If you can give me a single valid reason why their manipulation of the data would introduce a pattern like that, I am willing to listen.
As for the data, I believe the data they accessed was publicly available.
As for outlandish claims, the fact of the matter is, the Dominion software (involved in ALL the voting machines in Michigan) is perfectly capable of doing what they describe.
That is a fact, and there is nothing controversial or outlandish about that.
You may disagree in varying degrees about how valid their claims are, but I don’t see how you can, with what we know about how the software is designed, and how the infrastructure and security is set up (or in this case, not set up or deliberately flawed) characterize it as outlandish.
Having seen the functional diagram (distributed by Dominion before their name became nationally known to the nation) which includes potential network connections there are multiple points at which results can be manipulated. I say that as an IT professional, but it isn’t just my opinion, the State of Texas and other states said much the same thing. No, exactly the same thing.
So I disagree with your characterization of their work as “outlandish”. I don’t take issue with rational disagreement.