
DuPage Freedom Federation
608 posts




Col. Phil Waldron states that an email was verified confirming that Nevada's Secretary of State's office emailed the entire 2020 election voter database and voter rolls to a Pakistan ISI-linked tech firm named Kavtech. The reply email was carbon-copied to waqas@kavtech.net (mailto:waqas@kavtech.net), Waqas Butt, CEO/co-founder of Kavtech Solutions Ltd., Lahore, Pakistan. Kavtech is a private business intelligence firm with documented close ties to Pakistan’s ISI (Inter-Services Intelligence), military, and interior ministry. Evidence of a breach/compromise in the Nevada SOS email system allowing unauthorized foreign access to sensitive U.S. voter data. This is an enormous national security matter and completely compromises U.S. elections.





More fraudulent elections. Let’s predict it… it will flip and end at 50.09 yes



This is our sting operation in Delaware County, PA. I was a contributor to Project Veritas after I reached out to them directly. I was working directly with Spencer Meads. This operation was developed by Gregory Stenstrom, Leah Hoopes and we brought in the whistleblower directing her at every point. FORMAL POSITION STATEMENT The issue is being deliberately mischaracterized. This is not about recognition, ego, or attribution in the colloquial sense. This is about evidentiary integrity and credibility of source material. Where individuals with first-hand knowledge and direct involvement in the development of evidence are omitted, misidentified, or dismissed, the consequences are not superficial they are fatal to the reliability of the record. 1. Authorship establishes foundation. Evidence does not exist in a vacuum. It must be tied to a competent witness or originating party who can authenticate its creation, methodology, and accuracy. 2. Misattribution undermines admissibility. When third parties republish, summarize, or distort investigative findings without proper identification of the original source, they sever the evidentiary chain. That is not a social slight—it is a legal defect. 3. This is not “credit”—it is chain of custody. Labeling originators as “seeking attention” is a deliberate tactic used to avoid engaging with the substance of the evidence. It reframes a structural legal requirement as a personality flaw. That argument is frivolous and should be rejected outright. 4. Anger is not disqualifying—it is contextual. When individuals invest substantial time, resources, and risk exposure to develop evidence of serious wrongdoing, objection to its misuse or misrepresentation is not “jealousy.” It is a rational response to the degradation of the evidentiary record. 5. Unauthorized use creates liability. Any party leveraging investigative work while stripping attribution or altering context assumes risk, including: Misrepresentation of facts Inability to authenticate evidence Exposure in any proceeding where foundation is challenged. CONCLUSION The position is simple: If you intend to use the work, you identify the source. If you cannot identify the source, you cannot validate the evidence. If you cannot validate the evidence, it collapses. Attempts to reduce this to personality attacks or accusations of ego are not only irrelevant—they are indicative of a lack of substantive rebuttal. If you strip out the people who developed it, you destroy the chain of custody and the ability to prove it. Labeling that concern as “jealousy” is a deflection tactic used by people who don’t want to deal with the facts. You don’t get to use the work and erase the source. I have been blocked by Patrick Byrne—an individual who has used evidence developed through our work, obtained through our former attorney Stefanie Lambert, and then leveraged that material to raise money. That is not advocacy. That is exploitation. Stop reframing this as an issue of “credit.” That characterization is false and it is being used to dismiss a far more serious problem. This conduct: Misappropriates investigative work developed through substantial time, risk, and resources Breaks the chain of custody of critical evidence Distorts underlying facts, including timelines, participants, and third-party involvement Places the original investigators at risk while removing their ability to authenticate the record Those are not minor issues. Those are defects that can destroy the evidentiary value of the work entirely. And yet, the public is being told this is acceptable—as long as the information “gets out.” No. That standard is reckless. Evidence that cannot be properly sourced, verified, and authenticated is compromised. Once compromised, it is vulnerable to attack, dismissal, and exclusion. That does not advance any cause—it undermines it. Being told to “eat crow for the sake of the movement” is not strategy. It is complicity in misconduct. My standard is not negotiable: If you use the work, you identify the source. If you alter the facts, you disclose it. If you raise money on the back of that work, you answer for it. Anything less is dishonest and corrosive to the integrity of the record. If anyone believes this conduct is defensible, then take the position publicly. I am inviting an open, public discussion on the record.


Delaware County, PA election officials CAUGHT on secret video SHREDDING 2020 ELECTION EVIDENCE & plotting a cover-up, with 327K alleged fraudulent votes. - Ripping up voting machine proof/result tapes and tossing them in the trash. - Destroying mail-in ballot envelopes, scanners, hard drives, and other chain-of-custody items required by law. - Planning to fabricate missing certified return sheets, USB V-drives and other records using blank drives to respond to Right-to-Know requests. - Unreconciled votes across dozens of precincts, with claims this hid massive irregularities, lawsuit alleged 327k fraudulent votes in the county. - Explicitly saying “It’s a felony” while discussing getting rid of ballot pads and second scanners — then continuing anyway and shushing talk in front of other staff. - Joking about making a "campfire" to burn the shredded election materials so no one can recover them.
















