Election Fraud items 1 for November 26, 2020

We will update this till around 10 items then start another one.

1. Sydney Powell drops the load of evidence we have been waiting for on Georgia, Michigan

BREAKING: KRAKEN RELEASED! Attorney Sidney Powell Files 104 Page BOMBSHELL COMPLAINT of Massive Fraud in Georgia Election – Update: Michigan too

The Kraken came down to Georgia on this Thanksgiving Eve in the form of a 104 pg BOMBSHELL complaint exposing the massive fraud that overwhelmed the 2020 Georgia Elections. Georgia, you are most certainly on our minds. Link to filing to come, stay tuned! […]


Here’s one of the BOMBSHELLS in the report:
They are calling for 96,000 votes to be tossed!
page 10

Additionally, incontrovertible evidence Board of Elections records demonstrates that at least 96,600 absentee ballots were requested and counted but were never recorded as being returned to county election boards by the voter. Thus, at a minimum, 96,600 votes must be disregarded. (See Attached hereto, Exh. 9, R. Ramsland Aff.)

2. Did we post this one already?

3. Obama says a vote should only count if you can match the signature. I wonder when that was?

4. Twitter upticks its collusion with election fraudsters by blocking Sidney Powell’s materials showing how the fraud took place.

Twitter is blocking users from sharing links to lawyer Sidney Powell’s lawsuit relating to widespread voter fraud in the 2020 Presidential election.

A number of users across Twitter have reported being unable to share links to lawyer Sidney Powell’s lawsuit relating to voter fraud in the 2020 Presidential election. When attempting to share the link to the document, users receive a notification stating that the link has been identified as “potentially harmful.”

5. If the truth manages to triumph and Trump is declared winner, how will the left handle it?



About Eeyore

Canadian artist and counter-jihad and freedom of speech activist as well as devout Schrödinger's catholic

8 Replies to “Election Fraud items 1 for November 26, 2020”

  1. 5 – They are telling us to surrender or die, they believe their own propaganda about the amount of support they have, They also think we are cowards who won’t fight, they are in for a real big surprise.

  2. Heh, you think 96,000 votes is a bombshell? Read section 14 & 15.


    As explained and demonstrated in the accompanying redacted declaration of a former electronic intelligence analyst under 305th Military Intelligence with experience gathering SAM missile system electronic intelligence, the Dominion software was accessed by agents acting on behalf of China and Iran in order to monitor and manipulate elections, including the most recent US general election in 2020. This Declaration further includes a copy of the patent records for Dominion Systems in which Eric Coomer is listed as the first of the inventors of Dominion Voting Systems. (See Attached hereto as Exh. 8, copy of redacted witness affidavit, 17 pages, November 23, 2020).


    Expert Navid Keshavarez-Nia explains that US intelligence services had developed tools to infiltrate foreign voting systems including Dominion. He states that Dominion’s software is vulnerable to data manipulation by unauthorized means and permitted election data to be altered in all battleground states. He concludes that hundreds of thousands of votes that were cast for President Trump in the 2020 general election were transferred to former Vice-President Biden. (Exh. 26).

    Then remember Trump’s EO from back in 2018!

  3. Case 2:20-cv-13134-LVP-RSW ECF No. 1-15, PageID.631 Filed 11/25/20

    Declaration of XXXXXXXXX.

    Pursuant to 28 U.S.C Section 1746, I, XXXXXXXX, make the following

    1. I am over the age of 21 years and I am under no legal disability, which would prevent me from giving this declaration.

    2. I was an electronic intelligence analyst under 305th Military Intelligence with experience
    gathering SAM missile system electronic intelligence. I have extensive experience as a white hat hacker used by some of the top election specialists in the world. The methodologies I have employed represent industry standard cyber operation toolkits for digital forensics and OSINT, which are commonly used to certify connections between servers, network nodes and other digital properties and probe to network system vulnerabilities.


    PDF on this page:


Leave a Reply

Your email address will not be published.