Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - Crafty_Dog

Pages: [1] 2 3 ... 1241
1
Hat tip BBG



This could go a number of places, but given that the FBI is threatening the people revealing this apparent Chinese penetration into electoral databases and research center I'm dropping it in. Could this, perchance, reflect a quid for Biden's numerous Chinese pro quos?

Note: these X posts are graphics heavy and hence this piece should be viewed in the oringal, which starts here:

https://x.com/KanekoaTheGreat/status/1666490357469822976

KanekoaTheGreat

@KanekoaTheGreat

KONNECH #1🚨: Evidence shockingly suggests that the FBI is shielding two firms closely tied to the Chinese government, which have financed and developed an American election software company for the past 15 years, all while transferring confidential election data back to China.

2) Konnech has provided election administration and logistics software to many prominent cities and counties in the United States, including:

•Alameda County, California
•Allegheny County, Pennsylvania
•Contra Costa County, California
•Denver, Colorado
•Detroit, Michigan
•Fairfax County, Virginia
•Hillsborough County, Florida
•Maron County, Indiana
•Los Angeles, California
•San Francisco, California
•Santa Clara County, California
•St. Louis County, Missouri
•Travis County, Texas
•Washington, D.C.

3) On August 13, 2022, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) convened a group of researchers to discuss how the FBI's headquarters had betrayed them following a 15-month investigation into Konnech's storage of American election data on Chinese servers. The data involved various sensitive information, including:

•Name, DOB, SSN, Address
•Phone, Email, Bank Account
•Voting Machine Passwords
•Thumb Drive Passwords
•Voter Registration Rolls
•Provisional Ballot Serial Numbers
•RFID Tags On Voting Equipment
•Election Building Schematics
•And More...

"You'd be startled to know that this server lives on the main Unicom backbone in China. And it's in a Chinese University in Wuhan, China. I'm not talking about this just being a storage place for data process here.

The app server for this particular application was in China... We're confronted with the fact that everything there was to know about elections in America, and in key counties in key cities, was in this server in Wuhan, China... So what do you do with this information?

Well, we went to the FBI because this was a matter of national security. And, they agreed. So, we started working with the local FBI community. From January of 2021 until April of 2022, the FBI opened up a significant counterintelligence operation on this.

The problem with it was that it wasn't just American information. It was Australian information. It was Canadian information, it was Mexican information. And we ultimately found out that the CCPs own elections are on this same server set in that university...

Everyone involved on the counter intelligence teams at the Bureau agreed on one thing, this software, this penetration, and this opening was a significant national security threat...

So two weeks before the 2000 Mules movie came out, I get a call from an agent and he says this has risen now to the level of a national security threat and headquarters has gotten involved. I don't know who he was referring to, but he said two women saw the case differently, and felt as though we were the criminals.

They had instructed the Detroit FBI office to notify Konnech that we had breached their firewalls, none of which is true... We later found out they were accusing me of stealing three servers from the Chinese Unicom backbone and having illegal possession of American private information.

And they were shopping that around to the other agencies that would be involved NSA, CIA and others. Trying to get somebody to pick up on this so that they could come Roger Stone me...

But the challenge we all have is this software is still in place... When you dig into Konnech's CEO Eugene Yu, in particular the other URLs that he owns, it will take you to the underlying URL that runs the Chinese Communist Party's elections.

It lives on that server, on that same URL address and that URL is owned by Eugene Yu."

https://open.ink/konnech

4) In 2002, Konnech CEO Eugene Yu was an "officer" on the "finance committee" of a Chinese foundation that flew Professor Charles Lieber, the head of Harvard’s Chemistry Department, to Zhejiang University to give a speech on “Nanotech in Today’s World.”

This discovery was made in a Chinese magazine entitled "Overseas Scholars," written by the China Association for Science and Technology in the United States (CAST-USA) and the American Zhu Kezhen Education Foundation (AZKEF).

CAST is a transnational organization and constituent member of the Chinese People's Political Consultative Conference (CPPCC), whose stated mission is to “maintain close ties with millions of Chinese scientists, engineers and other people working in the fields of science and technology” and to operate as “the bridge linking Chinese science and technology community with the Communist Party of China and the Chinese government,” according to organization’s archived “About Us” webpage.

In 2003, CAST established the Help Our Motherland through Elite Intellectual Resources from Overseas Program (HOME) in concert with the Organization Department of the Chinese Communist Party to recruit overseas science and technology talent to transfer technology and intellectual property back to China.

The CPPCC’s role in channeling overseas science and technology knowledge toward China’s development has grown since a 2013 directive from General Secretary Xi Jinping to focus on incentivizing overseas Chinese to contribute their technical skills and expertise to China’s national rejuvenation.

By 2020, a United States congressional body warned that the Chinese government has built a “sprawling ecosystem of structures, programs, and incentives to coopt and exploit overseas experts for the science and technology they acquire abroad.”

“Chinese leaders have long viewed advanced science and technology (S&T) as key to China’s comprehensive national power and sought to acquire it through licit and illicit means from developed countries like the United States,” the US-China Economic and Security Review Commission (USCC) said in the report.

“This ecosystem sponsors promising Chinese students and scholars at the U.S. and other foreign universities, incentivizes their return to China for the long term, and employs transnational organizations to channel S&T know-how from those remaining abroad back to mainland China.”

The U.S. Senate report continues:

“Many programs associated with Beijing’s S&T transfer ecosystem—including scholarships to study abroad, talent recruitment plans, and entrepreneurship parks—contribute to China’s military-civil fusion strategy by collecting specific technologies and know-how that improve the capabilities of the People’s Liberation Army (PLA) and advance the goals” of the Chinese Communist Party (CCP).”

“This ecosystem sponsors promising Chinese students and scholars to study at foreign universities, incentivizes or requires their return to China in exchange for this support, and recruits researchers via hundreds of talent programs. Moreover, it integrates Chinese students and scholars remaining abroad with organizations that facilitate the transfer of S&T back to the Mainland, where it can be exploited by the PLA, government ministries, state-owned enterprises (SOEs), state-run laboratories, and startups.”

“Even when overseas Chinese students and scholars do stay in the United States after graduation, China’s transnational technology transfer organizations and talent recruitment plans provide a means to contribute to China’s national rejuvenation by transferring technology and know-how without requiring physical return.”

In the magazine, CAST-USA refers to Eugene Yu by his Chinese name YU Jianwei (于建伟), and says that he is an “officer” on the “finance committee” of the American Zhu Kezhen Education Foundation. The foundation’s mission is “to promote exchange and cooperation between Zhejiang University and universities in the United States” and “invite United States professors or scientists to Zhejiang University.”

In 2020, Prof. Charles Lieber was arrested for concealing his funding from the Wuhan University of Technology and participating in China’s Thousand Talents Program.

At a Senate Judiciary Committee hearing, Bill Priestap, the former Assistant Director of the FBI’s Counterintelligence Division, stated that China’s talent recruitment plans are effective “brain gain programs” that “encourage theft of intellectual property from U.S. institutions.”

Priestap continued, “For example, China’s talent recruitment plans, such as the Thousand Talents Program, offer competitive salaries, state-of-the-art research facilities, and honorific titles, luring both Chinese overseas talent and foreign experts alike to bring their knowledge and experience to China, even if that means stealing proprietary information or violating export controls to do so.”

Eugene Yu was an “officer” on the “finance committee” of a Chinese foundation in the United States tasked with flying professors like Charles Lieber to China. This discovery was made in a China Association for Science and Technology in the United States magazine entitled “Overseas Scholars.”

Similarly to how the U.S. congressional report described CAST’s overseas science and technology acquisition efforts, AZKEF keeps a list of talented overseas Chinese students, offers incentives for prominent scientists to fly to China, and focuses on bridging Zhejiang University with universities in the United States.

https://archive.ph/OFVCf

https://web.archive.org/web/20011119103624/http://www.azkef.org/

https://web.archive.org/web/20031220030107/http://azkef.org:80/programs.htm

https://web.archive.org/web/20030402092120/http://azkef.org:80/lecture2002.pdf

https://web.archive.org/web/20140206035502/http://english.cast.org.cn/n1181872/n1257426/47099.html
https://uscc.gov/sites/default/files/2020-10/Overseas_Chinese_Students_and_Scholars_in_Chinas_Drive_for_Innovation.pdf

5) On November 29, 2005, Eugene Yu, also known as YU Jianwei (于建伟), established a shadow subsidiary named Jinhua Yulian Network Technology Co., Ltd. (金华宇联网络科技有限公司) in Jinhua City, Zhejiang Province, China, two years after founding Konnech in the United States.

6) On January 25, 2006, Jinhua Yulian Network was accepted into the Entrepreneurship Service Center at the Chinese Academy of Sciences Jinhua Science and Technology Park.

The Chinese government has funded and overseen the development of Konnech's American election software ever since.

https://web.archive.org/web/20090413172501/http://www.jhcy.cn/yqqy.asp?page=3

7) On February 25, 2006, Eugene Yu registered the website domain "http://yu-lian.cn" for Jinhua Yulian Network with the email address eyu@konnech.com.

https://archive.is/YaRv1#

8) On http://yu-lian.cn, Eugene Yu wrote in Chinese that he provides election software "with Chinese characteristics" to various levels of the Chinese government, including the National People’s Congress and the Chinese People's Political Consultative Conference.

https://web.archive.org/web/20131207150515/http://yu-lian.cn/Services.html

9) On http://yu-lian.cn, Eugene Yu praised "Comrade Jiang Zemin" and emphasized Konnech's philosophy of prioritizing "political tasks first, and economic benefits second."

He highlighted his success stories of "Election Management, Detroit" and "US Overseas Voters."

The entire website was written in Chinese.

https://web.archive.org/web/20131207151051/http://yu-lian.cn/Case.html

10) In December 2006, Konnech announced on Facebook that they had partnered with Michigan State University and the Confucius Institute to build, http://ChineseBrief.com, an "interactive communication platform and Chinese language learning tool."

https://web.archive.org/web/20120729201212/http://www.confucius.msu.edu/news.htm

11) On July 18, 2007, Eugene Yu posted an ad on the Chinese Academy of Sciences Jinhua Science and Technology Park's website, offering "5 million yuan" for developing "software packages" for Jinhua Yulian Network and http://konnech.com.

In 2007, 5 million yuan was worth around $700,000 and was the prize money offered by the Chinese government to members of the Thousand Talents Program and other elite overseas entrepreneurs.

https://web.archive.org/web/20131019061139/http://www.jhcy.cn/jsnt_detail.asp?id=16

12) The Chinese Academy of Sciences (CAS) is a national think tank with extensive research facilities and over 50,000 researchers. CAS has been linked to Chinese military, nuclear, and cyber espionage programs.

The U.S. Department of Defense acknowledges the CAS as China's leading academic institution for comprehensive research and development.

CAS and its affiliated companies are involved in developing AI initiatives, hypersonic spaceplanes, robotic submarines, and missile technology for the Chinese military.

The Justice Department has indicted several individuals associated with CAS for their roles in transferring trade secrets and military technology from U.S. companies through Chinese overseas talent programs.

In October 2002, the Jinhua Science and Technology Park became the first collaboration between the Chinese Academy of Sciences (CAS) and a prefecture-level government.

The Chinese government has built more than 150 "Overseas Chinese scholar pioneering parks" in the hearts of 54 "National New and High Technology Development Zones."

These ultra-modern facilities were designed for returning specialists to "incubate" (find commercial or military applications for) technologies acquired overseas as part of China's strategy of "serving in place" that allows Chinese scholars to stay abroad while transferring foreign technology back home.

https://uscc.gov/sites/default/files/Research/Interos_Supply%20Chain%20Vulnerabilities%20from%20China%20in%20U.S.%20Federal%20ICT_final.pdf

https://media.defense.gov/2019/May/02/2002127082/-1/-1/1/2019_CHINA_MILITARY_POWER_REPORT.pdf

https://web.archive.org/web/20100628161736/http://www.jhkjy.ac.cn/about/index.asp

13) Jinhua Yulian Network's initial address was located at No. 988 Shuanglong South Street, Jinhua City, Zhejiang Province, China, which is situated 500 meters away from the Jinhua People's Government building (No. 801 Shuanglong South Street) and across the street from the Jinhua Science and Technology Bureau (No. 828 Shuanglong South Street).

14) The Jinhua Science and Technology Park (JHTP) offers Chinese government-funded support to domestic and overseas enterprises, including financial assistance, living facilities, server hosting, internet access, university partnerships, technology transfers, research assistance, and patent support.

In 1988, the State Council launched the Ministry of Science and Technology’s national Torch Program to speed up the nation’s “science and technological industrialization.”

In 2005, the Ministry of Science and Technology awarded JHTP the distinction of a national-level technology business incubator.

In 2006, JHTP was granted 3 million yuan by the Ministry of Science and Technology through China's national Torch Program to establish the Park's Internet Data Center, where Jinhua Yulian Network would develop, test, and maintain Konnech's American election software.

https://web.archive.org/web/20091017113128/http://www.jhcy.cn/yqgk_01.asp?flag=%B7%FE%CE%F1%B9%A6%C4%DC&lmbm=2405&lmmc=%B7%FE%CE%F1%B9%A6%C4%DC&url=yqgk_01.asp

https://web.archive.org/web/20090413171900/http://www.jhcy.cn/cxzt_01.asp

http://jhcy.cn/jhkjy/town_details/28.html

http://jhcy.cn/jhkjy/town_details/50.html

15) A 2008 Chinese document titled "International Elite Entrepreneurship Modern Service Outsourcing" reveals that Eugene Yu worked for the Chinese government as a Project Manager of the Guangzhou Economic and Technological Development Zone (GETDZ) from 1983 until 1985.

The document features 46 Chinese high-tech companies operating overseas and describes Konnech as an "Intelligent Web Communications" company with the mission of becoming "one of the top 50 e-commerce service providers for schools and government in the United States within 10 years.”

The document mentions Konnech's Chinese venture fund and describes the company's goal of developing advanced technology in cooperation with Zhejiang University:

“The company will enter a phase of rapid development after the implementation of the venture fund in Wuzhong.”

"In terms of specialized technology, we have been developing and hiring technical personnel with expertise in the field in a rapid manner by utilizing the role of corporate and university professors and graduate classes for project development, with the aim of receiving advanced applied technology."

"... it is an indisputable fact that many cutting-edge products come from American university campuses. We must take the corresponding path and cooperate with American universities and Zhejiang University and other domestic institutions to focus on the development of applied technologies and the application-oriented development of specialized technologies."

The document describes the problems facing the U.S. market, citing “expensive software programming fees and talent shortages” and reduced “funding for IT projects” before concluding, “In this environment, the role of our China branch is fully demonstrated.”

When Eugene Yu’s attorneys filed a motion to dismiss his criminal case in California, they included a section entitled FACTUAL BACKGROUND that says he “worked in various locations” after he graduated from Zhejiang University and before he was accepted into Wake Forest University.

However, it failed to mention his prior employment as a Project Manager in the Guangzhou Economic and Technological Development Zone, where he worked in the Industrial Project Negotiation Department and "completed the introduction of several major projects":

"Eugene Yu was born and raised in Jinhua City, Zhejiang Province, China. In 1974, as part of China’s cultural revolution, Mr. Yu was sent to a communal farm where he labored for four years in squalor conditions. In 1977, after Chairman Mao died, Mr. Yu scored high on a nationwide test, qualifying him for admission to study engineering at Zhejiang University.

After graduating from college, he was sent to work in various locations in China. Mr. Yu then met and married his wife Donna Wang. In 1986, Mr. Yu and Dr. Wang were accepted to graduate school programs at Wake Forest University, where Mr. Yu obtained his MBA degree."

Since the launch of the GETDZ in 1984, China has established 219 national-level Economic and Technological Development Zones (ETDZs), which helped launch China’s rise to a global economic superpower.

In order to promote science and technology-intensive industries, ETDZs offer financial incentives and preferential policies that target domestic and overseas enterprises focused on manufacturing, scientific, and technological industries.

Two decades later, Eugene Yu would return to China to launch his company Jinhua Yulian Network Technology Co., Ltd. (金华宇联网络科技有限公司) in the Jinhua Economic and Technological Development Zone (JETDZ).

https://max.book118.com/html/2012/0222/1126480.shtm

https://cbbc.org/sites/default/files/2021-01/China-Britain%20Business%20Council%20-%20In%20the%20Zone%20-%20A%20Comprehensive%20Guide%20to%20China%E2%80%99s%20Economic%20and%20Technological%20Development%20Zones%20-%20October%202020.pdf

https://documentcloud.org/documents/2317

16) On January 4, 2011, Lin Yu, a managing supervisor at Jinhua Yulian Network, established Jinhua Red Date Software Co., Ltd., also known as Jinhua Jujube Software Co., Ltd.

On January 16, 2011, Konnech registered the domain reddatesoft[.]com with the email eyu@konnech.com.

Jinhua Red Date Software and Jinhua Yulian Network shared the same address at No. 1583 Binhong Road, Jinhua City, Zhejiang Province.

Jinhua Yulian Network's website included "Jinhua Red Date Software Co., Ltd." and "reddatesoft[.]com" in its copyright statement.

Peter McCallister, the General Manager of Konnech Australia, later affirmed in an affidavit that Lin Yu is Eugene Yu's older brother and a Chinese national.

(Note: The modified domain URL "reddatesoft[.]com" is used because of safety concerns with the URL raised by Twitter.)

https://web.archive.org/web/20220822014930/https://www.11467.com/jinhua/co/273669.htm

https://web.archive.org/web/20130718125224/http://yu-lian.cn/

17) On April 13, 2015, Lin Yu established Jinhua Hongzheng Technology Co., Ltd. (金华鸿正科技有限公司) in Jinhua, Zhejiang Province, China.

Lin Yu (Eugene Yu's brother) owned 99.4% of the company.

Jun Yu (Eugene Yu's nephew) and Guojun Shao, who co-invented a Konnech patent with Eugene Yu, were among the other equity holders.

Jinhua Yulian Network later transferred a voting patent, co-invented with a Zhejiang University professor, to Jinhua Hongzheng Technology.  In a future thread, there will be a detailed discussion about Konnech's patents, employees, and the involvement of this professor.

18) Jinhua Hongzheng Technology provides election administration software, including web and mobile applications, to more than 430 National People's Congresses across over 20 provinces.

The company has established partnerships with Huawei, Lenovo, China Telecom, China Mobile, China Unicom, and the highest levels of the Chinese government.

19) On July 31, 2015, Eugene Yu registered the website domain "hongzhengtech[.]cn" for Jinhua Hongzheng Technology using the email address admin@konnech.com.

As a result, Konnech held significant control over a company that provides election administration software to the highest levels of the Chinese government.

Shortly after Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) exposed Konnech's connection to China's National People's Congress, the domain registration email address was changed to jiadeng@hongzhengtech.com.

(Note: The modified domain URL "hongzhengtech[.]cn" is used because of safety concerns with the URL raised by Twitter.)

https://web.archive.org/web/20220824173140/https://whois-history.whoisxmlapi.com/lookup-report/AVkvG34MR7

20) In a September 1, 2022, live chat, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) discussed the FBI's betrayal, Konnech programming software for China's National People's Congress, and the company's storage of U.S. election data on Chinese servers.

In January 2021, Phillips said that the cyber analyst he had been working with encountered an “oddity in some of the URLs” such as http://vote4la.com, http://vote4detroit.com, and http://vote4boston.com, which Konnech’s “PollChief” software application used to gather personally-identifying information about poll workers.

Using Binary Edge, a software product companies use to identify and assess the risk of cyber breaches, “We began to look at where these URLs resolve to.

We found that most of them resolve to one I.P. address and that I.P. address — the URL resolved in China,” Phillips said. “What we also learned in our review, http://apps.konnech.net, resolved into this same URL in China, meaning that the application itself was residing in China,” he continued.

“In Binary Edge, you can figure out what type of database they are using, their database port, and all the different services offered by ports in this particular application living in China. It turned out that not only did it live there, but they left the database open.”

This database “stored the personally identifying information of over a million Americans,” he emphasized. Engelbrecht and Phillips decided that “this was a major national security risk” and immediately took the information to the FBI.

When Engelbrecht and Phillips took this information to the FBI, the FBI “said the information was forwarded to their counter-intelligence operation, and a counter-intelligence op was opened up in January or February of 2021,” Phillips said.

Phillips described how he and Engelbrecht played an active role in the FBI’s operation, “They engaged us in the operation, they were communicating with us on a regular basis. They were communicating with Catherine regarding communications with the target and this went on for approximately 15 months.”

Phillips and Engelbrecht noted that the field office they worked with for those 15 months was “legitimate” and not “political law enforcement.”

“These were legitimate people who believed that this software posed a national security risk to the United States of America and they were working with us closely to try to stop this from being in place during the midterms,” Phillips said.

“The focus point was always we needed to remove this software from the election, but taking a step further, there were a lot of other concerns that the bureau had.”

In April 2022, Engelbrecht received a call from one of the FBI agents, who informed her that the FBI’s “Washington D.C. headquarters” was now involved in the investigation.

Engelbrecht described how everything changed after this call, “There was no more goodwill, there was no more let's work together, the script had been flipped, and now we were the target,” she said. “That was a very disturbing call.”

The agent informed Engelbrecht that “two women” at the FBI’s headquarters believed that Phillips and Engelbrecht were “in the wrong for doing this” and that the D.C. office was now trying “to figure out how you guys broke the law to find all of this.”

Engelbrecht added, “which of course we didn't, but that was kind of their Modus Operandi, they were going to try to pin something on us, and today you can pick your headlines about how the FBI has done this time and again.”

Phillips remarked, “The problem is they know about this, and they chose to do nothing. They chose to investigate it, and in the end, they chose to blame us, but this is China. These are Chinese operatives in the United States; these are Chinese citizens who are programming this.”

Engelbrecht explained how the FBI agents initially hoped they could persuade the Washington D.C. office to do the right thing, “Our contacts were saying we are going to try and smooth this out, but as the days clicked on, they re-contacted us and one of them said you may need to be ready to — his term was to use the nuclear option and go to the press,” she said.

With the FBI no longer interested in pursuing Konnech, Englebrecht and Phillips organized an event for Saturday, August 13th in Arizona called “the Pit” where they brought together about two hundred “researchers, independent journalists, and big thinkers” to share their story.

“We asked the people in attendance for help, we didn't know what the FBI's plans were for us, we didn't know if we didn't speak this publicly if we would ever have the chance to, but we felt like our best chance was to share this with people we trusted who had the wherewithal to get the word out,” Englebrecht said.

She continued, “There have been so many great things that have happened since that event, but one of the greatest, was this community that came out shoulder to shoulder saying let’s dig this, let's see how much more information we can find.”

“The quality of research that has been done to supplement what we already had and to corroborate what we already had has been incredible.”

Phillips added, “This is some of the best research I have ever seen. The quality of it, the depth of it, we were with a prosecutor the other day and we had an opportunity to share some of this information with them.”

He continued, “There's likely going to be a grand jury convened here in the next week or so. It's supported by not just the research that my team OPSEC did for Catherine and True the Vote, but by the research of one of the best research teams I've ever seen come together.”

“The data and research all stand on their own.”

https://truethevote.locals.com/post/2664780/the-tiger-project

21) On September 12, 2022, Konnech filed a defamation lawsuit against Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
), accusing them of spreading baseless "conspiracy theories" and engaging in "racism and xenophobia."   

Konnech denied any affiliation with the Communist Party of China and stated that they had never stored American election data on servers in China.

The legacy media echoed Konnech's claims against
@TrueTheVote
 and
@onwardsocial
 without conducting any examination of the company's connections to Jinhua Yulian Network, Jinhua Hongzheng Technology, or China's National People's Congress.

22) In an unusual move, U.S. District Court Judge Kenneth Hoyt issued an ex-parte temporary restraining order in favor of Konnech without providing an opportunity for
@TrueTheVote
 and
@OnwardSocial
 to respond to the complaint.

Furthermore, Judge Hoyt immediately ordered them to disclose the identities of all individuals involved in their investigation of Konnech at the outset of the trial, prior to the discovery phase.

Failure to comply would result in the imprisonment of Catherine Engelbrecht and Gregg Phillips for contempt of court.

23) On October 4, 2022, Eugene Yu, the CEO of Konnech, was arrested by the Los Angeles District Attorney's office for storing the data of American election workers on servers in China.

Deputy District Attorney Eric Neff described the scale of the data breach as "astounding," suggesting that it could be "the largest data breach in United States history."

Prosecutors alleged that Konnech employees shared the personal information of Los Angeles election workers with third-party software developers in China, who were involved in creating and fixing Konnech's software called PollChief.

Furthermore, software developers in China had "super administration access" to PollChief software and confidential election data from the United States.

https://truethevote.org/wp-content/uploads/2022/11/eugene-yu-complaint-101322.pdf

24) On October 5, 2022, during Eugene Yu's bond hearing, his attorney contended that he posed no risk of fleeing as he had been actively cooperating with the FBI for the preceding month, and his arrest had taken the agency by surprise.

However, the Los Angeles District Attorney's office argued that Yu presented a substantial flight risk due to his strong business ties in China.

Additionally, the prosecution raised concerns about the suspicious nature of Yu's arrest, noting that he was taken into custody without his cell phone while on his way to the airport.

25) On October 28, 2022,
@TrueTheVote
 and
@OnwardSocial
 submitted an affidavit containing approximately 10% of their text messages exchanged with FBI Agents in Detroit and San Antonio, supporting their claim of working with the FBI on a 15-month "counter-intelligence operation" against Eugene Yu, prior to the involvement of FBI headquarters in Washington D.C.

The text messages included conversations with the following individuals:

-Special Agent Bruce Fowler, Detroit
-SA Huy Nguyen, San Antonio
-SA Kevin McKenna, San Antonio
-SA Kristina Spindel, San Antonio

In one text message exchange, Fowler provided his FBI email address and mentioned receiving three thumb drives from the San Antonio office. He asked Engelbrecht to guide him on where to find information on those drives.

In another text message exchange, Engelbrecht asked for the name of an agent in Georgia. Nguyen responded that he would provide the name later, but “in the meantime, you can tell them that you filed the complaint with SA Huy Nguyen and SA Kevin McKenna with San Antonio Division.”

In another exchange, Engelbrecht texted Nguyen, stating:

"I wanted to let you know that we took the nuclear option and went public (in a very limited way, but nonetheless we did it). Konnech quickly filed a civil suit against us in Houston federal court and got an ex parte [temporary restraining order].

Part of the TRO required that we name who we’d gotten the election worker data from, same person who’d provided it to you. We gave the court the name under seal. Our attorney also notified the Houston FBI office, where the case was filed.

I’m very concerned about everyone’s safety at this point. Please do whatever possible to help ensure that name never comes out. I can provide you with whatever you may need."

Nguyen did not respond to Engelbrecht’s text. According to further texts provided by Engelbrecht, she reached out to “KayKay,” saying she hoped to talk, in person, if possible.

“KayKay” replied that she was on a temporary assignment out of state until January and asked if Engelbrecht still had Nguyen’s number. Engelbrecht then explained that she had “called and written him but no response.”

The text then explained: “We have been drug into a vicious lawsuit filed against us by Konnech.” “Our attorneys have contacted the FBI and been told that the Bureau has no interest in engaging with the court in order to maintain confidentiality.”

Engelbrecht added that she, Phillips, and “the researcher who originally provided us the data” are being “doxed,” and that it’s “a very serious situation and we’ve been left to hang.”

Engelbrecht then noted, “Yu has already been indicted by a Grand Jury and arrested,” but they “continue to hear chatter that the FBI is working with Konnech, against us, and still trying to accuse us of crimes we did not commit.”

The True the Vote founder then noted that “what Bobby said on the phone that day in April 22 (when you were reading the yearly CI disclaimer to me) has gone into full overdrive.” She added: “I also now believe Gregg and I have been set up. It’s appalling, heartbreaking, and wrong.”

https://thefederalist.com/2022/11/18/in-this-untold-story-of-poll-worker-data-chinese-servers-and-scandal-only-the-fbi-knows-the-truth/

https://storage.courtlistener.com/recap/gov.uscourts.txsd.1888133/gov.uscourts.txsd.1888133.46.2.pdf

26) On October 31, 2022, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) were imprisoned for contempt of court as they refused to disclose the identity of a researcher who provided information to the LADA that resulted in the indictment of Eugene Yu:

Despite Eugene Yu's arrest by the Los Angeles District Attorney based on the allegations he had previously denied in his defamation lawsuit, Judge Kenneth Hoyt refused to admit any evidence from the criminal proceedings against Konnech in his courtroom.

Furthermore, Judge Hoyt declined to respond to a phone call from the Los Angeles District Attorney's office and asserted that the criminal case against Eugene Yu was unrelated to the civil case involving Catherine Engelbrecht and Gregg Phillips.

27) On November 5, 2022, Tucker Carlson discussed Catherine Engelbrecht and Gregg Phillips being arrested for refusing to reveal the identity of a researcher who provided information to the LADA that resulted in criminal charges against Eugene Yu, the CEO of Konnech:

"George Gascon actually indicted Eugene Yu for exfiltrating the personal records of American poll workers, including their social security numbers and home addresses, out of the country to servers in China. These researchers developed that information.   

Catherine attempted to give it to law enforcement at the FBI and elsewhere and was sued by Konnech for doing that. When Konnech sued them, they got a restraining order, ordering Catherine to turn over the names of these researchers.   

Catherine and Gregg, who are very courageous people, simply refused to do it, and as a result, while Yu is home on bail, Catherine and Gregg are in jail tonight...

The civil libertarians and the mainstream press are basically a flock of sheep that are each bleeding the exact same tune, and all they want to do is deny any conversation about the possibility of fraud in elections."

28) On November 7, 2022,
@TrueTheVote
 and
@OnwardSocial
 were released from prison following a decision by the U.S. Court of Appeals for the Fifth Circuit, which overturned Judge Kenneth Hoyt's order to unjustly detain them for contempt of court in a civil defamation case.

Two week later, the appeals court vacated the contempt order and wrote, "the record does not reveal what sort of emergency justified the district court's demand for that information before the parties could file Rule 12 motions before the defendants could file an answer, before the parties could file their initial disclosures, or before discovery could begin let alone conclude in the ordinary course."

"Much less did the district court explain what sort of emergency could warrant jailing the petitioner-defendants for not making such immediate disclosures. Rather, the district court made clear that it was imposing its disclosure requirements because it—the district court—wanted to add defendants to the lawsuit. Resp. 13; App. 188. That is not how the Federal Rules of Civil Procedure work."

Furthermore, the appeals court criticized Judge Kenneth Hoyt for "using a temporary restraining order, a preliminary injunction, and a civil-contempt order to litigate the case on Konnech's behalf."

https://storage.courtlistener.com/recap/gov.uscourts.txsd.1888133/gov.uscourts.txsd.1888133.62.0.pdf

@gatewaypundit
 about their arrest and subsequent solitary confinement and provided information about the Konnech data breach that occurred in Pittsburgh, Pennsylvania, or Allegheny County.

The breach involved the unauthorized exposure of sensitive information belonging to election workers, election judges, the complete Pennsylvania voting registration file, voting machine serial numbers, passwords, and "everything that one would need to cheat."

"This isn't software, guys. This is malware. This is spyware. They are sucking data from the United States, storing it in China, and then using it to create a Chinese-style social credit system where we're all scored.   

United States citizens are scored to manipulate votes, manipulate thought, manipulate pretty much everything you can imagine in our lives. And these people are the tip of the spear for that. They're not the only ones but they're there."

30) On November 9, 2022, the Los Angeles District Attorney's office dropped charges against Konnech and its CEO, Eugene Yu.

District Attorney George Gascon cited concerns over “potential bias” and the “pace of the investigation” as his reasons for the decision.

"We are concerned about both the pace of the investigation and the potential bias in the presentation and investigation of the evidence," Gascon said in a statement.

"We currently have an immense volume of digital data that will define this case, but the processing of that data will take months. We would not be able to fairly and accurately process and present all of that evidence within the statutory timeframes."

"As a result, we have decided to ask the court to dismiss the current case and alert the public in order to ensure transparency."

A few weeks later, Gascon placed Deputy District Attorney Eric Neff, who alleged in court that this was potentially "the largest data breach in United States history," on administrative leave.

31) On December 22, 2022, Grant Bradley, a former employee of Konnech, filed a whistleblower lawsuit against the company that stated he personally “witnessed customer’s data (specifically poll watcher information) being made accessible to foreign nationals from China.”

Additionally, Bradley stated that Konnech used “developers, designers, and coders” who “are all Chinese nationals based out of Wuhan, China.”

https://thefederalist.com/2023/01/20/whistleblower-yes-election-data-company-gave-u-s-poll-workers-personal-info-to-china/

https://scribd.com/document/620894361/22-12-22-Verified-Complaint-1#

32) On February 24, 2023, cybersecurity expert Harry Haury, who forensically imaged Konnech's devices for the Los Angeles District Attorney's office, signed an affidavit stating that he witnessed Konnech storing the personal data of U.S. election workers on servers in China.

Furthermore, the affidavit stated that Konnech's software was developed, tested, and maintained in China, and metadata indicated that Eugene Yu was involved in developing election software for the Chinese government.

Haury, who is the CEO of Cain & Associates, stated that his company assisted the Los Angeles District Attorney's office by following FBI and Justice Department protocols to forensically image servers, computers, cell phones, and other electronic storage devices belonging to Konnech and Eugene Yu.

Haury, who has over 28 years of experience working as a cybersecurity expert for prominent organizations such as the Department of Defense, NSA, CIA, U.S. Treasury, NorthCOM, Sandia National Laboratories, more than a dozen top American banks, and the U.S. Justice Department stated that Konnech's data security system, "amounted to by far the worst example of complete disregard or negligence regarding the protection of PII and sensitive data I have ever seen. We discovered a data breach of U.S. data, which is classified as a total loss of control.”

Substantial evidence was reportedly discovered on Konnech's seized devices, including:

• confirmed multiple instances of Konnech hosting, on servers based in China, U.S. citizens’ personally identifiable information (PII);
• found evidence in private company messages that software code was being developed, tested, and maintained in China;
• confirmed that Konnech was providing administrative credentials to Chinese developers;
• PollChief software suffered from a security vulnerability that allowed any PollChief or Konnech worker to gain "super user" status, giving him or her broad access to information on all U.S. poll workers in the system;
• has evidence that Konnech employees have shared election-related data through, from, and on Chinese servers and applications;
• has evidence in metadata pulled from relevant files indicating Eugene Yu was involved in developing Chinese government (i.e., Wucheng District People’s Congress) election software; and
• has evidence showing Konnech is associated with several companies based in mainland China that appear to be associated with if not subsidized by the Chinese government.

Haury stated, "We concluded that this incident is a very high risk indicator of an intrusion by a foreign intelligence into the U.S. strategic infrastructure, and as obliged by law, we informed the Defense Counterintelligence and Security Agency (DCSA) and other pertinent law enforcement agencies of this contact."

https://truethevote.org/wp-content/uploads/2023/02/2023.02.24-Konnech-Dkt.-87-Motion-to-Inspect-Property.pdf

33) On March 24, 2023, Peter McCallister, the former General Manager of Konnech Australia, signed an affidavit stating that he believed Konnech's software development was done in China by Jinhua Hongzheng Technology, a company owned by "Mr. Yu's older brother" and "Jun Yu, Mr. Yu's nephew, was the person responsible for depositing the data onto the server in China."

Additionally, McCallister stated that after Eugene Yu's arrest, Konnech employees in China attempted to hack Konnech's CTO, Luis Nabergoi, and deleted "all conversations referencing or involving Eugene's nephew, Jun Yu."

Lastly, McCallister believed that Jinhua Hongzheng Technology was "the main provider of election software products to the Communist Party of China" and that Eugene Yu had asked him to sell the same "meeting administration and voting software" to the Australian government.

34) On April 5, 2023, Grant Bradley, the former Konnech employee, signed another affidavit stating "Konnech provided programmers in China private data of U.S.-based election workers, to include social security numbers and other identifying information."

"Konnech appeared to employ at least 80 and perhaps around 100 Chinese nationals to work on its elections software for American clients."

"I witnessed customers' data (specifically poll-watcher information) being made accessible to foreign nationals in China."

"Konnech's election logistics software was (and may still be) substantially developed by developers, designers, and coders who (to the best of my knowledge, information and belief), are all Chinese nationals based out of Wuhan, China."

"The standard process Konnech used to onboard China-based programmers was to create customer environments for the programmers by uploading files containing all of the American customers' poll workers' information, polling locations, and other data to DingTalk or Jira, where the leaders from the Chinese team would have access to Jira, and the entire Chinese team would have access to DingTalk."

"During my employment, on or after October 4, 2022 I was instructed by my superiors to say outwardly to customers that poll worker data was not stored overseas, was not available to foreign nationals, and that we had no idea why Eugene Yu had been arrested... My superiors who instructed me in these regards, and I, knew these statements were false."

https://truethevote.org/wp-content/uploads/2023/04/2023.04.07-Konnech-Dkt.-94-1-Exhibit-H-Affidavit-of-Grant-Bradley.pdf

https://truethevote.org/wp-content/uploads/2023/03/2023.03.24-Konnech-Dkt.-91-Reply-ISO-Motion-to-Inspect.pdf

35) On April 14, 2023, cybersecurity expert Nate Cain (
@cain_nate
), who forensically imaged Konnech's devices for the Los Angeles District Attorney's office, stated that Konnech stored the personal data of U.S. election workers and judges on servers in China.

Furthermore, Cain stated that a "Chinese company that has ties to the CCP" did Konnech's "software development and maintenance," and a Defense Counterintelligence Security Agency (DCSA) analyst reviewed their report, verified that it was accurate, and forwarded it to the FBI.

However, Cain mentioned that he had provided evidence of a major Konnech data breach to the police superintendent of a prominent U.S. county, who subsequently took the information to the FBI, and the FBI had declined to provide assistance, informing the superintendent that they were not interested in pursuing the matter.

Additionally, Cain stated that Los Angeles County had refused to inform several other counties that their data had also been breached.

Cain, who has over 25 years of experience working as a cybersecurity expert for the Army, Navy, Marine Corps, DISA, and the FBI, received his cybersecurity training from the NSA as a member of the U.S. Marine Corps Forces Cyberspace Command (MARFORCYBER).

"We found that there was voter poll worker data, as well as election judge data, and election inventory system data found on Chinese servers."

"We weren't expecting to see what we saw, which was that there was a Chinese company that was essentially doing the software development and all of the software maintenance for this company.

And what we discovered was that we got behind the Chinese firewall, and we found documents that showed that this Chinese company actually had ties to the CCP.

And then at that point, I had no choice but to take that information, package it up and provide it to the Defense Counterintelligence Security Agency (DCSA) because as a cleared contractor, I have a sworn obligation to provide them that information that this could be a potential Chinese espionage or intelligence operation working against the United States and our critical infrastructure.

So, I provided that information to them, and now, we're in a difficult situation because I don't think that George Gascon was very happy about that."

36) On April 20, 2023, Konnech and Eugene Yu retracted their defamation case against Catherine Engelbrecht and Gregg Phillips, a day after
@truethevote
 and
@onwardsocial
 unveiled a website (http://openink.com/konnech) containing much of the information discussed in this Twitter thread.

37) In conclusion, Eugene Yu develops election administration software for the Chinese government in partnership with Huawei, China Telecom, China Unicom, China Mobile, and Lenovo.

Two of his former employees have signed affidavits stating that he stored confidential U.S. election data on servers in China, where his software was developed, tested, and maintained.

Two cybersecurity experts, who forensically imaged Konnech's devices for the LADA, have stated that he stored confidential U.S. election data on servers in China, where he developed election administration software for the Chinese government.

This information is publicly available on the internet.

So, why is the FBI still allowing Konnech's election administration software to be used across the country?

38) On April 14, 2016, Jinhua Hongzheng Technology announced on Weibo that it provides election administration software to China's National People's Congress, Detroit,  Michigan, St. Louis, Missouri, and Washington, D.C.

Its predecessor is Jinhua Yulian Network and "Konnech."

https://archive.ph/8xIqe

39) So, why is the FBI shielding two firms closely tied to the Chinese government, which have financed and developed an American election software company for the past 15 years, all while transferring election data back to China?

40) And lastly, why is the FBI headquarters in Washington D.C., targeting Catherine (
@truethevote
) and Gregg (
@onwardsocial
) for exposing this while seemingly protecting Jianwei Yu (于建伟)?

41) If you would like Congress to hold the FBI accountable for betraying Catherine, Gregg, and their commitment to preserving the integrity of our election system, please visit
@TrueTheVote
's website, http://stopccpelectionfraud.com, and follow these three simple steps:

1. Sign the petition
2. Contact your representatives
3. Review these articles

42) In all of my interactions with Catherine and Gregg, despite facing lawsuits, wrongful arrests, and solitary confinement, their main concern has always been the removal of this national security threat from our election system.

If you would like to support their election integrity efforts, you can donate at:
https://truethevote.org/donate/

43) Finally, if you'd like to support my journalism, please consider becoming a member of my Twitter subscriber community.

By joining, you'll gain exclusive access to my reporting, including:

• Exclusive Konnech threads
• Content creation tips
• OSINT research tools
• Monthly Q&A sessions

Thank you for your time!

2
Hat tip BBG


This could go a number of places, but given that the FBI is threatening the people revealing this apparent Chinese penetration into electoral databases and research center I'm dropping it in. Could this, perchance, reflect a quid for Biden's numerous Chinese pro quos?

Note: these X posts are graphics heavy and hence this piece should be viewed in the oringal, which starts here:

https://x.com/KanekoaTheGreat/status/1666490357469822976

KanekoaTheGreat

@KanekoaTheGreat

KONNECH #1🚨: Evidence shockingly suggests that the FBI is shielding two firms closely tied to the Chinese government, which have financed and developed an American election software company for the past 15 years, all while transferring confidential election data back to China.

2) Konnech has provided election administration and logistics software to many prominent cities and counties in the United States, including:

•Alameda County, California
•Allegheny County, Pennsylvania
•Contra Costa County, California
•Denver, Colorado
•Detroit, Michigan
•Fairfax County, Virginia
•Hillsborough County, Florida
•Maron County, Indiana
•Los Angeles, California
•San Francisco, California
•Santa Clara County, California
•St. Louis County, Missouri
•Travis County, Texas
•Washington, D.C.

3) On August 13, 2022, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) convened a group of researchers to discuss how the FBI's headquarters had betrayed them following a 15-month investigation into Konnech's storage of American election data on Chinese servers. The data involved various sensitive information, including:

•Name, DOB, SSN, Address
•Phone, Email, Bank Account
•Voting Machine Passwords
•Thumb Drive Passwords
•Voter Registration Rolls
•Provisional Ballot Serial Numbers
•RFID Tags On Voting Equipment
•Election Building Schematics
•And More...

"You'd be startled to know that this server lives on the main Unicom backbone in China. And it's in a Chinese University in Wuhan, China. I'm not talking about this just being a storage place for data process here.

The app server for this particular application was in China... We're confronted with the fact that everything there was to know about elections in America, and in key counties in key cities, was in this server in Wuhan, China... So what do you do with this information?

Well, we went to the FBI because this was a matter of national security. And, they agreed. So, we started working with the local FBI community. From January of 2021 until April of 2022, the FBI opened up a significant counterintelligence operation on this.

The problem with it was that it wasn't just American information. It was Australian information. It was Canadian information, it was Mexican information. And we ultimately found out that the CCPs own elections are on this same server set in that university...

Everyone involved on the counter intelligence teams at the Bureau agreed on one thing, this software, this penetration, and this opening was a significant national security threat...

So two weeks before the 2000 Mules movie came out, I get a call from an agent and he says this has risen now to the level of a national security threat and headquarters has gotten involved. I don't know who he was referring to, but he said two women saw the case differently, and felt as though we were the criminals.

They had instructed the Detroit FBI office to notify Konnech that we had breached their firewalls, none of which is true... We later found out they were accusing me of stealing three servers from the Chinese Unicom backbone and having illegal possession of American private information.

And they were shopping that around to the other agencies that would be involved NSA, CIA and others. Trying to get somebody to pick up on this so that they could come Roger Stone me...

But the challenge we all have is this software is still in place... When you dig into Konnech's CEO Eugene Yu, in particular the other URLs that he owns, it will take you to the underlying URL that runs the Chinese Communist Party's elections.

It lives on that server, on that same URL address and that URL is owned by Eugene Yu."

https://open.ink/konnech

4) In 2002, Konnech CEO Eugene Yu was an "officer" on the "finance committee" of a Chinese foundation that flew Professor Charles Lieber, the head of Harvard’s Chemistry Department, to Zhejiang University to give a speech on “Nanotech in Today’s World.”

This discovery was made in a Chinese magazine entitled "Overseas Scholars," written by the China Association for Science and Technology in the United States (CAST-USA) and the American Zhu Kezhen Education Foundation (AZKEF).

CAST is a transnational organization and constituent member of the Chinese People's Political Consultative Conference (CPPCC), whose stated mission is to “maintain close ties with millions of Chinese scientists, engineers and other people working in the fields of science and technology” and to operate as “the bridge linking Chinese science and technology community with the Communist Party of China and the Chinese government,” according to organization’s archived “About Us” webpage.

In 2003, CAST established the Help Our Motherland through Elite Intellectual Resources from Overseas Program (HOME) in concert with the Organization Department of the Chinese Communist Party to recruit overseas science and technology talent to transfer technology and intellectual property back to China.

The CPPCC’s role in channeling overseas science and technology knowledge toward China’s development has grown since a 2013 directive from General Secretary Xi Jinping to focus on incentivizing overseas Chinese to contribute their technical skills and expertise to China’s national rejuvenation.

By 2020, a United States congressional body warned that the Chinese government has built a “sprawling ecosystem of structures, programs, and incentives to coopt and exploit overseas experts for the science and technology they acquire abroad.”

“Chinese leaders have long viewed advanced science and technology (S&T) as key to China’s comprehensive national power and sought to acquire it through licit and illicit means from developed countries like the United States,” the US-China Economic and Security Review Commission (USCC) said in the report.

“This ecosystem sponsors promising Chinese students and scholars at the U.S. and other foreign universities, incentivizes their return to China for the long term, and employs transnational organizations to channel S&T know-how from those remaining abroad back to mainland China.”

The U.S. Senate report continues:

“Many programs associated with Beijing’s S&T transfer ecosystem—including scholarships to study abroad, talent recruitment plans, and entrepreneurship parks—contribute to China’s military-civil fusion strategy by collecting specific technologies and know-how that improve the capabilities of the People’s Liberation Army (PLA) and advance the goals” of the Chinese Communist Party (CCP).”

“This ecosystem sponsors promising Chinese students and scholars to study at foreign universities, incentivizes or requires their return to China in exchange for this support, and recruits researchers via hundreds of talent programs. Moreover, it integrates Chinese students and scholars remaining abroad with organizations that facilitate the transfer of S&T back to the Mainland, where it can be exploited by the PLA, government ministries, state-owned enterprises (SOEs), state-run laboratories, and startups.”

“Even when overseas Chinese students and scholars do stay in the United States after graduation, China’s transnational technology transfer organizations and talent recruitment plans provide a means to contribute to China’s national rejuvenation by transferring technology and know-how without requiring physical return.”

In the magazine, CAST-USA refers to Eugene Yu by his Chinese name YU Jianwei (于建伟), and says that he is an “officer” on the “finance committee” of the American Zhu Kezhen Education Foundation. The foundation’s mission is “to promote exchange and cooperation between Zhejiang University and universities in the United States” and “invite United States professors or scientists to Zhejiang University.”

In 2020, Prof. Charles Lieber was arrested for concealing his funding from the Wuhan University of Technology and participating in China’s Thousand Talents Program.

At a Senate Judiciary Committee hearing, Bill Priestap, the former Assistant Director of the FBI’s Counterintelligence Division, stated that China’s talent recruitment plans are effective “brain gain programs” that “encourage theft of intellectual property from U.S. institutions.”

Priestap continued, “For example, China’s talent recruitment plans, such as the Thousand Talents Program, offer competitive salaries, state-of-the-art research facilities, and honorific titles, luring both Chinese overseas talent and foreign experts alike to bring their knowledge and experience to China, even if that means stealing proprietary information or violating export controls to do so.”

Eugene Yu was an “officer” on the “finance committee” of a Chinese foundation in the United States tasked with flying professors like Charles Lieber to China. This discovery was made in a China Association for Science and Technology in the United States magazine entitled “Overseas Scholars.”

Similarly to how the U.S. congressional report described CAST’s overseas science and technology acquisition efforts, AZKEF keeps a list of talented overseas Chinese students, offers incentives for prominent scientists to fly to China, and focuses on bridging Zhejiang University with universities in the United States.

https://archive.ph/OFVCf

https://web.archive.org/web/20011119103624/http://www.azkef.org/

https://web.archive.org/web/20031220030107/http://azkef.org:80/programs.htm

https://web.archive.org/web/20030402092120/http://azkef.org:80/lecture2002.pdf

https://web.archive.org/web/20140206035502/http://english.cast.org.cn/n1181872/n1257426/47099.html
https://uscc.gov/sites/default/files/2020-10/Overseas_Chinese_Students_and_Scholars_in_Chinas_Drive_for_Innovation.pdf

5) On November 29, 2005, Eugene Yu, also known as YU Jianwei (于建伟), established a shadow subsidiary named Jinhua Yulian Network Technology Co., Ltd. (金华宇联网络科技有限公司) in Jinhua City, Zhejiang Province, China, two years after founding Konnech in the United States.

6) On January 25, 2006, Jinhua Yulian Network was accepted into the Entrepreneurship Service Center at the Chinese Academy of Sciences Jinhua Science and Technology Park.

The Chinese government has funded and overseen the development of Konnech's American election software ever since.

https://web.archive.org/web/20090413172501/http://www.jhcy.cn/yqqy.asp?page=3

7) On February 25, 2006, Eugene Yu registered the website domain "http://yu-lian.cn" for Jinhua Yulian Network with the email address eyu@konnech.com.

https://archive.is/YaRv1#

8) On http://yu-lian.cn, Eugene Yu wrote in Chinese that he provides election software "with Chinese characteristics" to various levels of the Chinese government, including the National People’s Congress and the Chinese People's Political Consultative Conference.

https://web.archive.org/web/20131207150515/http://yu-lian.cn/Services.html

9) On http://yu-lian.cn, Eugene Yu praised "Comrade Jiang Zemin" and emphasized Konnech's philosophy of prioritizing "political tasks first, and economic benefits second."

He highlighted his success stories of "Election Management, Detroit" and "US Overseas Voters."

The entire website was written in Chinese.

https://web.archive.org/web/20131207151051/http://yu-lian.cn/Case.html

10) In December 2006, Konnech announced on Facebook that they had partnered with Michigan State University and the Confucius Institute to build, http://ChineseBrief.com, an "interactive communication platform and Chinese language learning tool."

https://web.archive.org/web/20120729201212/http://www.confucius.msu.edu/news.htm

11) On July 18, 2007, Eugene Yu posted an ad on the Chinese Academy of Sciences Jinhua Science and Technology Park's website, offering "5 million yuan" for developing "software packages" for Jinhua Yulian Network and http://konnech.com.

In 2007, 5 million yuan was worth around $700,000 and was the prize money offered by the Chinese government to members of the Thousand Talents Program and other elite overseas entrepreneurs.

https://web.archive.org/web/20131019061139/http://www.jhcy.cn/jsnt_detail.asp?id=16

12) The Chinese Academy of Sciences (CAS) is a national think tank with extensive research facilities and over 50,000 researchers. CAS has been linked to Chinese military, nuclear, and cyber espionage programs.

The U.S. Department of Defense acknowledges the CAS as China's leading academic institution for comprehensive research and development.

CAS and its affiliated companies are involved in developing AI initiatives, hypersonic spaceplanes, robotic submarines, and missile technology for the Chinese military.

The Justice Department has indicted several individuals associated with CAS for their roles in transferring trade secrets and military technology from U.S. companies through Chinese overseas talent programs.

In October 2002, the Jinhua Science and Technology Park became the first collaboration between the Chinese Academy of Sciences (CAS) and a prefecture-level government.

The Chinese government has built more than 150 "Overseas Chinese scholar pioneering parks" in the hearts of 54 "National New and High Technology Development Zones."

These ultra-modern facilities were designed for returning specialists to "incubate" (find commercial or military applications for) technologies acquired overseas as part of China's strategy of "serving in place" that allows Chinese scholars to stay abroad while transferring foreign technology back home.

https://uscc.gov/sites/default/files/Research/Interos_Supply%20Chain%20Vulnerabilities%20from%20China%20in%20U.S.%20Federal%20ICT_final.pdf

https://media.defense.gov/2019/May/02/2002127082/-1/-1/1/2019_CHINA_MILITARY_POWER_REPORT.pdf

https://web.archive.org/web/20100628161736/http://www.jhkjy.ac.cn/about/index.asp

13) Jinhua Yulian Network's initial address was located at No. 988 Shuanglong South Street, Jinhua City, Zhejiang Province, China, which is situated 500 meters away from the Jinhua People's Government building (No. 801 Shuanglong South Street) and across the street from the Jinhua Science and Technology Bureau (No. 828 Shuanglong South Street).

14) The Jinhua Science and Technology Park (JHTP) offers Chinese government-funded support to domestic and overseas enterprises, including financial assistance, living facilities, server hosting, internet access, university partnerships, technology transfers, research assistance, and patent support.

In 1988, the State Council launched the Ministry of Science and Technology’s national Torch Program to speed up the nation’s “science and technological industrialization.”

In 2005, the Ministry of Science and Technology awarded JHTP the distinction of a national-level technology business incubator.

In 2006, JHTP was granted 3 million yuan by the Ministry of Science and Technology through China's national Torch Program to establish the Park's Internet Data Center, where Jinhua Yulian Network would develop, test, and maintain Konnech's American election software.

https://web.archive.org/web/20091017113128/http://www.jhcy.cn/yqgk_01.asp?flag=%B7%FE%CE%F1%B9%A6%C4%DC&lmbm=2405&lmmc=%B7%FE%CE%F1%B9%A6%C4%DC&url=yqgk_01.asp

https://web.archive.org/web/20090413171900/http://www.jhcy.cn/cxzt_01.asp

http://jhcy.cn/jhkjy/town_details/28.html

http://jhcy.cn/jhkjy/town_details/50.html

15) A 2008 Chinese document titled "International Elite Entrepreneurship Modern Service Outsourcing" reveals that Eugene Yu worked for the Chinese government as a Project Manager of the Guangzhou Economic and Technological Development Zone (GETDZ) from 1983 until 1985.

The document features 46 Chinese high-tech companies operating overseas and describes Konnech as an "Intelligent Web Communications" company with the mission of becoming "one of the top 50 e-commerce service providers for schools and government in the United States within 10 years.”

The document mentions Konnech's Chinese venture fund and describes the company's goal of developing advanced technology in cooperation with Zhejiang University:

“The company will enter a phase of rapid development after the implementation of the venture fund in Wuzhong.”

"In terms of specialized technology, we have been developing and hiring technical personnel with expertise in the field in a rapid manner by utilizing the role of corporate and university professors and graduate classes for project development, with the aim of receiving advanced applied technology."

"... it is an indisputable fact that many cutting-edge products come from American university campuses. We must take the corresponding path and cooperate with American universities and Zhejiang University and other domestic institutions to focus on the development of applied technologies and the application-oriented development of specialized technologies."

The document describes the problems facing the U.S. market, citing “expensive software programming fees and talent shortages” and reduced “funding for IT projects” before concluding, “In this environment, the role of our China branch is fully demonstrated.”

When Eugene Yu’s attorneys filed a motion to dismiss his criminal case in California, they included a section entitled FACTUAL BACKGROUND that says he “worked in various locations” after he graduated from Zhejiang University and before he was accepted into Wake Forest University.

However, it failed to mention his prior employment as a Project Manager in the Guangzhou Economic and Technological Development Zone, where he worked in the Industrial Project Negotiation Department and "completed the introduction of several major projects":

"Eugene Yu was born and raised in Jinhua City, Zhejiang Province, China. In 1974, as part of China’s cultural revolution, Mr. Yu was sent to a communal farm where he labored for four years in squalor conditions. In 1977, after Chairman Mao died, Mr. Yu scored high on a nationwide test, qualifying him for admission to study engineering at Zhejiang University.

After graduating from college, he was sent to work in various locations in China. Mr. Yu then met and married his wife Donna Wang. In 1986, Mr. Yu and Dr. Wang were accepted to graduate school programs at Wake Forest University, where Mr. Yu obtained his MBA degree."

Since the launch of the GETDZ in 1984, China has established 219 national-level Economic and Technological Development Zones (ETDZs), which helped launch China’s rise to a global economic superpower.

In order to promote science and technology-intensive industries, ETDZs offer financial incentives and preferential policies that target domestic and overseas enterprises focused on manufacturing, scientific, and technological industries.

Two decades later, Eugene Yu would return to China to launch his company Jinhua Yulian Network Technology Co., Ltd. (金华宇联网络科技有限公司) in the Jinhua Economic and Technological Development Zone (JETDZ).

https://max.book118.com/html/2012/0222/1126480.shtm

https://cbbc.org/sites/default/files/2021-01/China-Britain%20Business%20Council%20-%20In%20the%20Zone%20-%20A%20Comprehensive%20Guide%20to%20China%E2%80%99s%20Economic%20and%20Technological%20Development%20Zones%20-%20October%202020.pdf

https://documentcloud.org/documents/2317

16) On January 4, 2011, Lin Yu, a managing supervisor at Jinhua Yulian Network, established Jinhua Red Date Software Co., Ltd., also known as Jinhua Jujube Software Co., Ltd.

On January 16, 2011, Konnech registered the domain reddatesoft[.]com with the email eyu@konnech.com.

Jinhua Red Date Software and Jinhua Yulian Network shared the same address at No. 1583 Binhong Road, Jinhua City, Zhejiang Province.

Jinhua Yulian Network's website included "Jinhua Red Date Software Co., Ltd." and "reddatesoft[.]com" in its copyright statement.

Peter McCallister, the General Manager of Konnech Australia, later affirmed in an affidavit that Lin Yu is Eugene Yu's older brother and a Chinese national.

(Note: The modified domain URL "reddatesoft[.]com" is used because of safety concerns with the URL raised by Twitter.)

https://web.archive.org/web/20220822014930/https://www.11467.com/jinhua/co/273669.htm

https://web.archive.org/web/20130718125224/http://yu-lian.cn/

17) On April 13, 2015, Lin Yu established Jinhua Hongzheng Technology Co., Ltd. (金华鸿正科技有限公司) in Jinhua, Zhejiang Province, China.

Lin Yu (Eugene Yu's brother) owned 99.4% of the company.

Jun Yu (Eugene Yu's nephew) and Guojun Shao, who co-invented a Konnech patent with Eugene Yu, were among the other equity holders.

Jinhua Yulian Network later transferred a voting patent, co-invented with a Zhejiang University professor, to Jinhua Hongzheng Technology.  In a future thread, there will be a detailed discussion about Konnech's patents, employees, and the involvement of this professor.

18) Jinhua Hongzheng Technology provides election administration software, including web and mobile applications, to more than 430 National People's Congresses across over 20 provinces.

The company has established partnerships with Huawei, Lenovo, China Telecom, China Mobile, China Unicom, and the highest levels of the Chinese government.

19) On July 31, 2015, Eugene Yu registered the website domain "hongzhengtech[.]cn" for Jinhua Hongzheng Technology using the email address admin@konnech.com.

As a result, Konnech held significant control over a company that provides election administration software to the highest levels of the Chinese government.

Shortly after Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) exposed Konnech's connection to China's National People's Congress, the domain registration email address was changed to jiadeng@hongzhengtech.com.

(Note: The modified domain URL "hongzhengtech[.]cn" is used because of safety concerns with the URL raised by Twitter.)

https://web.archive.org/web/20220824173140/https://whois-history.whoisxmlapi.com/lookup-report/AVkvG34MR7

20) In a September 1, 2022, live chat, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) discussed the FBI's betrayal, Konnech programming software for China's National People's Congress, and the company's storage of U.S. election data on Chinese servers.

In January 2021, Phillips said that the cyber analyst he had been working with encountered an “oddity in some of the URLs” such as http://vote4la.com, http://vote4detroit.com, and http://vote4boston.com, which Konnech’s “PollChief” software application used to gather personally-identifying information about poll workers.

Using Binary Edge, a software product companies use to identify and assess the risk of cyber breaches, “We began to look at where these URLs resolve to.

We found that most of them resolve to one I.P. address and that I.P. address — the URL resolved in China,” Phillips said. “What we also learned in our review, http://apps.konnech.net, resolved into this same URL in China, meaning that the application itself was residing in China,” he continued.

“In Binary Edge, you can figure out what type of database they are using, their database port, and all the different services offered by ports in this particular application living in China. It turned out that not only did it live there, but they left the database open.”

This database “stored the personally identifying information of over a million Americans,” he emphasized. Engelbrecht and Phillips decided that “this was a major national security risk” and immediately took the information to the FBI.

When Engelbrecht and Phillips took this information to the FBI, the FBI “said the information was forwarded to their counter-intelligence operation, and a counter-intelligence op was opened up in January or February of 2021,” Phillips said.

Phillips described how he and Engelbrecht played an active role in the FBI’s operation, “They engaged us in the operation, they were communicating with us on a regular basis. They were communicating with Catherine regarding communications with the target and this went on for approximately 15 months.”

Phillips and Engelbrecht noted that the field office they worked with for those 15 months was “legitimate” and not “political law enforcement.”

“These were legitimate people who believed that this software posed a national security risk to the United States of America and they were working with us closely to try to stop this from being in place during the midterms,” Phillips said.

“The focus point was always we needed to remove this software from the election, but taking a step further, there were a lot of other concerns that the bureau had.”

In April 2022, Engelbrecht received a call from one of the FBI agents, who informed her that the FBI’s “Washington D.C. headquarters” was now involved in the investigation.

Engelbrecht described how everything changed after this call, “There was no more goodwill, there was no more let's work together, the script had been flipped, and now we were the target,” she said. “That was a very disturbing call.”

The agent informed Engelbrecht that “two women” at the FBI’s headquarters believed that Phillips and Engelbrecht were “in the wrong for doing this” and that the D.C. office was now trying “to figure out how you guys broke the law to find all of this.”

Engelbrecht added, “which of course we didn't, but that was kind of their Modus Operandi, they were going to try to pin something on us, and today you can pick your headlines about how the FBI has done this time and again.”

Phillips remarked, “The problem is they know about this, and they chose to do nothing. They chose to investigate it, and in the end, they chose to blame us, but this is China. These are Chinese operatives in the United States; these are Chinese citizens who are programming this.”

Engelbrecht explained how the FBI agents initially hoped they could persuade the Washington D.C. office to do the right thing, “Our contacts were saying we are going to try and smooth this out, but as the days clicked on, they re-contacted us and one of them said you may need to be ready to — his term was to use the nuclear option and go to the press,” she said.

With the FBI no longer interested in pursuing Konnech, Englebrecht and Phillips organized an event for Saturday, August 13th in Arizona called “the Pit” where they brought together about two hundred “researchers, independent journalists, and big thinkers” to share their story.

“We asked the people in attendance for help, we didn't know what the FBI's plans were for us, we didn't know if we didn't speak this publicly if we would ever have the chance to, but we felt like our best chance was to share this with people we trusted who had the wherewithal to get the word out,” Englebrecht said.

She continued, “There have been so many great things that have happened since that event, but one of the greatest, was this community that came out shoulder to shoulder saying let’s dig this, let's see how much more information we can find.”

“The quality of research that has been done to supplement what we already had and to corroborate what we already had has been incredible.”

Phillips added, “This is some of the best research I have ever seen. The quality of it, the depth of it, we were with a prosecutor the other day and we had an opportunity to share some of this information with them.”

He continued, “There's likely going to be a grand jury convened here in the next week or so. It's supported by not just the research that my team OPSEC did for Catherine and True the Vote, but by the research of one of the best research teams I've ever seen come together.”

“The data and research all stand on their own.”

https://truethevote.locals.com/post/2664780/the-tiger-project

21) On September 12, 2022, Konnech filed a defamation lawsuit against Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
), accusing them of spreading baseless "conspiracy theories" and engaging in "racism and xenophobia."   

Konnech denied any affiliation with the Communist Party of China and stated that they had never stored American election data on servers in China.

The legacy media echoed Konnech's claims against
@TrueTheVote
 and
@onwardsocial
 without conducting any examination of the company's connections to Jinhua Yulian Network, Jinhua Hongzheng Technology, or China's National People's Congress.

22) In an unusual move, U.S. District Court Judge Kenneth Hoyt issued an ex-parte temporary restraining order in favor of Konnech without providing an opportunity for
@TrueTheVote
 and
@OnwardSocial
 to respond to the complaint.

Furthermore, Judge Hoyt immediately ordered them to disclose the identities of all individuals involved in their investigation of Konnech at the outset of the trial, prior to the discovery phase.

Failure to comply would result in the imprisonment of Catherine Engelbrecht and Gregg Phillips for contempt of court.

23) On October 4, 2022, Eugene Yu, the CEO of Konnech, was arrested by the Los Angeles District Attorney's office for storing the data of American election workers on servers in China.

Deputy District Attorney Eric Neff described the scale of the data breach as "astounding," suggesting that it could be "the largest data breach in United States history."

Prosecutors alleged that Konnech employees shared the personal information of Los Angeles election workers with third-party software developers in China, who were involved in creating and fixing Konnech's software called PollChief.

Furthermore, software developers in China had "super administration access" to PollChief software and confidential election data from the United States.

https://truethevote.org/wp-content/uploads/2022/11/eugene-yu-complaint-101322.pdf

24) On October 5, 2022, during Eugene Yu's bond hearing, his attorney contended that he posed no risk of fleeing as he had been actively cooperating with the FBI for the preceding month, and his arrest had taken the agency by surprise.

However, the Los Angeles District Attorney's office argued that Yu presented a substantial flight risk due to his strong business ties in China.

Additionally, the prosecution raised concerns about the suspicious nature of Yu's arrest, noting that he was taken into custody without his cell phone while on his way to the airport.

25) On October 28, 2022,
@TrueTheVote
 and
@OnwardSocial
 submitted an affidavit containing approximately 10% of their text messages exchanged with FBI Agents in Detroit and San Antonio, supporting their claim of working with the FBI on a 15-month "counter-intelligence operation" against Eugene Yu, prior to the involvement of FBI headquarters in Washington D.C.

The text messages included conversations with the following individuals:

-Special Agent Bruce Fowler, Detroit
-SA Huy Nguyen, San Antonio
-SA Kevin McKenna, San Antonio
-SA Kristina Spindel, San Antonio

In one text message exchange, Fowler provided his FBI email address and mentioned receiving three thumb drives from the San Antonio office. He asked Engelbrecht to guide him on where to find information on those drives.

In another text message exchange, Engelbrecht asked for the name of an agent in Georgia. Nguyen responded that he would provide the name later, but “in the meantime, you can tell them that you filed the complaint with SA Huy Nguyen and SA Kevin McKenna with San Antonio Division.”

In another exchange, Engelbrecht texted Nguyen, stating:

"I wanted to let you know that we took the nuclear option and went public (in a very limited way, but nonetheless we did it). Konnech quickly filed a civil suit against us in Houston federal court and got an ex parte [temporary restraining order].

Part of the TRO required that we name who we’d gotten the election worker data from, same person who’d provided it to you. We gave the court the name under seal. Our attorney also notified the Houston FBI office, where the case was filed.

I’m very concerned about everyone’s safety at this point. Please do whatever possible to help ensure that name never comes out. I can provide you with whatever you may need."

Nguyen did not respond to Engelbrecht’s text. According to further texts provided by Engelbrecht, she reached out to “KayKay,” saying she hoped to talk, in person, if possible.

“KayKay” replied that she was on a temporary assignment out of state until January and asked if Engelbrecht still had Nguyen’s number. Engelbrecht then explained that she had “called and written him but no response.”

The text then explained: “We have been drug into a vicious lawsuit filed against us by Konnech.” “Our attorneys have contacted the FBI and been told that the Bureau has no interest in engaging with the court in order to maintain confidentiality.”

Engelbrecht added that she, Phillips, and “the researcher who originally provided us the data” are being “doxed,” and that it’s “a very serious situation and we’ve been left to hang.”

Engelbrecht then noted, “Yu has already been indicted by a Grand Jury and arrested,” but they “continue to hear chatter that the FBI is working with Konnech, against us, and still trying to accuse us of crimes we did not commit.”

The True the Vote founder then noted that “what Bobby said on the phone that day in April 22 (when you were reading the yearly CI disclaimer to me) has gone into full overdrive.” She added: “I also now believe Gregg and I have been set up. It’s appalling, heartbreaking, and wrong.”

https://thefederalist.com/2022/11/18/in-this-untold-story-of-poll-worker-data-chinese-servers-and-scandal-only-the-fbi-knows-the-truth/

https://storage.courtlistener.com/recap/gov.uscourts.txsd.1888133/gov.uscourts.txsd.1888133.46.2.pdf

26) On October 31, 2022, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) were imprisoned for contempt of court as they refused to disclose the identity of a researcher who provided information to the LADA that resulted in the indictment of Eugene Yu:

Despite Eugene Yu's arrest by the Los Angeles District Attorney based on the allegations he had previously denied in his defamation lawsuit, Judge Kenneth Hoyt refused to admit any evidence from the criminal proceedings against Konnech in his courtroom.

Furthermore, Judge Hoyt declined to respond to a phone call from the Los Angeles District Attorney's office and asserted that the criminal case against Eugene Yu was unrelated to the civil case involving Catherine Engelbrecht and Gregg Phillips.

27) On November 5, 2022, Tucker Carlson discussed Catherine Engelbrecht and Gregg Phillips being arrested for refusing to reveal the identity of a researcher who provided information to the LADA that resulted in criminal charges against Eugene Yu, the CEO of Konnech:

"George Gascon actually indicted Eugene Yu for exfiltrating the personal records of American poll workers, including their social security numbers and home addresses, out of the country to servers in China. These researchers developed that information.   

Catherine attempted to give it to law enforcement at the FBI and elsewhere and was sued by Konnech for doing that. When Konnech sued them, they got a restraining order, ordering Catherine to turn over the names of these researchers.   

Catherine and Gregg, who are very courageous people, simply refused to do it, and as a result, while Yu is home on bail, Catherine and Gregg are in jail tonight...

The civil libertarians and the mainstream press are basically a flock of sheep that are each bleeding the exact same tune, and all they want to do is deny any conversation about the possibility of fraud in elections."

28) On November 7, 2022,
@TrueTheVote
 and
@OnwardSocial
 were released from prison following a decision by the U.S. Court of Appeals for the Fifth Circuit, which overturned Judge Kenneth Hoyt's order to unjustly detain them for contempt of court in a civil defamation case.

Two week later, the appeals court vacated the contempt order and wrote, "the record does not reveal what sort of emergency justified the district court's demand for that information before the parties could file Rule 12 motions before the defendants could file an answer, before the parties could file their initial disclosures, or before discovery could begin let alone conclude in the ordinary course."

"Much less did the district court explain what sort of emergency could warrant jailing the petitioner-defendants for not making such immediate disclosures. Rather, the district court made clear that it was imposing its disclosure requirements because it—the district court—wanted to add defendants to the lawsuit. Resp. 13; App. 188. That is not how the Federal Rules of Civil Procedure work."

Furthermore, the appeals court criticized Judge Kenneth Hoyt for "using a temporary restraining order, a preliminary injunction, and a civil-contempt order to litigate the case on Konnech's behalf."

https://storage.courtlistener.com/recap/gov.uscourts.txsd.1888133/gov.uscourts.txsd.1888133.62.0.pdf

@gatewaypundit
 about their arrest and subsequent solitary confinement and provided information about the Konnech data breach that occurred in Pittsburgh, Pennsylvania, or Allegheny County.

The breach involved the unauthorized exposure of sensitive information belonging to election workers, election judges, the complete Pennsylvania voting registration file, voting machine serial numbers, passwords, and "everything that one would need to cheat."

"This isn't software, guys. This is malware. This is spyware. They are sucking data from the United States, storing it in China, and then using it to create a Chinese-style social credit system where we're all scored.   

United States citizens are scored to manipulate votes, manipulate thought, manipulate pretty much everything you can imagine in our lives. And these people are the tip of the spear for that. They're not the only ones but they're there."

30) On November 9, 2022, the Los Angeles District Attorney's office dropped charges against Konnech and its CEO, Eugene Yu.

District Attorney George Gascon cited concerns over “potential bias” and the “pace of the investigation” as his reasons for the decision.

"We are concerned about both the pace of the investigation and the potential bias in the presentation and investigation of the evidence," Gascon said in a statement.

"We currently have an immense volume of digital data that will define this case, but the processing of that data will take months. We would not be able to fairly and accurately process and present all of that evidence within the statutory timeframes."

"As a result, we have decided to ask the court to dismiss the current case and alert the public in order to ensure transparency."

A few weeks later, Gascon placed Deputy District Attorney Eric Neff, who alleged in court that this was potentially "the largest data breach in United States history," on administrative leave.

31) On December 22, 2022, Grant Bradley, a former employee of Konnech, filed a whistleblower lawsuit against the company that stated he personally “witnessed customer’s data (specifically poll watcher information) being made accessible to foreign nationals from China.”

Additionally, Bradley stated that Konnech used “developers, designers, and coders” who “are all Chinese nationals based out of Wuhan, China.”

https://thefederalist.com/2023/01/20/whistleblower-yes-election-data-company-gave-u-s-poll-workers-personal-info-to-china/

https://scribd.com/document/620894361/22-12-22-Verified-Complaint-1#

32) On February 24, 2023, cybersecurity expert Harry Haury, who forensically imaged Konnech's devices for the Los Angeles District Attorney's office, signed an affidavit stating that he witnessed Konnech storing the personal data of U.S. election workers on servers in China.

Furthermore, the affidavit stated that Konnech's software was developed, tested, and maintained in China, and metadata indicated that Eugene Yu was involved in developing election software for the Chinese government.

Haury, who is the CEO of Cain & Associates, stated that his company assisted the Los Angeles District Attorney's office by following FBI and Justice Department protocols to forensically image servers, computers, cell phones, and other electronic storage devices belonging to Konnech and Eugene Yu.

Haury, who has over 28 years of experience working as a cybersecurity expert for prominent organizations such as the Department of Defense, NSA, CIA, U.S. Treasury, NorthCOM, Sandia National Laboratories, more than a dozen top American banks, and the U.S. Justice Department stated that Konnech's data security system, "amounted to by far the worst example of complete disregard or negligence regarding the protection of PII and sensitive data I have ever seen. We discovered a data breach of U.S. data, which is classified as a total loss of control.”

Substantial evidence was reportedly discovered on Konnech's seized devices, including:

• confirmed multiple instances of Konnech hosting, on servers based in China, U.S. citizens’ personally identifiable information (PII);
• found evidence in private company messages that software code was being developed, tested, and maintained in China;
• confirmed that Konnech was providing administrative credentials to Chinese developers;
• PollChief software suffered from a security vulnerability that allowed any PollChief or Konnech worker to gain "super user" status, giving him or her broad access to information on all U.S. poll workers in the system;
• has evidence that Konnech employees have shared election-related data through, from, and on Chinese servers and applications;
• has evidence in metadata pulled from relevant files indicating Eugene Yu was involved in developing Chinese government (i.e., Wucheng District People’s Congress) election software; and
• has evidence showing Konnech is associated with several companies based in mainland China that appear to be associated with if not subsidized by the Chinese government.

Haury stated, "We concluded that this incident is a very high risk indicator of an intrusion by a foreign intelligence into the U.S. strategic infrastructure, and as obliged by law, we informed the Defense Counterintelligence and Security Agency (DCSA) and other pertinent law enforcement agencies of this contact."

https://truethevote.org/wp-content/uploads/2023/02/2023.02.24-Konnech-Dkt.-87-Motion-to-Inspect-Property.pdf

33) On March 24, 2023, Peter McCallister, the former General Manager of Konnech Australia, signed an affidavit stating that he believed Konnech's software development was done in China by Jinhua Hongzheng Technology, a company owned by "Mr. Yu's older brother" and "Jun Yu, Mr. Yu's nephew, was the person responsible for depositing the data onto the server in China."

Additionally, McCallister stated that after Eugene Yu's arrest, Konnech employees in China attempted to hack Konnech's CTO, Luis Nabergoi, and deleted "all conversations referencing or involving Eugene's nephew, Jun Yu."

Lastly, McCallister believed that Jinhua Hongzheng Technology was "the main provider of election software products to the Communist Party of China" and that Eugene Yu had asked him to sell the same "meeting administration and voting software" to the Australian government.

34) On April 5, 2023, Grant Bradley, the former Konnech employee, signed another affidavit stating "Konnech provided programmers in China private data of U.S.-based election workers, to include social security numbers and other identifying information."

"Konnech appeared to employ at least 80 and perhaps around 100 Chinese nationals to work on its elections software for American clients."

"I witnessed customers' data (specifically poll-watcher information) being made accessible to foreign nationals in China."

"Konnech's election logistics software was (and may still be) substantially developed by developers, designers, and coders who (to the best of my knowledge, information and belief), are all Chinese nationals based out of Wuhan, China."

"The standard process Konnech used to onboard China-based programmers was to create customer environments for the programmers by uploading files containing all of the American customers' poll workers' information, polling locations, and other data to DingTalk or Jira, where the leaders from the Chinese team would have access to Jira, and the entire Chinese team would have access to DingTalk."

"During my employment, on or after October 4, 2022 I was instructed by my superiors to say outwardly to customers that poll worker data was not stored overseas, was not available to foreign nationals, and that we had no idea why Eugene Yu had been arrested... My superiors who instructed me in these regards, and I, knew these statements were false."

https://truethevote.org/wp-content/uploads/2023/04/2023.04.07-Konnech-Dkt.-94-1-Exhibit-H-Affidavit-of-Grant-Bradley.pdf

https://truethevote.org/wp-content/uploads/2023/03/2023.03.24-Konnech-Dkt.-91-Reply-ISO-Motion-to-Inspect.pdf

35) On April 14, 2023, cybersecurity expert Nate Cain (
@cain_nate
), who forensically imaged Konnech's devices for the Los Angeles District Attorney's office, stated that Konnech stored the personal data of U.S. election workers and judges on servers in China.

Furthermore, Cain stated that a "Chinese company that has ties to the CCP" did Konnech's "software development and maintenance," and a Defense Counterintelligence Security Agency (DCSA) analyst reviewed their report, verified that it was accurate, and forwarded it to the FBI.

However, Cain mentioned that he had provided evidence of a major Konnech data breach to the police superintendent of a prominent U.S. county, who subsequently took the information to the FBI, and the FBI had declined to provide assistance, informing the superintendent that they were not interested in pursuing the matter.

Additionally, Cain stated that Los Angeles County had refused to inform several other counties that their data had also been breached.

Cain, who has over 25 years of experience working as a cybersecurity expert for the Army, Navy, Marine Corps, DISA, and the FBI, received his cybersecurity training from the NSA as a member of the U.S. Marine Corps Forces Cyberspace Command (MARFORCYBER).

"We found that there was voter poll worker data, as well as election judge data, and election inventory system data found on Chinese servers."

"We weren't expecting to see what we saw, which was that there was a Chinese company that was essentially doing the software development and all of the software maintenance for this company.

And what we discovered was that we got behind the Chinese firewall, and we found documents that showed that this Chinese company actually had ties to the CCP.

And then at that point, I had no choice but to take that information, package it up and provide it to the Defense Counterintelligence Security Agency (DCSA) because as a cleared contractor, I have a sworn obligation to provide them that information that this could be a potential Chinese espionage or intelligence operation working against the United States and our critical infrastructure.

So, I provided that information to them, and now, we're in a difficult situation because I don't think that George Gascon was very happy about that."

36) On April 20, 2023, Konnech and Eugene Yu retracted their defamation case against Catherine Engelbrecht and Gregg Phillips, a day after
@truethevote
 and
@onwardsocial
 unveiled a website (http://openink.com/konnech) containing much of the information discussed in this Twitter thread.

37) In conclusion, Eugene Yu develops election administration software for the Chinese government in partnership with Huawei, China Telecom, China Unicom, China Mobile, and Lenovo.

Two of his former employees have signed affidavits stating that he stored confidential U.S. election data on servers in China, where his software was developed, tested, and maintained.

Two cybersecurity experts, who forensically imaged Konnech's devices for the LADA, have stated that he stored confidential U.S. election data on servers in China, where he developed election administration software for the Chinese government.

This information is publicly available on the internet.

So, why is the FBI still allowing Konnech's election administration software to be used across the country?

38) On April 14, 2016, Jinhua Hongzheng Technology announced on Weibo that it provides election administration software to China's National People's Congress, Detroit,  Michigan, St. Louis, Missouri, and Washington, D.C.

Its predecessor is Jinhua Yulian Network and "Konnech."

https://archive.ph/8xIqe

39) So, why is the FBI shielding two firms closely tied to the Chinese government, which have financed and developed an American election software company for the past 15 years, all while transferring election data back to China?

40) And lastly, why is the FBI headquarters in Washington D.C., targeting Catherine (
@truethevote
) and Gregg (
@onwardsocial
) for exposing this while seemingly protecting Jianwei Yu (于建伟)?

41) If you would like Congress to hold the FBI accountable for betraying Catherine, Gregg, and their commitment to preserving the integrity of our election system, please visit
@TrueTheVote
's website, http://stopccpelectionfraud.com, and follow these three simple steps:

1. Sign the petition
2. Contact your representatives
3. Review these articles

42) In all of my interactions with Catherine and Gregg, despite facing lawsuits, wrongful arrests, and solitary confinement, their main concern has always been the removal of this national security threat from our election system.

If you would like to support their election integrity efforts, you can donate at:
https://truethevote.org/donate/

43) Finally, if you'd like to support my journalism, please consider becoming a member of my Twitter subscriber community.

By joining, you'll gain exclusive access to my reporting, including:

• Exclusive Konnech threads
• Content creation tips
• OSINT research tools
• Monthly Q&A sessions

Thank you for your time!

4
(4) FEDERAL JUDGE TOSSES RED STATE ASYLUM RULE LAWSUIT: U.S. District Judge David Joseph ruled that Louisiana, Florida, and 17 other states lack standing to challenge a Department of Homeland Security (DHS) and Department of Justice (DOJ) interim final rule that ended the adversarial process for asylum claims and gave asylum officers the power rather than immigration judges to decide asylum claims.

Judge Joseph said Biden administration policies resulted in a breakdown of government control on the border and general lawlessness, but the states lacked standing to challenge the rule.

Why It Matters: The Biden administration has used new rules interpreting immigration law, and failed to enforce certain immigration laws, to exacerbate the immigration crisis. The Democratic Party long-term political strategy remains to bolster the Democratic voter base ahead of an eventual move on illegal immigrant asylum. – R.C.

5
Politics & Religion / Re: Israel, and its neighbors
« on: Today at 02:03:44 PM »
Or maybe we are being lied to?

Anyway, here's Zeihan:

https://www.youtube.com/watch?v=W4W0FHJ8A0o

6
I have done such training at PSR:

7
Politics & Religion / Re: Promises kept: Biden vs. America
« on: Today at 01:59:22 PM »
I see I failed to post the intro I included when I posted this on FB:
=================


Biden makes his case-- but enables enemy invasion by 10+ million illegal aliens among whom are tens of thousands of likely fifth columnists from China and other hostile powers.  Then there is the matter of enabling $100B to Iran, and billions in aid to Hamas even as it holds American hostages.   

=================


13
Politics & Religion / Biden: Moment of Truth
« on: April 17, 2024, 04:10:11 PM »
Moment of Truth on Ukraine and Israel
Both countries urgently need U.S. aid to defend themselves against brazen adversaries that seek their annihilation.
By Joe Biden
April 17, 2024 9:05 am ET


Iran launched an unprecedented attack against Israel this weekend, with a barrage of missiles and drones. Around the same time, some 1,500 miles north, Russia continued its bombardment of Ukraine, which has intensified dramatically in the last month.

Both Ukraine and Israel defended themselves against these attacks, holding the line and protecting their citizens. And both did it with critical help from the U.S.

Now is not the time to abandon our friends. The House must pass urgent national-security legislation for Ukraine and Israel, as well as desperately needed humanitarian aid for Palestinians in Gaza.

In this third year of Russia’s war, Ukraine continues to defy the odds. Against a much larger military, the Ukrainians regained more than half the territory that Russia occupied after its 2022 invasion. They’ve struck the Russian navy time and again, winning important victories in the Black Sea. And they’ve developed innovative weapons, especially drones, to counter Russian forces. Theirs is a fighting force with the will and the skill to win.

Meanwhile, as we saw this weekend, Israel’s military has the technology and training to defend the country against even an attack of unprecedented scope and ferocity.

But while both countries can capably defend their own sovereignty, they depend on American assistance, including weaponry, to do it. And this is a pivotal moment.

Vladimir Putin is ramping up his onslaught with help from his friends. China is providing Russia with microelectronics and other equipment that is critical for defense production. Iran is sending hundreds of drones; North Korea is providing artillery and ballistic missiles. Ukraine, facing ammunition shortfalls, is losing hold of territory it had regained.

After years of backing Hezbollah, Hamas and other proxies in their attacks on Israel, including Hamas’s brutal attack on Oct. 7, Iran launched a direct attack of its own—hoping to penetrate Israel’s air defense, including David’s Sling and the Iron Dome, which saved countless lives this weekend.

Both Ukraine and Israel are under attack by brazen adversaries that seek their annihilation. Mr. Putin wants to subjugate the people of Ukraine and absorb their nation into a new Russian empire. The government of Iran wants to destroy Israel forever—wiping the world’s only Jewish state off the map.

America must never accept either outcome—not only because we stand up for our friends, but because our security is on the line, too.

If Russia triumphs, Mr. Putin’s forces will move closer than ever to our North Atlantic Treaty Organization allies. “An attack on one is an attack on all” means that if Mr. Putin invades a NATO ally, we will come to its aid—as our NATO allies did for us after the Sept. 11 attacks. We should surge support to Ukraine now, to stop Mr. Putin from encroaching on our NATO allies and ensure that he doesn’t draw U.S. troops into a future war in Europe.

Likewise, if Iran succeeds in significantly escalating its assault on Israel, the U.S. could be drawn in. Israel is our strongest partner in the Middle East; it’s unthinkable that we would stand by if its defenses were weakened and Iran was able to carry out the destruction it intended this weekend. We can make that outcome less likely by replenishing Israel’s air defenses and providing military aid now, so its defenses can remain fully stocked and ready.

If Congress passes military aid for Ukraine and Israel, we won’t write blank checks. We’d send military equipment from our own stockpiles, then use the money authorized by Congress to replenish those stockpiles—by buying from American suppliers. That includes Patriot missiles made in Arizona, Javelin missiles made in Alabama, and artillery shells made in Pennsylvania, Ohio and Texas. We’d be investing in America’s industrial base, buying American products made by American workers, supporting jobs in nearly 40 states, and strengthening our own national security. We’d help our friends while helping ourselves.

I’ve been clear about my concerns over the safety of civilians in Gaza amid the war with Hamas, but this aid package is focused on Israel’s long-term defensive needs to ensure it can maintain its military edge against Iran or any other adversary. Importantly, this bill has funding that will allow us to continue delivering urgent humanitarian aid for the people of Gaza as well as others who have felt the impact of conflicts around the world.

It’s a strong and sensible plan. It shouldn’t be held hostage any longer by a small group of extreme Republican House members.

Mr. Putin has tried relentlessly to break the will of the Ukrainian people. He has failed. Now he’s trying to break the will of the West. We cannot let him succeed.

There are moments in history that call for leadership and courage. This is one of them.

Mr. Biden is president of the United States.

Advertisement


17
Politics & Religion / GPF: Japan-AUKUS
« on: April 17, 2024, 09:43:08 AM »
April 17, 2024
View On Website
Open as PDF

Is Japan the Next AUKUS Member?
Washington’s push for Tokyo engagement shows a strategic focus.
By: Ronan Wordsworth
The partnership comprising Australia, the United Kingdom and the United States known as AUKUS is intended to be among the most closely integrated national security alliances of its kind. It’s no surprise, then, that when the U.S. ambassador to Tokyo floated the idea last week of adding Japan to the grouping, it caused quite a stir. Australia’s prime minister has since downplayed the suggestion, saying there will be no new AUKUS members, but Japan nonetheless seems to have already developed a special relationship with the group.

AUKUS was first announced in September 2021 as a direct response to the threat its members believe China poses to their respective national securities and collective regional dominance. (Notably, the group was formed independently of the Five Eyes intelligence-sharing organization, which comprises AUKUS members and Canada and New Zealand.) The first phase of the partnership is to provide Australia with conventionally armed, nuclear-powered attack submarines – the first time such technologies are being shared with a non-nuclear state. These submarines are far more advanced than the traditional diesel-powered ones, can travel underwater for far longer and give off no audio signature. They will be developed trilaterally, based on a next-generation British design that incorporates technology from all three nations, including cutting-edge U.S. submarine technologies, demonstrating the collaboration between the partners of the most important military technology secrets.

The second phase – the one in which Japan was proposed to join – supports a much tighter integration of the three allies' armed forces. This includes collaboration on developing emerging technologies including undersea capabilities, quantum technologies, artificial intelligence, advanced cyber capabilities, hypersonic and counter-hypersonic weapons, electronic warfare capabilities, combined innovation, and information and knowledge sharing. And because these applications depend on the utmost secrecy, they can be shared only with the most reliable allies – a point Australia and the U.K. have repeatedly made.

Japan is not the first U.S. ally to consider or be considered for closer integration with the AUKUS partnership. New Zealand, Canada and some unspecified European countries are all reportedly in talks about potential areas of collaboration. But Japan appears to be the preferred candidate, and Washington has even reportedly considered formalizing bilateral cooperation between AUKUS and Tokyo. To be sure, Japan can offer advanced technological capabilities that would have useful military applications. As important, it has become more assertive in regional security over the past few years. Whereas Tokyo’s only real security ally until recently was Washington, Japan has more overtly tried to build stronger relationships with traditional U.S. allies and has openly competed with China in the Asia-Pacific. Japan has also slowly revitalized its defense industry so that it can more actively participate in regional affairs and even export arms. During a recent trip to Washington, Japanese Prime Minister Fumio Kishida signed several defense agreements, among them a trilateral deal that includes the Philippines, which, like Japan, has been an important component in American efforts to hem in China. Japan, the U.S. and Australia also signed an agreement on a joint air defense strategy to counter “growing air and missile threats.”

Yet neither London nor Canberra are sold on Japanese membership. They have expressed concerns over information security in Japan that could put at risk the technological secrets that are being developed. Japan’s cybersecurity defenses are still in their infancy, and despite promises to develop the sector further and introduce legislation allowing proactive combat of cyber threats, its security architecture and background checks are still relatively immature. Australia and the U.K. have also said advancements are needed within the current AUKUS information-sharing process before new members can be considered.

At its core, AUKUS was designed to deter and contain China. The development of Australian submarines and the integration of intelligence and military technology help to accomplish that goal. Bringing Japan into the fold, however modestly, could do the same – even if Washington is the only one advocating its inclusion. That advocacy says a lot about U.S. priorities going forward, especially if it means Washington sees Tokyo as an ally on par with Canberra and London.

Japan is unlikely to officially join AUKUS anytime soon, but even if it never does, the talks around its accession and the flurry of agreements signed over the past year with Washington, the Philippines, South Korea and Australia clearly indicate the stock that has been placed in developing the relationship.

18
Politics & Religion / Re: The Surveillance/Omnipotent State
« on: April 17, 2024, 09:24:47 AM »
https://cointelegraph.com/news/nsa-days-from-taking-over-internet-whistleblower-edward-snowden

A very savvy tech friend responds:

"No. Also Snowden lives in a house paid for by Putin and has security from Putin.  He is guy responsible for maybe 200 cia deaths from the documents he stole and then passed to China/Russia which led to multiple networks being revealed and the people killed.  So I always take any article like this quoting him with a big piece of kosher salt."

That said the part about seizing servers etc seems both plausible and frightening.

20
Politics & Religion / WSJ: The 4th is not in jeopardy
« on: April 17, 2024, 08:33:57 AM »

The Fourth Amendment Isn’t in Jeopardy
A bill headed for a House vote would harm U.S. intelligence and law enforcement with little impact on privacy.
By
The Editorial Board
Follow
April 16, 2024 5:34 pm ET



There is no shortage of bad ideas in Congress, and too many have a chance to become law these days. An example is the Fourth Amendment Is Not For Sale Act, which would prohibit the U.S. government from buying digital information that would remain available to the likes of China and Russia.

The bill, scheduled for a House vote on Wednesday, would ban the government from buying information on Americans from data brokers. This would include many things in the cloud of digital exhaust most Americans leave behind online, from information on the websites they visit to credit-card information, health information and political opinions.

Our libertarian friends fret that letting the government buy data infringes on the Fourth Amendment’s guarantee against unreasonable searches. But the Supreme Court held in U.S. v Miller (1976) that “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” The Court updated Fourth Amendment law on tracking cellphone location data in Carpenter v. U.S. (2018), but the Not For Sale Act goes much further.

The Justice Department says the bill, sponsored by Rep. Warren Davidson (R., Ohio), would limit the ability of U.S. law enforcement to seek information online that often helps solve federal crimes, including hacks and other malicious digital acts. The bill also bans the purchase of records on Americans’ location information, a change that Justice says would hinder the ability to track missing children, hunt fugitives and investigate criminal networks.

The bill would force U.S. intelligence officials to avoid data that could include information on an American. That’s a burden on tools the Defense Department uses to protect foreign military bases and troops abroad.

In a letter to Judiciary Chairman Jim Jordan and ranking Democrat Jerrold Nadler in December 2023, the Fraternal Order of Police wrote that banning the use of digital information would end law enforcement’s access to “tools that generate leads into crucial and often complex cases.” The National Sheriffs Association says the proposal “empowers the cartels.”

The bill’s co-sponsors include voices on the extremes of both parties, including Rep. Andy Biggs (R., Ariz.) and Democrats Pramila Jayapal (D., Wash.) and Mr. Nadler. Let’s hope the sensible center prevails on this one.

26
Politics & Religion / FO: Possible sabotage of ammo plant?
« on: April 16, 2024, 06:34:56 PM »
(4) SCRANTON ARMY AMMO PLANT CATCHES FIRE: Local authorities are investigating a fire at the Scranton Army Ammunition Plant in Scranton, PA, that broke out yesterday and said the extent of damage is unknown at this point.

The Scranton plant is the only manufacturer in the U.S. of 105mm and 155mm shell casings for the U.S. military.

Why It Matters: There is no information yet on the cause of the fire, and the base case is likely an accident. However, the Scranton plant presents a target of opportunity for foreign adversaries or domestic far left radicals who called for disrupting U.S. defense contractors and defense logistics. The contraction of the U.S. defense industrial base created choke points in the U.S. defense supply chain, allowing single points of failure to have a potentially outsized impact on U.S. national security. – R.C.

28
Politics & Religion / FO: NIST overwhelmed
« on: April 16, 2024, 04:39:23 PM »
(2) FEDERAL AGENCY OVERWHELMED BY CYBER VULNERABILITY REPORTS: The National Institute of Standards and Technology (NIST) said the agency will temporarily pause the National Vulnerability Database (NVD) to “regroup and reprioritize” because the agency is being overwhelmed with software vulnerability reports.

Censys researcher Emily Austin said security professionals across disciplines and organizations rely on the NVD, and they are at a major disadvantage due to issues with the database.

FBI Director Christopher Wray told the American Bar Association’s Law and National Security Committee last week that state-linked hacking groups are ramping up threat activity against the United States.

Why It Matters: NIST covers a broader spectrum of cybersecurity threats than the Cybersecurity and Infrastructure Security Agency (CISA), and is overwhelmed by reports on software vulnerabilities at the same time foreign adversaries are increasing cyberattacks against U.S. critical infrastructure. According to reports from industry groups, there were 420 million cyber incidents in 2023, a 30% jump from 2022, and about one-third of all attacks targeted operational technology in the industry and the energy sector. – R.C.

29
(1) HOUSE PASSES FISA RENEWAL WITHOUT WARRANT REFORM: The House passed the Foreign Intelligence Surveillance Act (FISA) Section 702 renewal bill in a 273-147 vote on Friday, 12 April.

The amendment to add a warrant requirement for Section 702 database searches of American citizens’ data was defeated in a 212-212 vote after House Speaker Mike Johnson (R-LA) voted to break the tie.

“I will do everything in my power to stop this bill” when it reaches the senate, Senator Ron Wyden (D-OR) said. Wyden added, “The House bill represents one of the most dramatic and terrifying expansions of government surveillance authority in history.”

Why It Matters: Republican lawmakers who voted against the warrant reform amendment argue that a warrant requirement would undermine national security by slowing the process of collecting and analyzing data on foreign threats. However, the warrant requirement would have only applied to Section 702 database searches targeting Americans. The bill now moves to the Senate, which is likely to face bipartisan opposition ahead of the Friday deadline when Section 702 authorities lapse. – R.C.

32
With a presidential rematch between Joe Biden and Donald Trump now all but confirmed, the world is focusing on what could be the most consequential election ever. If the disasters of the past three years have taught us anything, it’s that we need a conservative back in the White House. The West is succumbing to challenges from its enemies abroad while being undermined from within by the promotion of leftist ideologies, eco-extremism and wokeism. A Trump victory would provide much-needed leadership to the Western world.


But even if President Trump is re-elected, his battle will have only begun. Across the West—especially the English-speaking world—there has been a shift of power away from democratically accountable officeholders to unelected bureaucrats and technocrats. The administrative state undermined Mr. Trump’s first term and undermined my tenure as Britain’s prime minister, forcing me out of office after 49 days. I assumed that I would be able to drive through the agenda on which I was elected. How wrong I was. The opaque British bureaucratic state undermined my proposed reforms, and their American equivalents will have Mr. Trump in their sights if he is victorious in November. The deep state will attempt to undercut him even more than it did in his first term.

Conservatives need to understand that winning an election isn’t enough. The winner needs a concerted plan to dismantle the deep state, which seeks its own self-preservation. When I entered Downing Street in September 2022, growth in the British economy had been anemic for years, despite artificially low interest rates that served to accustom government and consumers alike to cheap money and inflation. Tax burdens and energy costs were high, and the expansive welfare state was bloated. The U.K. had left the European Union in 2020, but reams of burdensome laws remained on the British statute book. The economic establishment had bought into the high-tax, high-regulation, big-government European approach and had little appetite for supply-side policies or tax cuts. Too many conservatives went along with the establishment’s push for net zero and high immigration.

As soon as I announced plans to institute a range of supply-side reforms, I was marked by the technocrats for political extinction. On the eve of the publication of our growth plan, the Bank of England raised interest rates, but not by as much as anticipated—a misstep that prompted a fall in the value of the pound, leading to higher yields on U.K. government bonds, known as gilts. The central bank also announced plans to sell £40 billion in gilts that evening, prompting private bond holders to pre-empt the sale by flooding the market with their own gilts.

Rising yields were a problem because of pension funds’ exposure to leveraged liability-driven investment funds, which are highly susceptible to interest rate risk. Due to failures in regulation and oversight, U.K. pension funds were uniquely exposed to the same kind of risk that caused several U.S. banks to collapse in early 2023. The liability-driven investment funds’ leveraged bets on gilt prices began to sour while the Office for Budget Responsibility—a U.K. version of the Congressional Budget Office—leaked its claim that our plans would create a £70 billion “fiscal black hole.” OBR forecasts like this one have consistently been wrong because they underestimate the Laffer curve effect of tax cuts and the benefits of supply-side reforms.

Unelected bureaucrats caused this market turmoil, but elected representatives were blamed. Neither I nor Chancellor Kwasi Kwarteng had been given any warning before the liability-driven investment fund situation blew up. When the Bank of England announced it would buy gilts to support the pension funds—a move that everyone knew would prompt investors to unload their government bonds—I knew they had me at gunpoint. We had to ditch our program or risk a market meltdown that would leave the government unable to finance its debt. There should be an independent investigation into what happened, but the establishment would never allow it.

The U.S. economic establishment already is arming against Mr. Trump and his economic program. After the disaster of Bidenomics—with its ballooning subsidies, tax hikes, burdensome regulation and more than $34.6 trillion of debt—a program of supply-side measures like oil and gas exploration, spending cuts and tax reform is desperately needed. In March, CBO Director Phillip Swagel explicitly warned that the mounting U.S. fiscal burden threatened a crisis of the kind that brought me down. Corporate borrowers are also reportedly preparing for market volatility. Jamie Dimon of JPMorgan has warned the federal debt is pushing the economy toward a financial cliff.

This isn’t a fight only to return to fiscal responsibility, but also to return power to the people’s elected representatives. My Republican friends must be ready for the fight of their lives.

Ms. Truss served as Britain’s prime minister in 2022. She is author of “Ten Years to Save the West: Leading the Revolution Against Globalism, Socialism, and the Liberal Establishment,” out Tuesday.

33
"Israel should attack military targets not Iran's oil infrastructure."

Without oil money they would be as broke as they were during Trump and as quiescent.

34
Politics & Religion / WSJ: Lawfare via Sarbox
« on: April 16, 2024, 11:14:41 AM »
The Jan. 6 Riot Reaches the Supreme Court
Did the feds go too far in charging rioters with obstructing Congress under the Sarbanes-Oxley Act?
By The Editorial Board
Follow
April 15, 2024 5:30 pm ET


The people who breached the U.S. Capitol on Jan. 6, 2021, are being held accountable, and attempts to rebrand them as patriotic choirboys are a sign of the bizarre political times. Yet is it unduly stretching the law to prosecute Jan. 6 rioters using the Sarbanes-Oxley Act of 2002?

The Supreme Court will consider this Tuesday in Fischer v. U.S., and rooting for the government to lose requires no sympathy for the MAGA mob. Joseph Fischer says in his brief that he arrived late to the Capitol, spent four minutes inside, then “exited,” after “the weight of the crowd” pushed him toward a police line, where he was pepper sprayed. The feds tell an uglier tale.

Mr. Fischer was a local cop in Pennsylvania. “Take democratic congress to the gallows,” he wrote in a text message. “Can’t vote if they can’t breathe..lol.” The government says he “crashed into the police line” after charging it. Mr. Fischer was indicted for several crimes, including assaulting a federal officer. If true, perhaps he could benefit from quiet time in a prison library reading the 2020 court rulings dismantling the stolen election fantasy.

Sarbanes-Oxley, though? Congress enacted Sarbox, as it’s often called, in the wake of Enron and other corporate scandals. One section makes it a crime to shred or hide documents “corruptly” with an intent to impair their use in a federal court case or a Congressional investigation. That provision is followed by catchall language punishing anybody who “otherwise obstructs, influences, or impedes” such a proceeding. Now watch, as jurists with Ivy degrees argue about the meaning of the word “otherwise.”

In Mr. Fischer’s view, the point of this law is to prohibit “evidence spoliation,” so the “otherwise” prong merely covers unmentioned examples. The government’s position is that the catchall can catch almost anything, “to ensure complete coverage of all forms of corrupt obstruction.” The feds won 2-1 at the D.C. Circuit Court of Appeals.

Yet two judges were worried how far this reading would permit prosecutors to go. Judge Justin Walker, who joined the majority, said his vote depended on a tight rule for proving defendants acted “corruptly.”

Judge Gregory Katsas filed the vigorous dissent. The government “dubiously reads otherwise to mean ‘in a manner different from,’ rather than ‘in a manner similar to,’” he argued. The obstruction statute “has been on the books for two decades and charged in thousands of cases—yet until the prosecutions arising from the January 6 riot, it was uniformly treated as an evidence-impairment crime.”

A win for the feds, Judge Katsas warned, could “supercharge comparatively minor advocacy, lobbying, and protest offenses into 20-year felonies.” For example: “A protestor who demonstrates outside a courthouse, hoping to affect jury deliberations, has influenced an official proceeding (or attempted to do so, which carries the same penalty).” Or how about a Congressman (Rep. Jamaal Bowman) who pulls a fire alarm that impedes a House vote?

Special counsel Jack Smith has charged Donald Trump with obstructing a Congressional proceeding, and he says Mr. Trump’s “fraudulent electoral certifications” in 2020 are covered by Sarbox, regardless of what the Supreme Court does in Fischer. The other piece of context is that prosecutors going after Jan. 6 rioters have charged obstruction in hundreds of cases. But if those counts are in jeopardy, don’t blame the Supreme Court.

Presumably many of those defendants could be on the hook for disorderly conduct or other crimes, and the feds can throw the book at them. What prosecutors can’t do is rewrite the law to create crimes Congress didn’t.

35
Politics & Religion / WSJ: Israel has no choice but to
« on: April 16, 2024, 11:10:04 AM »
second

Israel Has No Choice but to Strike Back Against Iran
Those urging restraint after Tehran’s attack are following the same failed strategy that produced catastrophe on Oct. 7.
By Elliot Kaufman
April 16, 2024 12:55 pm ET


What if the Oct. 7 invasion had been “intercepted”? Imagine the same Hamas attack but better Israeli defense, with more than 90% of the terrorists stopped before the border or shortly thereafter, and only minor Israeli casualties. President Biden would probably have done then what he is doing now, in the aftermath of Iran’s intercepted attack: urge Israel not to respond in any serious way. Let Hamas live to try it again.

To learn the lessons of Oct. 7 is to reject that advice after the long night of April 13. Israel will respond to Iran, it announced Monday. It has learned the hard way that air defenses don’t relieve you of the duty to subdue a determined attacker. Hamas’s intent to slaughter Israelis was hardly a secret, but Israel allowed it to survive and grow stronger because its rockets could be intercepted.

It was no harm, no foul. Israel agreed to “take the win” against Hamas—as Mr. Biden now advises with regard to Iran—all the way to catastrophe.

Rocket fire from an Iranian proxy became normal, not worth a response in most cases, until it was too late. It’s the same story with Hezbollah, whose expanding arsenal and occasional rocket fire became facts of life in northern Israel. Another war would have been costly, and what damage were the rockets really doing in the meantime? As the smart set says about Iran today, Hezbollah’s attacks were merely “symbolic.”

Israel never stopped the trickle, so it became a flood. Hezbollah has fired on Israel more than 3,000 times since Oct. 7, depopulating the country’s north. Yet this, too, has become normal. “Man is a creature who can get used to anything,” writes Dostoevsky, and all the more so if it’s the other guy who has to live with the consequences. Biden administration officials now regularly implore Israel not to “escalate” with Hezbollah—that, they say, would cause a war.

The miracle of Iron Dome air defenses for years led Israel to tolerate what no other nation would. Worse, other nations demanded that Israel tolerate it, because Israel suffered little damage. When Hamas crossed a line and Israel responded, as in 2008 and 2014, the world quickly came to demand a cease-fire, no matter how strong and unbowed Hamas remained. Better to restore calm. Better to have peace and quiet.

Amid unprecedented economic growth, Israelis themselves came to worship calm. Politicians and generals rationalized allowing Qatar to send aid money to Gaza, knowing that much of it was being diverted to Hamas. Why? To maintain stability.

The Biden administration does much the same with Iran by issuing $10 billion sanctions waivers and not enforcing oil sanctions. This is money to grease the peace, even though everyone knows Iran uses it to spread war.

For Israel, it all worked until it didn’t. Hezbollah now diverts Israeli troops from Gaza, holds a region of the country hostage and is strong enough to deter a substantial reply. The Houthis in Yemen, another Iranian proxy, have shut down the Red Sea and barely paid a price. You think this will be the last time they do it?

The war in Gaza is now fought on Hamas’s terms, following Hamas’s greatest success, waged in the tunnels Hamas has spent 16 years preparing. It should have been fought after the very first rocket.

Easy for me to say now, but that’s the point. After Oct. 7, Israelis vowed never again to fall victim to such a conceptzia. Israel, and America, has a chance to learn from experience.

Today many restrainers assure us that Iran’s attack on Israel was a mere demonstration, nothing demanding a reply. Never mind that it was the largest drone attack in history, plus 150 or so ballistic and cruise missiles. When it wanted to put on a show in January, after Israel had killed a different Iranian terror kingpin, Iran fired 11 missiles at an Iraqi businessman’s family home and called it a Mossad base. This wasn’t that.

The Biden view of the attack is convoluted: “Iran’s intent was clearly to cause significant destruction and casualties,” spokesman John Kirby says, but no need for an Israeli reply. Claim victory to mask fear.

Telegraphing its intentions but firing a massive barrage suggests Tehran wanted to do as much damage as it could get away with. Bizarre public negotiations, conducted through leaks to third parties in the lead-up to the strike, helped Iran calibrate what it could shoot while securing Mr. Biden’s pressure on Israel not to respond.

The administration is proud of its back-channel work, but it shouldn’t be. Instead of reassuring Iran that it could attack Israel within parameters, Mr. Biden should have left Ayatollah Ali Khamenei fearing how the U.S. would reply.

In telling Israel to move on, Mr. Biden is asking it to recognize Iran’s right to respond to pinpoint strikes in Syria with war on the Israeli homeland. As the head of Iran’s Islamic Revolutionary Guard Corps said Sunday: “From now on, if the Zionist regime anywhere attacks our interests, assets, figures and citizens, we will reciprocally attack it from Iran.”

If those are allowed to become the rules of the game, would Israel be deterred from disrupting Iran’s command and supply hub in Syria, from which it arms Hezbollah in Lebanon and Hamas in the West Bank? A small Israeli surrender in Syria, coerced by a Biden administration desperate for calm, could seed the next war.

Israel is being told again to let the problem fester and accept a tit-for-tat equation, but on worse terms than ever. “It’s only 100 ballistic missiles” is only the latest gruel to swallow, while Mr. Khamenei releases ravings, such as on April 10, about Israeli normalization with Muslim states: “The Zionists suck the blood of a country for their own benefit when they gain a foothold.” The world brushes off the antisemitism. The media doesn’t even report his statements.

Mr. Biden asks Israel to put its faith in deterrence while its enemies become stronger and Israel is the one deterred. When the president threatens that Israel will be isolated, on its own if it defends itself properly, he is asking it to stick to the strategy that left it fatally exposed on Oct. 7 and that it swore off the same day.

37
Politics & Religion / PP
« on: April 16, 2024, 10:41:13 AM »
Johnson announces stand-alone bills on Israel, Ukraine, and more: It's been anything but a cakewalk since Mike Johnson was elected to the speakership last October, with his Republican ranks having dwindled, his margin for error having all but vanished, and certain of his GOP colleagues having decided that posturing is more important than governing. Despite this, and no doubt buoyed by his Christian faith, Johnson has persevered. Indeed, yesterday he announced his plan to introduce three separate bills for aid to Ukraine, Israel, and Taiwan. "What we'll do," he said, "is bring to the House floor independent measures. We won't be voting on the senate supplemental in its current form, but we will vote on each of these measures separately in four different pieces." Thus, at least for the nation's three major geopolitical interests, instead of trying (and, thankfully, failing) to ram through a single $118.3 billion abomination as Chuck Schumer's Democrat-controlled Senate did in early February, lawmakers will now be allowed to vote their consciences on independent bills with independent aims. As for that fourth piece Johnson referred to, that bill would muddy things up by facilitating the seizure of Russian assets, a lend-lease option for Ukraine funding, additional sanctions on Iran, and the divestiture of that poisonous ChiCom spyware known as TikTok. But, hey, with apologies to Meatloaf: Three out of four ain't bad.

39
Politics & Religion / WSJ: Texas gets a scare
« on: April 16, 2024, 10:03:10 AM »
Texas Gets a Spring Energy Scare
The Lone Star State power grid is already swooning and it’s only spring.
By
The Editorial Board
April 15, 2024 5:36 pm ET


Summer is two months away, yet the Texas power grid is already swooning. On Friday the Electric Reliability Council of Texas (Ercot) asked power generators to postpone scheduled maintenance early this week “to help alleviate potential tight conditions” as temperatures rise into the not-so-sizzling 80s.

The grid typically has excess power-generating capacity in the spring owing to mild weather. There’s also an abundance of solar and wind power. This is why plants go off-line for repairs in the spring to prepare for the summer when electricity use surges as people ramp up the air conditioning.

Yet merely warm spring weather is now enough to push the Texas grid to the brink. Tuesday’s high is forecast to be 89 degrees in Dallas and 84 in Houston. These temperatures shouldn’t force grid operators to break a sweat to keep the lights on, but they are.

One culprit is skyrocketing electricity demand from population growth, new data centers and manufacturing plants. A surge in Bitcoin prices has also made cypto-mining more profitable. Many miners located servers in Texas because—get this—they can arbitrage grid crunches to get paid to reduce power usage.

Data centers accounted for about 2.5% of U.S. electricity in 2022 and are expected to make up more than 20% by 2030. Artificial intelligence is magnifying this demand. A web search uses less than one watt of power while an AI-powered search can require 100 watts. Training an AI search uses around 1,000 watts.

The spring grid S.O.S. doesn’t augur well for the summer or the rest of the country. The past winter was one of the mildest on record, which eased the growing strain on the grid. Yet this summer is forecast to be one of the hottest, which means Americans will almost certainly be told to conserve power to prevent outages—i.e., don’t plan on plugging in your Tesla after getting home from work.

One risk is that power-plant maintenance that is delayed or canceled will lead to more plants failing in the summer when they are needed. Better get that emergency generator while it’s still in stock.

40
Politics & Religion / WSJ: The Lessons of Israeli Missile Defense
« on: April 16, 2024, 10:00:19 AM »
The Lessons of Israeli Missile Defense
Biden hails what he once opposed, but the aerial threat is escalating.
By
The Editorial Board
Follow
Updated April 15, 2024 6:22 pm ET


The performance of Israeli air defenses, combined with assistance from U.S. jets and interceptors, saved countless lives on the weekend. But Iran, Russia and other adversaries are learning from each engagement and probing for weaknesses to exploit. The U.S. needs to do more to deter and protect Americans from future assaults.


It’s no small irony that President Biden is hailing the success of missile and drone defenses over Israel. In the 1980s there was no more dedicated foe of missile defense than Sen. Joe Biden. Democrats have resisted or under-financed missile defenses for decades on grounds that they’re too expensive and too easily defeated by new technology.

Progressives oppose defenses because they think vulnerability somehow makes war less likely. On nuclear arms, the Union of Concerned Scientists and others prefer the doctrine of mutual-assured destruction to being able to shoot down enemy ICBMs.

Israel’s defenses proved how wrong this view is, displaying their practical and strategic value. If the more than 300 drones and ballistic and cruise missiles had reached their targets, Mr. Biden wouldn’t be able to say, as he told Prime Minister Benjamin Netanyahu on Saturday night, “take the win.” The mass casualties would have all but guaranteed a large-scale military escalation.

The weekend success of air defenses is a tribute to Israeli strategy and decades of investment in defense technology. U.S. assistance was also crucial—an example of alliance cooperation paying off in both directions. The U.S. helped to finance Israel’s Iron Dome defense system, which evolved into a co-production agreement that also covers gaps in U.S. missile defenses. The weekend exchange shows that Israel’s defense capability is far superior to Iran’s—at least for now.

But enemies never stand still, and the West’s adversaries are adapting their methods and technology to defeat aerial defenses. One threat is overwhelming defenses with sheer numbers. Israel stood up well against Saturday’s large attack, but it had U.S. and other help. It isn’t clear that Israel could have similar success if Hezbollah unleashed its missile arsenal from Lebanon and Syria while Iran attacked from the west and the Houthis from Yemen.

There is also the question of asymmetric cost. Drones are cheap to produce and easy to transport, but they can be expensive to shoot down. They can also arrive in swarms. That’s why a middling power like Iran specializes in drone production. Iran has been a crucial drone supplier to Russia, which deploys them to deadly effect in Ukraine. Azerbaijan’s drone swarms made the difference last year in its war with Armenia.

Kyiv has built its own drone production line and has bought Turkish drones. But the West will need to innovate to counter the problem of having to shoot down drones with interceptors that are a hundred times more expensive. The U.S. military is experimenting with promising technologies such as high-powered microwave weapons.

Iran’s attack also puts into focus, or at least it should, the shortfall in U.S. interceptor production. The U.S. stockpile is thin, and the Biden Administration had to ask Japan to transfer some of its Patriots so the U.S. could maintain enough for its defenses.

The Senate aid bill for Ukraine, Israel and the Pacific includes money to grow production of the most advanced Patriot interceptor to 650 a year from 550 now. But only 650? The U.S. could exhaust a year’s worth of production in mere weeks of intense fighting, and that figure is insufficient for the growing missile threats around the world.

The U.S. military needs to field new technology rapidly while also shifting closer to a wartime footing to produce more current munitions, including the Standard Missile that handles air defense on U.S. Navy destroyers. That means U.S. defense budgets will have to increase. Saturday night’s events are a lesson in why the U.S. never wants to be low on ammunition to defend itself.

42
Politics & Religion / Re: 2024
« on: April 16, 2024, 09:36:13 AM »
Yes, Florida immediately clears and arrests traffic blockers. 


43
VIX over 18, was over 19  (was down in the 12s not so long ago)
Silver over 28
Gold over 2400
10 yr. bond:  4.67%
30 yr. bond:  4.75%
BTC down to 62,000

It would appear gold & silver retain something of their quality as a hedge against geopolitical risk, whereas BTC seems not to-- even with the halfing but days away , , ,

47
Politics & Religion / Re: 2024
« on: April 16, 2024, 08:12:30 AM »
"His schtick is that this would never have happened because adversaries would be so terrified of his unpredictable behavior.  But we do not know that."

Disagree.  We do know that.  He hit Iran hard with sanctions and withdrew from the JCPOA.  He killed Suleiman.  He killed Bagdaddy.  He killed 250 Wagners.  He sent 39 cruise missiles up Russia's ass in Syria between the main course and desert at Mar al Lago with Xi sitting right there.  He recognized Jerusalem as Israel's capitol.  He took down the ISIS Caliphate.  It is his work that changed the landscape in ways that set up things like this: https://www.dailywire.com/news/saudi-arabia-publicly-acknowledges-defending-israel-from-iranian-attacks-reports?utm_source=facebook&utm_medium=social&utm_campaign=benshapiro&fbclid=IwAR1ra5h-fBJ7tq8gNYhgWhQXtZYfgtJJnQqy8U6lrWKdXiJ8KAGwE4qqmK0

Seems to me like a pretty strong track record.

"What would he do now?"

He has said that Israel made a mistake by taking too long in Gaza.  Sounds to me like he is saying that Israel should have kept moving forward and not fallen pray to Magoo's dithering.  He would reimpose and enforce sanctions on Iran.  He would not give Israel excrement.

49
Politics & Religion / Re: Politics by Lawfare, and the Law of War
« on: April 16, 2024, 06:44:49 AM »
Normalcy bias.

Acceptance that the integrity of the American legal system is a farce in many jurisdictions comes hard , , ,

50
Politics & Religion / Re: The Surveillance/Omnipotent State
« on: April 16, 2024, 06:41:21 AM »
Doug:

We have walked the same path here.

Pages: [1] 2 3 ... 1241