Hat tip BBG
This could go a number of places, but given that the FBI is threatening the people revealing this apparent Chinese penetration into electoral databases and research center I'm dropping it in. Could this, perchance, reflect a quid for Biden's numerous Chinese pro quos?
Note: these X posts are graphics heavy and hence this piece should be viewed in the oringal, which starts here:
https://x.com/KanekoaTheGreat/status/1666490357469822976KanekoaTheGreat
@KanekoaTheGreat
KONNECH #1🚨: Evidence shockingly suggests that the FBI is shielding two firms closely tied to the Chinese government, which have financed and developed an American election software company for the past 15 years, all while transferring confidential election data back to China.
2) Konnech has provided election administration and logistics software to many prominent cities and counties in the United States, including:
•Alameda County, California
•Allegheny County, Pennsylvania
•Contra Costa County, California
•Denver, Colorado
•Detroit, Michigan
•Fairfax County, Virginia
•Hillsborough County, Florida
•Maron County, Indiana
•Los Angeles, California
•San Francisco, California
•Santa Clara County, California
•St. Louis County, Missouri
•Travis County, Texas
•Washington, D.C.
3) On August 13, 2022, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) convened a group of researchers to discuss how the FBI's headquarters had betrayed them following a 15-month investigation into Konnech's storage of American election data on Chinese servers. The data involved various sensitive information, including:
•Name, DOB, SSN, Address
•Phone, Email, Bank Account
•Voting Machine Passwords
•Thumb Drive Passwords
•Voter Registration Rolls
•Provisional Ballot Serial Numbers
•RFID Tags On Voting Equipment
•Election Building Schematics
•And More...
"You'd be startled to know that this server lives on the main Unicom backbone in China. And it's in a Chinese University in Wuhan, China. I'm not talking about this just being a storage place for data process here.
The app server for this particular application was in China... We're confronted with the fact that everything there was to know about elections in America, and in key counties in key cities, was in this server in Wuhan, China... So what do you do with this information?
Well, we went to the FBI because this was a matter of national security. And, they agreed. So, we started working with the local FBI community. From January of 2021 until April of 2022, the FBI opened up a significant counterintelligence operation on this.
The problem with it was that it wasn't just American information. It was Australian information. It was Canadian information, it was Mexican information. And we ultimately found out that the CCPs own elections are on this same server set in that university...
Everyone involved on the counter intelligence teams at the Bureau agreed on one thing, this software, this penetration, and this opening was a significant national security threat...
So two weeks before the 2000 Mules movie came out, I get a call from an agent and he says this has risen now to the level of a national security threat and headquarters has gotten involved. I don't know who he was referring to, but he said two women saw the case differently, and felt as though we were the criminals.
They had instructed the Detroit FBI office to notify Konnech that we had breached their firewalls, none of which is true... We later found out they were accusing me of stealing three servers from the Chinese Unicom backbone and having illegal possession of American private information.
And they were shopping that around to the other agencies that would be involved NSA, CIA and others. Trying to get somebody to pick up on this so that they could come Roger Stone me...
But the challenge we all have is this software is still in place... When you dig into Konnech's CEO Eugene Yu, in particular the other URLs that he owns, it will take you to the underlying URL that runs the Chinese Communist Party's elections.
It lives on that server, on that same URL address and that URL is owned by Eugene Yu."
https://open.ink/konnech4) In 2002, Konnech CEO Eugene Yu was an "officer" on the "finance committee" of a Chinese foundation that flew Professor Charles Lieber, the head of Harvard’s Chemistry Department, to Zhejiang University to give a speech on “Nanotech in Today’s World.”
This discovery was made in a Chinese magazine entitled "Overseas Scholars," written by the China Association for Science and Technology in the United States (CAST-USA) and the American Zhu Kezhen Education Foundation (AZKEF).
CAST is a transnational organization and constituent member of the Chinese People's Political Consultative Conference (CPPCC), whose stated mission is to “maintain close ties with millions of Chinese scientists, engineers and other people working in the fields of science and technology” and to operate as “the bridge linking Chinese science and technology community with the Communist Party of China and the Chinese government,” according to organization’s archived “About Us” webpage.
In 2003, CAST established the Help Our Motherland through Elite Intellectual Resources from Overseas Program (HOME) in concert with the Organization Department of the Chinese Communist Party to recruit overseas science and technology talent to transfer technology and intellectual property back to China.
The CPPCC’s role in channeling overseas science and technology knowledge toward China’s development has grown since a 2013 directive from General Secretary Xi Jinping to focus on incentivizing overseas Chinese to contribute their technical skills and expertise to China’s national rejuvenation.
By 2020, a United States congressional body warned that the Chinese government has built a “sprawling ecosystem of structures, programs, and incentives to coopt and exploit overseas experts for the science and technology they acquire abroad.”
“Chinese leaders have long viewed advanced science and technology (S&T) as key to China’s comprehensive national power and sought to acquire it through licit and illicit means from developed countries like the United States,” the US-China Economic and Security Review Commission (USCC) said in the report.
“This ecosystem sponsors promising Chinese students and scholars at the U.S. and other foreign universities, incentivizes their return to China for the long term, and employs transnational organizations to channel S&T know-how from those remaining abroad back to mainland China.”
The U.S. Senate report continues:
“Many programs associated with Beijing’s S&T transfer ecosystem—including scholarships to study abroad, talent recruitment plans, and entrepreneurship parks—contribute to China’s military-civil fusion strategy by collecting specific technologies and know-how that improve the capabilities of the People’s Liberation Army (PLA) and advance the goals” of the Chinese Communist Party (CCP).”
“This ecosystem sponsors promising Chinese students and scholars to study at foreign universities, incentivizes or requires their return to China in exchange for this support, and recruits researchers via hundreds of talent programs. Moreover, it integrates Chinese students and scholars remaining abroad with organizations that facilitate the transfer of S&T back to the Mainland, where it can be exploited by the PLA, government ministries, state-owned enterprises (SOEs), state-run laboratories, and startups.”
“Even when overseas Chinese students and scholars do stay in the United States after graduation, China’s transnational technology transfer organizations and talent recruitment plans provide a means to contribute to China’s national rejuvenation by transferring technology and know-how without requiring physical return.”
In the magazine, CAST-USA refers to Eugene Yu by his Chinese name YU Jianwei (于建伟), and says that he is an “officer” on the “finance committee” of the American Zhu Kezhen Education Foundation. The foundation’s mission is “to promote exchange and cooperation between Zhejiang University and universities in the United States” and “invite United States professors or scientists to Zhejiang University.”
In 2020, Prof. Charles Lieber was arrested for concealing his funding from the Wuhan University of Technology and participating in China’s Thousand Talents Program.
At a Senate Judiciary Committee hearing, Bill Priestap, the former Assistant Director of the FBI’s Counterintelligence Division, stated that China’s talent recruitment plans are effective “brain gain programs” that “encourage theft of intellectual property from U.S. institutions.”
Priestap continued, “For example, China’s talent recruitment plans, such as the Thousand Talents Program, offer competitive salaries, state-of-the-art research facilities, and honorific titles, luring both Chinese overseas talent and foreign experts alike to bring their knowledge and experience to China, even if that means stealing proprietary information or violating export controls to do so.”
Eugene Yu was an “officer” on the “finance committee” of a Chinese foundation in the United States tasked with flying professors like Charles Lieber to China. This discovery was made in a China Association for Science and Technology in the United States magazine entitled “Overseas Scholars.”
Similarly to how the U.S. congressional report described CAST’s overseas science and technology acquisition efforts, AZKEF keeps a list of talented overseas Chinese students, offers incentives for prominent scientists to fly to China, and focuses on bridging Zhejiang University with universities in the United States.
https://archive.ph/OFVCfhttps://web.archive.org/web/20011119103624/http://www.azkef.org/https://web.archive.org/web/20031220030107/http://azkef.org:80/programs.htmhttps://web.archive.org/web/20030402092120/http://azkef.org:80/lecture2002.pdfhttps://web.archive.org/web/20140206035502/http://english.cast.org.cn/n1181872/n1257426/47099.htmlhttps://uscc.gov/sites/default/files/2020-10/Overseas_Chinese_Students_and_Scholars_in_Chinas_Drive_for_Innovation.pdf5) On November 29, 2005, Eugene Yu, also known as YU Jianwei (于建伟), established a shadow subsidiary named Jinhua Yulian Network Technology Co., Ltd. (金华宇联网络科技有限公司) in Jinhua City, Zhejiang Province, China, two years after founding Konnech in the United States.
6) On January 25, 2006, Jinhua Yulian Network was accepted into the Entrepreneurship Service Center at the Chinese Academy of Sciences Jinhua Science and Technology Park.
The Chinese government has funded and overseen the development of Konnech's American election software ever since.
https://web.archive.org/web/20090413172501/http://www.jhcy.cn/yqqy.asp?page=37) On February 25, 2006, Eugene Yu registered the website domain "
http://yu-lian.cn" for Jinhua Yulian Network with the email address eyu@konnech.com.
https://archive.is/YaRv1# On
http://yu-lian.cn, Eugene Yu wrote in Chinese that he provides election software "with Chinese characteristics" to various levels of the Chinese government, including the National People’s Congress and the Chinese People's Political Consultative Conference.
https://web.archive.org/web/20131207150515/http://yu-lian.cn/Services.html9) On
http://yu-lian.cn, Eugene Yu praised "Comrade Jiang Zemin" and emphasized Konnech's philosophy of prioritizing "political tasks first, and economic benefits second."
He highlighted his success stories of "Election Management, Detroit" and "US Overseas Voters."
The entire website was written in Chinese.
https://web.archive.org/web/20131207151051/http://yu-lian.cn/Case.html10) In December 2006, Konnech announced on Facebook that they had partnered with Michigan State University and the Confucius Institute to build,
http://ChineseBrief.com, an "interactive communication platform and Chinese language learning tool."
https://web.archive.org/web/20120729201212/http://www.confucius.msu.edu/news.htm11) On July 18, 2007, Eugene Yu posted an ad on the Chinese Academy of Sciences Jinhua Science and Technology Park's website, offering "5 million yuan" for developing "software packages" for Jinhua Yulian Network and
http://konnech.com.
In 2007, 5 million yuan was worth around $700,000 and was the prize money offered by the Chinese government to members of the Thousand Talents Program and other elite overseas entrepreneurs.
https://web.archive.org/web/20131019061139/http://www.jhcy.cn/jsnt_detail.asp?id=1612) The Chinese Academy of Sciences (CAS) is a national think tank with extensive research facilities and over 50,000 researchers. CAS has been linked to Chinese military, nuclear, and cyber espionage programs.
The U.S. Department of Defense acknowledges the CAS as China's leading academic institution for comprehensive research and development.
CAS and its affiliated companies are involved in developing AI initiatives, hypersonic spaceplanes, robotic submarines, and missile technology for the Chinese military.
The Justice Department has indicted several individuals associated with CAS for their roles in transferring trade secrets and military technology from U.S. companies through Chinese overseas talent programs.
In October 2002, the Jinhua Science and Technology Park became the first collaboration between the Chinese Academy of Sciences (CAS) and a prefecture-level government.
The Chinese government has built more than 150 "Overseas Chinese scholar pioneering parks" in the hearts of 54 "National New and High Technology Development Zones."
These ultra-modern facilities were designed for returning specialists to "incubate" (find commercial or military applications for) technologies acquired overseas as part of China's strategy of "serving in place" that allows Chinese scholars to stay abroad while transferring foreign technology back home.
https://uscc.gov/sites/default/files/Research/Interos_Supply%20Chain%20Vulnerabilities%20from%20China%20in%20U.S.%20Federal%20ICT_final.pdfhttps://media.defense.gov/2019/May/02/2002127082/-1/-1/1/2019_CHINA_MILITARY_POWER_REPORT.pdfhttps://web.archive.org/web/20100628161736/http://www.jhkjy.ac.cn/about/index.asp13) Jinhua Yulian Network's initial address was located at No. 988 Shuanglong South Street, Jinhua City, Zhejiang Province, China, which is situated 500 meters away from the Jinhua People's Government building (No. 801 Shuanglong South Street) and across the street from the Jinhua Science and Technology Bureau (No. 828 Shuanglong South Street).
14) The Jinhua Science and Technology Park (JHTP) offers Chinese government-funded support to domestic and overseas enterprises, including financial assistance, living facilities, server hosting, internet access, university partnerships, technology transfers, research assistance, and patent support.
In 1988, the State Council launched the Ministry of Science and Technology’s national Torch Program to speed up the nation’s “science and technological industrialization.”
In 2005, the Ministry of Science and Technology awarded JHTP the distinction of a national-level technology business incubator.
In 2006, JHTP was granted 3 million yuan by the Ministry of Science and Technology through China's national Torch Program to establish the Park's Internet Data Center, where Jinhua Yulian Network would develop, test, and maintain Konnech's American election software.
https://web.archive.org/web/20091017113128/http://www.jhcy.cn/yqgk_01.asp?flag=%B7%FE%CE%F1%B9%A6%C4%DC&lmbm=2405&lmmc=%B7%FE%CE%F1%B9%A6%C4%DC&url=yqgk_01.asphttps://web.archive.org/web/20090413171900/http://www.jhcy.cn/cxzt_01.asphttp://jhcy.cn/jhkjy/town_details/28.htmlhttp://jhcy.cn/jhkjy/town_details/50.html15) A 2008 Chinese document titled "International Elite Entrepreneurship Modern Service Outsourcing" reveals that Eugene Yu worked for the Chinese government as a Project Manager of the Guangzhou Economic and Technological Development Zone (GETDZ) from 1983 until 1985.
The document features 46 Chinese high-tech companies operating overseas and describes Konnech as an "Intelligent Web Communications" company with the mission of becoming "one of the top 50 e-commerce service providers for schools and government in the United States within 10 years.”
The document mentions Konnech's Chinese venture fund and describes the company's goal of developing advanced technology in cooperation with Zhejiang University:
“The company will enter a phase of rapid development after the implementation of the venture fund in Wuzhong.”
"In terms of specialized technology, we have been developing and hiring technical personnel with expertise in the field in a rapid manner by utilizing the role of corporate and university professors and graduate classes for project development, with the aim of receiving advanced applied technology."
"... it is an indisputable fact that many cutting-edge products come from American university campuses. We must take the corresponding path and cooperate with American universities and Zhejiang University and other domestic institutions to focus on the development of applied technologies and the application-oriented development of specialized technologies."
The document describes the problems facing the U.S. market, citing “expensive software programming fees and talent shortages” and reduced “funding for IT projects” before concluding, “In this environment, the role of our China branch is fully demonstrated.”
When Eugene Yu’s attorneys filed a motion to dismiss his criminal case in California, they included a section entitled FACTUAL BACKGROUND that says he “worked in various locations” after he graduated from Zhejiang University and before he was accepted into Wake Forest University.
However, it failed to mention his prior employment as a Project Manager in the Guangzhou Economic and Technological Development Zone, where he worked in the Industrial Project Negotiation Department and "completed the introduction of several major projects":
"Eugene Yu was born and raised in Jinhua City, Zhejiang Province, China. In 1974, as part of China’s cultural revolution, Mr. Yu was sent to a communal farm where he labored for four years in squalor conditions. In 1977, after Chairman Mao died, Mr. Yu scored high on a nationwide test, qualifying him for admission to study engineering at Zhejiang University.
After graduating from college, he was sent to work in various locations in China. Mr. Yu then met and married his wife Donna Wang. In 1986, Mr. Yu and Dr. Wang were accepted to graduate school programs at Wake Forest University, where Mr. Yu obtained his MBA degree."
Since the launch of the GETDZ in 1984, China has established 219 national-level Economic and Technological Development Zones (ETDZs), which helped launch China’s rise to a global economic superpower.
In order to promote science and technology-intensive industries, ETDZs offer financial incentives and preferential policies that target domestic and overseas enterprises focused on manufacturing, scientific, and technological industries.
Two decades later, Eugene Yu would return to China to launch his company Jinhua Yulian Network Technology Co., Ltd. (金华宇联网络科技有限公司) in the Jinhua Economic and Technological Development Zone (JETDZ).
https://max.book118.com/html/2012/0222/1126480.shtmhttps://cbbc.org/sites/default/files/2021-01/China-Britain%20Business%20Council%20-%20In%20the%20Zone%20-%20A%20Comprehensive%20Guide%20to%20China%E2%80%99s%20Economic%20and%20Technological%20Development%20Zones%20-%20October%202020.pdfhttps://documentcloud.org/documents/231716) On January 4, 2011, Lin Yu, a managing supervisor at Jinhua Yulian Network, established Jinhua Red Date Software Co., Ltd., also known as Jinhua Jujube Software Co., Ltd.
On January 16, 2011, Konnech registered the domain reddatesoft[.]com with the email eyu@konnech.com.
Jinhua Red Date Software and Jinhua Yulian Network shared the same address at No. 1583 Binhong Road, Jinhua City, Zhejiang Province.
Jinhua Yulian Network's website included "Jinhua Red Date Software Co., Ltd." and "reddatesoft[.]com" in its copyright statement.
Peter McCallister, the General Manager of Konnech Australia, later affirmed in an affidavit that Lin Yu is Eugene Yu's older brother and a Chinese national.
(Note: The modified domain URL "reddatesoft[.]com" is used because of safety concerns with the URL raised by Twitter.)
https://web.archive.org/web/20220822014930/https://www.11467.com/jinhua/co/273669.htmhttps://web.archive.org/web/20130718125224/http://yu-lian.cn/17) On April 13, 2015, Lin Yu established Jinhua Hongzheng Technology Co., Ltd. (金华鸿正科技有限公司) in Jinhua, Zhejiang Province, China.
Lin Yu (Eugene Yu's brother) owned 99.4% of the company.
Jun Yu (Eugene Yu's nephew) and Guojun Shao, who co-invented a Konnech patent with Eugene Yu, were among the other equity holders.
Jinhua Yulian Network later transferred a voting patent, co-invented with a Zhejiang University professor, to Jinhua Hongzheng Technology. In a future thread, there will be a detailed discussion about Konnech's patents, employees, and the involvement of this professor.
18) Jinhua Hongzheng Technology provides election administration software, including web and mobile applications, to more than 430 National People's Congresses across over 20 provinces.
The company has established partnerships with Huawei, Lenovo, China Telecom, China Mobile, China Unicom, and the highest levels of the Chinese government.
19) On July 31, 2015, Eugene Yu registered the website domain "hongzhengtech[.]cn" for Jinhua Hongzheng Technology using the email address admin@konnech.com.
As a result, Konnech held significant control over a company that provides election administration software to the highest levels of the Chinese government.
Shortly after Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) exposed Konnech's connection to China's National People's Congress, the domain registration email address was changed to jiadeng@hongzhengtech.com.
(Note: The modified domain URL "hongzhengtech[.]cn" is used because of safety concerns with the URL raised by Twitter.)
https://web.archive.org/web/20220824173140/https://whois-history.whoisxmlapi.com/lookup-report/AVkvG34MR720) In a September 1, 2022, live chat, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) discussed the FBI's betrayal, Konnech programming software for China's National People's Congress, and the company's storage of U.S. election data on Chinese servers.
In January 2021, Phillips said that the cyber analyst he had been working with encountered an “oddity in some of the URLs” such as
http://vote4la.com,
http://vote4detroit.com, and
http://vote4boston.com, which Konnech’s “PollChief” software application used to gather personally-identifying information about poll workers.
Using Binary Edge, a software product companies use to identify and assess the risk of cyber breaches, “We began to look at where these URLs resolve to.
We found that most of them resolve to one I.P. address and that I.P. address — the URL resolved in China,” Phillips said. “What we also learned in our review,
http://apps.konnech.net, resolved into this same URL in China, meaning that the application itself was residing in China,” he continued.
“In Binary Edge, you can figure out what type of database they are using, their database port, and all the different services offered by ports in this particular application living in China. It turned out that not only did it live there, but they left the database open.”
This database “stored the personally identifying information of over a million Americans,” he emphasized. Engelbrecht and Phillips decided that “this was a major national security risk” and immediately took the information to the FBI.
When Engelbrecht and Phillips took this information to the FBI, the FBI “said the information was forwarded to their counter-intelligence operation, and a counter-intelligence op was opened up in January or February of 2021,” Phillips said.
Phillips described how he and Engelbrecht played an active role in the FBI’s operation, “They engaged us in the operation, they were communicating with us on a regular basis. They were communicating with Catherine regarding communications with the target and this went on for approximately 15 months.”
Phillips and Engelbrecht noted that the field office they worked with for those 15 months was “legitimate” and not “political law enforcement.”
“These were legitimate people who believed that this software posed a national security risk to the United States of America and they were working with us closely to try to stop this from being in place during the midterms,” Phillips said.
“The focus point was always we needed to remove this software from the election, but taking a step further, there were a lot of other concerns that the bureau had.”
In April 2022, Engelbrecht received a call from one of the FBI agents, who informed her that the FBI’s “Washington D.C. headquarters” was now involved in the investigation.
Engelbrecht described how everything changed after this call, “There was no more goodwill, there was no more let's work together, the script had been flipped, and now we were the target,” she said. “That was a very disturbing call.”
The agent informed Engelbrecht that “two women” at the FBI’s headquarters believed that Phillips and Engelbrecht were “in the wrong for doing this” and that the D.C. office was now trying “to figure out how you guys broke the law to find all of this.”
Engelbrecht added, “which of course we didn't, but that was kind of their Modus Operandi, they were going to try to pin something on us, and today you can pick your headlines about how the FBI has done this time and again.”
Phillips remarked, “The problem is they know about this, and they chose to do nothing. They chose to investigate it, and in the end, they chose to blame us, but this is China. These are Chinese operatives in the United States; these are Chinese citizens who are programming this.”
Engelbrecht explained how the FBI agents initially hoped they could persuade the Washington D.C. office to do the right thing, “Our contacts were saying we are going to try and smooth this out, but as the days clicked on, they re-contacted us and one of them said you may need to be ready to — his term was to use the nuclear option and go to the press,” she said.
With the FBI no longer interested in pursuing Konnech, Englebrecht and Phillips organized an event for Saturday, August 13th in Arizona called “the Pit” where they brought together about two hundred “researchers, independent journalists, and big thinkers” to share their story.
“We asked the people in attendance for help, we didn't know what the FBI's plans were for us, we didn't know if we didn't speak this publicly if we would ever have the chance to, but we felt like our best chance was to share this with people we trusted who had the wherewithal to get the word out,” Englebrecht said.
She continued, “There have been so many great things that have happened since that event, but one of the greatest, was this community that came out shoulder to shoulder saying let’s dig this, let's see how much more information we can find.”
“The quality of research that has been done to supplement what we already had and to corroborate what we already had has been incredible.”
Phillips added, “This is some of the best research I have ever seen. The quality of it, the depth of it, we were with a prosecutor the other day and we had an opportunity to share some of this information with them.”
He continued, “There's likely going to be a grand jury convened here in the next week or so. It's supported by not just the research that my team OPSEC did for Catherine and True the Vote, but by the research of one of the best research teams I've ever seen come together.”
“The data and research all stand on their own.”
https://truethevote.locals.com/post/2664780/the-tiger-project21) On September 12, 2022, Konnech filed a defamation lawsuit against Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
), accusing them of spreading baseless "conspiracy theories" and engaging in "racism and xenophobia."
Konnech denied any affiliation with the Communist Party of China and stated that they had never stored American election data on servers in China.
The legacy media echoed Konnech's claims against
@TrueTheVote
and
@onwardsocial
without conducting any examination of the company's connections to Jinhua Yulian Network, Jinhua Hongzheng Technology, or China's National People's Congress.
22) In an unusual move, U.S. District Court Judge Kenneth Hoyt issued an ex-parte temporary restraining order in favor of Konnech without providing an opportunity for
@TrueTheVote
and
@OnwardSocial
to respond to the complaint.
Furthermore, Judge Hoyt immediately ordered them to disclose the identities of all individuals involved in their investigation of Konnech at the outset of the trial, prior to the discovery phase.
Failure to comply would result in the imprisonment of Catherine Engelbrecht and Gregg Phillips for contempt of court.
23) On October 4, 2022, Eugene Yu, the CEO of Konnech, was arrested by the Los Angeles District Attorney's office for storing the data of American election workers on servers in China.
Deputy District Attorney Eric Neff described the scale of the data breach as "astounding," suggesting that it could be "the largest data breach in United States history."
Prosecutors alleged that Konnech employees shared the personal information of Los Angeles election workers with third-party software developers in China, who were involved in creating and fixing Konnech's software called PollChief.
Furthermore, software developers in China had "super administration access" to PollChief software and confidential election data from the United States.
https://truethevote.org/wp-content/uploads/2022/11/eugene-yu-complaint-101322.pdf24) On October 5, 2022, during Eugene Yu's bond hearing, his attorney contended that he posed no risk of fleeing as he had been actively cooperating with the FBI for the preceding month, and his arrest had taken the agency by surprise.
However, the Los Angeles District Attorney's office argued that Yu presented a substantial flight risk due to his strong business ties in China.
Additionally, the prosecution raised concerns about the suspicious nature of Yu's arrest, noting that he was taken into custody without his cell phone while on his way to the airport.
25) On October 28, 2022,
@TrueTheVote
and
@OnwardSocial
submitted an affidavit containing approximately 10% of their text messages exchanged with FBI Agents in Detroit and San Antonio, supporting their claim of working with the FBI on a 15-month "counter-intelligence operation" against Eugene Yu, prior to the involvement of FBI headquarters in Washington D.C.
The text messages included conversations with the following individuals:
-Special Agent Bruce Fowler, Detroit
-SA Huy Nguyen, San Antonio
-SA Kevin McKenna, San Antonio
-SA Kristina Spindel, San Antonio
In one text message exchange, Fowler provided his FBI email address and mentioned receiving three thumb drives from the San Antonio office. He asked Engelbrecht to guide him on where to find information on those drives.
In another text message exchange, Engelbrecht asked for the name of an agent in Georgia. Nguyen responded that he would provide the name later, but “in the meantime, you can tell them that you filed the complaint with SA Huy Nguyen and SA Kevin McKenna with San Antonio Division.”
In another exchange, Engelbrecht texted Nguyen, stating:
"I wanted to let you know that we took the nuclear option and went public (in a very limited way, but nonetheless we did it). Konnech quickly filed a civil suit against us in Houston federal court and got an ex parte [temporary restraining order].
Part of the TRO required that we name who we’d gotten the election worker data from, same person who’d provided it to you. We gave the court the name under seal. Our attorney also notified the Houston FBI office, where the case was filed.
I’m very concerned about everyone’s safety at this point. Please do whatever possible to help ensure that name never comes out. I can provide you with whatever you may need."
Nguyen did not respond to Engelbrecht’s text. According to further texts provided by Engelbrecht, she reached out to “KayKay,” saying she hoped to talk, in person, if possible.
“KayKay” replied that she was on a temporary assignment out of state until January and asked if Engelbrecht still had Nguyen’s number. Engelbrecht then explained that she had “called and written him but no response.”
The text then explained: “We have been drug into a vicious lawsuit filed against us by Konnech.” “Our attorneys have contacted the FBI and been told that the Bureau has no interest in engaging with the court in order to maintain confidentiality.”
Engelbrecht added that she, Phillips, and “the researcher who originally provided us the data” are being “doxed,” and that it’s “a very serious situation and we’ve been left to hang.”
Engelbrecht then noted, “Yu has already been indicted by a Grand Jury and arrested,” but they “continue to hear chatter that the FBI is working with Konnech, against us, and still trying to accuse us of crimes we did not commit.”
The True the Vote founder then noted that “what Bobby said on the phone that day in April 22 (when you were reading the yearly CI disclaimer to me) has gone into full overdrive.” She added: “I also now believe Gregg and I have been set up. It’s appalling, heartbreaking, and wrong.”
https://thefederalist.com/2022/11/18/in-this-untold-story-of-poll-worker-data-chinese-servers-and-scandal-only-the-fbi-knows-the-truth/https://storage.courtlistener.com/recap/gov.uscourts.txsd.1888133/gov.uscourts.txsd.1888133.46.2.pdf26) On October 31, 2022, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) were imprisoned for contempt of court as they refused to disclose the identity of a researcher who provided information to the LADA that resulted in the indictment of Eugene Yu:
Despite Eugene Yu's arrest by the Los Angeles District Attorney based on the allegations he had previously denied in his defamation lawsuit, Judge Kenneth Hoyt refused to admit any evidence from the criminal proceedings against Konnech in his courtroom.
Furthermore, Judge Hoyt declined to respond to a phone call from the Los Angeles District Attorney's office and asserted that the criminal case against Eugene Yu was unrelated to the civil case involving Catherine Engelbrecht and Gregg Phillips.
27) On November 5, 2022, Tucker Carlson discussed Catherine Engelbrecht and Gregg Phillips being arrested for refusing to reveal the identity of a researcher who provided information to the LADA that resulted in criminal charges against Eugene Yu, the CEO of Konnech:
"George Gascon actually indicted Eugene Yu for exfiltrating the personal records of American poll workers, including their social security numbers and home addresses, out of the country to servers in China. These researchers developed that information.
Catherine attempted to give it to law enforcement at the FBI and elsewhere and was sued by Konnech for doing that. When Konnech sued them, they got a restraining order, ordering Catherine to turn over the names of these researchers.
Catherine and Gregg, who are very courageous people, simply refused to do it, and as a result, while Yu is home on bail, Catherine and Gregg are in jail tonight...
The civil libertarians and the mainstream press are basically a flock of sheep that are each bleeding the exact same tune, and all they want to do is deny any conversation about the possibility of fraud in elections."
28) On November 7, 2022,
@TrueTheVote
and
@OnwardSocial
were released from prison following a decision by the U.S. Court of Appeals for the Fifth Circuit, which overturned Judge Kenneth Hoyt's order to unjustly detain them for contempt of court in a civil defamation case.
Two week later, the appeals court vacated the contempt order and wrote, "the record does not reveal what sort of emergency justified the district court's demand for that information before the parties could file Rule 12 motions before the defendants could file an answer, before the parties could file their initial disclosures, or before discovery could begin let alone conclude in the ordinary course."
"Much less did the district court explain what sort of emergency could warrant jailing the petitioner-defendants for not making such immediate disclosures. Rather, the district court made clear that it was imposing its disclosure requirements because it—the district court—wanted to add defendants to the lawsuit. Resp. 13; App. 188. That is not how the Federal Rules of Civil Procedure work."
Furthermore, the appeals court criticized Judge Kenneth Hoyt for "using a temporary restraining order, a preliminary injunction, and a civil-contempt order to litigate the case on Konnech's behalf."
https://storage.courtlistener.com/recap/gov.uscourts.txsd.1888133/gov.uscourts.txsd.1888133.62.0.pdf@gatewaypundit
about their arrest and subsequent solitary confinement and provided information about the Konnech data breach that occurred in Pittsburgh, Pennsylvania, or Allegheny County.
The breach involved the unauthorized exposure of sensitive information belonging to election workers, election judges, the complete Pennsylvania voting registration file, voting machine serial numbers, passwords, and "everything that one would need to cheat."
"This isn't software, guys. This is malware. This is spyware. They are sucking data from the United States, storing it in China, and then using it to create a Chinese-style social credit system where we're all scored.
United States citizens are scored to manipulate votes, manipulate thought, manipulate pretty much everything you can imagine in our lives. And these people are the tip of the spear for that. They're not the only ones but they're there."
30) On November 9, 2022, the Los Angeles District Attorney's office dropped charges against Konnech and its CEO, Eugene Yu.
District Attorney George Gascon cited concerns over “potential bias” and the “pace of the investigation” as his reasons for the decision.
"We are concerned about both the pace of the investigation and the potential bias in the presentation and investigation of the evidence," Gascon said in a statement.
"We currently have an immense volume of digital data that will define this case, but the processing of that data will take months. We would not be able to fairly and accurately process and present all of that evidence within the statutory timeframes."
"As a result, we have decided to ask the court to dismiss the current case and alert the public in order to ensure transparency."
A few weeks later, Gascon placed Deputy District Attorney Eric Neff, who alleged in court that this was potentially "the largest data breach in United States history," on administrative leave.
31) On December 22, 2022, Grant Bradley, a former employee of Konnech, filed a whistleblower lawsuit against the company that stated he personally “witnessed customer’s data (specifically poll watcher information) being made accessible to foreign nationals from China.”
Additionally, Bradley stated that Konnech used “developers, designers, and coders” who “are all Chinese nationals based out of Wuhan, China.”
https://thefederalist.com/2023/01/20/whistleblower-yes-election-data-company-gave-u-s-poll-workers-personal-info-to-china/https://scribd.com/document/620894361/22-12-22-Verified-Complaint-1#32) On February 24, 2023, cybersecurity expert Harry Haury, who forensically imaged Konnech's devices for the Los Angeles District Attorney's office, signed an affidavit stating that he witnessed Konnech storing the personal data of U.S. election workers on servers in China.
Furthermore, the affidavit stated that Konnech's software was developed, tested, and maintained in China, and metadata indicated that Eugene Yu was involved in developing election software for the Chinese government.
Haury, who is the CEO of Cain & Associates, stated that his company assisted the Los Angeles District Attorney's office by following FBI and Justice Department protocols to forensically image servers, computers, cell phones, and other electronic storage devices belonging to Konnech and Eugene Yu.
Haury, who has over 28 years of experience working as a cybersecurity expert for prominent organizations such as the Department of Defense, NSA, CIA, U.S. Treasury, NorthCOM, Sandia National Laboratories, more than a dozen top American banks, and the U.S. Justice Department stated that Konnech's data security system, "amounted to by far the worst example of complete disregard or negligence regarding the protection of PII and sensitive data I have ever seen. We discovered a data breach of U.S. data, which is classified as a total loss of control.”
Substantial evidence was reportedly discovered on Konnech's seized devices, including:
• confirmed multiple instances of Konnech hosting, on servers based in China, U.S. citizens’ personally identifiable information (PII);
• found evidence in private company messages that software code was being developed, tested, and maintained in China;
• confirmed that Konnech was providing administrative credentials to Chinese developers;
• PollChief software suffered from a security vulnerability that allowed any PollChief or Konnech worker to gain "super user" status, giving him or her broad access to information on all U.S. poll workers in the system;
• has evidence that Konnech employees have shared election-related data through, from, and on Chinese servers and applications;
• has evidence in metadata pulled from relevant files indicating Eugene Yu was involved in developing Chinese government (i.e., Wucheng District People’s Congress) election software; and
• has evidence showing Konnech is associated with several companies based in mainland China that appear to be associated with if not subsidized by the Chinese government.
Haury stated, "We concluded that this incident is a very high risk indicator of an intrusion by a foreign intelligence into the U.S. strategic infrastructure, and as obliged by law, we informed the Defense Counterintelligence and Security Agency (DCSA) and other pertinent law enforcement agencies of this contact."
https://truethevote.org/wp-content/uploads/2023/02/2023.02.24-Konnech-Dkt.-87-Motion-to-Inspect-Property.pdf33) On March 24, 2023, Peter McCallister, the former General Manager of Konnech Australia, signed an affidavit stating that he believed Konnech's software development was done in China by Jinhua Hongzheng Technology, a company owned by "Mr. Yu's older brother" and "Jun Yu, Mr. Yu's nephew, was the person responsible for depositing the data onto the server in China."
Additionally, McCallister stated that after Eugene Yu's arrest, Konnech employees in China attempted to hack Konnech's CTO, Luis Nabergoi, and deleted "all conversations referencing or involving Eugene's nephew, Jun Yu."
Lastly, McCallister believed that Jinhua Hongzheng Technology was "the main provider of election software products to the Communist Party of China" and that Eugene Yu had asked him to sell the same "meeting administration and voting software" to the Australian government.
34) On April 5, 2023, Grant Bradley, the former Konnech employee, signed another affidavit stating "Konnech provided programmers in China private data of U.S.-based election workers, to include social security numbers and other identifying information."
"Konnech appeared to employ at least 80 and perhaps around 100 Chinese nationals to work on its elections software for American clients."
"I witnessed customers' data (specifically poll-watcher information) being made accessible to foreign nationals in China."
"Konnech's election logistics software was (and may still be) substantially developed by developers, designers, and coders who (to the best of my knowledge, information and belief), are all Chinese nationals based out of Wuhan, China."
"The standard process Konnech used to onboard China-based programmers was to create customer environments for the programmers by uploading files containing all of the American customers' poll workers' information, polling locations, and other data to DingTalk or Jira, where the leaders from the Chinese team would have access to Jira, and the entire Chinese team would have access to DingTalk."
"During my employment, on or after October 4, 2022 I was instructed by my superiors to say outwardly to customers that poll worker data was not stored overseas, was not available to foreign nationals, and that we had no idea why Eugene Yu had been arrested... My superiors who instructed me in these regards, and I, knew these statements were false."
https://truethevote.org/wp-content/uploads/2023/04/2023.04.07-Konnech-Dkt.-94-1-Exhibit-H-Affidavit-of-Grant-Bradley.pdfhttps://truethevote.org/wp-content/uploads/2023/03/2023.03.24-Konnech-Dkt.-91-Reply-ISO-Motion-to-Inspect.pdf35) On April 14, 2023, cybersecurity expert Nate Cain (
@cain_nate
), who forensically imaged Konnech's devices for the Los Angeles District Attorney's office, stated that Konnech stored the personal data of U.S. election workers and judges on servers in China.
Furthermore, Cain stated that a "Chinese company that has ties to the CCP" did Konnech's "software development and maintenance," and a Defense Counterintelligence Security Agency (DCSA) analyst reviewed their report, verified that it was accurate, and forwarded it to the FBI.
However, Cain mentioned that he had provided evidence of a major Konnech data breach to the police superintendent of a prominent U.S. county, who subsequently took the information to the FBI, and the FBI had declined to provide assistance, informing the superintendent that they were not interested in pursuing the matter.
Additionally, Cain stated that Los Angeles County had refused to inform several other counties that their data had also been breached.
Cain, who has over 25 years of experience working as a cybersecurity expert for the Army, Navy, Marine Corps, DISA, and the FBI, received his cybersecurity training from the NSA as a member of the U.S. Marine Corps Forces Cyberspace Command (MARFORCYBER).
"We found that there was voter poll worker data, as well as election judge data, and election inventory system data found on Chinese servers."
"We weren't expecting to see what we saw, which was that there was a Chinese company that was essentially doing the software development and all of the software maintenance for this company.
And what we discovered was that we got behind the Chinese firewall, and we found documents that showed that this Chinese company actually had ties to the CCP.
And then at that point, I had no choice but to take that information, package it up and provide it to the Defense Counterintelligence Security Agency (DCSA) because as a cleared contractor, I have a sworn obligation to provide them that information that this could be a potential Chinese espionage or intelligence operation working against the United States and our critical infrastructure.
So, I provided that information to them, and now, we're in a difficult situation because I don't think that George Gascon was very happy about that."
36) On April 20, 2023, Konnech and Eugene Yu retracted their defamation case against Catherine Engelbrecht and Gregg Phillips, a day after
@truethevote
and
@onwardsocial
unveiled a website (
http://openink.com/konnech) containing much of the information discussed in this Twitter thread.
37) In conclusion, Eugene Yu develops election administration software for the Chinese government in partnership with Huawei, China Telecom, China Unicom, China Mobile, and Lenovo.
Two of his former employees have signed affidavits stating that he stored confidential U.S. election data on servers in China, where his software was developed, tested, and maintained.
Two cybersecurity experts, who forensically imaged Konnech's devices for the LADA, have stated that he stored confidential U.S. election data on servers in China, where he developed election administration software for the Chinese government.
This information is publicly available on the internet.
So, why is the FBI still allowing Konnech's election administration software to be used across the country?
38) On April 14, 2016, Jinhua Hongzheng Technology announced on Weibo that it provides election administration software to China's National People's Congress, Detroit, Michigan, St. Louis, Missouri, and Washington, D.C.
Its predecessor is Jinhua Yulian Network and "Konnech."
https://archive.ph/8xIqe39) So, why is the FBI shielding two firms closely tied to the Chinese government, which have financed and developed an American election software company for the past 15 years, all while transferring election data back to China?
40) And lastly, why is the FBI headquarters in Washington D.C., targeting Catherine (
@truethevote
) and Gregg (
@onwardsocial
) for exposing this while seemingly protecting Jianwei Yu (于建伟)?
41) If you would like Congress to hold the FBI accountable for betraying Catherine, Gregg, and their commitment to preserving the integrity of our election system, please visit
@TrueTheVote
's website,
http://stopccpelectionfraud.com, and follow these three simple steps:
1. Sign the petition
2. Contact your representatives
3. Review these articles
42) In all of my interactions with Catherine and Gregg, despite facing lawsuits, wrongful arrests, and solitary confinement, their main concern has always been the removal of this national security threat from our election system.
If you would like to support their election integrity efforts, you can donate at:
https://truethevote.org/donate/43) Finally, if you'd like to support my journalism, please consider becoming a member of my Twitter subscriber community.
By joining, you'll gain exclusive access to my reporting, including:
• Exclusive Konnech threads
• Content creation tips
• OSINT research tools
• Monthly Q&A sessions
Thank you for your time!