reSee.it - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker raises concerns about the security of the tabulation machines and the process of transferring votes. They question whether the votes can be manipulated before being saved on a flash drive and if the flash drive can be swapped. They also mention the issue of trusting the county commissioner to not edit the contents of the flash drive. The speaker highlights the importance of the digital devices that hold cryptographic keys, emphasizing that if these keys are lost, the entire precinct's security is compromised. They give an example of a theft in Philadelphia before the election, where USB drives and a laptop were stolen from a key precinct, potentially impacting the legitimacy of the election results.

Video Saved From X

reSee.it Video Transcript AI Summary
Our society is under threat, and we have one person in the White House standing in the way. Every American must stand up; we cannot surrender. The attack on the Capitol was enabled by leaders like McConnell, Schumer, and Pelosi, who were aware of the lack of security. The media, influenced by Rupert Murdoch and his sons, is complicit in this disgraceful narrative. We are running out of time, as seen in Hong Kong. Recent information reveals cyber warfare in battleground states, and it has come to light that Comey sold a top-secret program to the Chinese, allowing them to manipulate voting networks. I received alarming news that foreign interference was detected in Georgia's voting machines, impacting the election results.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0: The election was stolen. A graph shows people who worked for ES&S, Hart, Dominion Voting Systems, ClearBallot, and Smartmatic, recycling through companies. People who worked at Dominion Voting Systems are entering the political sphere and taking over election offices; one county in Texas, after hiring someone who worked for Dominion, went blue for the first time. The speaker walks through information: Dominion using “Serbian technology with Chinese characteristics.” Huawei Bank is involved; there’s no public board saying Bank of China funds anything, but research on Roaming Networks—a relatively unknown Serbian company until 2013—shows it signed a value-added contract with Huawei Bank. Huawei is “the Bank of China.” Roaming Networks built ICT infrastructure and data centers in Serbia, with owner Nenad Kovac identified as the enterprise partner. Some Roaming Networks information may come off their site after this presentation. Dominion Voting Systems has a corporate office in Serbia; a screenshot of the office and a developer on their site is noted. A Serbian legislative leader said, “I know Dominion Voting Systems back in November. They have an office here.” Dominion started rapidly removing Serbian coders from their site/LinkedIn. Code is built in Serbia for a system used in the United States, using infrastructure funded by China, not just China but the Bank of China. A slide discusses Dominion’s enterprise partnership with Huawei, added to the restricted list on 05/16/2019. Roaming Networks references show Dominion Voting Systems using a pure flash storage solution in Dominion’s data center. A photo of Sacramento shows Dominion hardware coming from China, with a bill of lading from a Chinese supplier to Dominion’s McKinney, Texas office. Testing and approval of Dominion hardware show similarities with Smartmatic; the same hardware with different branding. They claim a “tail” behind the scenes—evidence of connections among ES&S, Hart, Dominion, ClearBallot, Smartmatic, with people cycling through these companies. People who once worked at Dominion are now entering election offices; in Texas, a county that hired a former Dominion employee “went blue” by accident with ES&S involved. The speaker calls out Gina Griswold for commenting on Tina Peters and Mesa, and Matt Crane’s role as Arapahoe County clerk and recorder, now head of the County Clerks Association; Crane’s wife previously worked for Dominion and Sequoia Voting Systems. The speaker asserts a public breach of trust requires an audit; if there’s nothing to hide, audits should restore trust. They argue, whether Dominion is the bad actor or not, removal of logs, altering code, and a “trusted build” are problematic, and emphasize the need for audits and investigations to restore trust in elections. Speaker 1: Indicators: a senior Dominion vice president’s name appears on patents; a software engineer involved in the Wayne County, Michigan tabulation center is connected to the software. Coincidences accumulate, suggesting there is a preponderance of evidence with affidavits across the country. The speaker asks which computer produced certain files analyzed yesterday; whether it came from the central count or precincts. Speaker 0: Answers with a non-answer, noting they imaged the main EMS and the tabulation system; servers in the county coordinate precinct information and house audit reports, cast vote reports, error reports, adjudication reports, and access logs. Thumb drives can contaminate the county and state systems if connected to a machine; it’s not unique to Dominion or voting systems but a general risk. They emphasize avoiding white noise and focusing on facts: Dominion is in Serbia; Huawei Bank funds the enterprise partnership and Serbia-based data centers; code is written in Serbia; imaging shows fingerprints of this. They call for audits, note deviations in Georgia (ballots appearing identical in different batches, a shredder truck before January 20 in Georgia, and a leaky arena water claim later proven to be a leaky toilet), and point to media silence. They argue against accepting the gold standard claim and highlight perceived connections to Soros-funded groups. They stress deviations in state and county behavior, urge audits, and compare the election system to a serial killer—unacceptable to let foreign systems run it. Speaker 2: Adds that with 100 indicators, a pattern emerges; reiterates the need to examine which files came from which computer, and questions the integrity of the central count. Speaker 3: Notes the risk of a non-internet-connected thumb drive introducing malware; emphasizes auditing all machines for that reason.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker discusses cybersecurity concerns in the election system, alleging that votes are stored on servers in Germany and could be manipulated by hackers. They point to suspicious vote count changes in swing states and highlight vulnerabilities in the software that could allow for vote manipulation. The speaker questions the transparency of the election process and calls for investigations into potential fraud. In Georgia, a hand recount of all ballots was announced following demands from the Trump campaign.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript strings together a series of fragmented remarks from multiple speakers, centered on conspiracy theories, political organizing, and media manipulation. Key points include: - Identity and information sources: Speaker 0 and Speaker 1 repeatedly ask, “Who the fuck is Jeremy?” and “Who the fuck is Jonathan?” about where they get information and why they deleted “karaoke,” signaling concern about sources and prior online activity. Speaker 3 later directs audiences to Jeremy Oliver on YouTube and Under “Onslaught Media Group” to see footage from protests, implying a push to present an alternative narrative to mainstream media. - Wisconsin as a pivot point: Speaker 2 describes Wisconsin as the place where “the evidence that I and my associate, Chris, had put together for Peter” was first presented under oath before the Wisconsin Senate Committee on Election Integrity. This is presented as a foundational moment in informing their views on elections. - Protests and media strategy: Several speakers reference attending or planning protests, streaming live coverage, and promoting First Amendment rights. There is urging to go to the capital today or on Friday, with claims of “the real story” beyond mainstream media. - Alleged coalition and political actors: The Flynn network, Ali Alexander, and Michael Flynn are named as central figures in a supposed strategy to create political instability and a “color revolution.” The discussion enumerates a supposed chain: the Flynn network’s ties to Patrick Byrne (founder of the America Project) and Roger Richards, who allegedly produced propaganda with Jordan Sather; Patrick Byrne’s connections to Stanley McChrystal; Flynn’s alleged legal or organizational registrations tied to McChrystal’s home; and involvement with the Defeat Disinfo Pack, an AI system for countering opposing viewpoints. - Information warfare and messaging: The speakers describe a broader plan involving “compliant independent media,” the spread of allegations of election fraud, and the mobilization of tens of thousands for protests. Brian Gamble (CIO of the America Project) is named as someone trained in information warfare and psychological operations; Emily Newman is described as having ties to the US Agency for Global Media, with ties to Hillary Clinton and John Kerry, framed as propaganda. - Election numbers and fraud claims: There is discussion of 2020 Maricopa County in-person voting figures (395,000 on election day, described as a lowball estimate due to COVID), with speculation about how many Republicans intended to vote but did not, and varying projections about missed voters (600k–700k mentioned, with some estimates around 150k). The comparison to midterms is used to argue about turnout patterns and perceived discrepancies. - Corporate and elite affiliations: References are made to the Rockefellers in connection with Scott Pressler, suggesting a linkage to supposedly nefarious finance and influence. There is a claim that Rockefeller money went directly to Scott, raising suspicions about funding sources and influence. - Personal safety and conduct: A speaker narrator describes intimidating behavior and the idea of exposing anonymous online actors through burner accounts to unmask traders and create real-world consequences, highlighting a motivation to disrupt online anonymity and safety. - Personal disclosures and reactions: Several speakers shift abruptly into frictional or confrontational exchanges (e.g., someone leaving a conversation, questions about conversations with Mike Lindell), illustrating tense, emotionally charged exchanges during the interactions. Overall, the transcript weaves together themes of alternative information channels, a claimed historical pivot in Wisconsin, a supposed Flynn-run strategy to destabilize the political system, allegations of media and government ties to propaganda or information warfare, and contentious discussions about election integrity, organizers, and elite affiliations.

Video Saved From X

reSee.it Video Transcript AI Summary
We've warned for over a year that Trump could win by a landslide, but the deep state may prevent his inauguration. Reports suggest preparations for martial law to stop him. Instances of ballot boxes being set on fire in swing states where Trump is polling well raise concerns about election integrity. Many Americans have already voted, but trust in the process is waning. A former state department cyber expert predicts intense unrest if Trump wins, with protests framed as pro-democracy movements. This could lead to Congress blocking his inauguration. Whistleblowers highlight the potential for organized protests against a Trump victory, indicating a planned response to maintain control. Awareness of these tactics is crucial as the situation unfolds.

Video Saved From X

reSee.it Video Transcript AI Summary
In this video, the speaker discusses the importance of securing election systems. They highlight the risk of connecting these systems to the internet, as it can make them vulnerable to hacking. The speaker suggests that using paper ballots might be a smarter option, as they cannot be hacked like computer systems. By having something tangible to hold on to, like a piece of paper, it becomes more difficult for entities like Russia to interfere with the election process.

Video Saved From X

reSee.it Video Transcript AI Summary
The video discusses the vulnerabilities in election systems and the potential for manipulation by hackers. It mentions that voting machines, campaign networks, and registration databases are all at risk. The speaker explains that attackers can cause mischief without physically accessing the machines, such as by messing up voter files. It is noted that Russia was able to influence the election by breaching DNC computers and targeting election-related systems in multiple states. The speaker emphasizes that manipulating vote counts on every machine in America would be difficult, but flipping a few senate seats could still impact the US Congress. The video concludes by suggesting that nation states and criminals likely have knowledge of these vulnerabilities.

Video Saved From X

reSee.it Video Transcript AI Summary
Welcome to a safe and secure voting center where Chad is excited to participate in his civic duty. He believes he just voted in the most secure election ever. However, some people express concerns about a rigged election and the loss of their rights. They feel that the truth is being covered up and that their voices are being silenced. There are allegations of election fraud and the exploitation of US technology by foreign organizations. The transparency and auditability of elections are questioned, and people fear being treated like dangerous criminals by their own government. They call for freedom from the control of machines and the release of January 6th prisoners.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript presents a broad, multi-voiced warning about the vulnerability of U.S. voting systems and the ease with which they can be hacked, hacked-stopping demonstrations, and the security gaps that remain even as elections continue. Key points and claims: - Virginia stopped using touch screen voting because it is “so vulnerable,” and multiple speakers argue that all voting machines must be examined to prevent hacking and attacks. Speaker 0, Speaker 1, and others emphasize systemic vulnerability across states. - Researchers have repeatedly demonstrated that ballot recording machines and other voting systems are susceptible to tampering, with examples that even hackers with limited knowledge can breach machines in minutes (Speaker 2, Speaker 3). - In 2018, electronic voting machines in Georgia and Texas allegedly deleted votes for certain candidates or switched votes from one candidate to another (Speaker 4). - The largest voting machine vendors are accused of cybersecurity violations, including directing that remote access software be installed, which would make machines attractive to fraudsters and hackers (Speaker 5). - Across the country, voting machines are described as easily hackable, with contention that three companies control many systems and that individual machines pose significant risk (Speaker 2, Speaker 6). - Many states use antiquated machines vulnerable to hacking, with demonstrations showing how easily workers could hack electronic voting machines (Speakers 7, 2). - A substantial portion of American voters use machines researchers say have serious security flaws, including backdoors (Speaker 5). Some states reportedly have no paper trail or only partial paper records (Speaker 5, various). - Aging systems are noted as failing due to use of unsupported software such as Windows XP/2000, increasing vulnerability to cyber attacks (Speaker 9). An observed concern is that 40 states use machines at least a decade old (Speaker 9). - Specific past intrusions are cited: Illinois and Arizona in 2016 had election websites hacked, with malware installed and sensitive voter information downloaded (Speaker 4). - There is debate about whether votes were changed in the 2016 election; one speaker notes that experts say you cannot claim—without forensic analysis—that votes were not changed (Speaker 17, 18). - The existence of paper records is contested: some jurisdictions lack verifiable paper trails, undermining the ability to prove results are legitimate (Speaker 5, 9). - Some devices rely on cellular modems to transmit results after elections, creating additional avenues for interception and manipulation; vendors acknowledge modems but vary in how they frame Internet connectivity (Speakers 10, 11, 13, 14, 17, 18, 19, 20, 21). The debate covers whether cellular transmissions truly isolate from the Internet or provide a backdoor, with demonstrations showing that modems can be connected to Internet networks and could be exploited. - The “programming” phase of elections—where memory cards are prepared with candidates and contests—can be a vector for spread of rogue software if an attacker compromises the election management system (Speaker 11, Speaker 10). - A scenario is outlined in which an attacker identifies weak swing states, probes them, hacks the election management system or outside vendors, spreads malicious code to machines, and alters a portion of votes; the assumption is that many jurisdictions will not rigorously use paper records to verify computer results (Speaker 10). - A Virginia governor’s anecdote is shared: after a hack demonstrated off-site by experts, all machines were decertified and replaced with paper ballots (Speaker 16). Overall impression: the discussion paints a picture of pervasive vulnerability, aging and diverse systems, reliance on modems and networked components, potential for targeted manipulation in close elections, and the need for upgrades and robust forensic capabilities, while noting contested claims about the extent of past interference.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker demonstrated how they were able to boot up the Electionware system on a non-conforming laptop, highlighting violations of security protocols. They revealed that default passwords for election machines are easily accessible online, posing a significant security risk. The speaker emphasized the urgent need for updating security measures and changing passwords to enhance election security. They also pointed out the lack of antivirus protection on crucial election machines, putting counties at risk. The speaker concluded by stressing the importance of immediate action to address these vulnerabilities.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript presents a series of claims about foreign interference, voting-system vulnerabilities, and alleged cover-ups related to the 2020 U.S. elections. - A 2020 FBI intelligence memo warned that China might have been sending fake driver’s licenses into the U.S. to produce fake mail-in ballots to help Joe Biden win. The memo’s integrity was questioned because the FBI reportedly called the intelligence back, and the agencies were asked to destroy the report, allegedly to avoid negative optics for Trump and Biden. The claim is that the licenses intercepted by Customs and Border Protection in Chicago corroborated the intel, yet no investigation followed. It is further stated that the FBI’s handling was intended to prevent leak before the election that China preferred Biden. - A 60 Minutes segment featuring Chris Krebs, then head of Homeland Security Cybersecurity Division, purportedly stated there were no foreign intrusions in the 2020 election and that it was a perfectly clean election. The transcript asserts this was later shown to be false, noting: - A 2021 indictment of Iranians in Manhattan for interfering with the election and hacking a state database to obtain voter IDs for an influence operation against the U.S. election. - Colorado-specific allegations include: - From June onward, passwords (seventy-six of them) from 63 of 64 Colorado counties’ secretary of state bios/passwords were publicly accessible on a site, implying broad exposure. The speaker accuses Secretary of State Jenna Griswold of knowing about the leak during a trial and not informing clerks, and asserts she should be held to account. - The speaker asserts ongoing concerns about leaked passwords for Dominion machines, suggesting potential compromises across other states and tying this to a broader cartel narrative involving Arizona, Michigan, and Dominion’s Colorado headquarters in Denver, with a note that Dominion is also connected to Serbia. - Mentions a video by Gary Brunson and references to a 30-year CIA whistleblower, linking the events back to Venezuela (Hugo Chávez) and to Patrick Byrne, suggesting a broader international corruption thread. - The transcript then asserts a second, explicit foreign operation: - In August 2020, three and a half months before the votes, the FBI believed China had begun a mass operation to produce fake U.S. driver’s licenses, arrange to bring Chinese citizens into the U.S. with the intent of obtaining fake mail-in ballots to vote for Joe Biden. The intelligence purportedly came from a Chinese intelligence source handled by the FBI, and the operation aimed to help Biden beat Trump. The claim emphasizes that the operation’s intention was to assist Biden. - Additionally, there are various related claims and items: - A claim of sensational evidence about a factory in Guangdong producing 500,000 blank American ballots, with an asserted link to a source (Vanessa Olivarez, claimed as a third-generation member of the Chinese Communist Party) and a purported translated phone recording between a caller and a ballot-printing company, circulated by Gateway Pundit. - An assertion that 20,000 fake driver’s IDs were intercepted by Customs and Border Protection, corroborating the intelligence, while the Biden administration and FBI (Chris Ray) allegedly covered this up, with the information sent to Chuck Grassley by Kash Patel. - An assertion that, since 2020, tightening voting laws in several states increased voter confidence, but China viewed mail-in voting as a vulnerability to exploit. - Individual testimonies and incidents: - Arrests reported by Speaker 5 (HSI Miami and partners) of a permanent resident Haitian national convicted felon for unlawful voting and casting a false ballot. - Speaker 6 claims 130,000 to 280,000 completed ballots were shipped from Bethpage, New York to Lancaster, Pennsylvania, with the trailer disappearing. - Speaker 7 describes witnessing thousands of ballots with return addresses loaded onto a trailer in New York headed for Pennsylvania, and questions the purpose. - Speaker 8 notes tens of thousands of fake voters and illegally cast ballots in the November election, asserting impacts across down-ballot races. - The speakers reference broader connections among Venezuela, U.S. election irregularities, and international actors, tying together various claims about foreign interference, domestic vulnerabilities, and alleged concealment or delay of intelligence reports.

Video Saved From X

reSee.it Video Transcript AI Summary
The speakers discuss the need to improve the electoral system and address issues with corrupt administrators and faulty voting machines. They criticize the lack of investigation into the source code and cast vote records of the machines. They also mention a case in Georgia that exposes problems with the machines. They believe that the Department of Homeland Security is involved in election subversion and that the machines can be easily manipulated. They mention a forthcoming film that aims to shed light on the election issues. The speakers assert that they have evidence to support their claims and challenge opponents to present their arguments. They maintain that the election was stolen.

Video Saved From X

reSee.it Video Transcript AI Summary
Patrick discusses the discovery of fraudulent ballots in Georgia. After sending someone to investigate a voting operation in Fulton County, they found that one of the three piles of ballots was illegitimate. The Georgia Senate Judiciary Committee inspected the ballots but they were later loaded onto a rental van and disappeared. The next day, a shredding operation in a neighboring county shredded some of the ballots, but law enforcement intervened and found shredded ballots and a receipt from a Chinese company. Patrick believes this is a national security issue and calls for action. He expresses confidence that Americans will not accept a rigged election and emphasizes the importance of maintaining peace while standing against it.

Video Saved From X

reSee.it Video Transcript AI Summary
Elon Musk's warnings about 500,000 unregistered voters in Michigan have been validated as evidence of election fraud emerges. Reports indicate that Dominion Voting Systems has caused ballot issues, particularly affecting disabled voters. In Michigan, over 100,000 false ballots were allegedly cast, and a Supreme Court ruling confirmed illegal aliens cannot vote in Virginia. Additionally, a Colorado official leaked passwords to voting machines, raising security concerns. The situation is chaotic, with claims of excess ballots and unregistered individuals voting. Despite denials from officials, investigations reveal discrepancies in voter registrations. The urgency for accountability and transparency in the electoral process is emphasized as the election approaches, with calls for emergency hearings to address these serious issues.

Video Saved From X

reSee.it Video Transcript AI Summary
- Speaker 0 asserts that mail-in ballots are corrupt and that a Republican-led effort will end mail-in ballots, including drafting an executive order by “the best lawyers in the country.” They claim the U.S. is nearly the only country using mail-in ballots and cite “massive fraud all over the place,” arguing that secure, paper-ballot elections with watermarking would produce faster results (claims that paper ballots provide results the same night, whereas machines allegedly take two weeks). - The conversation references a specific election night anomaly: a block of 138,000 votes (Speaker 1 and Speaker 2 confirm “138,000” votes) all reportedly voting for Biden with no Trump votes in that segment, described as inexplicable and not consistent with expected linear reporting. They note the timing as around 04:30–06:30 in the morning and suggest the results should not be linear given numerous counters reporting across states. They also complain that Nevada stopped counting mid-day, calling it inexplicable and illogical. - Speaker 4 claims a counting software glitch caused a 6,000-vote swing in a county, where ballots counted for Democrats were miscalculated for Republicans; she states that 47 counties use the same software. - Speaker 5 demonstrates concerns about voting-machine security: he shows how a bad actor could gain full admin access in under two minutes by opening a device, removing the card reader, and bypassing error messages, implying easy manipulation of tabulation in 18 states using the machine. - Speaker 6 describes observed ballot processing irregularities: a ballot-stuffing environment where ballots are stamped and filled in rapidly at the top of tickets, with security oversight present but gaps noted in workflow. - Speaker 7 discusses absentee/mail-in ballots with suspicions about sequence numbers: numbers appeared almost sequential, suggesting they could not be from mailed-in ballots, as mailed ballots typically arrive at different numbers; they note there was no date on envelopes and that some details would not be in poll books or the system, alleging irregularities in how ballots were handled. - Speaker 8 reports ongoing theft of duplicate ballots: a table for duplicates existed, but ballots were copied and redistributed at various tables, with duplicates not fully processed and ballots stashed under boxes; the speaker claims this occurred throughout the night. - Speaker 9 recounts a local media denial of fraud at the TCF center, contrasted with video obtained later showing a van delivering ballots after hours; she describes escort cars, a back-and-forth of ballots, and suggests the presence of unobserved ballots and a lack of witnesses during tabulation. She notes that the video was shared publicly and led to the suspension of a social-media account. - Speaker 10 provides a timeline from October 21, detailing a driver delivering mail-in ballots from New York to Harrisburg, Pennsylvania, and then to Lancaster, with the driver faced hours of waiting, lack of slips, and unclear purpose for moving the load; the driver states that this was the only time he transported mail-in ballots and expresses a belief in the importance of honest elections for Americans.

Video Saved From X

reSee.it Video Transcript AI Summary
The discussion centers on allegations of foreign and domestic interference in the 2020 U.S. election and related vulnerabilities in mail-in voting. - A 2020 FBI intelligence memo warned that China might have been sending fake driver’s licenses into the U.S. to create fake mail-in ballots intended to help Joe Biden win. The memo, reportedly corroborated by licenses intercepted by U.S. Customs and Border Protection in Chicago, was allegedly dismissed and not investigated because it would reflect badly on Trump. There are claims that intelligence reports were requested to be destroyed under federal records rules to prevent leaks before the election, as the memo allegedly indicated China preferred Joe Biden over Donald Trump. - A 60 Minutes segment quoted the head of Homeland Security’s cyber security division stating there were no foreign intrusions in the 2020 election, which is asserted as false by the speakers, citing later indictments of Iranians in Manhattan in 2021 for interfering in the election by hacking a state database to obtain voter IDs used in a malinformation operation. - In Colorado, it is claimed that 670 Dominion passwords from 63 out of 64 counties were exposed on the secretary of state’s public website since June, and that these passwords were known to Secretary of State Jenna Griswold during a trial but not disclosed to clerks. There are accusations that this could imply compromised elections, referencing fraudulent activity in Mesa County and asserting that passwords beyond Colorado were involved with Dominion machines. Dominion’s Colorado base is noted, with a claim that Dominion also has ties to Serbia. A video referenced by Gary Brunson is suggested to support these claims about the origins of the electoral manipulation. - A video and related claims allege a connection to a 30-year CIA whistleblower and trace the origins of the alleged election manipulation to Venezuela and Hugo Chávez, tying in references to Patrick Byrne and broader alleged corruption. - The speakers assert there was a second country deeply involved in meddling in the election, with FBI involvement in August 2020 in recognizing a Chinese operation to mass-produce fake U.S. driver’s licenses and mail-in ballots to influence the election in favor of Biden, describing the operation as designed to help Biden beat Trump. Customs and Border Protection reportedly intercepted 20,000 fake driver’s licenses, corroborating the intelligence, while the Biden administration and the Chris Wray-led FBI allegedly covered this up for five years until the document was provided to Chuck Grassley by Kash Patel. - It is claimed that China viewed mail-in ballots as an enormous vulnerability during the COVID-19 pandemic, exploiting the weakness in the system, and that this concern remains for states lacking strong mail-in voting security. - Additional notes include a claim that there were tightened voting laws in several states post-2020, with increased confidence in the system where tightened; an arrest by HSI Miami and partners of a permanent resident Haitian national for unlawful voting and casting a false ballot; and estimates that 130,000 to 280,000 completed ballots were shipped from Bethpage, New York to Lancaster, Pennsylvania, with the trailer disappearing. - The final claim references tens of thousands of fake voters having illegally cast ballots in the November election, implying broad down-ballot effects across Senate, Congress, and local elections.

Video Saved From X

reSee.it Video Transcript AI Summary
Thousands of ballots moved between states at night to manipulate the election. President Trump's overwhelming votes disrupted their plan to shift votes from Biden to him. Evidence shows this fraud in multiple counties and states. It's clear to anyone who looks at the real evidence. Visit defendingtherepublic.org for more information.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker states that the best investigators are pursuing election integrity. They claim there is evidence that electronic voting systems have been vulnerable to hackers for a long time and can be exploited to manipulate vote results. This vulnerability allegedly drives the mandate to implement paper ballots across the country, so voters can have faith in election integrity.

Video Saved From X

reSee.it Video Transcript AI Summary
- "The electoral systems of The United States can be manipulated by foreign agents or third parties." - "Are you in danger, physical danger, if your true identity is known?" - "Yes." - "We configured the transmission systems and the tally systems." - "I was the national coordinator for voting machines." - "You examined the forensic image of the election management server, that was used in the Mesa County twenty twenty election." - "In the case of Mesa, Colorado, all evidence, all log, all of that was deleted." - "We saw both images, the old one and the new one." - "And the structure changed, the structure of the program changed as compared to the version 5.5." - "Whoever gave the authorization for the system to be updated would be the person responsible for all the files that were deleted." - "It's easy to rig an election with it, and it's hard to audit."

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the public is being deceived about election security. They argue that while individual voting machines may not be connected to the internet, state and county databases are. They allege that votes are stored on a server in Frankfurt, Germany, and that the election software used in 28 states may be infected with malware called Q Snatch. Cybersecurity investigators suggest that this malware could allow hackers to manipulate votes in election databases nationwide. The cofounder of Allied Security Operations supports these claims, stating that the malware collects credentials and enables changes to be made to votes at various stages of the election process. The speaker suggests that this could explain the malicious activities observed during the election.

Video Saved From X

reSee.it Video Transcript AI Summary
Suzanne, welcome. We need to discuss election security as we approach election day. Early voting has already begun in many states. It's crucial for Americans to recognize that election officials have been preparing for this moment for years, ensuring the safety and security of voting locations. Voters should feel confident about their safety and the integrity of the voting process. While there are concerns about the political climate and potential threats, it's important to emphasize the efforts made by state and local officials to protect the election process.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker warns that “they have taken control of our society” and urges everyone to stand up, from the White House to every American, insisting that surrender is not an option and that time is running out, with a comparison to the urgency seen in Hong Kong. The speaker claims the attack on the capital was carried out by Antifa but was enabled by political figures—McConnell, Schumer, Pelosi, and the mayor—who allegedly knew it was coming and were lax on security, allowing Antifa to act before the media picked it up. The speaker criticizes media coverage as disgraceful, referencing an affiliation with Fox for almost seventeen years and asserting that Rupert Murdoch and his sons are driving a merge with the rest of the mainstream media. The assertion is made that this consolidation represents a serious, expanding threat. Attention turns to alleged cyber and information warfare, with the speaker mentioning new information about battleground states where cyber warfare was used. The speaker claims that former FBI director James Comey sold HAMR and Scorecard, a top-secret program, to the Chinese. According to the speaker, HAMR is a program that simulates an iPhone-like app inside the voting network, enabling it to be installed and to modulate voting to favor one candidate over another, rather than by a large margin. The speaker recounts a specific telephone claim: on a Tuesday night at 11:30, they were told that the ISI of Pakistan was in the voting machines in Georgia. They say they informed someone about it. The claim is made that, in Georgia, the two candidates Loeffler and Purdue were ahead, but one hour later, they were behind, suggesting a dramatic and rapid shift attributed to external manipulation. Throughout, the speaker emphasizes urgency, global and domestic conspiracies, and the need to act immediately to counter perceived control over society, media, and the electoral process. The narrative ties together political figures, media influence, alleged clandestine cyber tools, and foreign involvement in U.S. voting systems, presenting a cohesive but controversial account of systemic manipulation and imminent danger.

The Rubin Report

Trump’s Brutal Plan for His Second Term | Dinesh D’Souza
Guests: Dinesh D'Souza
reSee.it Podcast Summary
Dinesh D'Souza discusses Donald Trump's resilience amid 91 criminal charges, suggesting that while other Republicans would falter, Trump continues to thrive politically. He reflects on his evolving perspective of Trump since 2016, noting that Trump symbolizes a departure from the political elite and resonates with everyday Americans. D'Souza argues that Trump's rise is a reaction against the transformative policies of the Obama era, which many underestimated. He believes Trump underestimated the depth of government corruption, particularly during the COVID-19 pandemic, where Trump trusted established institutions that ultimately turned against him. D'Souza emphasizes the need for Trump to broaden his coalition and appoint capable individuals to reform government institutions in a potential second term. The conversation touches on election integrity, with D'Souza asserting that the GOP is now more vigilant against voter fraud. He highlights the vulnerabilities in the election system, including the ease of ballot manufacturing. D'Souza expresses confidence that if the election is fair, Trump will win, but acknowledges the challenges posed by media manipulation and institutional biases. Ultimately, he argues for accountability within government and media to restore trust and normalcy in American politics, suggesting that without such measures, the country risks further division and instability.

PBD Podcast

“Never Trust, Always Verify” - Harri Hursti Hacks a Voting Machine LIVE on PBD Podcast!
Guests: Harri Hursti
reSee.it Podcast Summary
Concerns about the integrity of voting systems are prevalent, with many questioning whether their votes truly count and if the machines can be manipulated. Harri Hursti, a hacker and security researcher, emphasizes that every independent study has shown that voting machines can be hacked, and he advocates for a "zero trust" approach—never trust, always verify. He argues that the vulnerabilities in voting machines are not merely technological issues but also regulatory and legal problems that require political will to address. With elections approaching, Hursti discusses his extensive experience with voting machines, including his participation in an HBO documentary where he demonstrated their vulnerabilities. He highlights that the lack of mandatory security standards has led to persistent issues, and he believes that transparency is essential for restoring public trust in the electoral process. Hursti asserts that while he has confidence in the U.S. election system, improvements are necessary, particularly the transition to hand-marked paper ballots, which allow for verification through audits. During the conversation, Hursti demonstrates a hack on a voting machine, showcasing how easily it can be manipulated. He notes that once access is gained, hackers can change results without detection, underscoring the need for robust security measures. He expresses concern over the dismantling of security protocols in some jurisdictions, which could undermine election integrity. Hursti also addresses the implications of foreign interference, stating that adversaries like Russia and China are continuously probing U.S. systems. He emphasizes that while vulnerabilities exist, the focus should be on improving security and ensuring that election processes are transparent and verifiable. The discussion touches on the complexities of U.S. elections, the need for independent audits, and the importance of public participation in the electoral process. In conclusion, Hursti advocates for a comprehensive approach to election security that includes hand-marked paper ballots, risk-limiting audits, and a commitment to transparency to rebuild trust in the electoral system.
View Full Interactive Feed