1. State of Georgia’s Election Process: Echoes of Ukraine’s Voting Anomalies from a Decade Ago - UKC

    State of Georgia’s Election Process: Echoes of Ukraine’s Voting Anomalies from a Decade Ago - UKC

    80
  2. STAGGERING VOTING ANOMALIES IN THE 2020 ELECTION

    STAGGERING VOTING ANOMALIES IN THE 2020 ELECTION

    13
  3. Tony Shaffer on Election Anomalies: Late Night Spikes for Biden; Curated Ballots; USPS Whistleblower | American Thought Leaders

    Tony Shaffer on Election Anomalies: Late Night Spikes for Biden; Curated Ballots; USPS Whistleblower | American Thought Leaders

    262
    2
    4.18K
    15
  4. Pattern Research & Mathematical Research Expert Explains Voting Anomalies in Maricopa County

    Pattern Research & Mathematical Research Expert Explains Voting Anomalies in Maricopa County

    3
    0
    182
  5. Who Is Accountable? The Integrity of the Voting Machines Is an Issue

    Who Is Accountable? The Integrity of the Voting Machines Is an Issue

    45
    0
    3.35K
    5
  6. Rep. Phil Lyman Sounds the Alarm on Voting Anomalies: Numbers Don't Lie!

    Rep. Phil Lyman Sounds the Alarm on Voting Anomalies: Numbers Don't Lie!

    58
  7. Michigan Double Voting by Mike Lindell

    Michigan Double Voting by Mike Lindell

    10
    0
    536
    1
  8. Phd Analysis Of Michigan Votes Reveals Unfortunate Truth Of U.S. Voting Systems

    Phd Analysis Of Michigan Votes Reveals Unfortunate Truth Of U.S. Voting Systems

    14
  9. UKRAINIAN NUCLEAR PLANT OUT OF CONTROL*OUTSPOKEN CONGRESSWOMAN KILLED*UK VOTING DELAYED*SOLAR STORM

    UKRAINIAN NUCLEAR PLANT OUT OF CONTROL*OUTSPOKEN CONGRESSWOMAN KILLED*UK VOTING DELAYED*SOLAR STORM

    11
    0
    225
    4
  10. Voting Machines - An Alarming Number of Voting Machines Are Vulnerable to Hacking.

    Voting Machines - An Alarming Number of Voting Machines Are Vulnerable to Hacking.

    5
  11. Voting Machines - An Alarming Number of Voting Machines Are Vulnerable to Hacking.

    Voting Machines - An Alarming Number of Voting Machines Are Vulnerable to Hacking.

    4