All Episodes

October 30, 2024 • 35 mins
Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:00):
Easton.

Speaker 2 (00:01):
We have a problem the significance of the passage of time.

Speaker 3 (00:05):
So when you think about it, there is great significance
to the passage of time.

Speaker 4 (00:10):
You're listening to the Situation with Michael Brown on six
thirty kh ow.

Speaker 5 (00:16):
Think of this moment as a moment that is about
great momentum. Here are their rules of engagement.

Speaker 3 (00:26):
Text the word Mike, the three three one zero three,
download the three to you I Heart Radio.

Speaker 4 (00:34):
Be sure to.

Speaker 2 (00:35):
Favorite two shows, The Situation with Michael Brown and The
Weekend with Michael Brown.

Speaker 6 (00:41):
When we talk about the children of the community, they
are a children of the community.

Speaker 4 (00:46):
Catch a little red micro Fallen London and leave a
talk back message if you like if and follow Michael
onex Facebook or or Instagram, as well as streaming the
program law download to bocast, listen to a compilation of
the different type pas. Check out the merch and send

(01:07):
fix you an e merge to Dragon.

Speaker 5 (01:10):
You need to get to go.

Speaker 6 (01:11):
I need to be able to get where you need
to go to do the work and get home.

Speaker 4 (01:16):
You can also see the various photos and stories.

Speaker 5 (01:18):
You think the dragons posts.

Speaker 3 (01:21):
There's Mico says go here dot com.

Speaker 5 (01:25):
What's that here, Mico says, go here dot com and.

Speaker 4 (01:29):
You're gonna literally see the creators on the med.

Speaker 7 (01:34):
You know what I'm it was a weird day.

Speaker 6 (01:42):
I don't know.

Speaker 7 (01:42):
I just felt like it was a weird day. Like so,
I walk in and we get these rules of which
you I absolutely despise, these rules of engagement and we
only play them when we don't have So, if you'll
just give me the microphone for a moment, mister a producer.

Speaker 5 (02:01):
Esson, the accent is back.

Speaker 3 (02:03):
Stacey Abrams would be the governor of Georgia.

Speaker 5 (02:07):
Andrew Gillham is the governor of Florida.

Speaker 8 (02:10):
First we saw her develop the magical accent when she
was down south.

Speaker 6 (02:15):
I'm gonna get into some business now, okay.

Speaker 5 (02:18):
And now it's back.

Speaker 9 (02:19):
You all know, just win in twenty twenty and we're
gonna do it again in twenty twenty four.

Speaker 5 (02:23):
We gonna beat him in November. What are you going
to do about it? We all know you don't talk
like that. You've been vice president for four years. He
does not walk it like he talks it. She doesn't
talk like this. When we get this done together, morand
I know i'd talk to you. I mean, come on,
why can I get a witness? And they know, we

(02:44):
all know she's just a big walking bag of artifice.

Speaker 7 (02:48):
You think you just fell out of a coconut tree.

Speaker 5 (02:51):
Best rapper alive, chupat are you kidding me? I'm totally
part of that listening generation of music.

Speaker 8 (03:03):
She seems to come forth with some sort of an
accent while she's talking to French scientists.

Speaker 2 (03:09):
We campaign with deep Plan, Uppercase Tea, uppercase pe Deep Plan.

Speaker 5 (03:15):
We're expected to defend the plan. What was that?

Speaker 7 (03:19):
But that was weird?

Speaker 5 (03:19):
Oh, the possibilities are immense. Whatever you want to do,
you can do.

Speaker 6 (03:24):
I eat no for breakfast, young men of color, black
men is not It's not just the barbershop, no coma.

Speaker 4 (03:31):
Here's this Indian right.

Speaker 5 (03:32):
We got these brothers out there. This one brother is
doing a lot of work on space or yes, yes,
my chitty is here. I was just talking with my
chitty about this. Go to India for the Valey. We
have to stay woke. Let's get a cease fire. There
must be an immediate cease fire, like everybody needs to
be woke. Just stay more woke than less woke. Leave

(03:52):
Grandma's medical marijuana alone. Do you want to put a
little uburb. Yes, okay, let's okay, go on and put
a little a little bit.

Speaker 2 (04:02):
There you go.

Speaker 5 (04:05):
I can't hold my golf.

Speaker 4 (04:07):
I don't know you could freec I cat like indeed
to be proud of one of its daughters.

Speaker 5 (04:13):
You better thank a union member. Since when does the
vice president have what sounds like a Southern accent?

Speaker 2 (04:19):
You matter thank a union member for sickly You better
thank a union member for paid lee.

Speaker 5 (04:25):
It's just it's just serio. It sounds so ridiculous.

Speaker 2 (04:28):
You better thank a union member for vacation time.

Speaker 5 (04:31):
We do. I also worked in McDonald's.

Speaker 7 (04:43):
Maybe we can get a talk back later today, Dragon,
what do you think here's hoping? Oh? Can you imagine that?
As for four years listening to that Although we may
not have listened to much of it because you probably
would come out much she'd only speaks from a teleprompter.
But good grief. Okay, let's go to dragon. Do you

(05:05):
have the top of the hour news story? Can can
you play that real quickly? I want to address an
issue that started blowing up last night, started getting text
messages and emails about passwords we have Truly, what is
today today is the thirtiest. We got six days left.
Oh my god, just dear, dear Jesus, get us to

(05:29):
I don't want to wish my life away, but holy crap,
let's just get this over with.

Speaker 10 (05:35):
And I think we could also promote the fact that
on Tuesday we're not doing We're not any right.

Speaker 5 (05:42):
We're gonna do a nothing.

Speaker 7 (05:43):
We're gonna do a tma ama, We're gonna do dragons
collecting stupid stories. There's nothing to talk about on Tuesday.

Speaker 5 (05:51):
No politics.

Speaker 7 (05:53):
But I won't say no politics. There might be something
has something to do with, you know, something going on
in the government. But we're not going to talk about
the election, correct, because the election's going on. So we're
not going to talk about the election on Tuesday. But
good grief, can we just get some sanity back now?

(06:15):
I get all of these messages about two things, Joe Rogan,
Donald Trump, YouTube and passwords. Passwords, passwords, So let's try
to rationally deal with both of them. I did not
hear the top of the Hour news, but apparently Pat Woodard,
one of our news guys, had the story at the

(06:35):
top of the hour. I've not heard what this says,
So let's see what he says.

Speaker 6 (06:39):
The Colorado Secretary of State's office accidentally posted passwords for
the state's voting systems online.

Speaker 3 (06:45):
The Colorado Republican Party discovered the mistake and immediately demanded
Secretary Jenna Griswold secure all voting machines. The Secretary released
a statement saying it takes two passwords to get into
a voting machine, as well as physical access to that machine,
and only people with security badges have access to the machines,

(07:07):
which are monitored by surveillance cameras. Colorado's County Clerks Association
says the mistake is concerning, but it shouldn't compromise next
week's elections.

Speaker 5 (07:17):
Reporter Brenda Stewart.

Speaker 7 (07:21):
I'm sorry, Can you play the beginning of that one
more time?

Speaker 6 (07:27):
The Colorado Secretary of States accidentally posted passwords for the
state's voting systems online.

Speaker 3 (07:34):
The Colorado Republican Party discovered the mistake and immediately demanded
Secretary Jenna Griswold secure all voting.

Speaker 7 (07:41):
Issueings out there. I didn't hear the Republican Party, so
I started digging around trying to find out what's going on,
and I went to two lefty sources to find out
the first is the Associated Press, and I want to
see what the AP says, because that's the story that
will In fact, I almost thought for a second that

(08:03):
what we were hearing at the top of the hour
was the AP story, because it's not verbatim, but it's
pretty close AP the sea when was this posted? Updated
at seven point fifteen last night. Voting system passwords were

(08:25):
mistakenly put on the Colorado Secretary of State's website for
several months before being spotted and taken down, but the
lapse did not pose an immediate threat to the upcoming election,
said state election officials Tuesday. The passwords were only one

(08:46):
of two that are needed to access any component of
Colorado's voting system and are just one part of a
layered security system, said Jack Todds, spokesman for the Secretary
of State's office, in a statement. The two passwords a quote,
kept in separate places and held by different parties. Then Griswold,

(09:08):
of course she has to get in, and she said
in an interview on nine News Tuesday evening, this is
not a security threat, she set her office again. According
to the AP, her office is investigating that not all
of the passwords in the spreadsheet were active and there
is no reason to believe there's been a security breach. Well,

(09:29):
that's not very encouraging. Griswold said workers are changing passwords,
looking at access logs and chain of custody books. She
frequently calls colorists. According to the AP, she frequently calls
Colorado the gold standard for election security, though there have
been some hiccups in the past. The era has brought

(09:51):
criticism from the chairman of the Colorado Republican Party, who
cares about him at a time of heightened scrutiny of
the country's election systems, though US election remain remarkably reliable.

Speaker 6 (10:07):
Now.

Speaker 7 (10:07):
I don't know the details about two passwords. There may
be a password to turn the machine on, in other words,
for the you know, there's something called the basic input
output system, the BIOS. Every computer has a BIOS, and
there may be a password to access that that basic layer,

(10:27):
the basic input output system. There may be a password
required for that. Then there may be a password required
for the not not for the operating software. Not for
the operating system, but there may be a password required
for the software that is then used to tabulate, or
to calculate, or to do whatever it does, so that

(10:49):
those I'm just assuming here those maybe the two passwords,
but none of that's what bothers me. What bothers me
is why are the passwords on a spreadsheet?

Speaker 6 (11:02):
Why?

Speaker 7 (11:03):
Why are the passwords? That's that's like, uh, you know,
I have I have, I've walked. I can say this
free because I don't think my mom's listening right now,
but I have walked into my into my old home,
my house, my child at home, and I've tried to
fix some stuff on my mom's computer. And I've said, hey, Mom,

(11:23):
what's the password for X? And she will and I
don't mean XT like Twitter, but Mom, what's the password
for this? And she'll say just a minute, and she
starts digging around, and she starts digging around, and she
pretty soon opens up like this, I don't know, note
pad case of some sort, and she starts flipping through

(11:43):
and she's of course written down all of her passwords.
Well she might as well just write it down on
a spreadsheet. So that does not instill confidence in me
that somehow the passwords, whether it's a paper you know,
a paper spreadsheet or an electron one spreadsheet, whatever it is,
that why don't you get a password manager, you know,

(12:05):
why don't you get? For example, I use one password.
One password is pretty much the gold standard of password managers,
and it allows me to electronically store my passwords. I
can also have them stored encrypted. And I have one
main password that is required, and that password is not

(12:30):
written down anywhere. It's not written down anywhere, but I
have a formula in my head that allows me to
under to remember what that password is. I don't even
use a password hint now. Of course, if something happens

(12:51):
to me and I keel over it today, although I
had a great medical checkup yesterday, you'll be glad to
know I'm going to be around for another thirty years.
Uh if if, uh if, If I forget my password,
uh my family is pretty much screwed. I haven't shared
it with anybody. Nobody, nobody has these passwords, all my

(13:12):
financial passwords, all of my all my porn passwords are
on there too, because I obviously don't. I don't want
drag anybody stealing my porn. Why wouldny boy steal porn
in this day and age. But the two passwords are
quote kept in separate places and held by different parties.

(13:33):
Yet they were mistakenly, according to the AP, put on
the Colorado Secretary State's website for several months before before
being spotted. I don't think by an individual's Secretary of
State's office. I think somebody else discovered these. Then, of
course I thought, let's go to the New York Times.
Let's see what the New New York Time says. This

(13:56):
article is uh dated yesterday. I don't have a timestamp
on partial passwords for election machines that were actively leaked
on the Colorist Secretary of State's website pose no threat
to the system of security, The Secretary's office said in
a statement on Tuesday night. Well what do you expect
yours say? The problem is not whether or whether or
not these the leak of these passwords presents a threat

(14:20):
or not. I mean, if they do, obviously that's a
big threat. But the whole problem is, how did.

Speaker 5 (14:26):
This breach occur?

Speaker 7 (14:28):
How did these whether they were a threat or not,
you had a leak. Now, if it's the gold standard,
as Jenner Griswold, who's nothing more than a Democrat activist,
if if these are, if our elections are the gold standard,
then how does somebody outside the Secretary of State's office
discover the passwords that are posted on the website. Jenner Griswold,

(14:53):
you got a problem. I think you're the problem. I
think you representretty much kind of you know, the whole
concept of DEI and you know we're gonna you know,
you got an incompetent staff. How in the world do
you do this? The New York Times says the passwords,
which were exposed on a hidden tab in a spreadsheet online,

(15:18):
were first revealed in a letter by Hope Shepplman, the
vice chair of the Colorado Republican Party. The passwords became
visible when a user downloaded a voting system's inventory spreadsheet
and clicked on hide. According to an affidavit that accompanied
mister Shepplman's letter, the passwords had been exposed since at
least August, but while they breach of passwords, according to

(15:41):
The New York Times, is likely to erode confidence and
invite disinformation. In Colorado, there are multiple layers of security
to protect the integrity of election machines in the state.
How do we know you've breached our confidence? You've breached
our trust, whether or not. Again, I want to emphasize

(16:05):
two separate passwords kept in two separate places. One may
be a basic password to get into the bio system,
the other may be a password to actually get into
the software itself. Who knows what they are? I mean,
I'm just speculating here, but you certainly don't give me
confidence where the gold standard?

Speaker 10 (16:21):
Well, she did also in PATS reports say the fact
that you need to have a badge in order to
get to where the machines are located, as well as
they are under video surveillance.

Speaker 5 (16:33):
But we all who work here know how easy.

Speaker 7 (16:37):
And I'm thinking as you're describing that, I'm thinking in
my head, Dragon, how many movies have I watched where
someone has taken, you know, temporarily gotten someone's badge, scanned
it real quickly, got the info so that they can
now get into the super secret room where the nuclear
weapons are all held.

Speaker 5 (16:58):
Yeah, stupider than that, just fall one of us in.

Speaker 7 (17:03):
And then, of course do it's under video surveillance? My
first question would be, hmmm, do the cameras work? How often?
Do how often do because it turned on? Are the
cameras turned on? And then I want to know who
has access to the video? And do we have eighteen

(17:26):
minutes of just darkness, you know, now dig it? Does
anybody get the eighteen minute reference?

Speaker 1 (17:32):
Huh?

Speaker 6 (17:33):
Huh?

Speaker 7 (17:34):
Richard Nixon, Rosemary Woods? Huh do you eighteen minutes of
erase tapes? And how often are the tapes recorded over
each other? I mean, come on, is this the Circle
K the Circle K video system? What is this? Oh,
it's the gold standard. Let's see New York Times continues
Jake Toddy or Jack Todd. There are two unique passwords

(17:56):
for every election equipment a component, which are kept in
separate places and held different parties. Wait a minute, held
by different parties. Why should anybody hold the passwords? Why?

Speaker 4 (18:08):
Why?

Speaker 7 (18:09):
Why do you? I mean this is a serious question.
I'm not trying to be as smart ass.

Speaker 1 (18:13):
Here.

Speaker 10 (18:13):
Is this like the KFC secret recipe where they're under
lock and key and only two people know it and yeah,
you know ones over here and they're never on the
same plane at the same time.

Speaker 7 (18:24):
Why do two people have and they're Why do two
people have the passwords? And then the passwords are kept
in separate places? You know there's something else going on. Well, oh,
and this is not what I plan to do this morning.
But do I ever plan? Do I ever get to
do what I plan to do any morning. So let's

(18:45):
talk about two other things that are going on that Now,
let me just say this about the passwords. If if
your passwords have been leaked, it's not the gold standard, Okay,
it's just it's just not the gold standard.

Speaker 1 (18:58):
Jim any Christmas, Michael four am. What so important that
you had to wake me up like that? Couldn't you
just have waited so that I could listen to the
podcast later?

Speaker 5 (19:09):
Oh my head, Mike.

Speaker 7 (19:14):
The Marning fair face, the Marning dragon leg and ding Dong.

Speaker 6 (19:17):
Hey, it seems to me that Jenna's got the whrewinhal
of cousin Eddie.

Speaker 7 (19:23):
You know them Griswolds. They got to stick together.

Speaker 4 (19:28):
Now.

Speaker 7 (19:28):
Somebody left me a text message. Because I haven't listened
to it, but somebody, and because I don't know whether
you're being truthful or sarcastic, but you left me a
text message that said that Kyle Clark did a hard
hitting piece of journalism yesterday. Well I just pulled it up.

Speaker 5 (19:44):
Let's see for anyone to see for months if you
knew where to look.

Speaker 8 (19:49):
Democratic Secretary sat Jenna Griswold's office apparently.

Speaker 5 (19:51):
Posted them online by accident.

Speaker 8 (19:54):
Griswold's office found out last Thursday and had not told
the county clerks who actually run election. Then the Colorado
Republican Party went public today demanding the Griswold secure those
voting machines.

Speaker 5 (20:06):
Here's Marshall Zellinger.

Speaker 9 (20:08):
The Colorado Secretary of State's office is required to maintain
a spreadsheet of certified voting systems for each county. That's
this list At the bottom of any spreadsheet. You can
have multiple tabs. You can also hide a tab, but
if you post the raw spreadsheet to a public website,
apparently anyone can also unhide the tab. This happened and
apparently revealed one set of passwords for voting computers in Colorado.

(20:32):
Next confirm this with the Secretary of State's office today,
but we learned about it this morning in an email
blast from the Colorado Republican Party. The passwords had been
up for months without it being known, and some but
not all, were current and active.

Speaker 2 (20:46):
There are two passwords to get into any voting component,
along with physical access.

Speaker 9 (20:51):
Democratic Colorado Secretary of State Jenner Griswold explained how each
computer component requires two passwords to gain access. The ones
on the website were just one of the passwords, and
it requires in person access by multiple people, which is
tracked by twenty four to seven video recording and badge
IDs that record who has gained access.

Speaker 2 (21:10):
We have layers of security and out of just an
abundance of caution, HAP staff in the field changing passwords,
looking at access logs.

Speaker 5 (21:18):
The truth is, is this a concern?

Speaker 4 (21:21):
Yes?

Speaker 11 (21:22):
Is it being mitigated yes? Does this mean that all
of the computers are connected to the Internet and that
votes are being flipped?

Speaker 5 (21:30):
No.

Speaker 9 (21:31):
Matt Crane is the former Republican of Rapahoe County Clerk
and current executive director of the County Clerk's Association. He
admits this is not great news, but not something that
will compromise anyone's vote.

Speaker 11 (21:42):
I want to stress here this is an all Republicans,
but you will have some Republicans who will use this
for political and financial purposes. Whereas we as clerks, we
will say in the truth and honoring our oath of
office to serve to serve our constituents in a truthful
and honest manner.

Speaker 8 (21:58):
Secretary State's Office rightly points out that this alone cannot
compromise the election system. There have to be somebody on
the inside with physical access to a machine to use
these passwords. But for people who don't have faith the
election system or people who are wondering, this is a
hell of an error.

Speaker 5 (22:15):
Yeah, it's pretty bad.

Speaker 9 (22:16):
I've learned something about spreadsheets that if you hit hide
that someone could unhide it.

Speaker 5 (22:20):
But look at it this way. It's like, if you're
worried about I love that.

Speaker 7 (22:24):
I've learned about spreadsheets that if you hit hide, then
somebody can unhide it. Wow. You mean once you hide something,
it's not hidden forever.

Speaker 4 (22:31):
Wow.

Speaker 9 (22:33):
I'm the who has missile control and it takes two keys.
I'm thinking the movie Crimson Tide, You've got one person
with the key in turn and oh so I'm.

Speaker 7 (22:42):
Not the only one that out of this story, and
then thought about movies.

Speaker 9 (22:46):
You need that second person who works at the county
that has access to this other password.

Speaker 5 (22:51):
That person would have to do something too.

Speaker 9 (22:53):
And even then it's not clear if you could do
anything about votes.

Speaker 5 (22:57):
That were in the system or that will be counted.

Speaker 9 (22:59):
You could just changing the system on the computer, like, hey,
we're going to be central Central time, it's at a
mountain times stuff like that. But you need two people,
and this is just one bit of information that one
person would need, and you're still lacking the second person
with that second bit of information.

Speaker 8 (23:15):
As much as we stress it, I feel like you
can hear the conspiracy theories.

Speaker 7 (23:20):
Oh yeah, Dragon makes a good point.

Speaker 5 (23:24):
Right somewhere.

Speaker 10 (23:24):
It may not be posted somewhere online to where that
anybody can get to it, but that implies that the
second ones out there.

Speaker 5 (23:32):
Yeah, being born of this error, Marshall sellinger, thank you.

Speaker 8 (23:37):
Secretary Griswold told me today that she had not decided
whether to tell you the public about that password leak before.

Speaker 5 (23:45):
Huh. I wonder why she got called out on it
publicly today.

Speaker 8 (23:50):
I asked Secretary Griswold whether she takes responsibility for this
election security breach in the same way that she has
held others accountable, and we discussed a string of errors
by her office damage for her confidence.

Speaker 2 (24:02):
To be very clear, we do not see this as
a full security threat to the state. This is not
a security threat.

Speaker 5 (24:08):
You do frequent media.

Speaker 7 (24:09):
We don't see this. I'd love the choice of words.
We don't see this as a full security threat. So
I I you know, if I if I was cross
examining her, I would say, so you do see it
as a security threat? Yes?

Speaker 1 (24:23):
Or no?

Speaker 7 (24:24):
Well you said full?

Speaker 8 (24:26):
So is it a partial interviews warning of the insider
threats to elections? The US Department of Homeland Security defines
an insider threat as somebody who uses authorized access wittingly
or unwittingly to do harm. Did the actions of your
office pose an insider threat to elections?

Speaker 5 (24:49):
By accident?

Speaker 7 (24:50):
Met?

Speaker 5 (24:50):
The definition found out last? By accident met?

Speaker 7 (24:53):
The different why is why is this stupid thing doing this?
This is why I hate playing these on air.

Speaker 5 (24:59):
Here we go thirty protocols.

Speaker 2 (25:02):
Well to push back on you, Kyle, that sentence is
in the press release, but there is a much bigger
press release. And part of that investigation in Mesa County
was two sets of passwords, unauthorized access, stolen passwords, and
it wasn't a different time. Since twenty twenty one and
what happened in Mesa County, our security has improved, including

(25:26):
the twenty four to seven hour cameras, including the badge
and access. The law has been significantly strengthened since then.
We have multiple layers in place to ensure situations like
Mesa County don't occur. And that is not what is
occurring here.

Speaker 8 (25:40):
This is not the first time that your office has
made mistakes that have damaged voter's confidence in our elections.
In twenty twenty two, your office sent out mailers to
thirty thousand non citizens inviting them to register to vote. They,
of course, are not eligible to register to vote. That
same year, your office used Colorado's balloting system to send

(26:01):
messages to specific Colorados encouraging them to vote, when in
fact they had already voted, causing confusion. They had to
be cleaned up by the county clerks. And now this
leak of the voting system passwords given your offices repeated
errors that have damaged confidence in our elections, which you
say is paramount.

Speaker 5 (26:19):
Will you resign?

Speaker 7 (26:22):
Wow, Drag, We've got some real journalism going on here.

Speaker 5 (26:26):
He's finally showing up.

Speaker 1 (26:28):
Wow.

Speaker 2 (26:31):
Absolutely not, Kyle, and I just want to your unfairly
characterizing and leaving out some crucial information. We came out
immediately and said a postcard had been sent out to
people who are ineligible. The postcard clearly stated that someone
had to be a US citizen. No one tried to

(26:53):
register from that group of people. We were actively tracking
it and it became came a situation where they're no
one registered and to push back even further, Kyle, Colorado
was tied for number one in confidence in the country
in our elections. We have stood up to situations time

(27:13):
and time again to protect the right of colorad In's
that I loved.

Speaker 5 (27:17):
About that has found out last Thursday.

Speaker 7 (27:19):
What I love about that is we have stood up
time and time again to you know, solve these problems. Well,
you keep creating these problems, you keep causing the problems.
Good grief.

Speaker 5 (27:32):
This she really is an incompoopent Kyle.

Speaker 2 (27:36):
That sentence is in the press release, but there is
a much bigger press release. And part of that investigation
in Mesa County was two sets of passwords, unauthorized access,
stolen passwords, and it wasn't a different time. Since twenty
twenty one and what happened in Mesa County, our security

(27:57):
has improved, including the twenty four to seven hour cameras,
including the badge and access. The law has been significantly
strengthened since then. We have multiple layers in place to
ensure situations like Mesa County don't occur. And that is
not what is occurring here.

Speaker 8 (28:12):
This is not the first time that your office has
made mistakes that have damaged voter's confidence in our elections.
In twenty twenty two, your office sent out mailers to
thirty thousand non citizens inviting them to register to vote.

Speaker 5 (28:26):
They, of course, are not eligible to register to vote.
That same year, your.

Speaker 8 (28:30):
Office used Colorado's ballot tracking system to send messages to
specific Colorado's encouraging them to vote, when in fact they
had already voted, causing confusion that had.

Speaker 5 (28:40):
To be cleaned up by the county clerks.

Speaker 8 (28:41):
And now this leak of the voting system passwords, given
your offices repeated errors that have damaged confidence in our elections,
which you say is paramount, will you resign?

Speaker 5 (28:55):
Absolutely not.

Speaker 2 (28:56):
Kyle and I just want to are unfairly characterizing and
leaving out.

Speaker 7 (29:03):
Some I'd really like to know you're actually in defense.
I can't believe I'm going to say this in defense
of Kyle Clark. What's he leaving out? What's he left out? Well,
let's see what she has to say crucial information.

Speaker 2 (29:18):
We came out immediately and said a postcard had been
sent out to people who are ineligible. The postcard clearly
stated that someone had to be a US citizen. No
one tried to register from that group of people. We
were actively tracking it, and it became.

Speaker 7 (29:36):
A we're actively tracking it. So you mean you're still
worried that there still may be some who are not
citizens who do register.

Speaker 2 (29:45):
To vote a situation where they're no one registered. And
to push back even further, Kyle Colorado was tied for
number one in confidence in the country in our elections.
We have stood up to situations time time again to
protect the right of coloradence. Going over and beyond what
anybody would ask of civil servants in this.

Speaker 7 (30:07):
Office, what what do you mean beyond what people would
ask if civil servants in that office. How did you
say that when the very story that you're being interviewed
about is that you had spreadsheets with passwords on your website. Now, again,

(30:28):
I want to be objective here. The passwords may not
have resulted in any breaches or in any unlawfully cast balance,
but what it does it shows just how incompetent they
are in terms of do they really understand cybersecurity. I

(30:52):
don't think she does. The very idea that you've got
the passwords on a spreadsheet on your web site shows
that whomever, whoever it is that's in charge of those
passwords ain't paying attention, and that destroys confidence in your office.

(31:14):
We are not if we're the gold standard, we're the
gold standard. We keep making mistakes. But Democrats just don't care.
They just keep going on anyway. They just keep telling
you if you, if you repeat the lie enough that
we're the gold standard, then boom, you must be the
gold standard. Except I don't think we are.

Speaker 5 (31:34):
Barnie, Michael and Dragon.

Speaker 12 (31:36):
So as someone who is in it security, someone's gotta
lose their job over this. And by the way, are
they keeping passwords in two places? One of the places
being the Internet open to the world, and then what's
the other place? Needs a lot of things in the imagination, Well,
have a gat.

Speaker 7 (31:56):
One of the passwords is being kept on a spreadsheet
posted on the web site, and then the other passwords
being kept on a note card on a bunch of
note cards that are in a file cabinet somewhere I
don't know, out somewhere, who knows where?

Speaker 10 (32:09):
No, no, no, no no. The other password is password,
a capital P with a zero.

Speaker 7 (32:16):
Zero the oh, yes, exactly, that's the other one.

Speaker 10 (32:19):
Maybe an exclamation mark on the end if you need that.
It's why you need a non literary number of character.

Speaker 7 (32:25):
So the text messages are you guys get it. Let's see,
we don't have this is gub Gubert number eleven fifty.
We don't have a twenty four car gold standard, but
the fool's gold standard seventeen thirteen no accountability and his
usual indignation that we would expect any accountability. Really, I mean, look, kudos.

(32:53):
I can't I can't believe I'm going to say this.
Kudos to Kyle Clark for actually, I mean Susan who
brought to my attention Susan down in the Springs. Susan,
your Gouber number is now I can't find your text
message anyway, Susans in the Springs. Here it's Guber number
seven zero zero one. I hope you've listened to Kyle

(33:15):
Clarke's interview yesterday with Griswold. It was hard hitting and
he repeatedly held her feet to the fire. He actually
practiced real unbiased journalism. Exclamation point, well, actually two exclamation points.
Susan in Colorado Springs, but then seventy seven to seventy
nine is spot on. The down playing of this security
breach is sickening. It is, in fact very serious. In

(33:37):
Peach Griswold, somebody needs to be held accountable. I mean,
don't forget. We still have the three ballots in Mason
County that were illegally cast and counted, and nobody seems
to be upset about it.

Speaker 10 (33:53):
I know it's only three v uncounted. Do what they
cannot be?

Speaker 7 (33:58):
They cannot be uncounted. Which wait a minute, if you
you sure you want to stick by that statement, dragon,
I mean, I know we've been told that, but if
we now face passwords that are out on the interwebs,
how do you know they how do you know for
sure they can't be uncounted simply because we've been told

(34:18):
they can't be uncounted? Yeah? Yeah, okay, see we've just
reached the point.

Speaker 10 (34:23):
Makes some sense though, because then once you separate the
signature card from the valet itself, then you can't.

Speaker 7 (34:28):
Practically speaking, I think you're right. I do think you're right.
But the problem is they've still been counted and they
should not have been counted. Correct. Yeah, that's the problem.
Let's see. Uh oh, listening to Jenna huffing to Kyle's
question is hilarious. It is hilarious, you know what. It's

(34:50):
just how many times do I have to preach? And Baby,
I'm going to preach it. Make me walk into a
polling place, show ID, let them check my name off,
hand me a ballot, Let me go mark the ballot,
and let them run it through one of those little
machines that's like you to get your SAT scores with
Advertise With Us

Popular Podcasts

Monster: BTK

Monster: BTK

'Monster: BTK', the newest installment in the 'Monster' franchise, reveals the true story of the Wichita, Kansas serial killer who murdered at least 10 people between 1974 and 1991. Known by the moniker, BTK – Bind Torture Kill, his notoriety was bolstered by the taunting letters he sent to police, and the chilling phone calls he made to media outlets. BTK's identity was finally revealed in 2005 to the shock of his family, his community, and the world. He was the serial killer next door. From Tenderfoot TV & iHeartPodcasts, this is 'Monster: BTK'.

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

Dateline NBC

Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.