Election Crime Bureau

Made possible by the Lindell Offense Fund

Ballot Integrity

The legal architecture governing ballot integrity rests on a single unbreakable requirement: every ballot issued must be traceable — through a documented chain of physical and digital custody — back to a verified voter, and every digital record of that ballot must be preserved for twenty-two months under 52 U.S.C. § 20701. That statute does not create a standard of care for administrative convenience; it creates a criminal prohibition against willful destruction, punishable by imprisonment and removal from office.

Two categories of ballot evidence are essential to any meaningful audit. First, physical ballots and their transfer documentation — batch manifests, chain-of-custody logs, duplication records — establish that the paper corpus presented for counting is identical to the paper corpus cast by voters. Second, digital ballot images and their corresponding cast vote records (CVRs), adjudication logs, and cryptographic authentication files (SHA hashes) establish that the electronic tally faithfully reflects machine reads of the physical ballots, and that human overrides of machine interpretations were authorized, documented, and traceable to specific operators.

When adjudication logs are deleted, the entire adjudication record — every instance where a human operator overrode machine interpretation of voter intent — becomes invisible. When ballot images are destroyed and their SHA authentication files are deleted, the cryptographic fingerprints that would allow forensic matching of physical to digital records are gone permanently. When physical ballots are commingled with duplicates, injected without chain-of-custody documentation, or processed on machines whose zero-report tapes are missing, the foundational accounting equation cannot be performed.

The pattern documented across the five battleground states below is not consistent with independent administrative failures in isolated jurisdictions. It is consistent with a systemic strategy of eliminating the audit infrastructure at precisely the layers where fraud would be detected.

Subtopic Analysis

Ballot Integrity

Just look at the ballots’ is a great answer — right up until somebody tries.

See Analysis

Ballot Integrity Findings