TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion Systems, the owner of Sequoia and Premier, has a customer portal called dominion.dominionvoting/portal. This portal can be easily accessed and manipulated, allowing customers to view and modify data, including election results. It doesn't require a nation state's level of sophistication to manipulate these sites or gain unauthorized access. Even with limited resources, someone could potentially manipulate the election using these systems.

Video Saved From X

reSee.it Video Transcript AI Summary
A senate report revealed that voting machines are aging and vulnerable to exploitation. A hacker demonstrated how easy it is to gain full admin access to a model used in 18 states. Professor Ed Felton documented how unattended voting machines can be manipulated by anyone. Additionally, some machines that claim not to be connected to the internet actually are, while others use cards programmed on internet-connected computers. In summary, all voting machines can be tampered with in some way. As an axe murderer once said, "pretty much everything is hackable."

Video Saved From X

reSee.it Video Transcript AI Summary
A Microsoft certified security expert provided evidence of a Dominion vote counting machine in a swing state with a wireless card connected to a thermostat's wireless network. The IP address traced back to a city in China, linked to a Chinese corporation involved in questionable dealings with American politicians. There is a thick binder of documented evidence showing foreign access and interference in the election, including public statements from the FBI and DHS warning about Iran's involvement. The evidence is undeniable, and those questioning it should argue with the FBI and DHS. The photographs and IPs provide conclusive proof of foreign interference in the voting systems.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities exist. Before elections, a supposed glitch prompts an emergency patch that opens backdoor access from a Serbian office, which is the true operational center of Dominion. This office, despite being presented as a U.S. company, has connections to Chinese nationals and operates on Huawei machines. Using virtual machines, they manipulate election results by creating a hidden environment within the county election equipment. After altering the data, they collapse the virtual machine, leaving no trace unless a forensic audit is conducted. This manipulation is facilitated through connections to China, raising concerns about the integrity of the election process. For more information, visit Stolen Elections Facts.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities exist. Just before elections, a "glitch" prompts an emergency patch that opens a backdoor for remote access from a Serbian office, which is the real operational center of Dominion, despite claims of being a US company. This office has Chinese nationals who manipulate election results using Huawei machines. They create virtual machines within the election equipment, allowing them to alter data undetected. Once the manipulation is complete, they collapse the virtual machine, leaving no trace unless a forensic audit is conducted. For more information, visit Stolen Elections Facts.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting machines in the U.S. are highly vulnerable to hacking, with researchers demonstrating that even those with limited skills can breach them quickly. Many machines are outdated, using unsupported software, and some states lack adequate paper trails for verification. Remote access software on machines increases risks, and several states have been hacked without detection. The use of cellular modems for transmitting results further exposes systems to cyber threats. Election management systems, often connected to the internet, can be compromised, allowing attackers to manipulate vote tallies. Despite assurances from vendors, the reality is that many machines can be hacked, raising serious concerns about election integrity in close contests. The lack of forensic evidence makes it difficult to confirm whether votes have been altered, leaving the electoral process at risk.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting systems are designed as closed systems without any Internet connectivity or external access. They are not meant to connect to the outside world in any way. Is there any remote access to the information on the equipment or within the machines? No, there is no remote access. Does anyone have access, to the best of your knowledge? No, no one has access.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speakers discuss the risks associated with modems in voting machines. They highlight concerns about hacking and the potential for cheating in future elections. ES&S, a voting machine manufacturer, claims that their modems are separated from the public internet by firewalls. However, last summer, ES&S voting systems were found online in some precincts across 11 states. Cellular modems are commonly used to transmit election results, but this introduces vulnerabilities. Intruders can intercept data between the cell tower and voting machines, allowing them to alter votes and software. Despite claims that voting machines are not connected to the internet, many new machines have wireless modems for faster result uploads, raising concerns about their security during elections.

Video Saved From X

reSee.it Video Transcript AI Summary
Systems are closed networks, not connected to the internet. Dominion denies remote access to machines. Claims of modems in Alaska voting machines contradict EAC certification. Allegations of fraud and perjury against Dominion CEO. Fox News settlement could be overturned if fraud is proven.

Video Saved From X

reSee.it Video Transcript AI Summary
Election machines are not connected to the Internet. Certification processes, beginning at the federal level, mandate that election systems operate in a closed, air-gapped system with no Internet connection.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities exist. Before elections, a supposed glitch prompts an emergency patch that opens a backdoor for remote access from a Serbian office, which is the true operational hub of Dominion. This office, staffed by Chinese nationals, manipulates election results using virtual machines created within the election equipment. The manipulation is done through software, leaving no trace unless a detailed forensic audit is conducted. This process involves using Huawei servers, linking back to China. For more information, visit Stolen Elections Facts for documentation.

Video Saved From X

reSee.it Video Transcript AI Summary
Modems in voting machines are vulnerable to hacking as they are network connections. ES and S claims that their modems are separated from the public internet by firewalls. However, once a hacker gains access through the modem, they can manipulate the voting machine software to cheat in future elections. Some jurisdictions use cellular modems or the internet to upload election results, introducing additional vulnerabilities. Voting machines with embedded modems transmit vote totals to the county elections office via cellular networks, which pass through routers and switches used for regular internet traffic. An intruder can intercept data between the cell tower and the voting machine, altering votes and software. Despite claims that voting machines are not connected to the internet, many have 4G wireless modems for faster result uploads, raising concerns about their security during elections.

Video Saved From X

reSee.it Video Transcript AI Summary
Cybersecurity experts discovered that voting machines, which are not meant to be connected to the internet, were found online. ES and S, the largest manufacturer of voting machines, revealed that some jurisdictions in Florida use modems to transmit unofficial results to the election office. However, concerns arise regarding the accuracy and security of these systems. Experts warn that hackers could manipulate the software in voting machines through the modems, potentially affecting future elections. Despite these findings, some of the systems remain online. It is widely agreed that modems in voting machines pose a significant vulnerability.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting machines in the US are vulnerable to hacking and manipulation, according to security researchers. These machines, which come in various models, have been found to have security vulnerabilities that allow attackers to inject malicious software and change election data. The most efficient way to hack the machines is through the machine used to program them, as it can pass rogue software to the voting machines. Contrary to popular belief, many voting machines are connected to the internet, either through wireless modems or other means, making them susceptible to cyber attacks. The lack of proper security measures and outdated systems make it only a matter of time before election results are compromised.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 notes that there were at least more than two of your direct employees and one indirect at the TCF center, up to nine, though no names are provided to avoid threats; they request clarification on each person’s responsibilities and roles during the process. Speaker 1 states backups were created by Tina Peters, Mesa County, Colorado county clerk. They are receiving information across the country that Dominion reps were going in under the guise of trusted build maintenance and wiping records. Under one dash 12 dash 69, those records by law have to be preserved. They caution not to blame staff, explaining a knee-jerk reaction by Dominion in Michigan to convince clerk staff they must have done something wrong. When discussing county liability, they emphasize listening to Mr. Lindbergh’s expert opinion. Speaker 0 asks about Ethernet access for adjudicators and tabulators in the TCF Center. Speaker 2 responds that the devices are not connected to the Internet; they are designed to be completely standalone and connected locally in a local area network separate from the Internet. Speaker 3 explains the vehicle for transmission from the ICP is a cellular modem, which can be configured in a VPN; Chicago and Cook County work with Verizon to secure that network, implying the same capabilities are available elsewhere. They note that multiple wireless chipsets/modems are supported, depending on jurisdiction preferences and network compatibility. Speaker 4 adds that some jurisdictions use a 3G modem (GSM) but can support multiple modem varieties, including latest 4G/5G standards. They confirm applicability across different networks (Verizon, AT&T, Sprint). They mention transmitting from the ICP in Mongolia, indicating no network limitations. In Puerto Rico, three vendors are used (Claro, AT&T, and T-Mobile) due to incomplete island coverage. Speaker 0 asks again about Ethernet setup to join the LAN. Speaker 5 paraphrases a claim that Dominion could fix the problem, implying Dominion can communicate with the device. Speaker 6 explains, by analogy to Apple remote support, that permission was given to take over the device to reprogram it from Adams Park to SSO 2 A and B at West Balding Drive Elementary. Speaker 7 shares observations from the TCF Center on the third and fourth, noting irregularities on election day. Randy Bishop, who owns radio stations and is IT-savvy, showed him high-speed scanners and tabulators with Ethernet lines running out of the tabulators, all bundled together and connected to routers and a main computer, which he says are connected to the Internet and that such connectivity is illegal and should not happen because it opens them to hacking. Speaker 2 reiterates that the computers in the local area network are connected via an RJ45 connector.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting systems are designed as closed systems without internet connectivity or external connections. Dominion does not have remote access to information or the machines themselves. No one has access to the machines to the best of the speaker's knowledge.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting systems are designed as closed systems without internet connectivity or external connections. Dominion does not have remote access to information or the machines themselves. No one has access to the machines to the best of the speaker's knowledge.

Video Saved From X

reSee.it Video Transcript AI Summary
Contrary to the current political narrative, the speaker emphasizes that voting machines are not connected to the Internet, making them secure. However, in 2018, there were instances of electronic voting machines in Georgia and Texas deleting or switching votes. The speaker mentions that even hackers with limited knowledge and resources were able to breach these machines easily. They also highlight concerns about remote access software making the machines vulnerable to fraudsters and hackers. The speaker clarifies that Dominion, the company in question, has no involvement in switched or deleted votes, and has no ties to communism or China. However, there are indications that some machines may be connected to the Internet, despite being designed as closed systems.

Video Saved From X

reSee.it Video Transcript AI Summary
Our technology teams discovered a concerning issue with connected devices at a polling location. Despite the devices not supposed to have Wi-Fi, they were found to be communicating in real time, both receiving and sending data. This should never happen, and we have documented the incident. We cannot disclose the location, but we have confirmed it in multiple places. There are three types of machines involved: a scanner, a ballot marking device, and a polling pad. The communication is happening through the polling pad, which is used for checking everything. This access could potentially allow someone to manipulate and modify the data being exchanged in the system.

Video Saved From X

reSee.it Video Transcript AI Summary
Contrary to the current political narrative, the speaker emphasizes that voting machines are not connected to the internet and the Department of Homeland Security claims the 2020 election was secure. However, in 2018, there were instances of electronic voting machines in Georgia and Texas deleting or switching votes. The speaker mentions that hackers were able to breach these machines easily, even with limited knowledge and resources. They also mention the concern of remote access software making the machines vulnerable to fraudsters and hackers. The speaker then addresses the controversy surrounding Dominion, stating that there were no switched or deleted votes involving their machines and that the company has no ties to communism or China. However, there are concerns that some machines may be connected to the internet despite being designed as closed systems.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting in America is conducted by private companies contracted by the county. However, there are no national security standards for these companies, making it easy to change votes without leaving a trace. Additionally, the votes from Texas and 28 other states are sent to a server in Frankfurt, Germany, owned by a multinational company based in Barcelona, Spain, which controls and reports the votes.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion voting machines are designed to be closed-networked, without internet or external connectivity. However, emails from Dominion employees show foreign nationals discussing accessing voting equipment. The U.S. Election Assistance Commission (EAC) certified Dominion voting machines, marking "no" to modem use for internet connection. An email from Dominion employees mentions retrofitting Alaska voting machines with dial-up modems. These modems contradict the CEO's sworn testimony and Dominion's statements to the EAC, potentially invalidating certifications and procurement processes funded by taxpayer dollars. This constitutes evidence of fraud, irrespective of whether Dominion cheated in the 2020 election. Dominion's alleged lies could allow Fox News to overturn its $787.5 million settlement and reclaim the funds.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities allow for manipulation. Just before elections, a supposed "glitch" prompts an emergency patch that opens a backdoor for remote access from a Serbian office, which is the true operational center of Dominion. This office, staffed by Chinese nationals, allows them to log into U.S. election machines and alter results. They use virtual machines to manipulate data without leaving traces. After the manipulation, they collapse the virtual server, making detection difficult unless a thorough forensic audit is conducted. This entire operation relies on Huawei equipment, linking back to China. For more information, visit Stolen Elections Facts.

Video Saved From X

reSee.it Video Transcript AI Summary
According to the testimony, Dominion equipment is generally not connected to the internet, but there is evidence of a connection in Gwinnett County, Georgia, during the 2020 election. Non-election personnel have remotely accessed a Dominion system. Dominion emails discuss remotely accessing Gwinnett County, Georgia. There is evidence of Dominion remotely accessing Georgia election equipment in one county, along with involvement in Colorado and Michigan. Dominion can remotely connect to election systems without detection, and this has occurred. The Denver, Colorado server granted access to Belgrade, with questions raised about why Belgrade, Montana, would need to connect to a Colorado file transfer server. Changes to the database server lack an engineering change order, which is important for change management and system integrity.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting machines have been proven to be vulnerable to tampering and hacking. Even with limited knowledge and resources, hackers can breach these machines in minutes. In 2018, electronic voting machines in Georgia and Texas deleted or switched votes. The biggest seller of voting machines violates cybersecurity principles by installing remote access software, making them attractive to fraudsters. Three companies control the majority of voting machines in different states, posing significant risks. Many states still use outdated and hackable machines. Researchers have found serious security flaws in 43% of voting machines used by American voters. Aging systems rely on unsupported software, making them more vulnerable to cyber attacks. A hack in just one swing state or a few counties could impact a close election.
View Full Interactive Feed