TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
On February 11, 462 log entries were overwritten by a script, followed by 37,680 entries on March 3, and 330 entries on March 12, the day before the system was received. The EMS admin account was responsible for these actions. During an audit, having full context of the election is crucial, yet that was not the case here. Specifically, within the Dominion software used for results tallying and reporting, someone executed a command to purge all election results, successfully deleting all records and files from the NAS directory, which contained essential election data, just before the audit began.

Video Saved From X

reSee.it Video Transcript AI Summary
At some point, there is a correlation between the purging of the database and the date of the audit. They both happen almost at the same time, the day before the audit. This connection requires an explanation.

Video Saved From X

reSee.it Video Transcript AI Summary
County technical employees reported independently that the vote counts recorded by machines and stored on USB drives changed overnight after polls closed. Votes seemed to appear and disappear during this time. When we sought to verify the integrity of these voting machines, we were only permitted a superficial visual inspection of the USB drives and denied a forensic examination.

Video Saved From X

reSee.it Video Transcript AI Summary
On February 11th, a script overwrote 462 log entries. On March 3rd, the same script overwrote 37,686 log entries. On March 12th, the day before the system was received, 330 log entries were overwritten by the script. The EMS admin account performed these actions. A log file from the Dominion software for results tallying and reporting shows that someone purged all the results for the election. The action completed successfully, deleting all the files on the NAS directory, including results and images from the election. According to the transcript, an individual ran a program to clear all records in the system used to generate the official results the day before an audit started.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses the issue of Windows security logs being purged right before two audits were set to begin. They highlight the difficulty in determining who had access to the RTR admin account, which is shared among all accounts. The speaker questions why someone would delete all the results and records from the Dominion software, which is used for tallying and reporting election results, just before an audit. They mention that the deletion was successful and affected files on the NAS directory where election images and details were stored. Overall, the speaker emphasizes the lack of accountability and the need to understand the motives behind this action.

Video Saved From X

reSee.it Video Transcript AI Summary
On 2/11, 462 log entries were overwritten by a script. On 3rd March, 37,686 log entries were overwritten by the same script. The day before we received the system, 330 log entries were overwritten by that script. The EMS admin account was responsible for this. The challenge is that this occurred before an audit, and it deleted all the records and files related to the election. Someone deliberately ran a program to clear all the records in the system used for generating the official results.

Video Saved From X

reSee.it Video Transcript AI Summary
On various dates, an individual ran a script to find blank passwords for the accounts on the system. The script was executed multiple times, overwriting a significant number of log entries. The EMS admin account was responsible for this, but due to the lack of accountability in assigning the username, it is difficult to prove who exactly did it. Fortunately, historical data from MTech video feeds helped identify the individuals at the keyboards during those times. However, their names will not be released to protect them from scrutiny and potential impacts.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses an incident where there were errors in the vote count for Biden and Trump. They explain that the voting machine generated a high number of errors, which were then sent for adjudication. The rate of ballots needing adjudication was 68%, much higher than the federal allowable rate of 1 in 125,000. The speaker suggests that this program is designed to generate errors and manipulate votes. They also mention that on November 4th, all system files related to adjudication were deleted. This is seen as a significant issue.

Video Saved From X

reSee.it Video Transcript AI Summary
On February 11, 462 log entries were overwritten by a script, and on March 3, 37,680 log entries were also overwritten. The day before we received the system, 330 log entries were overwritten. The EMS admin account was responsible for these actions. It raises concerns about the audit's integrity, as one would expect to have complete election context for auditing. The log file from the Dominion software indicates that someone executed a command to purge all election results, successfully deleting all records and images stored in the NAS directory. This action was taken just before the audit began, which is troubling.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker reveals shocking information about the deletion of the entire database directory from the d drive of the machine called EMS primary. This deletion occurred approximately 10 days before the machines were handed over to the Senate. Deleting documents after being told to preserve them can have severe legal consequences. Additionally, the main database for the election management system software, which contains all election-related data from the November 2020 general election, is missing from the EMS primary machine. This suggests that it has been removed.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers assert that there is evidence of direct access to the Antrim County election management system (EMS). In the forensic images, they note that on November 5 an anonymous user logged onto the EMS remotely and performed actions with escalated privileges, making changes to the database during attempts to retabulate the election. They describe this as a major development, because it demonstrates that the machines were accessed remotely, and crucially, that the remote access was by an anonymous user who possessed elevated privileges within the system. They present this as a significant point for those who oppose forensic auditing or who are against non-forensic reviews. They also reference visible features on ballots, specifically the black boxes along the side of the ballot. The ballots reportedly contain 59 of these black boxes. In the forensic images, they indicate that certain blocks—numbers 15, 18, 28, 41, and 44—were intentionally modified. The described modifications concerned the height, width, and overall shape of these blocks, with the stated purpose of generating errors. Regarding the consequences of these modifications, the narrative claims that by altering these specific blocks, errors were created that led to rejections of Republican ballots. In other words, ballots cast for Donald Trump that were processed through the machine allegedly faced a higher likelihood of being rejected due to these block modifications. The asserted outcome is that such ballots were rejected at a rate of 20% more than ballots cast for Joe Biden.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there was direct access to the Antrim County election management system (EMS). They claim that on November 5, an anonymous user logged on to the EMS remotely with escalated privileges and made changes to the database while attempting to retabulate the election. This, they say, constitutes a significant development, proving that the machines were remotely accessed and that access was by an anonymous user with elevated system privileges. Speaker 0 also discusses ballots, referring to black boxes on the side of the ballot, noting that there are 59 such black boxes. They state that forensic images show that in Antrim County, blocks 15, 18, 28, 41, and 44 were intentionally modified. The modification involved altering the height, width, and shape of those blocks with the intention of generating errors. They describe the consequence of such modifications: by modding these specific blocks, they were able to cause rejections for Republican ballots. Specifically, they claim that if a ballot voted for Donald Trump and was fed into the machine, that ballot was rejected at a rate 20% higher than for Joe Biden ballots.

Video Saved From X

reSee.it Video Transcript AI Summary
Two Clark County Technical employees reported that the vote counts recorded by machines and stored on USB drives changed overnight after polls closed. Votes seemed to appear and disappear during this time. Attempts to verify the integrity of the voting machines were met with limitations; only a superficial visual inspection of the USB drives was permitted, while a forensic examination was denied.

Video Saved From X

reSee.it Video Transcript AI Summary
A scanner can only scan one dollar per second, but there are 4,000 ballots with the exact same time stamp of November 5th at 11:19:40. This suggests that these ballots may have been inserted and cannot be authenticated. The main question is whether this time stamp, which shows an unbelievable speed of scanning, is from the EMS system and not something we created.

Video Saved From X

reSee.it Video Transcript AI Summary
Forensic copy bit for bit of everything that was on the Mesa County computer. Just to clarify, there were two forensic images taken of the Mesa County Election server. One, before the software update. Another image taken after. Everything that had been on that drive before this update was gone. Looks like a cover up. Low risk of being caught. Low consequence if they are caught. The reason we know it was deliberate is because of Tina Peters. Are those files important to elections? Critical. The federal voting system standards are very clear that the election records that are required to audit a voting system include the digital records that are all the log files generated by that voting system, especially when it's a complex computer system.

Video Saved From X

reSee.it Video Transcript AI Summary
County technical employees reported independently that the vote counts recorded by machines and stored on USB drives changed between the closing of polls and their reopening the next morning. Votes appeared and disappeared overnight. Attempts to verify the integrity of these voting machines were limited to a superficial visual inspection of the USB drives, and a forensic examination was denied.

Video Saved From X

reSee.it Video Transcript AI Summary
The Windows security logs were purged right before two audits were scheduled to begin. This makes it difficult to determine who had access to the RTR admin account, which is shared among all accounts. It is unclear why someone would delete all the records and files from the Dominion software, which is used for tallying and reporting election results, the day before an audit started.

Video Saved From X

reSee.it Video Transcript AI Summary
Is it standard practice to delete files off a server after an election? I hope not. It’s appropriate to maintain files, and while we deleted some files, they were archived. The auditors initially did not have access to those archived files because they were not subpoenaed. It’s laughable to suggest that deleting files in response to a subpoena is acceptable. The subpoena should have covered all election-related records. I cannot confirm if purging the database after elections is standard practice, but limited server space may require it. If that is the case, why was data from prior elections still present? We will provide answers to these questions. It's important to note that we had oversight during the 2020 election due to concerns about the previous administration's competence.

Video Saved From X

reSee.it Video Transcript AI Summary
Clark County technical employees reported independently discovering that the number of votes recorded by voting machines and stored on USB drives would change between the time the polls were closed and when they were reopened. Votes were allegedly appearing and disappearing overnight. When attempts were made to verify the integrity of these voting machines, only a visual inspection of the outside of a USB drive was permitted, and a forensic examination was denied.

Video Saved From X

reSee.it Video Transcript AI Summary
On the left is the image before the Dominion employee arrived at the election management server, and on the right is the image after the employee left. The logs folder on the left is missing on the right, indicating that it disappeared after the employee left. Additionally, in the Inetpub log folder, there are multiple log files that contain evidence of connections to the web server. The number of log files is not mentioned.

Video Saved From X

reSee.it Video Transcript AI Summary
On various dates, an individual ran a script to search for blank passwords on the system. This script overwrote a significant number of log entries. The EMS admin account was responsible, but it's difficult to prove who specifically executed the script due to the lack of accountability in assigning usernames. Fortunately, historical data from MTech video feeds allowed us to identify individuals at the keyboards during those times. However, we won't disclose their names due to the potential scrutiny and impact on them.

Video Saved From X

reSee.it Video Transcript AI Summary
There is a discussion about log files on two screens. One screen shows hundreds of log files from 2019 until May 22, 2021. The other screen only has three years of log files, which have mysteriously disappeared. It is mentioned that when a Dominion employee came in, the log files vanished. These files record all access to a specific machine. It is also mentioned that Dominion sent people around the country for software updates during that time. Some participants confirm this information.

Video Saved From X

reSee.it Video Transcript AI Summary
The hard drive was cloned for forensic analysis, revealing deleted or altered election records. 29,000 records were affected, impacting election totals. Two forensic images were compared, showing data loss after a software update. The actions suggest a cover-up with low risk and consequences. Tina Peters' involvement indicates deliberate tampering. The missing files are crucial for elections. Translation: The hard drive was copied for investigation, uncovering changes to election records. A comparison of two images showed data loss post-update. The situation implies a cover-up with minimal risk and consequences. Tina Peters' role suggests intentional interference. The missing files are vital for elections.

Video Saved From X

reSee.it Video Transcript AI Summary
On February 11th, a script overwrote 462 log entries. On March 3rd, the same script overwrote 37,686 log entries. On March 12th, the day before the system was received, 330 log entries were overwritten by the script. The EMS admin account performed these actions. A log file from the Dominion software for results tallying and reporting shows that someone purged all the results for the election. The action was completed successfully, deleting all the files on the NAS directory, which contained all the results and images from the election. An individual ran a program to clear all records in the system used to generate the official results the day before an audit started.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker asserts that there was direct access to the Antrim County election management system (EMS). According to the forensic images, on November 5 an anonymous user logged on to the EMS remotely with escalated privileges and made changes to the database while attempting to retabulate the election. This is presented as a major development indicating remote access to the machines, and specifically remote access by an anonymous user with elevated privileges. Additionally, the speaker describes intentional modifications to ballot components. Ballots have black boxes along the side, with boxes 59 in total. The forensic images allegedly show that blocks 15, 18, 28, 41, and 44 were intentionally modified, altering their height and width to generate errors. The claimed consequence of these modifications is that errors were produced which led to ballot rejections. Specifically, ballots in which a voter chose Donald Trump and then fed the ballot into the machine were rejected at a rate 20% higher than ballots for Joe Biden.
View Full Interactive Feed