TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
There are concerns about the security of electronic voting machines, as they can potentially be hacked without detection. While there is no evidence of this happening, it cannot be proven that it hasn't or won't happen in the future. Instances of machine errors have been reported, such as recording extra votes for a candidate or subtracting votes instead of adding them. It is unknown how many instances went unnoticed and what impact they had on elections. Legislation is being proposed to require a paper trail for every electronic machine, similar to ATM receipts, to ensure transparency and allow for verification. An investigation is also being requested to assess the effectiveness of voting machines and improve election systems.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker discusses the importance of securing election systems. They highlight the risk of connecting these systems to the internet, as it can make them vulnerable to hacking. The speaker suggests that using paper ballots might be a smarter option, as they cannot be hacked like computer systems. By having something tangible to hold on to, like a piece of paper, we can ensure the integrity of the election process.

Video Saved From X

reSee.it Video Transcript AI Summary
At the Capitol, we witnessed the hacking of outdated election machines, which are used in many states. This raises concerns as only three companies control these machines, making them vulnerable to hacking. Researchers have discovered serious security flaws, including backdoors, in voting machines used by 43% of American voters. These companies refuse to answer questions about their cybersecurity practices, and the larger companies avoid answering any questions altogether. Additionally, five states lack a paper trail, making it impossible to verify the legitimacy of the voting machine results. This undermines the notion of cybersecurity in our elections.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker states they are investigating dangerous and negative consequences with the "best of the best." They claim electronic voting systems have been vulnerable to hackers for a long time and open to exploitation, allowing manipulation of vote results. This vulnerability purportedly reinforces the need for paper ballots nationwide, so voters can have faith in election integrity.

Video Saved From X

reSee.it Video Transcript AI Summary
Jen Easterly, director of the US Cybersecurity and Infrastructure Security Agency, asserts that foreign adversaries cannot change US election results. While it's difficult to claim anything is impossible, the built-in checks and balances make it highly unlikely. The resilience of the voting system, including oversight from both parties and the use of paper ballots for audits, enhances integrity. Despite concerns about misinformation, the US election infrastructure is robust and secure. Voting machines are not connected to the Internet, and state and local officials continuously work to improve security. The dedication of these officials ensures that the election process remains fair, accurate, and trustworthy, deserving our gratitude for their ongoing efforts.

Video Saved From X

reSee.it Video Transcript AI Summary
We demonstrated how easily election machines can be hacked, raising concerns about the limited number of companies controlling voting technology. 43% of American voters use machines with security flaws, and some states lack a paper trail to verify results. The lack of transparency in cybersecurity practices is alarming.

Video Saved From X

reSee.it Video Transcript AI Summary
A bill exists that would require states to upgrade their elections infrastructure. The best and most secure way to conduct voting is with paper ballots. Russia can't hack a piece of paper. It would be beneficial if the Republican leader would put these bills on the floor for a vote.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker, a computer science professor, warns that the electronic voting systems used in the US are vulnerable to sabotage and cyber attacks that can change votes. Through their research, they have repeatedly hacked voting machines and found ways for attackers to manipulate them. They emphasize that these vulnerabilities are within reach for America's enemies. While some states have secure voting technology, others are alarmingly vulnerable, putting the entire nation at risk. The speaker debunks the belief that voting machines are secure because they are not connected to the internet, explaining that many machines have wireless modems for faster result uploading. They conclude that it is only a matter of time before these vulnerabilities are exploited.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses cybersecurity concerns in the election system, alleging that votes are stored on servers in Germany and could be manipulated by hackers. They point to suspicious vote count changes in swing states and highlight vulnerabilities in the software that could allow for vote manipulation. The speaker questions the transparency of the election process and calls for investigations into potential fraud. In Georgia, a hand recount of all ballots was announced following demands from the Trump campaign.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker advocates for a return to paper ballots, stating Russia cannot hack them. The speaker contrasts this with Kamala Harris.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker discusses the importance of securing election systems. They highlight the risk of connecting these systems to the internet, as it can make them vulnerable to hacking. The speaker suggests that using paper ballots might be a smarter option, as they cannot be hacked like computer systems. By having something tangible to hold on to, like a piece of paper, it becomes more difficult for entities like Russia to interfere with the election process.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript presents a broad, multi-voiced warning about the vulnerability of U.S. voting systems and the ease with which they can be hacked, hacked-stopping demonstrations, and the security gaps that remain even as elections continue. Key points and claims: - Virginia stopped using touch screen voting because it is “so vulnerable,” and multiple speakers argue that all voting machines must be examined to prevent hacking and attacks. Speaker 0, Speaker 1, and others emphasize systemic vulnerability across states. - Researchers have repeatedly demonstrated that ballot recording machines and other voting systems are susceptible to tampering, with examples that even hackers with limited knowledge can breach machines in minutes (Speaker 2, Speaker 3). - In 2018, electronic voting machines in Georgia and Texas allegedly deleted votes for certain candidates or switched votes from one candidate to another (Speaker 4). - The largest voting machine vendors are accused of cybersecurity violations, including directing that remote access software be installed, which would make machines attractive to fraudsters and hackers (Speaker 5). - Across the country, voting machines are described as easily hackable, with contention that three companies control many systems and that individual machines pose significant risk (Speaker 2, Speaker 6). - Many states use antiquated machines vulnerable to hacking, with demonstrations showing how easily workers could hack electronic voting machines (Speakers 7, 2). - A substantial portion of American voters use machines researchers say have serious security flaws, including backdoors (Speaker 5). Some states reportedly have no paper trail or only partial paper records (Speaker 5, various). - Aging systems are noted as failing due to use of unsupported software such as Windows XP/2000, increasing vulnerability to cyber attacks (Speaker 9). An observed concern is that 40 states use machines at least a decade old (Speaker 9). - Specific past intrusions are cited: Illinois and Arizona in 2016 had election websites hacked, with malware installed and sensitive voter information downloaded (Speaker 4). - There is debate about whether votes were changed in the 2016 election; one speaker notes that experts say you cannot claim—without forensic analysis—that votes were not changed (Speaker 17, 18). - The existence of paper records is contested: some jurisdictions lack verifiable paper trails, undermining the ability to prove results are legitimate (Speaker 5, 9). - Some devices rely on cellular modems to transmit results after elections, creating additional avenues for interception and manipulation; vendors acknowledge modems but vary in how they frame Internet connectivity (Speakers 10, 11, 13, 14, 17, 18, 19, 20, 21). The debate covers whether cellular transmissions truly isolate from the Internet or provide a backdoor, with demonstrations showing that modems can be connected to Internet networks and could be exploited. - The “programming” phase of elections—where memory cards are prepared with candidates and contests—can be a vector for spread of rogue software if an attacker compromises the election management system (Speaker 11, Speaker 10). - A scenario is outlined in which an attacker identifies weak swing states, probes them, hacks the election management system or outside vendors, spreads malicious code to machines, and alters a portion of votes; the assumption is that many jurisdictions will not rigorously use paper records to verify computer results (Speaker 10). - A Virginia governor’s anecdote is shared: after a hack demonstrated off-site by experts, all machines were decertified and replaced with paper ballots (Speaker 16). Overall impression: the discussion paints a picture of pervasive vulnerability, aging and diverse systems, reliance on modems and networked components, potential for targeted manipulation in close elections, and the need for upgrades and robust forensic capabilities, while noting contested claims about the extent of past interference.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker demonstrated how they were able to boot up the Electionware system on a non-conforming laptop, highlighting violations of security protocols. They revealed that default passwords for election machines are easily accessible online, posing a significant security risk. The speaker emphasized the urgent need for updating security measures and changing passwords to enhance election security. They also pointed out the lack of antivirus protection on crucial election machines, putting counties at risk. The speaker concluded by stressing the importance of immediate action to address these vulnerabilities.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker believes some amount of cheating takes place in elections, particularly with mail-in ballots and lack of proof of citizenship, making it hard to prove. Statistically unlikely events occurred, such as the use of Dominion Voting Machines in specific locations like Philadelphia and Maricopa County. The speaker advocates for paper ballots, hand-counted, citing the ease of hacking computer programs. They also support in-person voting with voter ID, which they claim is standard in almost every country with democratic elections. To effectively address fraud, the speaker suggests in-person voting with ID. Given the current situation, they believe a very large margin of victory is needed to overcome potential cheating.

Video Saved From X

reSee.it Video Transcript AI Summary
Cybersecurity experts agree that electronic voting machines are dangerous and obsolete. These machines can be easily hacked, as demonstrated by a computer scientist who has hacked multiple machines and even turned one into a video game console. The vulnerability of these machines puts our election infrastructure at risk of sabotage and cyberattacks. In the 2016 election, millions of Americans voted on paperless electronic machines. The speaker reveals a step-by-step process for hacking these machines and stealing votes. The solution proposed is to use paper ballots, which can be quickly scanned and verified by humans. It is emphasized that all elections should be run with paper ballots and audits. The importance of having a paper backup system is highlighted. The concise transcript emphasizes the need to replace electronic voting machines with paper ballots for secure and reliable elections.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting machines in the US are vulnerable to hacking and manipulation, according to researchers. These machines, which come in various models, have been found to have security vulnerabilities that allow attackers to inject malicious software and change election data. The machines can be hacked through the machine used to program them, and many of them have wireless modems that can connect to the internet, despite claims that they are not connected. The vulnerabilities in the voting machines, along with the lack of secure systems for voter registration and result reporting, pose a significant risk to the integrity of elections. It is crucial to address these vulnerabilities to ensure the trustworthiness of election results.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the potential vulnerabilities of electronic voting machines. They mention instances where machines recorded extra votes for a candidate or subtracted votes instead of adding them. These issues were caught and corrected, but it raises concerns about undetected instances and their impact on elections. The speaker emphasizes the need for a paper trail to ensure transparency and accountability. They mention legislation proposed by Rush Holt and Hillary Clinton that calls for electronic machines to provide a printed receipt for voters to verify their choices. They also highlight a case where 4,500 votes were lost due to a machine malfunction. The speaker requests an investigation by the Government Accountability Office to assess the effectiveness of voting machines.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting machines in the US are vulnerable to hacking and manipulation, according to security researchers. These machines, which come in various models, have been found to have security vulnerabilities that allow attackers to inject malicious software and change election data. The most efficient way to hack the machines is through the machine used to program them, as it can pass rogue software to the voting machines. Contrary to popular belief, many voting machines are connected to the internet, either through wireless modems or other means, making them susceptible to cyber attacks. The lack of proper security measures and outdated systems make it only a matter of time before election results are compromised.

Video Saved From X

reSee.it Video Transcript AI Summary
As a computer scientist specializing in election system security, I want to highlight the vulnerabilities in computerized voting equipment used in polling places. These systems can be easily compromised, allowing corrupt candidates or foreign adversaries to disrupt elections and potentially alter vote tallies without detection. The poor design and implementation by equipment vendors contribute to these vulnerabilities. Additionally, voter registration databases and systems reporting final results are attractive targets for disruption, with even fewer standards for securing them. It is unrealistic to expect county election IT managers to defend against cyber attacks by foreign intelligence services. We need to address these issues to ensure the integrity of our elections.

Video Saved From X

reSee.it Video Transcript AI Summary
Contrary to the current political narrative, the speaker emphasizes that voting machines are not connected to the Internet, making them secure. However, in 2018, there were instances of electronic voting machines in Georgia and Texas deleting or switching votes. The speaker mentions that even hackers with limited knowledge and resources were able to breach these machines easily. They also highlight concerns about remote access software making the machines vulnerable to fraudsters and hackers. The speaker clarifies that Dominion, the company in question, has no involvement in switched or deleted votes, and has no ties to communism or China. However, there are indications that some machines may be connected to the Internet, despite being designed as closed systems.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the public is being deceived about election security. They argue that while individual voting machines may not be connected to the internet, state and county databases are. They allege that votes are stored on a server in Frankfurt, Germany, and that the election software used in 28 states may be infected with malware called Q Snatch. Cybersecurity investigators suggest that this malware could allow hackers to manipulate votes in election databases nationwide. The cofounder of Allied Security Operations supports these claims, stating that the malware collects credentials and enables changes to be made to votes at various stages of the election process. The speaker suggests that this could explain the malicious activities observed during the election.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the importance of paper documents, such as the Declaration of Independence and voting ballots. They explain how voting machines can be manipulated, using the example of a dollar bill being rejected by a vending machine. They question why mail-in ballots in heavily Democratic areas are consistently accurate, while those in Republican areas are frequently out of calibration. The speaker suggests that human intervention allows for interpretation of voter intent, which they believe is unacceptable.

Video Saved From X

reSee.it Video Transcript AI Summary
Contrary to the current political narrative, the speaker emphasizes that voting machines are not connected to the internet and the Department of Homeland Security claims the 2020 election was secure. However, in 2018, there were instances of electronic voting machines in Georgia and Texas deleting or switching votes. The speaker mentions that hackers were able to breach these machines easily, even with limited knowledge and resources. They also mention the concern of remote access software making the machines vulnerable to fraudsters and hackers. The speaker then addresses the controversy surrounding Dominion, stating that there were no switched or deleted votes involving their machines and that the company has no ties to communism or China. However, there are concerns that some machines may be connected to the internet despite being designed as closed systems.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker states that the "best of the best" are investigating election integrity. They claim there is evidence that electronic voting systems have been vulnerable to hackers and exploitation, allowing for the manipulation of vote results. This allegedly supports the mandate to implement paper ballots nationwide, with the goal of restoring voters' faith in election integrity.

PBD Podcast

“Never Trust, Always Verify” - Harri Hursti Hacks a Voting Machine LIVE on PBD Podcast!
Guests: Harri Hursti
reSee.it Podcast Summary
Concerns about the integrity of voting systems are prevalent, with many questioning whether their votes truly count and if the machines can be manipulated. Harri Hursti, a hacker and security researcher, emphasizes that every independent study has shown that voting machines can be hacked, and he advocates for a "zero trust" approach—never trust, always verify. He argues that the vulnerabilities in voting machines are not merely technological issues but also regulatory and legal problems that require political will to address. With elections approaching, Hursti discusses his extensive experience with voting machines, including his participation in an HBO documentary where he demonstrated their vulnerabilities. He highlights that the lack of mandatory security standards has led to persistent issues, and he believes that transparency is essential for restoring public trust in the electoral process. Hursti asserts that while he has confidence in the U.S. election system, improvements are necessary, particularly the transition to hand-marked paper ballots, which allow for verification through audits. During the conversation, Hursti demonstrates a hack on a voting machine, showcasing how easily it can be manipulated. He notes that once access is gained, hackers can change results without detection, underscoring the need for robust security measures. He expresses concern over the dismantling of security protocols in some jurisdictions, which could undermine election integrity. Hursti also addresses the implications of foreign interference, stating that adversaries like Russia and China are continuously probing U.S. systems. He emphasizes that while vulnerabilities exist, the focus should be on improving security and ensuring that election processes are transparent and verifiable. The discussion touches on the complexities of U.S. elections, the need for independent audits, and the importance of public participation in the electoral process. In conclusion, Hursti advocates for a comprehensive approach to election security that includes hand-marked paper ballots, risk-limiting audits, and a commitment to transparency to rebuild trust in the electoral system.
View Full Interactive Feed