TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
At the Capitol, we witnessed the hacking of outdated election machines, which are used in many states. This raises concerns as only three companies control these machines, making them vulnerable to hacking. Researchers have discovered serious security flaws, including backdoors, in voting machines used by 43% of American voters. These companies refuse to answer questions about their cybersecurity practices, and the larger companies avoid answering any questions altogether. Additionally, five states lack a paper trail, making it impossible to verify the legitimacy of the voting machine results. This undermines the notion of cybersecurity in our elections.

Video Saved From X

reSee.it Video Transcript AI Summary
A Microsoft certified security expert provided evidence of a Dominion vote counting machine in a swing state with a wireless card connected to a thermostat's wireless network. The IP address traced back to a city in China, linked to a Chinese corporation involved in questionable dealings with American politicians. There is a thick binder of documented evidence showing foreign access and interference in the election, including public statements from the FBI and DHS warning about Iran's involvement. The evidence is undeniable, and those questioning it should argue with the FBI and DHS. The photographs and IPs provide conclusive proof of foreign interference in the voting systems.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims there is black and white evidence that the FBI interfered in the 2016 election and then sought to destroy the Trump administration after their candidate, Hillary Clinton, wasn't elected. They allege the CIA interfered in the 2020 election with the 51 former intel agents who dismissed the Hunter Biden laptop as Russian disinformation. The speaker asserts that US intelligence agencies and the Department of Justice interfered in past elections and will interfere in the 2024 election to protect themselves. They believe the Durham investigation and congressional investigations provide hard evidence of this interference. The speaker suggests individuals involved are terrified of a Republican president and attorney general investigating and charging them with crimes committed over the last eight years. They claim these individuals were aware of their wrongdoing and avoided putting anything in writing.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker states they are investigating dangerous and negative consequences with the "best of the best." They claim electronic voting systems have been vulnerable to hackers for a long time and open to exploitation, allowing manipulation of vote results. This vulnerability purportedly reinforces the need for paper ballots nationwide, so voters can have faith in election integrity.

Video Saved From X

reSee.it Video Transcript AI Summary
Speakers discuss the severity and novelty of threats to the United States’ political system, focusing on Russian interference and the digital domain. - All acknowledge that the country faced a cataclysmic disruption to its political system that is unlike prior experiences. Speaker 2 notes, as a Vietnam veteran, that fundamental institutions were jeopardized then but proved resilient, and expresses hope for a similar outcome now. - Speaker 1 emphasizes two points: (1) Vladimir Putin’s determination to shape political landscapes inside Russia and abroad, and (2) the consequential role of the digital domain, which allowed Russian intelligence to exploit and manipulate more effectively, culminating in the twenty sixteen election. - They note that Russian interference historically involved exploiting elections, but never with such aggression, directness, or multidimensional methods. The Internet and modern technology serve as a huge enabler for influencing opinion and undermining fundamental systems. - There is a discussion of whether this manipulation was unforeseen. Speaker 2 indicates it goes back to the Soviet era with attempts to influence elections, but the magnitude in twenty sixteen was unprecedented. The digital environment provides malefactors with more opportunities to attack and influence. - The panel explains active measures as fabricating or propagating stories (even patently false ones) to advance a narrative, color perceptions, and lend legitimacy to political actors. They note that the Russians focused on specific voter blocks in states like Wisconsin and Michigan, with estimates that 70,000–80,000 votes could have swung the election. - They discuss methods beyond information operations, including collecting information (e.g., DNC and DCCC email breaches) and money-related tactics: money laundering, disguising funding sources for political actions, and potential extortion or blackmail. They stress that collusion is a tool in the Russians’ kit and that they recruit or exploit individuals where openings exist. - Following the money is highlighted as essential across national security domains; FBI financial investigators and intelligence analysts play key roles, and there is confidence that Mueller and others will trace financial pathways to uncover motivations. - The distinction between cyber warfare and conventional warfare is acknowledged: there are no tanks or planes, but the cyber realm constitutes a war for democracy. A robust response is needed to strengthen the cyber environment, including proposals for a congressional independent commission to assess and strategize future protections, involving engineers, technologists, scientists, and private sector input. - They reflect on why the nation did not respond with the immediacy seen after physical attacks (e.g., 9/11). The lack of a physical rubble-like trigger makes cyber threats harder to mobilize a national response. Leadership issues are cited: when the White House diminishes the CIA, FBI, NSA, or intelligence and law enforcement, it undermines efforts to address the threat. - They recount briefings to the president-elect in January, noting high confidence levels in assessments that did not rely on the dossier; the bigger concern is a perceived indifference to the Russian threat and the denigration of security institutions. - They stress the importance of institutional integrity: the press, law enforcement, and intelligence are pillars of democracy, and denigration of these institutions undermines U.S. credibility abroad. They advocate for stronger checks and balances and reiterate their commitment to truthful reporting and protecting the country. - The speakers, experienced and apolitical, emphasize loyalty to the Constitution and the need for decisive leadership and sustained commitment to democratic institutions, despite political challenges. They conclude with a solemn commitment to safeguard the country and its democratic framework.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker states that interference or federal election crimes will be aggressively investigated, and they will work with partners to quickly take appropriate action. They are also coordinating with private sector technology and social media companies. The goal is to ensure these platforms aren't used by foreign adversaries to spread disinformation and propaganda.

Video Saved From X

reSee.it Video Transcript AI Summary
Mister Bowman emphasized the importance of this hearing, highlighting that the U.S. is under attack from adversaries like China, Russia, Iran, and North Korea. He stressed that these threats are real and affect everyday Americans, urging them to recognize the foreign influence on their votes. The adversaries aim to undermine U.S. democracy and manipulate public opinion to weaken American power and influence. It’s crucial for Americans to understand this manipulation and assert their right to decide their representation and policies. When asked about partisan influence in elections, it was noted that both parties have faced attacks, and a bipartisan approach is essential for effective solutions.

Video Saved From X

reSee.it Video Transcript AI Summary
Voters, not Vladimir Putin, should decide who the American president is. The Russians offered, the campaign accepted, and the president used Russian help. The dossier alleges collusion and assistance. Vladimir Putin doesn't want one of the speakers to be president. Russia, China, and Iran have been involved in the election. Seventeen intelligence agencies have confirmed this. Fifty security officials who served in Republican administrations have said that Donald is unfit to be the commander in chief. The smear on Joe Biden comes from the Kremlin. The president is unwilling to confront Putin, even when Russia puts bounties on the heads of American soldiers in Afghanistan. There are several factors that contributed to the low to moderate confidence in the judgment.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker alleges that it is “all election interference” and that they are “great at cheating on elections, and they're great at misinformation, disinformation” (described as similar, but not the same). The speaker further claims that “they're weaponizing the DOJ and the FBI, our election systems, and attacking free speech, and they're also going into the states.”

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker believes votes were manipulated electronically in favor of Joe Biden, citing TV reports of votes switching from Trump to Biden. In one instance, 12,000 votes shifted, and in another, 20,000. Trump's numbers decreased by the exact amount that Biden's increased. The speaker believes the Dominion Company represents foreign interference because it is a Canadian company storing records in Germany and Spain. The speaker claims the CIA was involved, using servers in Germany for political operations. These servers were seized by US forces with German help and are now in the hands of the FBI. The speaker notes that in Europe, the CIA operates under the jurisdiction of the military.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript presents a broad, multi-voiced warning about the vulnerability of U.S. voting systems and the ease with which they can be hacked, hacked-stopping demonstrations, and the security gaps that remain even as elections continue. Key points and claims: - Virginia stopped using touch screen voting because it is “so vulnerable,” and multiple speakers argue that all voting machines must be examined to prevent hacking and attacks. Speaker 0, Speaker 1, and others emphasize systemic vulnerability across states. - Researchers have repeatedly demonstrated that ballot recording machines and other voting systems are susceptible to tampering, with examples that even hackers with limited knowledge can breach machines in minutes (Speaker 2, Speaker 3). - In 2018, electronic voting machines in Georgia and Texas allegedly deleted votes for certain candidates or switched votes from one candidate to another (Speaker 4). - The largest voting machine vendors are accused of cybersecurity violations, including directing that remote access software be installed, which would make machines attractive to fraudsters and hackers (Speaker 5). - Across the country, voting machines are described as easily hackable, with contention that three companies control many systems and that individual machines pose significant risk (Speaker 2, Speaker 6). - Many states use antiquated machines vulnerable to hacking, with demonstrations showing how easily workers could hack electronic voting machines (Speakers 7, 2). - A substantial portion of American voters use machines researchers say have serious security flaws, including backdoors (Speaker 5). Some states reportedly have no paper trail or only partial paper records (Speaker 5, various). - Aging systems are noted as failing due to use of unsupported software such as Windows XP/2000, increasing vulnerability to cyber attacks (Speaker 9). An observed concern is that 40 states use machines at least a decade old (Speaker 9). - Specific past intrusions are cited: Illinois and Arizona in 2016 had election websites hacked, with malware installed and sensitive voter information downloaded (Speaker 4). - There is debate about whether votes were changed in the 2016 election; one speaker notes that experts say you cannot claim—without forensic analysis—that votes were not changed (Speaker 17, 18). - The existence of paper records is contested: some jurisdictions lack verifiable paper trails, undermining the ability to prove results are legitimate (Speaker 5, 9). - Some devices rely on cellular modems to transmit results after elections, creating additional avenues for interception and manipulation; vendors acknowledge modems but vary in how they frame Internet connectivity (Speakers 10, 11, 13, 14, 17, 18, 19, 20, 21). The debate covers whether cellular transmissions truly isolate from the Internet or provide a backdoor, with demonstrations showing that modems can be connected to Internet networks and could be exploited. - The “programming” phase of elections—where memory cards are prepared with candidates and contests—can be a vector for spread of rogue software if an attacker compromises the election management system (Speaker 11, Speaker 10). - A scenario is outlined in which an attacker identifies weak swing states, probes them, hacks the election management system or outside vendors, spreads malicious code to machines, and alters a portion of votes; the assumption is that many jurisdictions will not rigorously use paper records to verify computer results (Speaker 10). - A Virginia governor’s anecdote is shared: after a hack demonstrated off-site by experts, all machines were decertified and replaced with paper ballots (Speaker 16). Overall impression: the discussion paints a picture of pervasive vulnerability, aging and diverse systems, reliance on modems and networked components, potential for targeted manipulation in close elections, and the need for upgrades and robust forensic capabilities, while noting contested claims about the extent of past interference.

Video Saved From X

reSee.it Video Transcript AI Summary
"This is absolute proof of what we knew all along and what the president has denied, namely that we were attacked." "This is a very serious attack against The United States by a hostile foreign power, an attack against our election process, our our entire governing process." "That it we know that the attack is continuing and that our intelligence agencies tell us that it's going to certainly continue through the next election." "the president and the republicans in in the house for that matter refuse refuse to do anything about, protecting us from an attack." "Imagine if FDR, had denied that the Japanese attacked us at Pearl Harbor and and didn't react." "That's the equivalent." "They didn't kill anyone, but they're destroying our our country."

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 argues that sowing seeds of doubt about the legitimacy of our elections undermines democracy, calls it dangerous, and says it is work that benefits adversaries because democracy depends on people knowing that their vote matters and that those who occupy power were chosen by the people. Speaker 1 states that every intelligence agency in the federal government arrived at a consensus that the Russians hacked the DNC, and that the information released was the consequence of a decision by Russian intelligence and Russian officials at the highest levels; the CIA assesses that it was done purposefully to tilt the election toward a particular candidate, which is not a surprise, and this was helping the Trump campaign and hurting the Hillary campaign.

Video Saved From X

reSee.it Video Transcript AI Summary
Voters in America should decide the president, not Vladimir Putin. The Russians offered, the campaign accepted, and the president used their help. The allegation is that they colluded. Putin doesn't want me to be president. Russia, China, and Iran have been involved in this election. 17 intelligence agencies confirmed it. Fifty former national security officials said Trump is unfit to be commander in chief. The smear on Joe Biden comes from the Kremlin. Trump is unwilling to confront Putin, who put bounties on American soldiers in Afghanistan. The confidence in this judgment is low to moderate due to various factors.

Video Saved From X

reSee.it Video Transcript AI Summary
The discussion centers on allegations of foreign and domestic interference in the 2020 U.S. election and related vulnerabilities in mail-in voting. - A 2020 FBI intelligence memo warned that China might have been sending fake driver’s licenses into the U.S. to create fake mail-in ballots intended to help Joe Biden win. The memo, reportedly corroborated by licenses intercepted by U.S. Customs and Border Protection in Chicago, was allegedly dismissed and not investigated because it would reflect badly on Trump. There are claims that intelligence reports were requested to be destroyed under federal records rules to prevent leaks before the election, as the memo allegedly indicated China preferred Joe Biden over Donald Trump. - A 60 Minutes segment quoted the head of Homeland Security’s cyber security division stating there were no foreign intrusions in the 2020 election, which is asserted as false by the speakers, citing later indictments of Iranians in Manhattan in 2021 for interfering in the election by hacking a state database to obtain voter IDs used in a malinformation operation. - In Colorado, it is claimed that 670 Dominion passwords from 63 out of 64 counties were exposed on the secretary of state’s public website since June, and that these passwords were known to Secretary of State Jenna Griswold during a trial but not disclosed to clerks. There are accusations that this could imply compromised elections, referencing fraudulent activity in Mesa County and asserting that passwords beyond Colorado were involved with Dominion machines. Dominion’s Colorado base is noted, with a claim that Dominion also has ties to Serbia. A video referenced by Gary Brunson is suggested to support these claims about the origins of the electoral manipulation. - A video and related claims allege a connection to a 30-year CIA whistleblower and trace the origins of the alleged election manipulation to Venezuela and Hugo Chávez, tying in references to Patrick Byrne and broader alleged corruption. - The speakers assert there was a second country deeply involved in meddling in the election, with FBI involvement in August 2020 in recognizing a Chinese operation to mass-produce fake U.S. driver’s licenses and mail-in ballots to influence the election in favor of Biden, describing the operation as designed to help Biden beat Trump. Customs and Border Protection reportedly intercepted 20,000 fake driver’s licenses, corroborating the intelligence, while the Biden administration and the Chris Wray-led FBI allegedly covered this up for five years until the document was provided to Chuck Grassley by Kash Patel. - It is claimed that China viewed mail-in ballots as an enormous vulnerability during the COVID-19 pandemic, exploiting the weakness in the system, and that this concern remains for states lacking strong mail-in voting security. - Additional notes include a claim that there were tightened voting laws in several states post-2020, with increased confidence in the system where tightened; an arrest by HSI Miami and partners of a permanent resident Haitian national for unlawful voting and casting a false ballot; and estimates that 130,000 to 280,000 completed ballots were shipped from Bethpage, New York to Lancaster, Pennsylvania, with the trailer disappearing. - The final claim references tens of thousands of fake voters having illegally cast ballots in the November election, implying broad down-ballot effects across Senate, Congress, and local elections.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 says that over the last several weeks they declassified and released documents exposing that President Obama and leaders in the intelligence community knowingly manufactured a false intelligence document after the 2016 election. The document alleged that Russia aspired to help President Trump win the election with the aim of undermining his presidency and usurping the will and the voices of the American people who sent Trump to the White House.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker asserts that Russia interfered in the 2016 election with purpose, sophistication, and overwhelming technical efforts via an active measures campaign driven from the top of the Russian government. This is a high confidence judgment of the entire intelligence community. The speaker confirms that entities beyond the DNC and DCCC were targeted, including government, non-governmental, and near-governmental agencies like nonprofits. The speaker estimates that the Russians specifically targeted hundreds, possibly over a thousand, entities.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker states that the best investigators are pursuing election integrity. They claim there is evidence that electronic voting systems have been vulnerable to hackers for a long time and can be exploited to manipulate vote results. This vulnerability allegedly drives the mandate to implement paper ballots across the country, so voters can have faith in election integrity.

Video Saved From X

reSee.it Video Transcript AI Summary
We at Governance and Nations in Action have conducted extensive research on election integrity. Recent events have revealed orchestrated election theft in America, involving individuals uploading software to manipulate results. This information has been documented in an affidavit presented in a federal court in Italy. Foreign interference in the election has been confirmed, and those involved must face prosecution. Italy did it, and the truth is coming to light.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses foreign interference in elections and questions why the president is not pursuing this avenue. They mention evidence of votes being sent overseas and foreign actors meddling in elections. The speaker then explains how voter rolls are kept in foreign nations, such as Pakistan, and how fake ballots are attributed to registered voters who have not yet voted. They reveal that 171,000 blank fake ballots were dropped into the system and attributed to different people, ultimately benefiting the Democratic candidates. The speaker concludes by stating that there are other aspects of foreign involvement in elections.

Video Saved From X

reSee.it Video Transcript AI Summary
The video discusses evidence of foreign interference in the election, showing how votes were manipulated and which computers were involved. The speakers highlight the importance of cybersecurity experts uncovering the attacks in real-time, preventing potential election manipulation. They express gratitude for the proof of interference and emphasize the significance of having this information. The speakers marvel at the detailed documentation and consider it a miracle to have such insight into the attacks.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the public is being deceived about election security. They argue that while individual voting machines may not be connected to the internet, state and county databases are. They allege that votes are stored on a server in Frankfurt, Germany, and that the election software used in 28 states may be infected with malware called Q Snatch. Cybersecurity investigators suggest that this malware could allow hackers to manipulate votes in election databases nationwide. The cofounder of Allied Security Operations supports these claims, stating that the malware collects credentials and enables changes to be made to votes at various stages of the election process. The speaker suggests that this could explain the malicious activities observed during the election.

Video Saved From X

reSee.it Video Transcript AI Summary
50 former national intelligence officials, including the heads of the CIA from both parties, have dismissed the accusations against me as a Russian plot. They argue that the cyber attacks targeting our elections originate from the highest levels of the Kremlin. This is deeply concerning. Despite this, there are those who fail to comprehend this reality, whether it's Russia, China, or any other country. I have faith in the 17 intelligence agencies of our nation, and I trust the military and civilian intelligence professionals who are dedicated to our protection.

Video Saved From X

reSee.it Video Transcript AI Summary
Google, Facebook, and others were caught cheating in the last election, referencing "51 agents" and the laptop. It was claimed that they affected the election by many points. The speaker stated that anyone caught cheating in the election will be pursued more aggressively than ever before because they are a threat. Democrats are described as the real threat to democracy.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker states that the "best of the best" are investigating election integrity. They claim there is evidence that electronic voting systems have been vulnerable to hackers and exploitation, allowing for the manipulation of vote results. This allegedly supports the mandate to implement paper ballots nationwide, with the goal of restoring voters' faith in election integrity.
View Full Interactive Feed