Clean Elections for UtahPage last updated: Wednesday, 16-Feb-2022 11:08:15 EST
HOME Utah Election
Resources2020 Election
Statistical AnomaliesSecure Vote Utah
Ballot InitiativeJen's and Sophie's Big GRAMA Adventures 2022 Caucus March 8 The case for a full forensic audit of Utah, not just "kick the tires"
Summaries of Utah 2020 statistical anomalies
Utah Election Integrity (Ranked Choice Voting)
Utah Freedom Coalition - why audit?
Steve Christiansen's video summarizing Utah 2020 election statistical anomalies (about 90 minutes)
Dr. Douglas Frank's work on calculations made for "ballot harvesting."
Draza Smith's and Jeff O'Donnell's work on the New York Times Edison feed data.
O'Donnell Response to Utah County Commissioner Gardner, February 2022.
Captain Seth Keshel's work on longer term voting trends.
Risk Limiting versus Full Forensic Audits (Frankspeech)
2020 Election fraud at the national level
CVRs and manipulated votes, as explained by Draza
Election Fraud Evidence (Let's fix stuff)
Judicial Watch finds 353 counties in which voter registration exceeds population.
Ten Indisputable Facts about the 2020 election that argue for audits
How to steal an election so nobody notices
How an election is stolen at the state level
Please note that the investigative techniques described on these pages and linked videos do NOT in and of themselves PROVE that fraud occurred in an election. They only serve as indicators (like red light warnings) that something looks irregular and a closer inspection of election data may be warranted.
Dr. Douglas Frank outlined these steps at the August 2021 Cybersymposium.
Before the election, those perpetrating an election theft decide what outcome is desired, by state, down to the county level. They come up with estimates of the ballots that will be cast for each county.
The perpetrators then have to decide where they need additional ballots to push their candidate up, but doing so in a way that it will escape detection. For each state, county by county, they have to make up the difference.
Step 1: Inflate the voter registration databases.
Create a credit bank of phantom voters. These are not just stuffed into a database in a pell-mell fashion but by algorithm (i.e., it is calculated in advance).Dr. Douglas Frank explains this in great detail and has focused his research on this step.
Step 2: Program the machines beforehand
The machines may not necessarily have to flip votes, just count the votes of those not eligible to vote but are still registered.Software patches containing data manipulation algorithms can be installed (Internet not required). The person installing the patch may be none the wiser, just thinking it is some sort of maintenance patch.
Step 3: Track the machines during the election.
Manipulate data as necessary, including adding more ballots.Pump the results into the Edison Research New York Times feed. See analysis of real time election returns, work done by Draza Smith and by Jeff O'Donnell.
Step 4: Clean up after and publish the modified results.
Make sure phantom voters are paired with voter IDs (what one analyst called the "eHarmony" phase of the theft.) In other words, make the ballots cast by phantom voters look legitimate. Publish the results. Then destroy evidence of tampering by making voter rolls right, etc.Publish the results. Captain Seth Keshel and Steve Christiansen have examined long-term voting trends and looked at expected versus published Utah results for 2020.