TruthArchive.ai - Related Video Feed

Video Saved From X

reSee.it Video Transcript AI Summary
"The use of some 19,000 electronic voting machines in the city of Chicago and Cook County primary on March 21 is now under intense scrutiny." "The US company that makes the machines, Sequoia, was bought in 2005 by Smartmatic, a private company primarily owned by Venezuelan businessmen." "I think that American elections ought to be run by American companies and ought to be run by American citizens, not Venezuelan nationals." "We believe this is a national security issue. There is no way that companies belonging to non US corporations should have access to our elections." "In the case of, Smartmatic, there are a number of unanswered questions." "Certainly, our government should know."

Video Saved From X

reSee.it Video Transcript AI Summary
In 2018, the Dallas elections had irregularities, similar to what we're hearing now. Texas hired a cybersecurity group to investigate these irregularities, finding 10 different ways the Dominion equipment could be manipulated. Texas outlawed the use of Dominion, but it was still used. This group spent 2 years reverse engineering how to rig an election using Dominion. Meanwhile, another cybersecurity group, including hackers and other experts, mapped out the election manipulation plan. They approached DHS and CISA for a meeting, but they refused to attend. It's concerning how many people turned a blind eye to this issue. Lawyers involved may not understand the technology, but they should be held accountable.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0, Speaker 1, and Speaker 2 discuss Dominion’s access to election systems during the 2020 election period in Georgia, with Gwinnett County cited as a specific example. The dialogue confirms that the questioning period was during the 2020 election, and the focus is on whether Dominion remotely accessed election systems and whether such access occurred in Georgia. Speaker 2 asks if there is any indication of nonelection personnel remotely accessing a Dominion system. Speaker 3 responds that they have reviewed a series of emails produced by Dominion in which they’re discussing remoting into Gwinnett County, Georgia. Speaker 1 then notes that Speaker 0 had mentioned Dominion remote collection or connection to election systems but lacks evidence that it occurred in Georgia. Speaker 0 asserts that there was one county and that they have seen many Dominion emails, requiring translation from Serbian to English to verify technical questions and translations. Speaker 1 asks specifically: “So it's your testimony that there is evidence of dominion remotely accessing Georgia election equipment?” Speaker 0 answers: “Yes, on the one county. It was included with stuff that I was researching and reading through considering Colorado. Michigan was also involved and there were other ones.” Speaker 2 inquires about Dominion’s ability to remotely connect to these election systems and whether they could do so without detection. Speaker 0 responds: “Yes.” Speaker 2 then asks if the interviewee is aware of any instances in which that has occurred, and Speaker 0 confirms: “One would be the Denver, Colorado server was granted or requested to grant Belgrave, Only Belgrade. Did search. There is a Belgrade Montana.” The speaker questions why Montana would need to connect to a Colorado file transfer server as part of the election system, noting there are other components and things done in the background concerning the database and the configuration of the database server that still do not have an engineering change order. Speaker 0 explains that in operational environments, things sometimes break and need fixing, leading to the submission of a change request or, in this case, an engineering change order that is retroactive. The goal is to record the process to ensure change management and integrity of the system. If changes are not recorded, it leads to a bad situation, according to Speaker 0.

Video Saved From X

reSee.it Video Transcript AI Summary
A Microsoft certified security expert provided evidence of a Dominion vote counting machine in a swing state with a wireless card connected to a thermostat's wireless network. The IP address traced back to a city in China, linked to a Chinese corporation involved in questionable dealings with American politicians. There is a thick binder of documented evidence showing foreign access and interference in the election, including public statements from the FBI and DHS warning about Iran's involvement. The evidence is undeniable, and those questioning it should argue with the FBI and DHS. The photographs and IPs provide conclusive proof of foreign interference in the voting systems.

Video Saved From X

reSee.it Video Transcript AI Summary
In general, would you say that Smartmatic software was designed with two principles in mind? Number one, it's easy to rig elections. Number two, it's hard to audit. That is correct. And is the same true for Dominion software? It's easy to rig an election with it, and it's hard to audit. That is correct.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 1, Clinton Eugene Curtis, testifies that he wrote a prototype program in 2000 that could secretly fix elections. The program could flip votes to any desired candidate without detection by election officials. Curtis explains that the only way to detect such a program would be to view the source code or compare paper receipts to the actual vote totals. When asked if he could have designed a protective program to prevent election rigging in Ohio, Curtis says no, as it would require examining the source code and involving programmers from all parties. Curtis believes that the Ohio presidential election was hacked based on statistical anomalies between exit polling data and tabulated results. He also reveals that he was asked to design the program by Tom Feeney, who was a lobbyist for Yang Enterprises.

Video Saved From X

reSee.it Video Transcript AI Summary
I was invited to investigate the Mesa County server to compare the before and after images. I wanted to test the system's security, so I used a backdoor utility called SQL Server Management Studio, which is not certified software and should not be on a voting machine. I quickly accessed the presidential election results in Mesa County, showing Biden with 31,000 votes and Trump with 56,000 votes. I will explain later how easily I could manipulate the election results if I wanted to.

Video Saved From X

reSee.it Video Transcript AI Summary
"Smartmatic is a labyrinth of international holding companies owned by Venezuelan businessmen." "When Smartmatic bought The US voting machine companies, the US government did not review the sale." "Many experts say those voting machines were manipulated in Venezuela to give president Hugo Chavez a victory." "Exit polls done by The US firm Penn shown in Berlin had Chavez losing 41% to 59%." "But the next day, Chavez declared victory, reversing the score, saying he won 59% of the vote." "All these machines talk to a central computer and report on their results." "And in that mechanism, as they communicate with the center, the central machine can report anything." "The Chavez government gave Bizta, Smartmatic, and another company a $91,000,000 contract to run voting machines for the February."

Video Saved From X

reSee.it Video Transcript AI Summary
Do you believe votes were manipulated electronically in favor of Joe Biden? Yes, I do. I saw reports of votes switching from Trump to Biden—around 12,000 and 20,000 votes in two instances, with Trump's numbers decreasing exactly as Biden's increased. I suspected something was wrong, especially with claims of intelligence involvement. The Dominion Company, a Canadian firm, stored its records in Germany and Spain, raising concerns about foreign interference. It seems there may have been CIA involvement, as U.S. forces seized servers in Germany, which were linked to CIA operations. Now, those servers are with the FBI, which makes me uneasy, but at least they are in American hands.

Video Saved From X

reSee.it Video Transcript AI Summary
A computer programmer testified that programs exist to secretly fix elections. He claims that in February, he wrote a prototype for Congressman Tom Feeney that could rig an election. The program could flip the vote to 51-49 for a candidate in any race. He stated that election officials would never detect the program.

Video Saved From X

reSee.it Video Transcript AI Summary
We subpoenaed Mike Frontera, Dominion's lawyer, but they blocked our witnesses. Since June, 670 bios passwords from 63 of Colorado's 64 counties have been publicly accessible, putting the election at risk. Jenna Griswold knew about this during my trial and failed to inform the clerks, only apologizing afterward. This negligence could compromise elections in other states too, particularly with Dominion machines. There are issues in Arizona and Michigan linked to this. The situation connects back to corruption involving Hugo Chavez in Venezuela, as highlighted by whistleblower Gary Brunson.

Video Saved From X

reSee.it Video Transcript AI Summary
We subpoenaed Mike Frontera, Dominion's lawyer, but they prevented us from accessing our witnesses. Since June, 670 bios passwords from 63 of Colorado's 64 counties have been publicly available, putting election security at risk. Jenna Griswold should be held accountable for this leak, which she knew about during my trial but failed to address. This negligence has compromised not just Colorado's elections but potentially others across the U.S. involving Dominion machines. There are serious concerns about election integrity in states like Arizona and Michigan. The situation ties back to international corruption, including connections to Venezuela and figures like Hugo Chavez.

Video Saved From X

reSee.it Video Transcript AI Summary
Voting systems are designed as closed systems without any Internet connectivity or external access. They are not meant to connect to the outside world in any way. Is there any remote access to the information on the equipment or within the machines? No, there is no remote access. Does anyone have access, to the best of your knowledge? No, no one has access.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker reveals shocking information about the deletion of the entire database directory from the d drive of the machine called EMS primary. This deletion occurred approximately 10 days before the machines were handed over to the Senate. Deleting documents after being told to preserve them can have severe legal consequences. Additionally, the main database for the election management system software, which contains all election-related data from the November 2020 general election, is missing from the EMS primary machine. This suggests that it has been removed.

Video Saved From X

reSee.it Video Transcript AI Summary
Is it standard practice to delete files off a server after an election? I hope not. So, you admit Maricopa County deleted files after the election? Those files were archived. The auditors initially didn’t have access to those archived files, correct? They did not subpoena those, that's right. You didn’t feel obligated to turn them over? We responded to the subpoena. It’s laughable to suggest a county could delete files in response to a subpoena. Your Twitter mentions purging the 2020 election database in February as standard practice. Can you confirm that’s done for all elections? I cannot confirm that today, but we’ll get you an answer. Why was data from prior elections still present? I don’t have an answer now, but we will provide one. The recorder will answer questions in a timely fashion, but he previously criticized Adrian Fontes, who ran the 2020 election. Yes, we had oversight from both parties during the election.

Video Saved From X

reSee.it Video Transcript AI Summary
The transcript presents a broad, multi-voiced warning about the vulnerability of U.S. voting systems and the ease with which they can be hacked, hacked-stopping demonstrations, and the security gaps that remain even as elections continue. Key points and claims: - Virginia stopped using touch screen voting because it is “so vulnerable,” and multiple speakers argue that all voting machines must be examined to prevent hacking and attacks. Speaker 0, Speaker 1, and others emphasize systemic vulnerability across states. - Researchers have repeatedly demonstrated that ballot recording machines and other voting systems are susceptible to tampering, with examples that even hackers with limited knowledge can breach machines in minutes (Speaker 2, Speaker 3). - In 2018, electronic voting machines in Georgia and Texas allegedly deleted votes for certain candidates or switched votes from one candidate to another (Speaker 4). - The largest voting machine vendors are accused of cybersecurity violations, including directing that remote access software be installed, which would make machines attractive to fraudsters and hackers (Speaker 5). - Across the country, voting machines are described as easily hackable, with contention that three companies control many systems and that individual machines pose significant risk (Speaker 2, Speaker 6). - Many states use antiquated machines vulnerable to hacking, with demonstrations showing how easily workers could hack electronic voting machines (Speakers 7, 2). - A substantial portion of American voters use machines researchers say have serious security flaws, including backdoors (Speaker 5). Some states reportedly have no paper trail or only partial paper records (Speaker 5, various). - Aging systems are noted as failing due to use of unsupported software such as Windows XP/2000, increasing vulnerability to cyber attacks (Speaker 9). An observed concern is that 40 states use machines at least a decade old (Speaker 9). - Specific past intrusions are cited: Illinois and Arizona in 2016 had election websites hacked, with malware installed and sensitive voter information downloaded (Speaker 4). - There is debate about whether votes were changed in the 2016 election; one speaker notes that experts say you cannot claim—without forensic analysis—that votes were not changed (Speaker 17, 18). - The existence of paper records is contested: some jurisdictions lack verifiable paper trails, undermining the ability to prove results are legitimate (Speaker 5, 9). - Some devices rely on cellular modems to transmit results after elections, creating additional avenues for interception and manipulation; vendors acknowledge modems but vary in how they frame Internet connectivity (Speakers 10, 11, 13, 14, 17, 18, 19, 20, 21). The debate covers whether cellular transmissions truly isolate from the Internet or provide a backdoor, with demonstrations showing that modems can be connected to Internet networks and could be exploited. - The “programming” phase of elections—where memory cards are prepared with candidates and contests—can be a vector for spread of rogue software if an attacker compromises the election management system (Speaker 11, Speaker 10). - A scenario is outlined in which an attacker identifies weak swing states, probes them, hacks the election management system or outside vendors, spreads malicious code to machines, and alters a portion of votes; the assumption is that many jurisdictions will not rigorously use paper records to verify computer results (Speaker 10). - A Virginia governor’s anecdote is shared: after a hack demonstrated off-site by experts, all machines were decertified and replaced with paper ballots (Speaker 16). Overall impression: the discussion paints a picture of pervasive vulnerability, aging and diverse systems, reliance on modems and networked components, potential for targeted manipulation in close elections, and the need for upgrades and robust forensic capabilities, while noting contested claims about the extent of past interference.

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 asserts that there was direct access to the Antrim County election management system (EMS). They claim that on November 5, an anonymous user logged on to the EMS remotely with escalated privileges and made changes to the database while attempting to retabulate the election. This, they say, constitutes a significant development, proving that the machines were remotely accessed and that access was by an anonymous user with elevated system privileges. Speaker 0 also discusses ballots, referring to black boxes on the side of the ballot, noting that there are 59 such black boxes. They state that forensic images show that in Antrim County, blocks 15, 18, 28, 41, and 44 were intentionally modified. The modification involved altering the height, width, and shape of those blocks with the intention of generating errors. They describe the consequence of such modifications: by modding these specific blocks, they were able to cause rejections for Republican ballots. Specifically, they claim that if a ballot voted for Donald Trump and was fed into the machine, that ballot was rejected at a rate 20% higher than for Joe Biden ballots.

Video Saved From X

reSee.it Video Transcript AI Summary
Is it standard practice to delete files off a server after an election? I hope not. So, you admit Maricopa County deleted files after the election? Those files were archived. Initially, auditors didn’t have access to those archived files, correct? They did not subpoena those, that’s correct. It’s laughable to suggest that a county can delete files in response to a subpoena while claiming they are archived. Your Twitter mentions purging the 2020 election database in February; is that standard for all elections? I can’t confirm that today, but we’ll get you an answer. Why was data from prior elections still present? I don’t have an answer now, but we’ll provide one. The recorder will answer questions timely. You hired someone to oversee the 2020 election due to concerns about Adrian Fontes, correct? We took back responsibility for election operations to ensure oversight.

Video Saved From X

reSee.it Video Transcript AI Summary
- Speaker 0 asserts that mail-in ballots are corrupt and that a Republican-led effort will end mail-in ballots, including drafting an executive order by “the best lawyers in the country.” They claim the U.S. is nearly the only country using mail-in ballots and cite “massive fraud all over the place,” arguing that secure, paper-ballot elections with watermarking would produce faster results (claims that paper ballots provide results the same night, whereas machines allegedly take two weeks). - The conversation references a specific election night anomaly: a block of 138,000 votes (Speaker 1 and Speaker 2 confirm “138,000” votes) all reportedly voting for Biden with no Trump votes in that segment, described as inexplicable and not consistent with expected linear reporting. They note the timing as around 04:30–06:30 in the morning and suggest the results should not be linear given numerous counters reporting across states. They also complain that Nevada stopped counting mid-day, calling it inexplicable and illogical. - Speaker 4 claims a counting software glitch caused a 6,000-vote swing in a county, where ballots counted for Democrats were miscalculated for Republicans; she states that 47 counties use the same software. - Speaker 5 demonstrates concerns about voting-machine security: he shows how a bad actor could gain full admin access in under two minutes by opening a device, removing the card reader, and bypassing error messages, implying easy manipulation of tabulation in 18 states using the machine. - Speaker 6 describes observed ballot processing irregularities: a ballot-stuffing environment where ballots are stamped and filled in rapidly at the top of tickets, with security oversight present but gaps noted in workflow. - Speaker 7 discusses absentee/mail-in ballots with suspicions about sequence numbers: numbers appeared almost sequential, suggesting they could not be from mailed-in ballots, as mailed ballots typically arrive at different numbers; they note there was no date on envelopes and that some details would not be in poll books or the system, alleging irregularities in how ballots were handled. - Speaker 8 reports ongoing theft of duplicate ballots: a table for duplicates existed, but ballots were copied and redistributed at various tables, with duplicates not fully processed and ballots stashed under boxes; the speaker claims this occurred throughout the night. - Speaker 9 recounts a local media denial of fraud at the TCF center, contrasted with video obtained later showing a van delivering ballots after hours; she describes escort cars, a back-and-forth of ballots, and suggests the presence of unobserved ballots and a lack of witnesses during tabulation. She notes that the video was shared publicly and led to the suspension of a social-media account. - Speaker 10 provides a timeline from October 21, detailing a driver delivering mail-in ballots from New York to Harrisburg, Pennsylvania, and then to Lancaster, with the driver faced hours of waiting, lack of slips, and unclear purpose for moving the load; the driver states that this was the only time he transported mail-in ballots and expresses a belief in the importance of honest elections for Americans.

Video Saved From X

reSee.it Video Transcript AI Summary
Forensic copy bit for bit of everything that was on the Mesa County computer. Just to clarify, there were two forensic images taken of the Mesa County Election server. One, before the software update. Another image taken after. Everything that had been on that drive before this update was gone. Looks like a cover up. Low risk of being caught. Low consequence if they are caught. The reason we know it was deliberate is because of Tina Peters. Are those files important to elections? Critical. The federal voting system standards are very clear that the election records that are required to audit a voting system include the digital records that are all the log files generated by that voting system, especially when it's a complex computer system.

Video Saved From X

reSee.it Video Transcript AI Summary
A senior law enforcement officer witnessed unauthorized individuals inserting USBs into voting machines multiple times. Despite demands for forensic evidence collection, no action was taken. Chain of custody logs and records in Delaware County are missing, leaving 100,000-120,000 ballots in question with no remedy available. The speaker believes certifying the vote would be unconscionable. Translation: A senior law enforcement officer saw unauthorized people inserting USBs into voting machines multiple times. Despite requests for forensic evidence collection, no action was taken. Chain of custody logs and records in Delaware County are missing, leaving 100,000-120,000 ballots in question with no solution available. The speaker believes certifying the vote would be unethical.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker claims that the public is being deceived about election security. They argue that while individual voting machines may not be connected to the internet, state and county databases are. They allege that votes are stored on a server in Frankfurt, Germany, and that the election software used in 28 states may be infected with malware called Q Snatch. Cybersecurity investigators suggest that this malware could allow hackers to manipulate votes in election databases nationwide. The cofounder of Allied Security Operations supports these claims, stating that the malware collects credentials and enables changes to be made to votes at various stages of the election process. The speaker suggests that this could explain the malicious activities observed during the election.

Video Saved From X

reSee.it Video Transcript AI Summary
I have questions about the election in Arizona, particularly in Maricopa County. Did you authorize the secret testing on the machines, considering the election procedures manual states you should oversee additional testing? Also, are you aware of the signatures on the mail-in ballot updates and how they don't resemble the voter's signatures? As Secretary of State, you oversaw elections in Maricopa County and Arizona. Is it true you told someone to give it an "effing rest?"

Video Saved From X

reSee.it Video Transcript AI Summary
Speaker 0 presents a video focused on data and evidence of alleged irregularities in the 2020 election, asserting that there has been no comprehensive place to see widespread fraud until now. He states the video is “pure data” and invites viewers to consider the statistical anomalies in three states (Michigan, Wisconsin, Georgia) in the early hours of 11/04/2020, when Biden received major vote spikes after trailing Trump. - He analyzes 8,954 individual vote updates and identifies a clear statistical pattern across nearly all updates, with four notably aberrant updates: two in Michigan, one in Wisconsin, and one in Georgia, all occurring in the same five-hour window in the middle of the night when counting reportedly stopped in some places. - In Michigan, a 06:30AM update shows Biden at 141,258 votes to Trump’s 5,968, described as the most extreme update in all datasets across all states, followed by a noticeable ratio change in nearby updates. In Wisconsin, a single update allegedly moved Biden from trailing by over 100,000 votes into the lead. In Georgia, a 01:34AM Eastern Time update shows Biden at 136,155 to Trump’s 29,115. They claim these four spikes exceed the states’ margins of victory, making the spikes not only abnormal by percentage but also by magnitude. They conclude that if these four unlikely updates had not happened, the presidency could have been different. - Detractors are cited as arguing human error, but the video questions where evidence of corrections is, and notes that California shows only one anomalous update in percentage, not enough magnitude to shift outcomes. - A “consistently identical ratio of Biden to Trump votes across time” is highlighted as allegedly impossible, with a Florida example showing 100 identical ratios over several days. The video asserts a computer algorithm is involved, termed a weighted race distribution, associated with Diebold voting machines (known as early as 2001), implying values rather than simple counts. - In California, a single update is shown with Biden receiving about 65% and Trump 32% for one vote, raising questions about how one vote could go to more than one candidate. Speaker 0 then links these patterns to alleged connections between Diebold and Dominion Voting Systems, claiming Dominion acquired ESNS in 2010, which had previously acquired Diebold, and that Dominion’s software is licensed from Smartmatic. They also note that forensic audits show errors and that the mainstream narrative claims these issues are misinformation. They reference NBC News and PBS findings on how easy it is to hack voting machines or cast fake votes. Next, Speaker 0 notes eyewitness and video evidence from Georgia: poll worker Ruby allegedly was filmed in the backroom with absentee ballots, and at 10:30PM on November 3, media and poll watchers were told to leave, yet Ruby and others remained, pulling ballots from under a table and distributing them to counting stations. They describe Ruby running the same stack of ballots to the machine three times, observing a large Biden surge after 01:34AM Georgia time, and question whether a ballot can be counted more than once, citing Coffey County, Georgia as an example of someone claiming to scan the same batches repeatedly. Speaker 0 references Raquel Rodriguez, arrested for election fraud in Texas over video evidence of ballot harvesting, and asserts that cybersecurity evidence indicates Dominion and Edison Research used an unencrypted VPN with easily accessible credentials allowing foreign access, asserting that China, Iran, and other countries accessed the servers, contradicting claims that Dominion machines were not connected to the Internet. They mention Dominion’s association with a Chinese-registered domain, and board members with Chinese nationality, alleging conflicts of interest through corporate ownership and licensing from Smartmatic. Speaker 0 highlights that Antrim County, Michigan audits found high error and adjudication rates in Dominion, with an 68 o 5% error rate far above federal guidelines, missing logs for 2020, and reprogramming of election event designer cards during the safe harbor period. They point to subpoenas and the lack of access to logs, and to affidavits from poll workers claiming illegal activities, non-equal treatment of observers, counting without proper oversight, shredding ballots, and other irregularities. Speaker 7 concludes with a claim that many Americans distrust the 2020 election and urges viewers to download and share the video, demand election reform, and notes that the video’s credits will continue with data readers, while warning of erasure or fact checks by tech platforms.

Video Saved From X

reSee.it Video Transcript AI Summary
The speaker asserts that there was direct access to the Antrim County election management system (EMS). According to the forensic images, on November 5 an anonymous user logged on to the EMS remotely with escalated privileges and made changes to the database while attempting to retabulate the election. This is presented as a major development indicating remote access to the machines, and specifically remote access by an anonymous user with elevated privileges. Additionally, the speaker describes intentional modifications to ballot components. Ballots have black boxes along the side, with boxes 59 in total. The forensic images allegedly show that blocks 15, 18, 28, 41, and 44 were intentionally modified, altering their height and width to generate errors. The claimed consequence of these modifications is that errors were produced which led to ballot rejections. Specifically, ballots in which a voter chose Donald Trump and then fed the ballot into the machine were rejected at a rate 20% higher than ballots for Joe Biden.
View Full Interactive Feed