The Hidden Infrastructure of Voter Surveillance: Evidence of an Unlawful Relational Database Linking Ballots to Voters
**Prepared by TBTR Strategies**
Executive Summary
This report details extensive findings suggesting the unlawful construction and use of a relational database that can track ballots back to individual voters, thereby violating federal and state protections of ballot secrecy. Drawing on public records, grassroots investigations, and expert analyses, including those from Barry Wernick, Dr. Andrew Paquette, Susan Valiant, TBTR Strategies, Dr. Laura Pressley, and more, we outline a pattern of activity and system design that undermines the integrity and transparency of elections in multiple jurisdictions, including Tarrant County, Dallas County in Texas, counties like Nassau County in New York, and potentially every county using computerized voting systems to conduct elections.
---
I. Introduction
The secrecy of the ballot is a bedrock principle of democratic elections, mandated by both Texas and federal law. However, research conducted by multiple independent teams, compiled by TBTR Strategies, reveals an alarming pattern in which computerized voting systems—especially those employing electronic poll books (epoll books), ballot marking devices (BMDs), and integrated ballot printers—are producing ballots embedded with identifiable data linked directly to voter check-ins. These identifiers may take the form of barcodes, QR codes, access codes, or hexadecimal-style numerical tags.
Through both human-readable and machine-readable formats, voter data from check-in to ballot creation is potentially being used to build a covert and unlawful relational database, allowing administrative actors or external entities with administrative access, to associate individual ballots with specific voters, in direct violation of constitutional and statutory mandates. Independent researchers report the potentially unlawful inflation and deflation of active voter rosters both pre and post-election, inconsistent vote totals between county and state reports, the facilitation and obfuscation of the replacement of electronic totals and physical ballots, and the inability to audit records to detect these issues inherent in modern computerized voting systems.
---
II. Technical Breakdown: How Voter Data is Embedded into Ballots
A. The Role of E-Poll Books and Ballot Printers
In Dallas County, ES&S epoll books were found to have glitched during a recent general election, failing to complete voter check-ins and printing ballots with repetitive barcodes used to create the "ballot style" for the voter. This malfunction in the ES&S epoll book equipment resulted in an untold number of voters receiving the wrong ballot style— meaning multiple voters received the same ballot tied to a single incomplete check-in.
These ballot identifiers, printed from epoll books directly, or using a peripheral machine to transcribe epoll book barcodes created for each voter, included human-readable and machine-readable codes (barcodes or hexadecimal-like identifiers) that were transferred from the epoll book to the ballot marking device, and then on to the ballot which is then scanned into a thumb drive. In many cases it is known that these incorrect ballots were printed and then unknowingly voted and cast, without these voters even being formally checked in, as the epoll books were stuck on the initial voter scanned in, and kept printing ballots for that original voter only, without anyone noticing. Election judges had no idea the voters they were scanning were not being checked in, and that they were all getting the same ballot style. This lack of understanding of how to conduct computerized elections and detect serious issues has created opportunities for multiple votes to be cast by or on behalf of a single registration without detection.
These system malfunctions were later patched mid-election through a firmware update, raising serious concerns about the legal chain of custody, the auditability of ballots, and the security of the voting process.
B. QR Codes and Access Codes as Data Carriers
In systems like HART InterCivic’s Verity Voting, a barcode generated at check-in is translated via a peripheral controller, typically into a six-digit access code that must be manually entered by the voter into the ballot marking device to create that voter's unique ballot. After voter selections are made, a QR code, and often an additional mysterious number which has gone unexplained by even this author's friend, Heider Garcia, is printed onto the ballot along with the voter selections. The structure of this data pathway suggests a multi-step digital fingerprinting process by which a single code, tied to the voter’s check-in, survives through every step of the voting process—from check-in to ballot generation to casting and potentially beyond.
Election officials claim that these codes contain no voter-identifiable information. However, without full transparency and vendor cooperation—and under threat of legal consequences for inspecting proprietary software—we cannot verify these assurances. The very structure of these systems, as demonstrated by technical audits and whistleblower reports, indicates the presence of relational logic: one piece of data triggering another, across multiple devices, creating a traceable chain.
---
III. Legislative and Procedural Failures
A. The SOS Redaction Order and its Implications
The Texas Secretary of State (SOS) issued a directive after the 2024 primary election requiring the redaction of “personally identifiable” information from cast ballot images and election records. This move followed reports—initiated by grassroots investigator Barry Wernick—revealing that ballots across multiple counties could be matched to individual voters using publicly available election data.
Rather than admit to a systemic issue, the SOS sought to cover it up through redactions, thus acknowledging the problem while simultaneously hiding its scale. This redaction policy placed local election officials in the position of determining what data was "personally identifiable," leading to inconsistent application and further violations of transparency statutes.
This undermines the statutory mandate that all ballots must be anonymous at the time of creation and violates public access rights under both state and federal law.
---
IV. Ballot Fraud by Design: A Workflow for Undetectable Manipulation
TBTR Strategies has compiled all the available evidence from our own investigations, and from thorough examination of work completed by other dedicated American Patriots, that when compiled logically, seem to document a full chain of election manipulation, using both technical and procedural vulnerabilities:
1. **Inflation of Voter Rolls**: Pre-election increases in active voter registrations, including reactivation of inactive voters.
2. **Ballot Generation Loopholes**: Unlimited ballots can be created under one check-in, with systems not designed to flag duplicate ballots.
3. **Non-Sequential Ballot Numbering**: Vendors have advised counties to eliminate sequential numbering, making insertion of fraudulent ballots undetectable.
4. **Excess Ballot Stock**: Thousands of additional blank ballots were allocated to polling locations with historically low turnout. TBTX and TBTR Strategies trained poll watchers observed that election judges were trained only to count ballot stock on the log forms as they opened a packet, leaving thousands unaccounted for. We are only aware of these excessive ballot stock allocations because of properly trained poll watchers.
5. **Ballot Swapping and Mishandling**: Election judges observed opening and sorting of cast ballots from ballot boxes after the close of polls, in violation of chain of custody.
6. **Broken, Missing or Incomplete Chain of Custody**: The removal of lawful ballots and insertion of fraudulently created ballots could be occurring countywide with the severe Chain of Custody violations documented by TBTX and TBTR Strategies trained poll watchers. This is the only evidence the county and state has to prove that a lawful, trustworthy and accurate election was conducted.
7. **Vote Collapsing and Registration Removal**: Post-election, fake registrations are returned to inactive or suspended status, obscuring voter history and eliminating traces of fake votes, while county and state vote totals and voter turnout records fail to reconcile.
In short:
We believe that before an election, inactive voters or suspended voters are somehow activated, polling places are equipped with epoll books to track voter turnout countywide and assign some kind of data to a ballot upon voter check-in, are overstocked with ballots not being tracked, and after an election is conducted that fake voters are removed, fake ballots are created and inserted without detection along with thumb drives of data, and lawfull ballots are removed from ballot boxes after being counted and sorted, with those ballots deemed "undesirable" being swapped prior to delivery to the central election office on election night, or throughout the early voting period.
---
V. Data Pattern Analysis: The Findings of Dr. Andrew Paquette
Dr. Andrew Paquette’s research in Nassau County and across other jurisdictions provides critical technical validation of TBTR’s findings. His forensic audits uncovered algorithmic patterns within voter registration files that indicate:
- Cloning of voter files through dual IDs linked to a hidden third.
- Predictable numerical patterns occurring every tenth entry—indicating algorithmic assignment.
- Removal of voters after elections, with corresponding changes in status from active to inactive or suspended.
These anomalies match the patterns uncovered by Susan Valiant, Barry Wernick, and others in multiple Texas counties, and add technical weight to claims of a relational database underpinning the voter rolls, which we have already shown have data linked directly to the ballot from the epoll books (voter rolls), what is supposed to be a separate database.
---
VI. The Legal and Constitutional Framework
The Texas Constitution demands that elections be conducted in a manner that preserves the purity of the ballot box, through ballot secrecy, auditability and strong election laws preventing undue influence and improper practice. The United States Constitution and federal law similarly require the protection of voter privacy, access to meaningful audits, and free and fair elections.
Every breakdown outlined in this report—whether in the form of broken chain of custody, insertion of machine-generated identifiers, or unlawful redactions—represents a violation of these core principles. A system which inherently houses a secret database facilitating what we appear to have detected would be wholly illegal and unlawful, should such a system be in existence and in use in US elections.
---
VII. Conclusion
The convergence of technical malfunctions, unusual voter registration patterns, procedural irregularities, and embedded identifiers on ballots cannot be dismissed as mere coincidence or clerical error. Taken together, these findings form a cohesive body of evidence pointing to the likely existence of a relational database that unlawfully links ballots to individual voters—potentially enabling the tracking of fraudulent registrations for the purpose of collapsing them after the election.
This database not only facilitates the insertion and deletion of both ballots and voter records but also ensures that such manipulation remains undetectable without access to proprietary systems currently shielded by legal threats and vendor contracts. The database infrastructure is protected by a veneer of procedural legitimacy, but its function appears to be, potentially, entirely unlawful.
This phenomenon can only be occurring at the administrative level, and we will need access to the entire voting system to determine whether there is further evidence of this relational database as documented by Dr. Andrew Paquette and TBTR Strategies with supplementing work from Susan Valiant, Barry Wernick, Dr. Laura Pressley and other unnamed patriots who have dedicated their time, energy, money and good name to this cause to understand how best to secure our elections from undue influence and improper practice.
Aubree
Founder
TBTR Strategies tbtr.us
Taking Back Texas takingbacktexas.org
Aubree … Thanks for sending… Ive been saying, “the Left engaging in fraud is axiomatic from the moment they announce for office, because they must lie about their true identity and intentions, or they would never garner a single vote.”
Praying the right eyes are opened by this powerful salvo. Thank you.