weak and easily guessable, making them vulnerable to even the most basic
forms of unauthorized access.
Interestingly, the table contained two entries for each county with varying values. Along with the
standard 123456 password (which incidentally is the same password on my luggage), in Bibb County,
the password for technicians was set to 870913.
The ease with which these passwords were accessed and the apparent lack of complexity in password
selection raise significant concerns about the overall security posture of these systems. The fact that
such rudimentary and easily exploitable practices were in place within a voting system's infrastructure is
not just concerning; it borders on negligence. This section aims to delve deeper into these security flaws
and their potential implications on the integrity of the electoral process.
The technician and supervisor passwords for the various counties are
• Appling: 515250
• Bibb: 870913
• Jones: 356753
• Telfair: 228823
58 | P a g e
Uncovering the ElectionEvent Table
Progressing further into the database, my investigation led me to a table named ElectionEvent, a
repository of ostensibly benign information related to various electoral events. This table included
standard fields like the date of the election and descriptive labels, such as 'Bibb County November 2020
General and Special Election'. However, it was the discovery of certain other fields in this table that
raised immediate and profound security concerns.
2. X509Data: This field contained a byte array representing a full x.509 security certificate, including the
crucial public/private key pair. X.509 certificates are a standard for public key infrastructure and are used
for secure data exchange, including digital signatures. The exposure of this certificate, especially the
private key, is a major vulnerability, effectively laying bare the system's secure communication channels.
3. HMACKey: Although its specific application in this context was unclear, HMAC (Hash-based Message
Authentication Code) Keys are generally used for data integrity checks and authentication. The visibility
of this key further adds to the list of security lapses.
In subsequent chapters, I will delve deeper into the implications of these discoveries, particularly how
the exposed x.509 certificate compromises the system's integrity. The findings underscore a pressing
need for a comprehensive review and overhaul of the security measures protecting these critical
electoral systems.
59 | P a g e
Exploring the TabulatorUser Table
Continuing my investigation into the security protocols of the electoral system, I turned my attention to a
database table named TabulatorUser. This table ostensibly listed credentials for tabulator
administrators, and my findings here were both revealing and concerning.
The data showed that all 89 Bibb county poll workers, along with those in other counties like Appling (15
rows), Bibb (20 rows), and Telfair (14 rows), shared the same password and access levels.
The simplicity of this decryption process was alarming. It required minimal effort and basic encryption
knowledge, suggesting that anyone with such skills could potentially access these passwords.
Improper Password Storage: In the realm of cybersecurity, it is a standard practice to hash passwords
using a one-way hash rather than encrypt them. This method ensures that even if someone gains access
to the password hash, they cannot decrypt it to obtain the original password. The electoral system’s use
of reversible encryption rather than hashing demonstrated a fundamental misunderstanding of secure
password storage practices.
60 | P a g e
Uniform Passwords: The use of a single password for all users in a county is another glaring security
issue. It creates a single point of failure, making the system vulnerable to unauthorized access if the
common password is compromised.
In conclusion, the security practices observed in the TabulatorUser table indicate a concerning lack
of basic cybersecurity protocols, potentially jeopardizing the integrity of the electoral process. The
subsequent sections will delve deeper into the implications of these security flaws and the necessary
steps to mitigate them.
61 | P a g e
Assessing the AppUser Table
Continuing the exploration of the electoral system's database, I next examined the `AppUser` table. This
table, found to be consistent across all four counties, offered a different perspective on the system’s
approach to password security compared to the previous tables I analyzed.
The usage of hashed passwords is a positive aspect, demonstrating an understanding of proper security
practices for password storage. However, a deeper analysis revealed a critical flaw.
Statewide Uniform Administrative Passwords: A more alarming observation was that for every county,
the administrative passwords were identical. This uniformity across the state meant that access to one of
these administrative accounts, such as SAdmin, MRO01, or ROAdmin, would grant access to the
administrative settings of all the counties. Such a setup poses a significant security risk, as it creates a
single point of failure that could potentially lead to widespread system compromise.
The findings in the AppUser table, while initially appearing more secure due to the use of hashing, still
reveal a lack of fundamental cybersecurity standards. The use of shared passwords, especially for
administrative accounts with broad access, is a critical vulnerability. This discrepancy between the
security measures applied in different tables and the shared passwords across counties raises questions
about the consistency and effectiveness of the system’s overall cybersecurity strategy.
62 | P a g e
The X509 Certificate Data
The discovery of the X509 data certificate in the ElectionEvent table of the electoral system's
database is perhaps one of the most concerning findings in this investigation, both due to its implications
and the complexity involved in understanding these implications.
Secure Email Communications: They are used to encrypt and digitally sign emails, ensuring that
sensitive information remains confidential and verifying the sender’s identity.
Digital Signatures on Files: Certificates can be used to apply verifiable digital signatures to files. In an
election system, this might include voter rolls, election results, or software updates, ensuring the
integrity and authenticity of these files.
Encrypted Data Transmission: They are fundamental in setting up SSL/TLS connections, which are
crucial for secure data transmission over the internet. This could be used for transmitting election results
or voter information between different entities.
Authentication and Access Control: Certificates can play a role in authenticating users or systems
before granting access to sensitive data or operations, potentially including access to voting machines or
electoral databases.
63 | P a g e
The Gravity of the Situation:
Leaving the complete X509 certificate, including the private key, unprotected and easily accessible in the
database, is akin to leaving the keys in the ignition of an unlocked car. It exposes the electoral system to
a multitude of risks, from unauthorized access and data manipulation to the potential fabrication of
fraudulent digital communications or transactions. This vulnerability cannot be overstated and calls for
immediate and decisive action to secure these systems.
64 | P a g e
Ballots on Demand
Discovery of 'Fuzzy' Ballots
During the comparison of original and recount ballots in Fulton County, a peculiar pattern emerged.
Certain ballots exhibited consistently light or dark un-filled circles, a feature independent of the
tabulator or scanner used. This consistency suggested that the characteristic was inherent to the ballots
themselves, not a result of scanner variability. These ballots were colloquially termed 'fuzzy' ballots, a
phenomenon unique to Fulton County, and appeared in a significant number.
When scanners designed to ignore red ink are used, the non-standard black ink of these locally printed
ballots doesn't register as effectively. This results in the faded appearance of the circles, a key
characteristic of the 'fuzzy' ballots.
Inquiries into the prevalence of On Demand Ballots in Fulton County suggested that approximately 5,000
such ballots were generated. With the latest software update, I was able to identify 3,575 of these On
Demand Ballots that were cast in the election.
The identification and analysis of On Demand Ballots in Fulton County reveal an important aspect of the
voting process, particularly in situations of ballot shortage. The unique characteristics of these ballots,
primarily their 'fuzzy' appearance due to printing methods, underscore the nuances in ballot creation
and processing.
65 | P a g e
The Strange Timing of On Demand Ballots
With the On Demand Ballots now identified, a crucial aspect of our analysis focused on the timing of
their scanning. This factor provides insight into the distribution and handling of these ballots in the
voting process.
Contrary to expectations, these On Demand Ballots did not exhibit a random distribution among early
voting ballots. Instead, they tended to appear in batches, often grouped together, which deviates
significantly from the expected norm. Under typical circumstances, if these ballots were mailed,
received, and processed like other early votes, they would be randomly intermixed with the rest of the
ballots.
This pattern of grouping was not an isolated incident. In most instances, On Demand Ballots were not
randomly dispersed within the batches as one would expect. Instead, they were commonly found
clustered together.
66 | P a g e
Analyzing Scanning Times: An Anomaly
The most intriguing aspect emerged when we analyzed the scanning times of these ballots. On Election
Day, only a minimal number of On Demand Ballots were processed. The following day, November 4th,
saw a slightly higher but still small number. However, at 10 AM on November 5th, two days post-
election, a surge occurred with over 1,800 of these ballots being scanned – an anomaly in the context of
time analysis.
Upon charting the scan times of all ballots, it became evident that the On Demand Ballots were
predominantly scanned towards the end of the entire ballot scanning period. This finding is highly
unusual, given that these ballots, by their nature, should have been randomly distributed among the
overall ballot pool.
The peculiar timing and grouping patterns of the On Demand Ballots in our analysis raise significant
questions about their handling and processing. These ballots' concentrated appearance in batches, and
67 | P a g e
their late scanning times, particularly days after the election, point to an irregularity that deviates from
standard electoral procedures. This abnormality warrants further investigation to understand the
implications and reasons behind such a distribution pattern.
68 | P a g e
Other Security Issues
The SHA Signature Files and Ballot Image
Security
While the integrity of the database is crucial, the security of ballot images holds equal significance.
During our review of the data obtained through Open Records Requests, we encountered 'sha' signature
files associated with these ballot images. These files are essentially hashes of the ballot images, serving
to verify the authenticity and integrity of these images.
This ease in recreating sha files creates a false sense of security. It suggests that the ballot images are
secure and unaltered, which might not be the case. A ballot can be tampered with, a new sha file
generated, and the files would still appear legitimate.
69 | P a g e
Recommended Best Practices:
To enhance security, a more robust approach would be to employ a hashing algorithm that requires a
public/private key certificate. This certificate would generate a unique signature that couldn't be
replicated by anyone without access to the private key. The public part of the certificate would then be
used to verify the authenticity of the hash. Such an approach would significantly bolster the security of
the ballot images, ensuring that any alterations can be reliably detected and traced back to their source.
70 | P a g e
Mismatch between Ballot Data and the
Database
In the complex ecosystem of election technology, the alignment between different components is
critical. One area where this alignment is paramount, yet sometimes faltering, is in the relationship
between the QR codes on Ballot Marking Device (BMD) ballots and the corresponding database records.
Conclusion:
This section underscores the vulnerability inherent in the use of BMD ballots and emphasizes the need
for database management to ensure accuracy in reflecting voters' intentions. Any misalignment, as
shown in these cases, can lead to significant misrepresentations of voter choices, potentially
undermining the integrity of the electoral process.
71 | P a g e
72 | P a g e
73 | P a g e
74 | P a g e