reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
In 2018, the Dallas elections had irregularities, similar to what we're hearing now. Texas hired a cybersecurity group to investigate these irregularities, finding 10 different ways the Dominion equipment could be manipulated. Texas outlawed the use of Dominion, but it was still used. This group spent 2 years reverse engineering how to rig an election using Dominion. Meanwhile, another cybersecurity group, including hackers and other experts, mapped out the election manipulation plan. They approached DHS and CISA for a meeting, but they refused to attend. It's concerning how many people turned a blind eye to this issue. Lawyers involved may not understand the technology, but they should be held accountable.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0, Speaker 1, and Speaker 2 discuss Dominion’s access to election systems during the 2020 election period in Georgia, with Gwinnett County cited as a specific example. The dialogue confirms that the questioning period was during the 2020 election, and the focus is on whether Dominion remotely accessed election systems and whether such access occurred in Georgia. Speaker 2 asks if there is any indication of nonelection personnel remotely accessing a Dominion system. Speaker 3 responds that they have reviewed a series of emails produced by Dominion in which they’re discussing remoting into Gwinnett County, Georgia. Speaker 1 then notes that Speaker 0 had mentioned Dominion remote collection or connection to election systems but lacks evidence that it occurred in Georgia. Speaker 0 asserts that there was one county and that they have seen many Dominion emails, requiring translation from Serbian to English to verify technical questions and translations. Speaker 1 asks specifically: “So it's your testimony that there is evidence of dominion remotely accessing Georgia election equipment?” Speaker 0 answers: “Yes, on the one county. It was included with stuff that I was researching and reading through considering Colorado. Michigan was also involved and there were other ones.” Speaker 2 inquires about Dominion’s ability to remotely connect to these election systems and whether they could do so without detection. Speaker 0 responds: “Yes.” Speaker 2 then asks if the interviewee is aware of any instances in which that has occurred, and Speaker 0 confirms: “One would be the Denver, Colorado server was granted or requested to grant Belgrave, Only Belgrade. Did search. There is a Belgrade Montana.” The speaker questions why Montana would need to connect to a Colorado file transfer server as part of the election system, noting there are other components and things done in the background concerning the database and the configuration of the database server that still do not have an engineering change order. Speaker 0 explains that in operational environments, things sometimes break and need fixing, leading to the submission of a change request or, in this case, an engineering change order that is retroactive. The goal is to record the process to ensure change management and integrity of the system. If changes are not recorded, it leads to a bad situation, according to Speaker 0.

Video Saved From X

reSee.it Video Transcript AI Summary
A Microsoft certified security expert provided evidence of a Dominion vote counting machine in a swing state with a wireless card connected to a thermostat's wireless network. The IP address traced back to a city in China, linked to a Chinese corporation involved in questionable dealings with American politicians. There is a thick binder of documented evidence showing foreign access and interference in the election, including public statements from the FBI and DHS warning about Iran's involvement. The evidence is undeniable, and those questioning it should argue with the FBI and DHS. The photographs and IPs provide conclusive proof of foreign interference in the voting systems.

Video Saved From X

reSee.it Video Transcript AI Summary
In general, would you say that Smartmatic software was designed with two principles in mind? Number one, it's easy to rig elections. Number two, it's hard to audit. That is correct. And is the same true for Dominion software? It's easy to rig an election with it, and it's hard to audit. That is correct.

Video Saved From X

reSee.it Video Transcript AI Summary
Cybersecurity experts have provided signed affidavits stating that Dominion Voting Machines were tampered with over Internet connections. The machines used an unencrypted VPN with easily accessible login credentials, allowing foreign adversaries to monitor and manipulate votes. IP addresses showed that China, Iran, and other countries accessed the servers, while Edison Research also communicated with these adversaries. Claims that Dominion machines were not connected to the Internet are false. Dominion Voting Systems is linked to a Chinese-owned company, and its software is licensed from a Venezuelan-owned company. Forensic audits revealed significant errors in the machines. Georgia recently signed a $100 million contract with Dominion, despite the machines being easily hackable.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities exist. Before elections, a supposed glitch prompts an emergency patch that opens backdoor access from a Serbian office, which is the true operational center of Dominion. This office, despite being presented as a U.S. company, has connections to Chinese nationals and operates on Huawei machines. Using virtual machines, they manipulate election results by creating a hidden environment within the county election equipment. After altering the data, they collapse the virtual machine, leaving no trace unless a forensic audit is conducted. This manipulation is facilitated through connections to China, raising concerns about the integrity of the election process. For more information, visit Stolen Elections Facts.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities exist. Just before elections, a "glitch" prompts an emergency patch that opens a backdoor for remote access from a Serbian office, which is the real operational center of Dominion, despite claims of being a US company. This office has Chinese nationals who manipulate election results using Huawei machines. They create virtual machines within the election equipment, allowing them to alter data undetected. Once the manipulation is complete, they collapse the virtual machine, leaving no trace unless a forensic audit is conducted. For more information, visit Stolen Elections Facts.

Video Saved From X

reSee.it Video Transcript AI Summary
While on the oversight committee in the senate, Dominion was investigated. The president of Dominion and his software maker testified. Questions focused on whether Dominion machines had internet access. The president of Dominion said no, but this was a lie. The investigation was published, recorded, and should be online.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker believes votes were manipulated electronically in favor of Joe Biden, citing TV reports of votes switching from Trump to Biden. In one instance, 12,000 votes shifted, and in another, 20,000. Trump's numbers decreased by the exact amount that Biden's increased. The speaker believes the Dominion Company represents foreign interference because it is a Canadian company storing records in Germany and Spain. The speaker claims the CIA was involved, using servers in Germany for political operations. These servers were seized by US forces with German help and are now in the hands of the FBI. The speaker notes that in Europe, the CIA operates under the jurisdiction of the military.

Video Saved From X

reSee.it Video Transcript AI Summary
Signed affidavits from cybersecurity experts suggest that Dominion Voting Machines and Edison Research used an unencrypted VPN, allowing foreign adversaries to access and manipulate votes. The IP addresses showed communication between these adversaries and Edison Research. Claims that Dominion machines were not connected to the internet are false. Dominion Voting Systems is registered to a Chinese company, and UBS Securities has three Chinese nationals on its board. Dominion's software is licensed from Venezuelan-owned Smartmatic. Forensic audits of the machines revealed significant errors. Left-leaning news sources previously highlighted the vulnerability of voting machines. Georgia recently signed a contract with Dominion, despite concerns. An audit in Michigan's Antrim County exposed high error and adjudication rates.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript presents a broad, multi-voiced warning about the vulnerability of U.S. voting systems and the ease with which they can be hacked, hacked-stopping demonstrations, and the security gaps that remain even as elections continue. Key points and claims: - Virginia stopped using touch screen voting because it is “so vulnerable,” and multiple speakers argue that all voting machines must be examined to prevent hacking and attacks. Speaker 0, Speaker 1, and others emphasize systemic vulnerability across states. - Researchers have repeatedly demonstrated that ballot recording machines and other voting systems are susceptible to tampering, with examples that even hackers with limited knowledge can breach machines in minutes (Speaker 2, Speaker 3). - In 2018, electronic voting machines in Georgia and Texas allegedly deleted votes for certain candidates or switched votes from one candidate to another (Speaker 4). - The largest voting machine vendors are accused of cybersecurity violations, including directing that remote access software be installed, which would make machines attractive to fraudsters and hackers (Speaker 5). - Across the country, voting machines are described as easily hackable, with contention that three companies control many systems and that individual machines pose significant risk (Speaker 2, Speaker 6). - Many states use antiquated machines vulnerable to hacking, with demonstrations showing how easily workers could hack electronic voting machines (Speakers 7, 2). - A substantial portion of American voters use machines researchers say have serious security flaws, including backdoors (Speaker 5). Some states reportedly have no paper trail or only partial paper records (Speaker 5, various). - Aging systems are noted as failing due to use of unsupported software such as Windows XP/2000, increasing vulnerability to cyber attacks (Speaker 9). An observed concern is that 40 states use machines at least a decade old (Speaker 9). - Specific past intrusions are cited: Illinois and Arizona in 2016 had election websites hacked, with malware installed and sensitive voter information downloaded (Speaker 4). - There is debate about whether votes were changed in the 2016 election; one speaker notes that experts say you cannot claim—without forensic analysis—that votes were not changed (Speaker 17, 18). - The existence of paper records is contested: some jurisdictions lack verifiable paper trails, undermining the ability to prove results are legitimate (Speaker 5, 9). - Some devices rely on cellular modems to transmit results after elections, creating additional avenues for interception and manipulation; vendors acknowledge modems but vary in how they frame Internet connectivity (Speakers 10, 11, 13, 14, 17, 18, 19, 20, 21). The debate covers whether cellular transmissions truly isolate from the Internet or provide a backdoor, with demonstrations showing that modems can be connected to Internet networks and could be exploited. - The “programming” phase of elections—where memory cards are prepared with candidates and contests—can be a vector for spread of rogue software if an attacker compromises the election management system (Speaker 11, Speaker 10). - A scenario is outlined in which an attacker identifies weak swing states, probes them, hacks the election management system or outside vendors, spreads malicious code to machines, and alters a portion of votes; the assumption is that many jurisdictions will not rigorously use paper records to verify computer results (Speaker 10). - A Virginia governor’s anecdote is shared: after a hack demonstrated off-site by experts, all machines were decertified and replaced with paper ballots (Speaker 16). Overall impression: the discussion paints a picture of pervasive vulnerability, aging and diverse systems, reliance on modems and networked components, potential for targeted manipulation in close elections, and the need for upgrades and robust forensic capabilities, while noting contested claims about the extent of past interference.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript presents a series of claims about foreign interference, voting-system vulnerabilities, and alleged cover-ups related to the 2020 U.S. elections. - A 2020 FBI intelligence memo warned that China might have been sending fake driver’s licenses into the U.S. to produce fake mail-in ballots to help Joe Biden win. The memo’s integrity was questioned because the FBI reportedly called the intelligence back, and the agencies were asked to destroy the report, allegedly to avoid negative optics for Trump and Biden. The claim is that the licenses intercepted by Customs and Border Protection in Chicago corroborated the intel, yet no investigation followed. It is further stated that the FBI’s handling was intended to prevent leak before the election that China preferred Biden. - A 60 Minutes segment featuring Chris Krebs, then head of Homeland Security Cybersecurity Division, purportedly stated there were no foreign intrusions in the 2020 election and that it was a perfectly clean election. The transcript asserts this was later shown to be false, noting: - A 2021 indictment of Iranians in Manhattan for interfering with the election and hacking a state database to obtain voter IDs for an influence operation against the U.S. election. - Colorado-specific allegations include: - From June onward, passwords (seventy-six of them) from 63 of 64 Colorado counties’ secretary of state bios/passwords were publicly accessible on a site, implying broad exposure. The speaker accuses Secretary of State Jenna Griswold of knowing about the leak during a trial and not informing clerks, and asserts she should be held to account. - The speaker asserts ongoing concerns about leaked passwords for Dominion machines, suggesting potential compromises across other states and tying this to a broader cartel narrative involving Arizona, Michigan, and Dominion’s Colorado headquarters in Denver, with a note that Dominion is also connected to Serbia. - Mentions a video by Gary Brunson and references to a 30-year CIA whistleblower, linking the events back to Venezuela (Hugo Chávez) and to Patrick Byrne, suggesting a broader international corruption thread. - The transcript then asserts a second, explicit foreign operation: - In August 2020, three and a half months before the votes, the FBI believed China had begun a mass operation to produce fake U.S. driver’s licenses, arrange to bring Chinese citizens into the U.S. with the intent of obtaining fake mail-in ballots to vote for Joe Biden. The intelligence purportedly came from a Chinese intelligence source handled by the FBI, and the operation aimed to help Biden beat Trump. The claim emphasizes that the operation’s intention was to assist Biden. - Additionally, there are various related claims and items: - A claim of sensational evidence about a factory in Guangdong producing 500,000 blank American ballots, with an asserted link to a source (Vanessa Olivarez, claimed as a third-generation member of the Chinese Communist Party) and a purported translated phone recording between a caller and a ballot-printing company, circulated by Gateway Pundit. - An assertion that 20,000 fake driver’s IDs were intercepted by Customs and Border Protection, corroborating the intelligence, while the Biden administration and FBI (Chris Ray) allegedly covered this up, with the information sent to Chuck Grassley by Kash Patel. - An assertion that, since 2020, tightening voting laws in several states increased voter confidence, but China viewed mail-in voting as a vulnerability to exploit. - Individual testimonies and incidents: - Arrests reported by Speaker 5 (HSI Miami and partners) of a permanent resident Haitian national convicted felon for unlawful voting and casting a false ballot. - Speaker 6 claims 130,000 to 280,000 completed ballots were shipped from Bethpage, New York to Lancaster, Pennsylvania, with the trailer disappearing. - Speaker 7 describes witnessing thousands of ballots with return addresses loaded onto a trailer in New York headed for Pennsylvania, and questions the purpose. - Speaker 8 notes tens of thousands of fake voters and illegally cast ballots in the November election, asserting impacts across down-ballot races. - The speakers reference broader connections among Venezuela, U.S. election irregularities, and international actors, tying together various claims about foreign interference, domestic vulnerabilities, and alleged concealment or delay of intelligence reports.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers assert that there is evidence of direct access to the Antrim County election management system (EMS). In the forensic images, they note that on November 5 an anonymous user logged onto the EMS remotely and performed actions with escalated privileges, making changes to the database during attempts to retabulate the election. They describe this as a major development, because it demonstrates that the machines were accessed remotely, and crucially, that the remote access was by an anonymous user who possessed elevated privileges within the system. They present this as a significant point for those who oppose forensic auditing or who are against non-forensic reviews. They also reference visible features on ballots, specifically the black boxes along the side of the ballot. The ballots reportedly contain 59 of these black boxes. In the forensic images, they indicate that certain blocks—numbers 15, 18, 28, 41, and 44—were intentionally modified. The described modifications concerned the height, width, and overall shape of these blocks, with the stated purpose of generating errors. Regarding the consequences of these modifications, the narrative claims that by altering these specific blocks, errors were created that led to rejections of Republican ballots. In other words, ballots cast for Donald Trump that were processed through the machine allegedly faced a higher likelihood of being rejected due to these block modifications. The asserted outcome is that such ballots were rejected at a rate of 20% more than ballots cast for Joe Biden.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there was direct access to the Antrim County election management system (EMS). They claim that on November 5, an anonymous user logged on to the EMS remotely with escalated privileges and made changes to the database while attempting to retabulate the election. This, they say, constitutes a significant development, proving that the machines were remotely accessed and that access was by an anonymous user with elevated system privileges. Speaker 0 also discusses ballots, referring to black boxes on the side of the ballot, noting that there are 59 such black boxes. They state that forensic images show that in Antrim County, blocks 15, 18, 28, 41, and 44 were intentionally modified. The modification involved altering the height, width, and shape of those blocks with the intention of generating errors. They describe the consequence of such modifications: by modding these specific blocks, they were able to cause rejections for Republican ballots. Specifically, they claim that if a ballot voted for Donald Trump and was fed into the machine, that ballot was rejected at a rate 20% higher than for Joe Biden ballots.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities exist. Before elections, a supposed glitch prompts an emergency patch that opens a backdoor for remote access from a Serbian office, which is the true operational hub of Dominion. This office, staffed by Chinese nationals, manipulates election results using virtual machines created within the election equipment. The manipulation is done through software, leaving no trace unless a detailed forensic audit is conducted. This process involves using Huawei servers, linking back to China. For more information, visit Stolen Elections Facts for documentation.

Video Saved From X

reSee.it Video Transcript AI Summary
The Windows security logs were purged right before two audits were scheduled to begin. This makes it difficult to determine who had access to the RTR admin account, which is shared among all accounts. It is unclear why someone would delete all the records and files from the Dominion software, which is used for tallying and reporting election results, the day before an audit started.

Video Saved From X

reSee.it Video Transcript AI Summary
- "The electoral systems of The United States can be manipulated by foreign agents or third parties." - "Are you in danger, physical danger, if your true identity is known?" - "Yes." - "We configured the transmission systems and the tally systems." - "I was the national coordinator for voting machines." - "You examined the forensic image of the election management server, that was used in the Mesa County twenty twenty election." - "In the case of Mesa, Colorado, all evidence, all log, all of that was deleted." - "We saw both images, the old one and the new one." - "And the structure changed, the structure of the program changed as compared to the version 5.5." - "Whoever gave the authorization for the system to be updated would be the person responsible for all the files that were deleted." - "It's easy to rig an election with it, and it's hard to audit."

Video Saved From X

reSee.it Video Transcript AI Summary
Contrary to the current political narrative, the speaker emphasizes that voting machines are not connected to the Internet, making them secure. However, in 2018, there were instances of electronic voting machines in Georgia and Texas deleting or switching votes. The speaker mentions that even hackers with limited knowledge and resources were able to breach these machines easily. They also highlight concerns about remote access software making the machines vulnerable to fraudsters and hackers. The speaker clarifies that Dominion, the company in question, has no involvement in switched or deleted votes, and has no ties to communism or China. However, there are indications that some machines may be connected to the Internet, despite being designed as closed systems.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion, a key player in vote tabulation, received a $400 million investment from Credit Suisse, a Chinese bank, just weeks before the election. Another company, Seidel, which recently declared bankruptcy, had its assets acquired by a new entity with ties to George Soros and Venezuela. Additionally, Kamala Harris' husband is linked to one of these companies. The software used for elections originates from Hugo Chavez's Venezuela, while the machinery and tabulation services are connected to Venezuelan and Chinese interests. This raises concerns about foreign influence in the election process, suggesting a potential manipulation of our electoral system.

Video Saved From X

reSee.it Video Transcript AI Summary
Contrary to the current political narrative, the speaker emphasizes that voting machines are not connected to the internet and the Department of Homeland Security claims the 2020 election was secure. However, in 2018, there were instances of electronic voting machines in Georgia and Texas deleting or switching votes. The speaker mentions that hackers were able to breach these machines easily, even with limited knowledge and resources. They also mention the concern of remote access software making the machines vulnerable to fraudsters and hackers. The speaker then addresses the controversy surrounding Dominion, stating that there were no switched or deleted votes involving their machines and that the company has no ties to communism or China. However, there are concerns that some machines may be connected to the internet despite being designed as closed systems.

Video Saved From X

reSee.it Video Transcript AI Summary
Smartmatic built a production facility in China and shipped hardware marked as Taiwanese to Smartmatic and Dominion, violating US law. Dominion manages elections in almost all US swing states. Evidence suggests the Venezuelan regime owns the source code used in Smartmatic and Dominion machines, which are manufactured in China. Dominion moved its R&D and servers with swing state voting information to Belgrade, Serbia, where Venezuelan, Chinese, and Serbian engineers alter elections as directed by foreign entities. Voter information is stored on Huawei servers linked to Hong Kong. CISA consulted Smartmatic and Dominion regarding election irregularities. Smartmatic executives were indicted in Florida for bribery related to altering election results in the Philippines. The CNE source code can prove election alterations. The FBI allegedly tried to obstruct investigations. Smartmatic was created at the direction of Hugo Chavez, and its source code was designed to alter election results. The Venezuelan CNE owns Smartmatic's source code. Smartmatic entered the US market and orchestrated Dominion's purchase of Sequoia, inheriting the Smartmatic source code. Smartmatic publicly broke with the Venezuelan regime in 2018. Dominion and Smartmatic's actions are controlled by the Cartel del Sol, the Cuban DGI, and the Chinese CCP.

Video Saved From X

reSee.it Video Transcript AI Summary
Dominion machines are certified and sealed, but vulnerabilities allow for manipulation. Just before elections, a supposed "glitch" prompts an emergency patch that opens a backdoor for remote access from a Serbian office, which is the true operational center of Dominion. This office, staffed by Chinese nationals, allows them to log into U.S. election machines and alter results. They use virtual machines to manipulate data without leaving traces. After the manipulation, they collapse the virtual server, making detection difficult unless a thorough forensic audit is conducted. This entire operation relies on Huawei equipment, linking back to China. For more information, visit Stolen Elections Facts.

Video Saved From X

reSee.it Video Transcript AI Summary
According to the testimony, Dominion equipment is generally not connected to the internet, but there is evidence of a connection in Gwinnett County, Georgia, during the 2020 election. Non-election personnel have remotely accessed a Dominion system. Dominion emails discuss remotely accessing Gwinnett County, Georgia. There is evidence of Dominion remotely accessing Georgia election equipment in one county, along with involvement in Colorado and Michigan. Dominion can remotely connect to election systems without detection, and this has occurred. The Denver, Colorado server granted access to Belgrade, with questions raised about why Belgrade, Montana, would need to connect to a Colorado file transfer server. Changes to the database server lack an engineering change order, which is important for change management and system integrity.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 presents a video focused on data and evidence of alleged irregularities in the 2020 election, asserting that there has been no comprehensive place to see widespread fraud until now. He states the video is “pure data” and invites viewers to consider the statistical anomalies in three states (Michigan, Wisconsin, Georgia) in the early hours of 11/04/2020, when Biden received major vote spikes after trailing Trump. - He analyzes 8,954 individual vote updates and identifies a clear statistical pattern across nearly all updates, with four notably aberrant updates: two in Michigan, one in Wisconsin, and one in Georgia, all occurring in the same five-hour window in the middle of the night when counting reportedly stopped in some places. - In Michigan, a 06:30AM update shows Biden at 141,258 votes to Trump’s 5,968, described as the most extreme update in all datasets across all states, followed by a noticeable ratio change in nearby updates. In Wisconsin, a single update allegedly moved Biden from trailing by over 100,000 votes into the lead. In Georgia, a 01:34AM Eastern Time update shows Biden at 136,155 to Trump’s 29,115. They claim these four spikes exceed the states’ margins of victory, making the spikes not only abnormal by percentage but also by magnitude. They conclude that if these four unlikely updates had not happened, the presidency could have been different. - Detractors are cited as arguing human error, but the video questions where evidence of corrections is, and notes that California shows only one anomalous update in percentage, not enough magnitude to shift outcomes. - A “consistently identical ratio of Biden to Trump votes across time” is highlighted as allegedly impossible, with a Florida example showing 100 identical ratios over several days. The video asserts a computer algorithm is involved, termed a weighted race distribution, associated with Diebold voting machines (known as early as 2001), implying values rather than simple counts. - In California, a single update is shown with Biden receiving about 65% and Trump 32% for one vote, raising questions about how one vote could go to more than one candidate. Speaker 0 then links these patterns to alleged connections between Diebold and Dominion Voting Systems, claiming Dominion acquired ESNS in 2010, which had previously acquired Diebold, and that Dominion’s software is licensed from Smartmatic. They also note that forensic audits show errors and that the mainstream narrative claims these issues are misinformation. They reference NBC News and PBS findings on how easy it is to hack voting machines or cast fake votes. Next, Speaker 0 notes eyewitness and video evidence from Georgia: poll worker Ruby allegedly was filmed in the backroom with absentee ballots, and at 10:30PM on November 3, media and poll watchers were told to leave, yet Ruby and others remained, pulling ballots from under a table and distributing them to counting stations. They describe Ruby running the same stack of ballots to the machine three times, observing a large Biden surge after 01:34AM Georgia time, and question whether a ballot can be counted more than once, citing Coffey County, Georgia as an example of someone claiming to scan the same batches repeatedly. Speaker 0 references Raquel Rodriguez, arrested for election fraud in Texas over video evidence of ballot harvesting, and asserts that cybersecurity evidence indicates Dominion and Edison Research used an unencrypted VPN with easily accessible credentials allowing foreign access, asserting that China, Iran, and other countries accessed the servers, contradicting claims that Dominion machines were not connected to the Internet. They mention Dominion’s association with a Chinese-registered domain, and board members with Chinese nationality, alleging conflicts of interest through corporate ownership and licensing from Smartmatic. Speaker 0 highlights that Antrim County, Michigan audits found high error and adjudication rates in Dominion, with an 68 o 5% error rate far above federal guidelines, missing logs for 2020, and reprogramming of election event designer cards during the safe harbor period. They point to subpoenas and the lack of access to logs, and to affidavits from poll workers claiming illegal activities, non-equal treatment of observers, counting without proper oversight, shredding ballots, and other irregularities. Speaker 7 concludes with a claim that many Americans distrust the 2020 election and urges viewers to download and share the video, demand election reform, and notes that the video’s credits will continue with data readers, while warning of erasure or fact checks by tech platforms.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker asserts that there was direct access to the Antrim County election management system (EMS). According to the forensic images, on November 5 an anonymous user logged on to the EMS remotely with escalated privileges and made changes to the database while attempting to retabulate the election. This is presented as a major development indicating remote access to the machines, and specifically remote access by an anonymous user with elevated privileges. Additionally, the speaker describes intentional modifications to ballot components. Ballots have black boxes along the side, with boxes 59 in total. The forensic images allegedly show that blocks 15, 18, 28, 41, and 44 were intentionally modified, altering their height and width to generate errors. The claimed consequence of these modifications is that errors were produced which led to ballot rejections. Specifically, ballots in which a voter chose Donald Trump and then fed the ballot into the machine were rejected at a rate 20% higher than ballots for Joe Biden.
View Full Interactive Feed