Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - Crafty_Dog

Pages: [1] 2 3 ... 1241
1
Japan-U.S. Relationship Serves as a Model for Indo-Pacific Security, a Bad Omen for China
11 MIN READApr 15, 2024 | 18:57 GMT


The recent summit between U.S. President Joe Biden and Japanese Prime Minister Fumio Kishida indicates the indispensability of the expanding Japan-U.S. defense partnership to both countries' Asia-Pacific policy agendas and the secondary nature of the United States' ties with South Korea, while new U.S.-Japan defense cooperation will exacerbate China's sense of entrapment, furthering Beijing's partnerships with authoritarian regimes and its long-term preparations for a Taiwan conflict. Biden and Kishida met on April 10 for an hour and a half in a closed-door meeting, followed by a joint press conference at the White House and a state dinner for Kishida and his wife later that night. A joint statement later released by both sides explored the geopolitical, industrial, and defense content of the meeting. On the geopolitical side, much ink was spilled affirming ideological common ground, including a free and open international order; opposing Chinese efforts to change the territorial status quo around Taiwan and the South China Sea; and concern about North Korea's nuclear program. Sections on industrial cooperation also followed well-trod paths of supply chain cooperation in advanced technologies (e.g. AI) and green energy, with Japan joining the U.S. Floating Offshore Wind Shot research program and the United States pledging to send two Japanese astronauts to the moon via the Artemis program. On defense matters, however, the meeting revealed developments with more actionable timelines and with more concrete geopolitical impacts.

The two sides pledged to expand their command and control frameworks for responding to wartime and peacetime contingencies. Though little detail was given, previous media leaks revealed that the United States is considering assigning a four-star general to collaborate with the new Japan Joint Operations Command (J-JOC), due by 2025.

The United States plans to begin training and ship modification for Japan to acquire Tomahawk cruise missiles, and both sides pledged to explore collaboration on co-production and co-development of missiles for interoperable air defense systems.

The two countries will explore opportunities for Japan to help repair and maintain forward-deployed U.S. Navy vessels and U.S. Air Force aircraft (including fourth-generation fighters), and will convene the first ''Working Group for Ship Repair in Japan'' by June 2024.
The members of the AUKUS defense pact between Australia, the United Kingdom, and the United States will consider Japan's participation in AUKUS Pillar 2 regarding advanced technology collaboration, including on undersea drones and artificial intelligence.
The United States and Japan will hold an annual trilateral military exercise with the United Kingdom starting in 2025. They will also look to collaborate with Australia on ''collaborative combat aircraft and autonomy'' development, and announced a plan to work with Australia on a networked air defense infrastructure.

The meeting came amid Japan's plans to expand its security role in the Pacific and the United States' plan to grow its military partnerships to counter Chinese security threats in the waters around Japan. Ever since the United States' post-World War II occupation of and rebuilding of Japan, bilateral military relations have been governed by the U.S.-Japan Security Treaty (1952), which saw Japan renounce its right to self-defense, and saw the United States pledge to defend Japan. This led to the building of one of the most extensive networks of U.S. military bases, with Japan now hosting around 53,000 overseas U.S. troops, the most of any country. Partly because of this, through the mid-2010s, Tokyo had been more or less content to let Washington guide Japan's defense affairs. However, between 2012 and 2020, then-Japanese Prime Minister Shinzo Abe played a large part in shifting to a mindset of restrengthening Japan's military and expanding its remit beyond just territorial defense to a leadership role in the security of the Asia-Pacific region, a shift driven partly by growing concerns about China's growing military brinkmanship in the East China Sea and South China Sea. This mindset has continued under Prime Minister Kishida, and is prevalent among most factional leaders under his ruling Liberal Democratic Party. As for the United States, the post-2017 acceleration of its geopolitical competition with China has seen the Biden administration focus on building out a network of multilateral defense partnerships in Asia, partly to offset the dilemma of the U.S. military's global remit and the necessity of deterring a regionally focused Chinese military.

These defense cooperation plans will help both countries accomplish their near-term geopolitical goals while leveraging their relative strengths: the United States' military and Japan's geography. The United States aims to empower Japan's efforts to strengthen its military as a means of achieving regional deterrence against China — particularly against a Chinese invasion of Taiwan or Beijing's rule by force over the South China Sea, through which at least a third of global shipping travels — and, to a lesser extent, deterrence against North Korea and Russia (in the latter's Far East). With Japanese participation in the production and deployment of missiles, as well as joint-force coordination with and maintenance of U.S. naval and air assets, the United States aims to overcome a significant obstacle to deterring China: the tyranny of distance over military supply chains, especially in times of war. Japan, in the process, gets to accelerate its domestic arms industry and training via military exercises with regional partners to prepare for scenarios that could deeply disrupt Japan's economy, like a Taiwan war, all while preserving the ''free and open'' international system on which Japan's economic miracle was founded.

Accomplishing these defense goals will hinge on the command and control structures that Washington and Tokyo seek to build, as well as their ability to clear domestic policy hurdles. The key aspect of U.S.-Japan defense collaboration, and the one that was least discussed during the Biden-Kishida summit, is that of expanding and integrating command and control infrastructure, in particular by appointing joint command military leaders in both the Japanese Self-Defense Force (JSDF) and U.S. Forces Japan (USFJ) to coordinate during and plan ahead for times of conflict. This deeper coordination is necessary to best mobilize and make effective use of defense assets and processes — e.g. naval and aircraft repairs, missile defense deployment, and drone development. In a Korean Peninsula war scenario, the guidelines and command structures are clear, with the U.S. military leading both U.S. and Korean forces in peninsular defense. In Japan, there is less clarity about cooperation during conflict, like a Taiwan war, hence the necessity of deeper planning during peacetime to better understand each country's capabilities, operational frameworks and escalation procedures, and to integrate the USFJ and JSDF operations during contingencies, even if not under a singular command, as would happen in a Korean Peninsula contingency. Policy roadblocks to these plans are likely. U.S. INDOPACOM commanders over the years have consistently requested greater funding to bolster U.S. deterrence of China vis-a-vis Taiwan and U.S. capabilities on the first and second island chains (including Japan and Guam, respectively), but this has been made difficult by contentious budget debates in the U.S. Congress. However, many of the plans outlined during the Biden-Kishida summit — e.g. Japanese repair of U.S. military assets and co-production of missiles — could actually save the U.S. government money, so budgetary impediments will be reduced. Japan's side, too, has legal impediments, primarily centered on a limited military remit as dictated in Japan's pacifist constitution, but Tokyo has recently shown a willingness and ability to overcome these barriers in the legislature.

After months of debate between the ruling Liberal Democratic Party and its pacifist coalition partner Komeito in Japan's legislature, Tokyo was finally able to tweak defense exports rules in March 2024 to allow Japan to export sixth-generation fighter jets developed jointly with the United Kingdom and Italy, overturning a longstanding ban on exporting lethal equipment.

The U.S.-Japan partnership serves as the cornerstone of deepening U.S. military engagement in the region, meant to deter Chinese military expansion, and highlights the secondary nature to Washington of the South Korean partnership (relative to Japan), and thus of Washington's commitment to deterring North Korea (relative to China). One theme of the joint statement, and of recent U.S. military engagement in the Asia-Pacific, is trilateral groupings for military cooperation. Aside from the U.S. and Japanese trilateral defense cooperation with South Korea on missile threat monitoring of North Korea, Washington and Tokyo are engaging in new trilateral naval cooperation with the Philippines, aimed at preserving freedom of navigation and countering Chinese military coercion in the South China Sea. The joint statement also noted regular U.S.-U.K.-Japan military exercises and repeatedly mentioned U.S.-Japanese aspirations to deepen military cooperation with Australia, including on advanced air combat capabilities. The key theme in these groupings is Japan, the hub of the United States' ''hub and spoke'' model of deepening security engagement in the Pacific, a model that capitalizes on long-standing, strong U.S.-Japan bonds and assists Tokyo in pursuing regional military engagement beyond Washington. This theme also indicates, however, that South Korean President Yoon Suk-yeol's efforts to compete with Tokyo to become the top U.S. military partner in Asia — as evidenced by Seoul's artillery provisioning for Washington to backstop U.S. support for Ukraine — remain insufficient, as do Seoul's efforts to elevate Washington's commitment to countering the North Korean threat (relative to China). Despite this disappointment on Seoul's side, the United States will still push to deepen the U.S.-South Korea and U.S.-Japan-South Korea partnerships, as both contribute to Washington's security policies in East and Southeast Asia, even if Washington prioritizes regional threats differently than Seoul.

Part of the reason for Washington's choice of Japan, as opposed to South Korea, as the centerpiece of its multilateral military engagement in Asia is political consistency. South Korea's government sees regular turnover between the conservatives, who favor defense ties with Washington, and the liberals, who favor better relations with China and North Korea while deemphasizing U.S. military ties, resulting in inconsistent support from Seoul on U.S. security policy in the region. A prime example of this dynamic is Seoul's initial acceptance and then cool reception of Washington's deployment of the THAAD missile system in South Korea in 2016. Tokyo, by contrast, is consistently run by the conservative Liberal Democratic Party, which staunchly supports U.S. military ties.

The strengthening U.S.-Japan and multilateral partnerships will also contribute to China's growing sense of entrapment by the U.S.-led military ''containment'' net, pushing China closer to authoritarian partners like Russia, steeling Beijing's resolve to eventual unification with Taiwan, and putting Japan and its citizens more at risk of Chinese economic coercion. China sees all of these Asian tie-ups with the United States — and especially the U.S.-Japan partnership — as indicative of the ever-tightening U.S. ''containment'' net around China, both economically and in the strategic (military and territorial) space. In response to this perception, and the increasing U.S. alignment of countries like the Philippines and South Korea, whose former leaders supported balanced ties with Beijing, China will deepen its military and diplomatic partnerships with Russia and North Korea, despite the incumbent risks of Western secondary sanctions due to these partners' actions, such as those that come with Russia's war in Ukraine and North Korea's expanding missile program. These partners provide China with a geographic buffer space to U.S. bases, its own military partnerships to counter the U.S. containment net, and support in international fora for China's expansive maritime territorial claims. As this U.S. containment grows, Beijing will also commit more fully to its long-term preparations for a Taiwan war — in contrast to the deterrence aims of the U.S.-Japan defense partnership — as Beijing perceives that Taiwan could serve as an ''unsinkable aircraft carrier'' for the U.S. military, i.e. a conduit for U.S. air power projection into China's geographic heartland and a naval base from which the United States could impede China's critical north-south coastal trade routes. Growing U.S.-Japan military ties will also raise the chance of additional Chinese economic coercion against Japan — in the form of export bans on key industrial inputs (e.g. rare earths), arbitrary inspections into Japanese companies, and exit bans on Japanese employees in China — as Beijing tends to reserve its most severe economic coercive tools for countries, like the United States, that do the most to counter China's economic and security interests.

2
Politics & Religion / Stratfor: Jordan's alignment with Israel
« on: April 19, 2024, 06:23:54 PM »


Jordan's Alignment With Israel Will Put It in Iran's Crosshairs
7 MIN READApr 17, 2024 | 18:47 GMT





The Jordanian Flag.
(Getty Images)

Jordan will remain aligned with the United States and Israel, which will result in a heightened risk of attacks by Iranian-backed proxies and growing risks of radicalization at home. On April 13, the Royal Jordanian Air Force intercepted dozens of drones that entered Jordanian airspace during the Iranian attack on Israel, during which Tehran launched more than 300 drones, cruise missiles and ballistic missiles. On April 14, Jordanian Foreign Minister Ayman Safadi summoned the Iranian ambassador after Iranian official media sources reportedly said that Jordan would be targeted if Jordan sided with Israel. That same day, King Abdullah II spoke with U.S. President Joe Biden to discuss the risk the war could spread regionally depending on the scale of Israeli retaliation.

Key Israeli allies including the United States, the United Kingdom and France took action to intercept drones en route to Israel during the attack.

Prior to the attack, Jordan closed its airspace as a precautionary measure. Amman has said it intercepted the drones in Jordan because they "posed a threat to [Jordanian] people and populated areas."

Throughout the Hamas-Israel War, Jordan has emphasized regional de-escalation amid concerns about spillover effects from the war and increasing domestic unrest from its pro-Palestinian population. Although Jordan, along with other Arab allies, has called for regional de-escalation since the beginning of the Hamas-Israel War and for Israeli restraint, Amman has juggled its cooperative relationship with Israel, particularly for water imports and border security, while trying to prevent domestic unrest. In recent weeks, pro-Palestinian protests have escalated outside of the Israeli Embassy in Amman as Jordanians, including Muslim Brotherhood-affiliated Islamic Action Front supporters, have protested Israeli operations in Gaza and the 1994 peace treaty between Jordan and Israel. While Jordan has had some tolerance for pro-Palestinian protests, Jordanian security forces have arrested several protesters. Furthermore, amid criticism of what some Jordanians view as a weak stance on Israel, pro-Hamas sentiment has grown within Jordan, despite Hamas being prohibited in Jordan. While Jordan has made efforts to secure its borders, including from pro-Palestinian Jordanians attempting to enter the West Bank earlier in the war, it has been impacted by spillover violence. On Jan. 28, Iranian-backed militias attacked Tower 22 in Jordan, resulting in the deaths of three U.S. troops, an incident the U.S. retaliated for while Jordan did not.

Jordan and Israel have maintained a pragmatic relationship since they signed their 1994 peace treaty and have jointly collaborated on counterterrorism efforts, border security, and water-for-energy deals in which Jordan exports energy to Israel and receives potable water in return. Controlling its border with Israel improves Jordanian security, in contrast with its porous borders with Iraq and Syria.

About 60% of Jordanians are of Palestinian descent, and many of them are ardently pro-Palestinian. During the Hamas-Israel War, Amman has demonstrated solidarity with Palestinians in Gaza by facilitating humanitarian aid into the Gaza Strip, repeatedly calling for a cease-fire along with other Arab nations and criticizing Israeli military actions.

With the threat of Israeli retaliation and subsequent Iranian response, Jordan is very unlikely to shift from its U.S. alliance and will continue to intercept Iranian attacks aimed at Israel, but this could make Jordan a target itself. Although Jordan will pressure Israel directly and via Washington to take a restrained approach and avoid escalation and a second Iranian attack, Jordan will continue to intercept Iranian drones regardless of Israel's decision. If Iran does carry out another attack against Israel, Amman will be compelled to intercept drones again due to its strong alliance with the United States. Iranian-backed proxies in Syria and Iraq may target Jordan in any second strike to distract Jordanian air defenses from a barrage of drones and missiles and to inflict some damage due to Jordan's perceived support for Israel and its alliance with the West. In a less likely but high-impact scenario, Iran may directly launch missiles toward Jordan during a second attack to distract air defenses and inflict some damage as a signal to other regional actors, including Gulf Cooperation Council countries, that support for Israel and the West may result in their being targeted. This, however, would likely force a response from Jordan, which could involve striking Iranian proxy groups in Syria and Iraq. That would widen the conflict in a way that regional stakeholders, including Jordan and Iran, do not want. The increased risk to Jordan means Amman will likely leverage its relationship with the United States as well as its proven ability to intercept Iranian drones to request additional military aid such as the Patriot missile system to advance its air defense capabilities. While the United States might not be able to deploy it to Jordan due to high demand for the system, it will likely increase military aid to Jordan to bolster regional security.

Jordan is a key non-NATO ally of the United States, and the United States is Jordan's largest provider of bilateral assistance, with $1.45 billion in annual assistance since fiscal year 2023. Jordan hosts about 3,000 American military personnel, and U.S. military aid to Jordan accounts for at least 20% of Jordan's military defense budget. The United States uses Muwaffaq al-Salti air base to conduct operations in Syria and Iraq.

After the April 13 attack, Jordanian Foreign Minister Ayman Safadi said that Jordan would have intercepted an Israeli attack on Iran if Israel had sought to use Jordanian airspace. The United States, a key Israeli ally, might pressure Jordan not to do so in the event of an actual Israeli attack on Iran traversing Jordanian airspace.

Jordan and Iran have a tense relationship in part due to Iran's support for Hamas, a militant Islamist organization banned in Jordan, and to Iranian backing for smugglers and militias in neighboring Syria and Iraq who destabilize the region through the drug trade and attacks on U.S. troops.

In late October 2023, Jordan requested the deployment of the Patriot missile defense system to bolster its border defenses.

Jordan's defense of Israel and its U.S. alliance will increase anti-Western sentiment against the regime, intensify recurrent protests, and risk militancy and emboldened terror cells within Jordan. Many pro-Palestinian Jordanians will likely view Jordan's drone interceptions as defending Israel, and will resent Jordan's alignment with the West despite Amman's anti-Israel rhetoric. Jordanians will become increasingly critical of the government's actions and of the United States, and may protest near the U.S. Embassy in Amman, though security forces would likely strongly disperse those protests. Furthermore, protests and online forums with swelling anti-government rhetoric will likely result in a tougher crackdown by Amman, which will use its August 2023 Cybercrime Law to quell criticism of the government and monarchy online. As Jordanians become increasingly frustrated with the government's actions, pro-Hamas sentiment will likely increase as Hamas is seen as taking action to support Palestinians in Gaza. Furthermore, with Iranian-backed proxy networks in Syria and Iraq, Jordan will likely face increased smuggling activities of arms and illegal drugs like fenethylline (commonly known as Captagon), which will cause Jordan to increase border security. Illegal arms entering Jordan would broadly increase the threat of terrorism since some would likely reach Islamic State cells in Jordan, making attacks likelier. While smuggling will increase the potential for violence, Jordanian security forces will likely be able to mitigate the risks. Jordan will likely increase security deployments in border areas to prevent smuggling, and perhaps even to target Iranian-backed smugglers in Syria as Jordan did in early 2024.

Jordan has arrested more than 1,500 individuals since the Hamas-Israel War began, with more than a third being arrested since March 2024. Jordanian security forces used tear gas and batons to disperse protests in March.

In early April, Kataib Hezbollah, an Iranian-backed Iraqi militant group, threatened to arm 12,000 Jordanian fighters in a move that would undermine Amman and put pressure on Jordan's border with the West Bank and Israel. In such a scenario, Jordan would inevitably increase its security presence along the border, increasing the potential for clashes between Jordanian security and armed protesters.

Editor's Note: An earlier version of this piece misstated the name of the Jordanian foreign minister.

3
Politics & Religion / FO: China ramps up fukkery with Philippines
« on: April 19, 2024, 06:17:56 PM »

(6) CHINA TO RAMP UP GRAY ZONE WARFARE IN MAY: China appears to be increasing its gray zone warfare activity around its neighbors ahead of a turbulent May.

4,600 Chinese “students” recently arrived in the Philippines’ Cagayan Province. The students applied to enroll at four private universities, but three of the four universities do not have any foreign students for the school year starting in June.

China will begin operating two new airlanes near Taiwan on May 16th, Taiwan opposes this as the airlines cross over Taiwanese airspace and nearly intersect their airlanes.

Why It Matters: Cagayan province will host the majority of the Balikatan exercise this month and will likely be subject to observation by the thousands of unenrolled Chinese “students.” China’s new airlanes will begin operation just before Taiwan inaugurates Lai Ching-te as its new President, potentially causing an international incident. We are likely to see increasingly blatant tactics following Lai’s inauguration and ahead of Japan’s annual exercise. – J.V.

===================

Arms for the Philippines. India delivered its first batch of BrahMos supersonic cruise missiles to the Philippines on Friday. Manila plans to deploy three batteries of the missile system along its coastal areas. The delivery is part of a $375 million deal signed in 2022.

6
Politics & Religion / Sedition
« on: April 19, 2024, 06:11:54 PM »

8
Science, Culture, & Humanities / Re: Education
« on: April 19, 2024, 06:06:21 PM »
ZANG!

9
Science, Culture, & Humanities / Re: Outdoor Recreation
« on: April 19, 2024, 06:04:39 PM »
 :-o :-o :-o

10
Science, Culture, & Humanities / Re: History
« on: April 19, 2024, 06:03:50 PM »
That would be American History  :-D

12
Politics & Religion / Re: Political Humor
« on: April 19, 2024, 02:24:07 PM »
OMG!!!  That had me rolling on the  floor!!!  :-D :-D :-D :-D :-D :-D :-D :-D :-D

14
Politics & Religion / Re: Israel, and its neighbors
« on: April 19, 2024, 02:14:51 PM »
Well stated!

16
Politics & Religion / Michael Yon on the invasion of America
« on: April 19, 2024, 09:44:43 AM »


Haven't watched this yet.

Seems to be clear of his anti-semitism:

https://rumble.com/v4puf02-unchecked-migration-michael-yon-tpc-1463.html

18
Politics & Religion / Re: 2024
« on: April 19, 2024, 08:55:28 AM »
The Rep House is incoherent.

If I were Speaker, I would be organizing a coherent effort to play chicken:

Pass HR-2 in exchange for $$$ for Ukraine.  Defend America's borders as price to defend Ukraine's borders!

19
Politics & Religion / Re: Housing/Mortgage/Real Estate
« on: April 19, 2024, 08:52:43 AM »
Important measuring sticks there.

Saw an article yesterday that RE prices in Humbolt County CA (pot cultivation territory) have crashed.  If someone buys, there are responsible for the tax liens pending.

20
Politics & Religion / GPF: China-Myanmar (Bay of Bengal)
« on: April 19, 2024, 08:48:46 AM »

April 19, 2024
View On Website
Open as PDF

In Myanmar, China Considers a New Strategy
The conflict to the south threatens regional trade and security.
By: Victoria Herczegh
In mid-April, China’s People’s Liberation Army conducted live-fire drills along its southern border – the second of its kind this month – amid deteriorating security in Myanmar. The exercises come as the PLA Daily published an article saying the war there has threatened security and stability in the border region and stressing that the PLA will take “all necessary measures” to safeguard national sovereignty and the safety of its people. Together, these developments demonstrate a new, more intense level of alertness by Chinese leaders and a deeper concern about the potential disruption of internal stability.

China has important strategic objectives in Myanmar, which provides a route from its landlocked southwest to the Bay of Bengal, allowing it to streamline trade and energy flows as part of its Belt and Road Initiative and project power into the Indian Ocean basin. This explains why Beijing planned ambitious infrastructure projects as part of the China-Myanmar Economic Corridor. But for those projects to be realized – and thus for China to achieve its objectives – Myanmar needs to be stable, something it has not been since the 2021 military coup.

Now, three years after it seized power, the junta is facing ethnic insurgent groups across the country. A coalition of rebel factions known as the Three Brotherhood Alliance has taken control of more than a dozen towns and trade ports in Myanmar’s northern Shan state. It has also advanced into Rakhine state despite a cease-fire agreement brokered by China.



(click to enlarge)

Beijing has long maintained ties with a number of armed ethnic organizations, mostly located on the China-Myanmar border, including the Kachin Independence Army (KIA), the Myanmar National Democratic Alliance Army and the Taang National Liberation Army. (The latter two and the KIA-backed Arakan Army form the Three Brotherhood Alliance.) China’s ties with the alliance are driven by the need to secure the China-Myanmar border and a host of business interests such as logging and mining concessions. And though Beijing also maintains ties with the ruling military government, their relationship is fraught with distrust. The junta is suspicious of Beijing’s support of the rebels – and its broader geopolitical influence in the country – while Beijing resents how the junta has disrupted Chinese security. For example, when Chinese nationals were kidnapped and held hostage by cyber-criminals in late summer and fall last year, the families of those detained criticized the government for its inability to protect its own. In response, Beijing enlisted its rebel allies to raid the criminals’ camps.

Despite these troubles, Beijing has managed to hold sway with both sides, even brokering several short-term truces that, though important, ultimately never lasted. For a time, this fragile status quo aligned with Beijing’s objectives in the region: to keep the conflict from spreading in any way into China and disturbing the country’s internal security and to enjoy the benefits of such a geographically crucial area.

In the past, Beijing has preferred to manage this status quo by treating it as an “internal” matter in Myanmar. But it seems as though this is no longer a viable strategy. The persistent violence has created a situation that China, despite its influence among both sides of the conflict, can no longer control. Trade – some $500 million worth in corn, rice, rubber, black sesame, dried elephant foot yam, green gram and groundnuts, cotton, raw plastic, machinery, chemical fertilizers and medicine – completely halted in December. More important, Chinese investments are now at risk. Last year, for example, China and the junta signed a supplementary agreement to develop the Kyaukphyu port, which would facilitate access to the Indian Ocean and oil imports to bypass the South China Sea, as part of its Belt and Road Initiative. China’s state-owned Citic Group would retain a 70 percent stake in the project. However, the development of Kyaukphyu has been halted by the fighting. Worse for Beijing is that the junta has lost influence as the rebels advance. The Chinese army is pledging to take “all necessary measures” to protect the safety of its people, according to a PLA Daily article, but tellingly it could have pledged as much earlier if it chose to. Now that Beijing knows it could lose all it has invested in Myanmar, it needs a more direct strategy.

The junta’s territorial losses have hurt India and Thailand as well. Myanmar borders the Indian states of Arunachal Pradesh, Nagaland, Manipur and Mizoram, all of which have been susceptible to insurgencies, and all of which have housed the bulk of Myanmar’s refugees. The refugee crisis has created problems between the Indian central government and local governments. India has likely explored ways to support the junta as a means of resolving these problems – and as a way to make sure China alone doesn’t have influence in Myanmar and, by extension, its border states. Thailand’s problem is similar to India’s; it worries that it could see spikes in refugee flows and cross-border violence. However, Thailand is also one of the biggest exporters of opium in Asia, and opium production has increased because of the conflict next door.

Thus the deterioration of security in Myanmar affects the entire surrounding region. Beijing holds by far the most influence over its smaller neighbor, but so far its influence has amounted to little. Expect the government to take a broader or more active approach going forward. Though this approach would require a larger investment, it would also promise a greater return – potentially including a lasting peace. China has its own economic problems, but if it can bring trade back online and its investments to fruition, Beijing may believe it’s worth the cost.

Andres Araujo contributed to this analysis. Mr. Araujo is an intern at Geopolitical Futures and a student at the University of Valle de Atemajac in Guadalajara, Mexico, where he studies international relations

21
Hat tip BBG



This could go a number of places, but given that the FBI is threatening the people revealing this apparent Chinese penetration into electoral databases and research center I'm dropping it in. Could this, perchance, reflect a quid for Biden's numerous Chinese pro quos?

Note: these X posts are graphics heavy and hence this piece should be viewed in the oringal, which starts here:

https://x.com/KanekoaTheGreat/status/1666490357469822976

KanekoaTheGreat

@KanekoaTheGreat

KONNECH #1🚨: Evidence shockingly suggests that the FBI is shielding two firms closely tied to the Chinese government, which have financed and developed an American election software company for the past 15 years, all while transferring confidential election data back to China.

2) Konnech has provided election administration and logistics software to many prominent cities and counties in the United States, including:

•Alameda County, California
•Allegheny County, Pennsylvania
•Contra Costa County, California
•Denver, Colorado
•Detroit, Michigan
•Fairfax County, Virginia
•Hillsborough County, Florida
•Maron County, Indiana
•Los Angeles, California
•San Francisco, California
•Santa Clara County, California
•St. Louis County, Missouri
•Travis County, Texas
•Washington, D.C.

3) On August 13, 2022, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) convened a group of researchers to discuss how the FBI's headquarters had betrayed them following a 15-month investigation into Konnech's storage of American election data on Chinese servers. The data involved various sensitive information, including:

•Name, DOB, SSN, Address
•Phone, Email, Bank Account
•Voting Machine Passwords
•Thumb Drive Passwords
•Voter Registration Rolls
•Provisional Ballot Serial Numbers
•RFID Tags On Voting Equipment
•Election Building Schematics
•And More...

"You'd be startled to know that this server lives on the main Unicom backbone in China. And it's in a Chinese University in Wuhan, China. I'm not talking about this just being a storage place for data process here.

The app server for this particular application was in China... We're confronted with the fact that everything there was to know about elections in America, and in key counties in key cities, was in this server in Wuhan, China... So what do you do with this information?

Well, we went to the FBI because this was a matter of national security. And, they agreed. So, we started working with the local FBI community. From January of 2021 until April of 2022, the FBI opened up a significant counterintelligence operation on this.

The problem with it was that it wasn't just American information. It was Australian information. It was Canadian information, it was Mexican information. And we ultimately found out that the CCPs own elections are on this same server set in that university...

Everyone involved on the counter intelligence teams at the Bureau agreed on one thing, this software, this penetration, and this opening was a significant national security threat...

So two weeks before the 2000 Mules movie came out, I get a call from an agent and he says this has risen now to the level of a national security threat and headquarters has gotten involved. I don't know who he was referring to, but he said two women saw the case differently, and felt as though we were the criminals.

They had instructed the Detroit FBI office to notify Konnech that we had breached their firewalls, none of which is true... We later found out they were accusing me of stealing three servers from the Chinese Unicom backbone and having illegal possession of American private information.

And they were shopping that around to the other agencies that would be involved NSA, CIA and others. Trying to get somebody to pick up on this so that they could come Roger Stone me...

But the challenge we all have is this software is still in place... When you dig into Konnech's CEO Eugene Yu, in particular the other URLs that he owns, it will take you to the underlying URL that runs the Chinese Communist Party's elections.

It lives on that server, on that same URL address and that URL is owned by Eugene Yu."

https://open.ink/konnech

4) In 2002, Konnech CEO Eugene Yu was an "officer" on the "finance committee" of a Chinese foundation that flew Professor Charles Lieber, the head of Harvard’s Chemistry Department, to Zhejiang University to give a speech on “Nanotech in Today’s World.”

This discovery was made in a Chinese magazine entitled "Overseas Scholars," written by the China Association for Science and Technology in the United States (CAST-USA) and the American Zhu Kezhen Education Foundation (AZKEF).

CAST is a transnational organization and constituent member of the Chinese People's Political Consultative Conference (CPPCC), whose stated mission is to “maintain close ties with millions of Chinese scientists, engineers and other people working in the fields of science and technology” and to operate as “the bridge linking Chinese science and technology community with the Communist Party of China and the Chinese government,” according to organization’s archived “About Us” webpage.

In 2003, CAST established the Help Our Motherland through Elite Intellectual Resources from Overseas Program (HOME) in concert with the Organization Department of the Chinese Communist Party to recruit overseas science and technology talent to transfer technology and intellectual property back to China.

The CPPCC’s role in channeling overseas science and technology knowledge toward China’s development has grown since a 2013 directive from General Secretary Xi Jinping to focus on incentivizing overseas Chinese to contribute their technical skills and expertise to China’s national rejuvenation.

By 2020, a United States congressional body warned that the Chinese government has built a “sprawling ecosystem of structures, programs, and incentives to coopt and exploit overseas experts for the science and technology they acquire abroad.”

“Chinese leaders have long viewed advanced science and technology (S&T) as key to China’s comprehensive national power and sought to acquire it through licit and illicit means from developed countries like the United States,” the US-China Economic and Security Review Commission (USCC) said in the report.

“This ecosystem sponsors promising Chinese students and scholars at the U.S. and other foreign universities, incentivizes their return to China for the long term, and employs transnational organizations to channel S&T know-how from those remaining abroad back to mainland China.”

The U.S. Senate report continues:

“Many programs associated with Beijing’s S&T transfer ecosystem—including scholarships to study abroad, talent recruitment plans, and entrepreneurship parks—contribute to China’s military-civil fusion strategy by collecting specific technologies and know-how that improve the capabilities of the People’s Liberation Army (PLA) and advance the goals” of the Chinese Communist Party (CCP).”

“This ecosystem sponsors promising Chinese students and scholars to study at foreign universities, incentivizes or requires their return to China in exchange for this support, and recruits researchers via hundreds of talent programs. Moreover, it integrates Chinese students and scholars remaining abroad with organizations that facilitate the transfer of S&T back to the Mainland, where it can be exploited by the PLA, government ministries, state-owned enterprises (SOEs), state-run laboratories, and startups.”

“Even when overseas Chinese students and scholars do stay in the United States after graduation, China’s transnational technology transfer organizations and talent recruitment plans provide a means to contribute to China’s national rejuvenation by transferring technology and know-how without requiring physical return.”

In the magazine, CAST-USA refers to Eugene Yu by his Chinese name YU Jianwei (于建伟), and says that he is an “officer” on the “finance committee” of the American Zhu Kezhen Education Foundation. The foundation’s mission is “to promote exchange and cooperation between Zhejiang University and universities in the United States” and “invite United States professors or scientists to Zhejiang University.”

In 2020, Prof. Charles Lieber was arrested for concealing his funding from the Wuhan University of Technology and participating in China’s Thousand Talents Program.

At a Senate Judiciary Committee hearing, Bill Priestap, the former Assistant Director of the FBI’s Counterintelligence Division, stated that China’s talent recruitment plans are effective “brain gain programs” that “encourage theft of intellectual property from U.S. institutions.”

Priestap continued, “For example, China’s talent recruitment plans, such as the Thousand Talents Program, offer competitive salaries, state-of-the-art research facilities, and honorific titles, luring both Chinese overseas talent and foreign experts alike to bring their knowledge and experience to China, even if that means stealing proprietary information or violating export controls to do so.”

Eugene Yu was an “officer” on the “finance committee” of a Chinese foundation in the United States tasked with flying professors like Charles Lieber to China. This discovery was made in a China Association for Science and Technology in the United States magazine entitled “Overseas Scholars.”

Similarly to how the U.S. congressional report described CAST’s overseas science and technology acquisition efforts, AZKEF keeps a list of talented overseas Chinese students, offers incentives for prominent scientists to fly to China, and focuses on bridging Zhejiang University with universities in the United States.

https://archive.ph/OFVCf

https://web.archive.org/web/20011119103624/http://www.azkef.org/

https://web.archive.org/web/20031220030107/http://azkef.org:80/programs.htm

https://web.archive.org/web/20030402092120/http://azkef.org:80/lecture2002.pdf

https://web.archive.org/web/20140206035502/http://english.cast.org.cn/n1181872/n1257426/47099.html
https://uscc.gov/sites/default/files/2020-10/Overseas_Chinese_Students_and_Scholars_in_Chinas_Drive_for_Innovation.pdf

5) On November 29, 2005, Eugene Yu, also known as YU Jianwei (于建伟), established a shadow subsidiary named Jinhua Yulian Network Technology Co., Ltd. (金华宇联网络科技有限公司) in Jinhua City, Zhejiang Province, China, two years after founding Konnech in the United States.

6) On January 25, 2006, Jinhua Yulian Network was accepted into the Entrepreneurship Service Center at the Chinese Academy of Sciences Jinhua Science and Technology Park.

The Chinese government has funded and overseen the development of Konnech's American election software ever since.

https://web.archive.org/web/20090413172501/http://www.jhcy.cn/yqqy.asp?page=3

7) On February 25, 2006, Eugene Yu registered the website domain "http://yu-lian.cn" for Jinhua Yulian Network with the email address eyu@konnech.com.

https://archive.is/YaRv1#

8) On http://yu-lian.cn, Eugene Yu wrote in Chinese that he provides election software "with Chinese characteristics" to various levels of the Chinese government, including the National People’s Congress and the Chinese People's Political Consultative Conference.

https://web.archive.org/web/20131207150515/http://yu-lian.cn/Services.html

9) On http://yu-lian.cn, Eugene Yu praised "Comrade Jiang Zemin" and emphasized Konnech's philosophy of prioritizing "political tasks first, and economic benefits second."

He highlighted his success stories of "Election Management, Detroit" and "US Overseas Voters."

The entire website was written in Chinese.

https://web.archive.org/web/20131207151051/http://yu-lian.cn/Case.html

10) In December 2006, Konnech announced on Facebook that they had partnered with Michigan State University and the Confucius Institute to build, http://ChineseBrief.com, an "interactive communication platform and Chinese language learning tool."

https://web.archive.org/web/20120729201212/http://www.confucius.msu.edu/news.htm

11) On July 18, 2007, Eugene Yu posted an ad on the Chinese Academy of Sciences Jinhua Science and Technology Park's website, offering "5 million yuan" for developing "software packages" for Jinhua Yulian Network and http://konnech.com.

In 2007, 5 million yuan was worth around $700,000 and was the prize money offered by the Chinese government to members of the Thousand Talents Program and other elite overseas entrepreneurs.

https://web.archive.org/web/20131019061139/http://www.jhcy.cn/jsnt_detail.asp?id=16

12) The Chinese Academy of Sciences (CAS) is a national think tank with extensive research facilities and over 50,000 researchers. CAS has been linked to Chinese military, nuclear, and cyber espionage programs.

The U.S. Department of Defense acknowledges the CAS as China's leading academic institution for comprehensive research and development.

CAS and its affiliated companies are involved in developing AI initiatives, hypersonic spaceplanes, robotic submarines, and missile technology for the Chinese military.

The Justice Department has indicted several individuals associated with CAS for their roles in transferring trade secrets and military technology from U.S. companies through Chinese overseas talent programs.

In October 2002, the Jinhua Science and Technology Park became the first collaboration between the Chinese Academy of Sciences (CAS) and a prefecture-level government.

The Chinese government has built more than 150 "Overseas Chinese scholar pioneering parks" in the hearts of 54 "National New and High Technology Development Zones."

These ultra-modern facilities were designed for returning specialists to "incubate" (find commercial or military applications for) technologies acquired overseas as part of China's strategy of "serving in place" that allows Chinese scholars to stay abroad while transferring foreign technology back home.

https://uscc.gov/sites/default/files/Research/Interos_Supply%20Chain%20Vulnerabilities%20from%20China%20in%20U.S.%20Federal%20ICT_final.pdf

https://media.defense.gov/2019/May/02/2002127082/-1/-1/1/2019_CHINA_MILITARY_POWER_REPORT.pdf

https://web.archive.org/web/20100628161736/http://www.jhkjy.ac.cn/about/index.asp

13) Jinhua Yulian Network's initial address was located at No. 988 Shuanglong South Street, Jinhua City, Zhejiang Province, China, which is situated 500 meters away from the Jinhua People's Government building (No. 801 Shuanglong South Street) and across the street from the Jinhua Science and Technology Bureau (No. 828 Shuanglong South Street).

14) The Jinhua Science and Technology Park (JHTP) offers Chinese government-funded support to domestic and overseas enterprises, including financial assistance, living facilities, server hosting, internet access, university partnerships, technology transfers, research assistance, and patent support.

In 1988, the State Council launched the Ministry of Science and Technology’s national Torch Program to speed up the nation’s “science and technological industrialization.”

In 2005, the Ministry of Science and Technology awarded JHTP the distinction of a national-level technology business incubator.

In 2006, JHTP was granted 3 million yuan by the Ministry of Science and Technology through China's national Torch Program to establish the Park's Internet Data Center, where Jinhua Yulian Network would develop, test, and maintain Konnech's American election software.

https://web.archive.org/web/20091017113128/http://www.jhcy.cn/yqgk_01.asp?flag=%B7%FE%CE%F1%B9%A6%C4%DC&lmbm=2405&lmmc=%B7%FE%CE%F1%B9%A6%C4%DC&url=yqgk_01.asp

https://web.archive.org/web/20090413171900/http://www.jhcy.cn/cxzt_01.asp

http://jhcy.cn/jhkjy/town_details/28.html

http://jhcy.cn/jhkjy/town_details/50.html

15) A 2008 Chinese document titled "International Elite Entrepreneurship Modern Service Outsourcing" reveals that Eugene Yu worked for the Chinese government as a Project Manager of the Guangzhou Economic and Technological Development Zone (GETDZ) from 1983 until 1985.

The document features 46 Chinese high-tech companies operating overseas and describes Konnech as an "Intelligent Web Communications" company with the mission of becoming "one of the top 50 e-commerce service providers for schools and government in the United States within 10 years.”

The document mentions Konnech's Chinese venture fund and describes the company's goal of developing advanced technology in cooperation with Zhejiang University:

“The company will enter a phase of rapid development after the implementation of the venture fund in Wuzhong.”

"In terms of specialized technology, we have been developing and hiring technical personnel with expertise in the field in a rapid manner by utilizing the role of corporate and university professors and graduate classes for project development, with the aim of receiving advanced applied technology."

"... it is an indisputable fact that many cutting-edge products come from American university campuses. We must take the corresponding path and cooperate with American universities and Zhejiang University and other domestic institutions to focus on the development of applied technologies and the application-oriented development of specialized technologies."

The document describes the problems facing the U.S. market, citing “expensive software programming fees and talent shortages” and reduced “funding for IT projects” before concluding, “In this environment, the role of our China branch is fully demonstrated.”

When Eugene Yu’s attorneys filed a motion to dismiss his criminal case in California, they included a section entitled FACTUAL BACKGROUND that says he “worked in various locations” after he graduated from Zhejiang University and before he was accepted into Wake Forest University.

However, it failed to mention his prior employment as a Project Manager in the Guangzhou Economic and Technological Development Zone, where he worked in the Industrial Project Negotiation Department and "completed the introduction of several major projects":

"Eugene Yu was born and raised in Jinhua City, Zhejiang Province, China. In 1974, as part of China’s cultural revolution, Mr. Yu was sent to a communal farm where he labored for four years in squalor conditions. In 1977, after Chairman Mao died, Mr. Yu scored high on a nationwide test, qualifying him for admission to study engineering at Zhejiang University.

After graduating from college, he was sent to work in various locations in China. Mr. Yu then met and married his wife Donna Wang. In 1986, Mr. Yu and Dr. Wang were accepted to graduate school programs at Wake Forest University, where Mr. Yu obtained his MBA degree."

Since the launch of the GETDZ in 1984, China has established 219 national-level Economic and Technological Development Zones (ETDZs), which helped launch China’s rise to a global economic superpower.

In order to promote science and technology-intensive industries, ETDZs offer financial incentives and preferential policies that target domestic and overseas enterprises focused on manufacturing, scientific, and technological industries.

Two decades later, Eugene Yu would return to China to launch his company Jinhua Yulian Network Technology Co., Ltd. (金华宇联网络科技有限公司) in the Jinhua Economic and Technological Development Zone (JETDZ).

https://max.book118.com/html/2012/0222/1126480.shtm

https://cbbc.org/sites/default/files/2021-01/China-Britain%20Business%20Council%20-%20In%20the%20Zone%20-%20A%20Comprehensive%20Guide%20to%20China%E2%80%99s%20Economic%20and%20Technological%20Development%20Zones%20-%20October%202020.pdf

https://documentcloud.org/documents/2317

16) On January 4, 2011, Lin Yu, a managing supervisor at Jinhua Yulian Network, established Jinhua Red Date Software Co., Ltd., also known as Jinhua Jujube Software Co., Ltd.

On January 16, 2011, Konnech registered the domain reddatesoft[.]com with the email eyu@konnech.com.

Jinhua Red Date Software and Jinhua Yulian Network shared the same address at No. 1583 Binhong Road, Jinhua City, Zhejiang Province.

Jinhua Yulian Network's website included "Jinhua Red Date Software Co., Ltd." and "reddatesoft[.]com" in its copyright statement.

Peter McCallister, the General Manager of Konnech Australia, later affirmed in an affidavit that Lin Yu is Eugene Yu's older brother and a Chinese national.

(Note: The modified domain URL "reddatesoft[.]com" is used because of safety concerns with the URL raised by Twitter.)

https://web.archive.org/web/20220822014930/https://www.11467.com/jinhua/co/273669.htm

https://web.archive.org/web/20130718125224/http://yu-lian.cn/

17) On April 13, 2015, Lin Yu established Jinhua Hongzheng Technology Co., Ltd. (金华鸿正科技有限公司) in Jinhua, Zhejiang Province, China.

Lin Yu (Eugene Yu's brother) owned 99.4% of the company.

Jun Yu (Eugene Yu's nephew) and Guojun Shao, who co-invented a Konnech patent with Eugene Yu, were among the other equity holders.

Jinhua Yulian Network later transferred a voting patent, co-invented with a Zhejiang University professor, to Jinhua Hongzheng Technology.  In a future thread, there will be a detailed discussion about Konnech's patents, employees, and the involvement of this professor.

18) Jinhua Hongzheng Technology provides election administration software, including web and mobile applications, to more than 430 National People's Congresses across over 20 provinces.

The company has established partnerships with Huawei, Lenovo, China Telecom, China Mobile, China Unicom, and the highest levels of the Chinese government.

19) On July 31, 2015, Eugene Yu registered the website domain "hongzhengtech[.]cn" for Jinhua Hongzheng Technology using the email address admin@konnech.com.

As a result, Konnech held significant control over a company that provides election administration software to the highest levels of the Chinese government.

Shortly after Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) exposed Konnech's connection to China's National People's Congress, the domain registration email address was changed to jiadeng@hongzhengtech.com.

(Note: The modified domain URL "hongzhengtech[.]cn" is used because of safety concerns with the URL raised by Twitter.)

https://web.archive.org/web/20220824173140/https://whois-history.whoisxmlapi.com/lookup-report/AVkvG34MR7

20) In a September 1, 2022, live chat, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) discussed the FBI's betrayal, Konnech programming software for China's National People's Congress, and the company's storage of U.S. election data on Chinese servers.

In January 2021, Phillips said that the cyber analyst he had been working with encountered an “oddity in some of the URLs” such as http://vote4la.com, http://vote4detroit.com, and http://vote4boston.com, which Konnech’s “PollChief” software application used to gather personally-identifying information about poll workers.

Using Binary Edge, a software product companies use to identify and assess the risk of cyber breaches, “We began to look at where these URLs resolve to.

We found that most of them resolve to one I.P. address and that I.P. address — the URL resolved in China,” Phillips said. “What we also learned in our review, http://apps.konnech.net, resolved into this same URL in China, meaning that the application itself was residing in China,” he continued.

“In Binary Edge, you can figure out what type of database they are using, their database port, and all the different services offered by ports in this particular application living in China. It turned out that not only did it live there, but they left the database open.”

This database “stored the personally identifying information of over a million Americans,” he emphasized. Engelbrecht and Phillips decided that “this was a major national security risk” and immediately took the information to the FBI.

When Engelbrecht and Phillips took this information to the FBI, the FBI “said the information was forwarded to their counter-intelligence operation, and a counter-intelligence op was opened up in January or February of 2021,” Phillips said.

Phillips described how he and Engelbrecht played an active role in the FBI’s operation, “They engaged us in the operation, they were communicating with us on a regular basis. They were communicating with Catherine regarding communications with the target and this went on for approximately 15 months.”

Phillips and Engelbrecht noted that the field office they worked with for those 15 months was “legitimate” and not “political law enforcement.”

“These were legitimate people who believed that this software posed a national security risk to the United States of America and they were working with us closely to try to stop this from being in place during the midterms,” Phillips said.

“The focus point was always we needed to remove this software from the election, but taking a step further, there were a lot of other concerns that the bureau had.”

In April 2022, Engelbrecht received a call from one of the FBI agents, who informed her that the FBI’s “Washington D.C. headquarters” was now involved in the investigation.

Engelbrecht described how everything changed after this call, “There was no more goodwill, there was no more let's work together, the script had been flipped, and now we were the target,” she said. “That was a very disturbing call.”

The agent informed Engelbrecht that “two women” at the FBI’s headquarters believed that Phillips and Engelbrecht were “in the wrong for doing this” and that the D.C. office was now trying “to figure out how you guys broke the law to find all of this.”

Engelbrecht added, “which of course we didn't, but that was kind of their Modus Operandi, they were going to try to pin something on us, and today you can pick your headlines about how the FBI has done this time and again.”

Phillips remarked, “The problem is they know about this, and they chose to do nothing. They chose to investigate it, and in the end, they chose to blame us, but this is China. These are Chinese operatives in the United States; these are Chinese citizens who are programming this.”

Engelbrecht explained how the FBI agents initially hoped they could persuade the Washington D.C. office to do the right thing, “Our contacts were saying we are going to try and smooth this out, but as the days clicked on, they re-contacted us and one of them said you may need to be ready to — his term was to use the nuclear option and go to the press,” she said.

With the FBI no longer interested in pursuing Konnech, Englebrecht and Phillips organized an event for Saturday, August 13th in Arizona called “the Pit” where they brought together about two hundred “researchers, independent journalists, and big thinkers” to share their story.

“We asked the people in attendance for help, we didn't know what the FBI's plans were for us, we didn't know if we didn't speak this publicly if we would ever have the chance to, but we felt like our best chance was to share this with people we trusted who had the wherewithal to get the word out,” Englebrecht said.

She continued, “There have been so many great things that have happened since that event, but one of the greatest, was this community that came out shoulder to shoulder saying let’s dig this, let's see how much more information we can find.”

“The quality of research that has been done to supplement what we already had and to corroborate what we already had has been incredible.”

Phillips added, “This is some of the best research I have ever seen. The quality of it, the depth of it, we were with a prosecutor the other day and we had an opportunity to share some of this information with them.”

He continued, “There's likely going to be a grand jury convened here in the next week or so. It's supported by not just the research that my team OPSEC did for Catherine and True the Vote, but by the research of one of the best research teams I've ever seen come together.”

“The data and research all stand on their own.”

https://truethevote.locals.com/post/2664780/the-tiger-project

21) On September 12, 2022, Konnech filed a defamation lawsuit against Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
), accusing them of spreading baseless "conspiracy theories" and engaging in "racism and xenophobia."   

Konnech denied any affiliation with the Communist Party of China and stated that they had never stored American election data on servers in China.

The legacy media echoed Konnech's claims against
@TrueTheVote
 and
@onwardsocial
 without conducting any examination of the company's connections to Jinhua Yulian Network, Jinhua Hongzheng Technology, or China's National People's Congress.

22) In an unusual move, U.S. District Court Judge Kenneth Hoyt issued an ex-parte temporary restraining order in favor of Konnech without providing an opportunity for
@TrueTheVote
 and
@OnwardSocial
 to respond to the complaint.

Furthermore, Judge Hoyt immediately ordered them to disclose the identities of all individuals involved in their investigation of Konnech at the outset of the trial, prior to the discovery phase.

Failure to comply would result in the imprisonment of Catherine Engelbrecht and Gregg Phillips for contempt of court.

23) On October 4, 2022, Eugene Yu, the CEO of Konnech, was arrested by the Los Angeles District Attorney's office for storing the data of American election workers on servers in China.

Deputy District Attorney Eric Neff described the scale of the data breach as "astounding," suggesting that it could be "the largest data breach in United States history."

Prosecutors alleged that Konnech employees shared the personal information of Los Angeles election workers with third-party software developers in China, who were involved in creating and fixing Konnech's software called PollChief.

Furthermore, software developers in China had "super administration access" to PollChief software and confidential election data from the United States.

https://truethevote.org/wp-content/uploads/2022/11/eugene-yu-complaint-101322.pdf

24) On October 5, 2022, during Eugene Yu's bond hearing, his attorney contended that he posed no risk of fleeing as he had been actively cooperating with the FBI for the preceding month, and his arrest had taken the agency by surprise.

However, the Los Angeles District Attorney's office argued that Yu presented a substantial flight risk due to his strong business ties in China.

Additionally, the prosecution raised concerns about the suspicious nature of Yu's arrest, noting that he was taken into custody without his cell phone while on his way to the airport.

25) On October 28, 2022,
@TrueTheVote
 and
@OnwardSocial
 submitted an affidavit containing approximately 10% of their text messages exchanged with FBI Agents in Detroit and San Antonio, supporting their claim of working with the FBI on a 15-month "counter-intelligence operation" against Eugene Yu, prior to the involvement of FBI headquarters in Washington D.C.

The text messages included conversations with the following individuals:

-Special Agent Bruce Fowler, Detroit
-SA Huy Nguyen, San Antonio
-SA Kevin McKenna, San Antonio
-SA Kristina Spindel, San Antonio

In one text message exchange, Fowler provided his FBI email address and mentioned receiving three thumb drives from the San Antonio office. He asked Engelbrecht to guide him on where to find information on those drives.

In another text message exchange, Engelbrecht asked for the name of an agent in Georgia. Nguyen responded that he would provide the name later, but “in the meantime, you can tell them that you filed the complaint with SA Huy Nguyen and SA Kevin McKenna with San Antonio Division.”

In another exchange, Engelbrecht texted Nguyen, stating:

"I wanted to let you know that we took the nuclear option and went public (in a very limited way, but nonetheless we did it). Konnech quickly filed a civil suit against us in Houston federal court and got an ex parte [temporary restraining order].

Part of the TRO required that we name who we’d gotten the election worker data from, same person who’d provided it to you. We gave the court the name under seal. Our attorney also notified the Houston FBI office, where the case was filed.

I’m very concerned about everyone’s safety at this point. Please do whatever possible to help ensure that name never comes out. I can provide you with whatever you may need."

Nguyen did not respond to Engelbrecht’s text. According to further texts provided by Engelbrecht, she reached out to “KayKay,” saying she hoped to talk, in person, if possible.

“KayKay” replied that she was on a temporary assignment out of state until January and asked if Engelbrecht still had Nguyen’s number. Engelbrecht then explained that she had “called and written him but no response.”

The text then explained: “We have been drug into a vicious lawsuit filed against us by Konnech.” “Our attorneys have contacted the FBI and been told that the Bureau has no interest in engaging with the court in order to maintain confidentiality.”

Engelbrecht added that she, Phillips, and “the researcher who originally provided us the data” are being “doxed,” and that it’s “a very serious situation and we’ve been left to hang.”

Engelbrecht then noted, “Yu has already been indicted by a Grand Jury and arrested,” but they “continue to hear chatter that the FBI is working with Konnech, against us, and still trying to accuse us of crimes we did not commit.”

The True the Vote founder then noted that “what Bobby said on the phone that day in April 22 (when you were reading the yearly CI disclaimer to me) has gone into full overdrive.” She added: “I also now believe Gregg and I have been set up. It’s appalling, heartbreaking, and wrong.”

https://thefederalist.com/2022/11/18/in-this-untold-story-of-poll-worker-data-chinese-servers-and-scandal-only-the-fbi-knows-the-truth/

https://storage.courtlistener.com/recap/gov.uscourts.txsd.1888133/gov.uscourts.txsd.1888133.46.2.pdf

26) On October 31, 2022, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) were imprisoned for contempt of court as they refused to disclose the identity of a researcher who provided information to the LADA that resulted in the indictment of Eugene Yu:

Despite Eugene Yu's arrest by the Los Angeles District Attorney based on the allegations he had previously denied in his defamation lawsuit, Judge Kenneth Hoyt refused to admit any evidence from the criminal proceedings against Konnech in his courtroom.

Furthermore, Judge Hoyt declined to respond to a phone call from the Los Angeles District Attorney's office and asserted that the criminal case against Eugene Yu was unrelated to the civil case involving Catherine Engelbrecht and Gregg Phillips.

27) On November 5, 2022, Tucker Carlson discussed Catherine Engelbrecht and Gregg Phillips being arrested for refusing to reveal the identity of a researcher who provided information to the LADA that resulted in criminal charges against Eugene Yu, the CEO of Konnech:

"George Gascon actually indicted Eugene Yu for exfiltrating the personal records of American poll workers, including their social security numbers and home addresses, out of the country to servers in China. These researchers developed that information.   

Catherine attempted to give it to law enforcement at the FBI and elsewhere and was sued by Konnech for doing that. When Konnech sued them, they got a restraining order, ordering Catherine to turn over the names of these researchers.   

Catherine and Gregg, who are very courageous people, simply refused to do it, and as a result, while Yu is home on bail, Catherine and Gregg are in jail tonight...

The civil libertarians and the mainstream press are basically a flock of sheep that are each bleeding the exact same tune, and all they want to do is deny any conversation about the possibility of fraud in elections."

28) On November 7, 2022,
@TrueTheVote
 and
@OnwardSocial
 were released from prison following a decision by the U.S. Court of Appeals for the Fifth Circuit, which overturned Judge Kenneth Hoyt's order to unjustly detain them for contempt of court in a civil defamation case.

Two week later, the appeals court vacated the contempt order and wrote, "the record does not reveal what sort of emergency justified the district court's demand for that information before the parties could file Rule 12 motions before the defendants could file an answer, before the parties could file their initial disclosures, or before discovery could begin let alone conclude in the ordinary course."

"Much less did the district court explain what sort of emergency could warrant jailing the petitioner-defendants for not making such immediate disclosures. Rather, the district court made clear that it was imposing its disclosure requirements because it—the district court—wanted to add defendants to the lawsuit. Resp. 13; App. 188. That is not how the Federal Rules of Civil Procedure work."

Furthermore, the appeals court criticized Judge Kenneth Hoyt for "using a temporary restraining order, a preliminary injunction, and a civil-contempt order to litigate the case on Konnech's behalf."

https://storage.courtlistener.com/recap/gov.uscourts.txsd.1888133/gov.uscourts.txsd.1888133.62.0.pdf

@gatewaypundit
 about their arrest and subsequent solitary confinement and provided information about the Konnech data breach that occurred in Pittsburgh, Pennsylvania, or Allegheny County.

The breach involved the unauthorized exposure of sensitive information belonging to election workers, election judges, the complete Pennsylvania voting registration file, voting machine serial numbers, passwords, and "everything that one would need to cheat."

"This isn't software, guys. This is malware. This is spyware. They are sucking data from the United States, storing it in China, and then using it to create a Chinese-style social credit system where we're all scored.   

United States citizens are scored to manipulate votes, manipulate thought, manipulate pretty much everything you can imagine in our lives. And these people are the tip of the spear for that. They're not the only ones but they're there."

30) On November 9, 2022, the Los Angeles District Attorney's office dropped charges against Konnech and its CEO, Eugene Yu.

District Attorney George Gascon cited concerns over “potential bias” and the “pace of the investigation” as his reasons for the decision.

"We are concerned about both the pace of the investigation and the potential bias in the presentation and investigation of the evidence," Gascon said in a statement.

"We currently have an immense volume of digital data that will define this case, but the processing of that data will take months. We would not be able to fairly and accurately process and present all of that evidence within the statutory timeframes."

"As a result, we have decided to ask the court to dismiss the current case and alert the public in order to ensure transparency."

A few weeks later, Gascon placed Deputy District Attorney Eric Neff, who alleged in court that this was potentially "the largest data breach in United States history," on administrative leave.

31) On December 22, 2022, Grant Bradley, a former employee of Konnech, filed a whistleblower lawsuit against the company that stated he personally “witnessed customer’s data (specifically poll watcher information) being made accessible to foreign nationals from China.”

Additionally, Bradley stated that Konnech used “developers, designers, and coders” who “are all Chinese nationals based out of Wuhan, China.”

https://thefederalist.com/2023/01/20/whistleblower-yes-election-data-company-gave-u-s-poll-workers-personal-info-to-china/

https://scribd.com/document/620894361/22-12-22-Verified-Complaint-1#

32) On February 24, 2023, cybersecurity expert Harry Haury, who forensically imaged Konnech's devices for the Los Angeles District Attorney's office, signed an affidavit stating that he witnessed Konnech storing the personal data of U.S. election workers on servers in China.

Furthermore, the affidavit stated that Konnech's software was developed, tested, and maintained in China, and metadata indicated that Eugene Yu was involved in developing election software for the Chinese government.

Haury, who is the CEO of Cain & Associates, stated that his company assisted the Los Angeles District Attorney's office by following FBI and Justice Department protocols to forensically image servers, computers, cell phones, and other electronic storage devices belonging to Konnech and Eugene Yu.

Haury, who has over 28 years of experience working as a cybersecurity expert for prominent organizations such as the Department of Defense, NSA, CIA, U.S. Treasury, NorthCOM, Sandia National Laboratories, more than a dozen top American banks, and the U.S. Justice Department stated that Konnech's data security system, "amounted to by far the worst example of complete disregard or negligence regarding the protection of PII and sensitive data I have ever seen. We discovered a data breach of U.S. data, which is classified as a total loss of control.”

Substantial evidence was reportedly discovered on Konnech's seized devices, including:

• confirmed multiple instances of Konnech hosting, on servers based in China, U.S. citizens’ personally identifiable information (PII);
• found evidence in private company messages that software code was being developed, tested, and maintained in China;
• confirmed that Konnech was providing administrative credentials to Chinese developers;
• PollChief software suffered from a security vulnerability that allowed any PollChief or Konnech worker to gain "super user" status, giving him or her broad access to information on all U.S. poll workers in the system;
• has evidence that Konnech employees have shared election-related data through, from, and on Chinese servers and applications;
• has evidence in metadata pulled from relevant files indicating Eugene Yu was involved in developing Chinese government (i.e., Wucheng District People’s Congress) election software; and
• has evidence showing Konnech is associated with several companies based in mainland China that appear to be associated with if not subsidized by the Chinese government.

Haury stated, "We concluded that this incident is a very high risk indicator of an intrusion by a foreign intelligence into the U.S. strategic infrastructure, and as obliged by law, we informed the Defense Counterintelligence and Security Agency (DCSA) and other pertinent law enforcement agencies of this contact."

https://truethevote.org/wp-content/uploads/2023/02/2023.02.24-Konnech-Dkt.-87-Motion-to-Inspect-Property.pdf

33) On March 24, 2023, Peter McCallister, the former General Manager of Konnech Australia, signed an affidavit stating that he believed Konnech's software development was done in China by Jinhua Hongzheng Technology, a company owned by "Mr. Yu's older brother" and "Jun Yu, Mr. Yu's nephew, was the person responsible for depositing the data onto the server in China."

Additionally, McCallister stated that after Eugene Yu's arrest, Konnech employees in China attempted to hack Konnech's CTO, Luis Nabergoi, and deleted "all conversations referencing or involving Eugene's nephew, Jun Yu."

Lastly, McCallister believed that Jinhua Hongzheng Technology was "the main provider of election software products to the Communist Party of China" and that Eugene Yu had asked him to sell the same "meeting administration and voting software" to the Australian government.

34) On April 5, 2023, Grant Bradley, the former Konnech employee, signed another affidavit stating "Konnech provided programmers in China private data of U.S.-based election workers, to include social security numbers and other identifying information."

"Konnech appeared to employ at least 80 and perhaps around 100 Chinese nationals to work on its elections software for American clients."

"I witnessed customers' data (specifically poll-watcher information) being made accessible to foreign nationals in China."

"Konnech's election logistics software was (and may still be) substantially developed by developers, designers, and coders who (to the best of my knowledge, information and belief), are all Chinese nationals based out of Wuhan, China."

"The standard process Konnech used to onboard China-based programmers was to create customer environments for the programmers by uploading files containing all of the American customers' poll workers' information, polling locations, and other data to DingTalk or Jira, where the leaders from the Chinese team would have access to Jira, and the entire Chinese team would have access to DingTalk."

"During my employment, on or after October 4, 2022 I was instructed by my superiors to say outwardly to customers that poll worker data was not stored overseas, was not available to foreign nationals, and that we had no idea why Eugene Yu had been arrested... My superiors who instructed me in these regards, and I, knew these statements were false."

https://truethevote.org/wp-content/uploads/2023/04/2023.04.07-Konnech-Dkt.-94-1-Exhibit-H-Affidavit-of-Grant-Bradley.pdf

https://truethevote.org/wp-content/uploads/2023/03/2023.03.24-Konnech-Dkt.-91-Reply-ISO-Motion-to-Inspect.pdf

35) On April 14, 2023, cybersecurity expert Nate Cain (
@cain_nate
), who forensically imaged Konnech's devices for the Los Angeles District Attorney's office, stated that Konnech stored the personal data of U.S. election workers and judges on servers in China.

Furthermore, Cain stated that a "Chinese company that has ties to the CCP" did Konnech's "software development and maintenance," and a Defense Counterintelligence Security Agency (DCSA) analyst reviewed their report, verified that it was accurate, and forwarded it to the FBI.

However, Cain mentioned that he had provided evidence of a major Konnech data breach to the police superintendent of a prominent U.S. county, who subsequently took the information to the FBI, and the FBI had declined to provide assistance, informing the superintendent that they were not interested in pursuing the matter.

Additionally, Cain stated that Los Angeles County had refused to inform several other counties that their data had also been breached.

Cain, who has over 25 years of experience working as a cybersecurity expert for the Army, Navy, Marine Corps, DISA, and the FBI, received his cybersecurity training from the NSA as a member of the U.S. Marine Corps Forces Cyberspace Command (MARFORCYBER).

"We found that there was voter poll worker data, as well as election judge data, and election inventory system data found on Chinese servers."

"We weren't expecting to see what we saw, which was that there was a Chinese company that was essentially doing the software development and all of the software maintenance for this company.

And what we discovered was that we got behind the Chinese firewall, and we found documents that showed that this Chinese company actually had ties to the CCP.

And then at that point, I had no choice but to take that information, package it up and provide it to the Defense Counterintelligence Security Agency (DCSA) because as a cleared contractor, I have a sworn obligation to provide them that information that this could be a potential Chinese espionage or intelligence operation working against the United States and our critical infrastructure.

So, I provided that information to them, and now, we're in a difficult situation because I don't think that George Gascon was very happy about that."

36) On April 20, 2023, Konnech and Eugene Yu retracted their defamation case against Catherine Engelbrecht and Gregg Phillips, a day after
@truethevote
 and
@onwardsocial
 unveiled a website (http://openink.com/konnech) containing much of the information discussed in this Twitter thread.

37) In conclusion, Eugene Yu develops election administration software for the Chinese government in partnership with Huawei, China Telecom, China Unicom, China Mobile, and Lenovo.

Two of his former employees have signed affidavits stating that he stored confidential U.S. election data on servers in China, where his software was developed, tested, and maintained.

Two cybersecurity experts, who forensically imaged Konnech's devices for the LADA, have stated that he stored confidential U.S. election data on servers in China, where he developed election administration software for the Chinese government.

This information is publicly available on the internet.

So, why is the FBI still allowing Konnech's election administration software to be used across the country?

38) On April 14, 2016, Jinhua Hongzheng Technology announced on Weibo that it provides election administration software to China's National People's Congress, Detroit,  Michigan, St. Louis, Missouri, and Washington, D.C.

Its predecessor is Jinhua Yulian Network and "Konnech."

https://archive.ph/8xIqe

39) So, why is the FBI shielding two firms closely tied to the Chinese government, which have financed and developed an American election software company for the past 15 years, all while transferring election data back to China?

40) And lastly, why is the FBI headquarters in Washington D.C., targeting Catherine (
@truethevote
) and Gregg (
@onwardsocial
) for exposing this while seemingly protecting Jianwei Yu (于建伟)?

41) If you would like Congress to hold the FBI accountable for betraying Catherine, Gregg, and their commitment to preserving the integrity of our election system, please visit
@TrueTheVote
's website, http://stopccpelectionfraud.com, and follow these three simple steps:

1. Sign the petition
2. Contact your representatives
3. Review these articles

42) In all of my interactions with Catherine and Gregg, despite facing lawsuits, wrongful arrests, and solitary confinement, their main concern has always been the removal of this national security threat from our election system.

If you would like to support their election integrity efforts, you can donate at:
https://truethevote.org/donate/

43) Finally, if you'd like to support my journalism, please consider becoming a member of my Twitter subscriber community.

By joining, you'll gain exclusive access to my reporting, including:

• Exclusive Konnech threads
• Content creation tips
• OSINT research tools
• Monthly Q&A sessions

Thank you for your time!

22
Hat tip BBG


This could go a number of places, but given that the FBI is threatening the people revealing this apparent Chinese penetration into electoral databases and research center I'm dropping it in. Could this, perchance, reflect a quid for Biden's numerous Chinese pro quos?

Note: these X posts are graphics heavy and hence this piece should be viewed in the oringal, which starts here:

https://x.com/KanekoaTheGreat/status/1666490357469822976

KanekoaTheGreat

@KanekoaTheGreat

KONNECH #1🚨: Evidence shockingly suggests that the FBI is shielding two firms closely tied to the Chinese government, which have financed and developed an American election software company for the past 15 years, all while transferring confidential election data back to China.

2) Konnech has provided election administration and logistics software to many prominent cities and counties in the United States, including:

•Alameda County, California
•Allegheny County, Pennsylvania
•Contra Costa County, California
•Denver, Colorado
•Detroit, Michigan
•Fairfax County, Virginia
•Hillsborough County, Florida
•Maron County, Indiana
•Los Angeles, California
•San Francisco, California
•Santa Clara County, California
•St. Louis County, Missouri
•Travis County, Texas
•Washington, D.C.

3) On August 13, 2022, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) convened a group of researchers to discuss how the FBI's headquarters had betrayed them following a 15-month investigation into Konnech's storage of American election data on Chinese servers. The data involved various sensitive information, including:

•Name, DOB, SSN, Address
•Phone, Email, Bank Account
•Voting Machine Passwords
•Thumb Drive Passwords
•Voter Registration Rolls
•Provisional Ballot Serial Numbers
•RFID Tags On Voting Equipment
•Election Building Schematics
•And More...

"You'd be startled to know that this server lives on the main Unicom backbone in China. And it's in a Chinese University in Wuhan, China. I'm not talking about this just being a storage place for data process here.

The app server for this particular application was in China... We're confronted with the fact that everything there was to know about elections in America, and in key counties in key cities, was in this server in Wuhan, China... So what do you do with this information?

Well, we went to the FBI because this was a matter of national security. And, they agreed. So, we started working with the local FBI community. From January of 2021 until April of 2022, the FBI opened up a significant counterintelligence operation on this.

The problem with it was that it wasn't just American information. It was Australian information. It was Canadian information, it was Mexican information. And we ultimately found out that the CCPs own elections are on this same server set in that university...

Everyone involved on the counter intelligence teams at the Bureau agreed on one thing, this software, this penetration, and this opening was a significant national security threat...

So two weeks before the 2000 Mules movie came out, I get a call from an agent and he says this has risen now to the level of a national security threat and headquarters has gotten involved. I don't know who he was referring to, but he said two women saw the case differently, and felt as though we were the criminals.

They had instructed the Detroit FBI office to notify Konnech that we had breached their firewalls, none of which is true... We later found out they were accusing me of stealing three servers from the Chinese Unicom backbone and having illegal possession of American private information.

And they were shopping that around to the other agencies that would be involved NSA, CIA and others. Trying to get somebody to pick up on this so that they could come Roger Stone me...

But the challenge we all have is this software is still in place... When you dig into Konnech's CEO Eugene Yu, in particular the other URLs that he owns, it will take you to the underlying URL that runs the Chinese Communist Party's elections.

It lives on that server, on that same URL address and that URL is owned by Eugene Yu."

https://open.ink/konnech

4) In 2002, Konnech CEO Eugene Yu was an "officer" on the "finance committee" of a Chinese foundation that flew Professor Charles Lieber, the head of Harvard’s Chemistry Department, to Zhejiang University to give a speech on “Nanotech in Today’s World.”

This discovery was made in a Chinese magazine entitled "Overseas Scholars," written by the China Association for Science and Technology in the United States (CAST-USA) and the American Zhu Kezhen Education Foundation (AZKEF).

CAST is a transnational organization and constituent member of the Chinese People's Political Consultative Conference (CPPCC), whose stated mission is to “maintain close ties with millions of Chinese scientists, engineers and other people working in the fields of science and technology” and to operate as “the bridge linking Chinese science and technology community with the Communist Party of China and the Chinese government,” according to organization’s archived “About Us” webpage.

In 2003, CAST established the Help Our Motherland through Elite Intellectual Resources from Overseas Program (HOME) in concert with the Organization Department of the Chinese Communist Party to recruit overseas science and technology talent to transfer technology and intellectual property back to China.

The CPPCC’s role in channeling overseas science and technology knowledge toward China’s development has grown since a 2013 directive from General Secretary Xi Jinping to focus on incentivizing overseas Chinese to contribute their technical skills and expertise to China’s national rejuvenation.

By 2020, a United States congressional body warned that the Chinese government has built a “sprawling ecosystem of structures, programs, and incentives to coopt and exploit overseas experts for the science and technology they acquire abroad.”

“Chinese leaders have long viewed advanced science and technology (S&T) as key to China’s comprehensive national power and sought to acquire it through licit and illicit means from developed countries like the United States,” the US-China Economic and Security Review Commission (USCC) said in the report.

“This ecosystem sponsors promising Chinese students and scholars at the U.S. and other foreign universities, incentivizes their return to China for the long term, and employs transnational organizations to channel S&T know-how from those remaining abroad back to mainland China.”

The U.S. Senate report continues:

“Many programs associated with Beijing’s S&T transfer ecosystem—including scholarships to study abroad, talent recruitment plans, and entrepreneurship parks—contribute to China’s military-civil fusion strategy by collecting specific technologies and know-how that improve the capabilities of the People’s Liberation Army (PLA) and advance the goals” of the Chinese Communist Party (CCP).”

“This ecosystem sponsors promising Chinese students and scholars to study at foreign universities, incentivizes or requires their return to China in exchange for this support, and recruits researchers via hundreds of talent programs. Moreover, it integrates Chinese students and scholars remaining abroad with organizations that facilitate the transfer of S&T back to the Mainland, where it can be exploited by the PLA, government ministries, state-owned enterprises (SOEs), state-run laboratories, and startups.”

“Even when overseas Chinese students and scholars do stay in the United States after graduation, China’s transnational technology transfer organizations and talent recruitment plans provide a means to contribute to China’s national rejuvenation by transferring technology and know-how without requiring physical return.”

In the magazine, CAST-USA refers to Eugene Yu by his Chinese name YU Jianwei (于建伟), and says that he is an “officer” on the “finance committee” of the American Zhu Kezhen Education Foundation. The foundation’s mission is “to promote exchange and cooperation between Zhejiang University and universities in the United States” and “invite United States professors or scientists to Zhejiang University.”

In 2020, Prof. Charles Lieber was arrested for concealing his funding from the Wuhan University of Technology and participating in China’s Thousand Talents Program.

At a Senate Judiciary Committee hearing, Bill Priestap, the former Assistant Director of the FBI’s Counterintelligence Division, stated that China’s talent recruitment plans are effective “brain gain programs” that “encourage theft of intellectual property from U.S. institutions.”

Priestap continued, “For example, China’s talent recruitment plans, such as the Thousand Talents Program, offer competitive salaries, state-of-the-art research facilities, and honorific titles, luring both Chinese overseas talent and foreign experts alike to bring their knowledge and experience to China, even if that means stealing proprietary information or violating export controls to do so.”

Eugene Yu was an “officer” on the “finance committee” of a Chinese foundation in the United States tasked with flying professors like Charles Lieber to China. This discovery was made in a China Association for Science and Technology in the United States magazine entitled “Overseas Scholars.”

Similarly to how the U.S. congressional report described CAST’s overseas science and technology acquisition efforts, AZKEF keeps a list of talented overseas Chinese students, offers incentives for prominent scientists to fly to China, and focuses on bridging Zhejiang University with universities in the United States.

https://archive.ph/OFVCf

https://web.archive.org/web/20011119103624/http://www.azkef.org/

https://web.archive.org/web/20031220030107/http://azkef.org:80/programs.htm

https://web.archive.org/web/20030402092120/http://azkef.org:80/lecture2002.pdf

https://web.archive.org/web/20140206035502/http://english.cast.org.cn/n1181872/n1257426/47099.html
https://uscc.gov/sites/default/files/2020-10/Overseas_Chinese_Students_and_Scholars_in_Chinas_Drive_for_Innovation.pdf

5) On November 29, 2005, Eugene Yu, also known as YU Jianwei (于建伟), established a shadow subsidiary named Jinhua Yulian Network Technology Co., Ltd. (金华宇联网络科技有限公司) in Jinhua City, Zhejiang Province, China, two years after founding Konnech in the United States.

6) On January 25, 2006, Jinhua Yulian Network was accepted into the Entrepreneurship Service Center at the Chinese Academy of Sciences Jinhua Science and Technology Park.

The Chinese government has funded and overseen the development of Konnech's American election software ever since.

https://web.archive.org/web/20090413172501/http://www.jhcy.cn/yqqy.asp?page=3

7) On February 25, 2006, Eugene Yu registered the website domain "http://yu-lian.cn" for Jinhua Yulian Network with the email address eyu@konnech.com.

https://archive.is/YaRv1#

8) On http://yu-lian.cn, Eugene Yu wrote in Chinese that he provides election software "with Chinese characteristics" to various levels of the Chinese government, including the National People’s Congress and the Chinese People's Political Consultative Conference.

https://web.archive.org/web/20131207150515/http://yu-lian.cn/Services.html

9) On http://yu-lian.cn, Eugene Yu praised "Comrade Jiang Zemin" and emphasized Konnech's philosophy of prioritizing "political tasks first, and economic benefits second."

He highlighted his success stories of "Election Management, Detroit" and "US Overseas Voters."

The entire website was written in Chinese.

https://web.archive.org/web/20131207151051/http://yu-lian.cn/Case.html

10) In December 2006, Konnech announced on Facebook that they had partnered with Michigan State University and the Confucius Institute to build, http://ChineseBrief.com, an "interactive communication platform and Chinese language learning tool."

https://web.archive.org/web/20120729201212/http://www.confucius.msu.edu/news.htm

11) On July 18, 2007, Eugene Yu posted an ad on the Chinese Academy of Sciences Jinhua Science and Technology Park's website, offering "5 million yuan" for developing "software packages" for Jinhua Yulian Network and http://konnech.com.

In 2007, 5 million yuan was worth around $700,000 and was the prize money offered by the Chinese government to members of the Thousand Talents Program and other elite overseas entrepreneurs.

https://web.archive.org/web/20131019061139/http://www.jhcy.cn/jsnt_detail.asp?id=16

12) The Chinese Academy of Sciences (CAS) is a national think tank with extensive research facilities and over 50,000 researchers. CAS has been linked to Chinese military, nuclear, and cyber espionage programs.

The U.S. Department of Defense acknowledges the CAS as China's leading academic institution for comprehensive research and development.

CAS and its affiliated companies are involved in developing AI initiatives, hypersonic spaceplanes, robotic submarines, and missile technology for the Chinese military.

The Justice Department has indicted several individuals associated with CAS for their roles in transferring trade secrets and military technology from U.S. companies through Chinese overseas talent programs.

In October 2002, the Jinhua Science and Technology Park became the first collaboration between the Chinese Academy of Sciences (CAS) and a prefecture-level government.

The Chinese government has built more than 150 "Overseas Chinese scholar pioneering parks" in the hearts of 54 "National New and High Technology Development Zones."

These ultra-modern facilities were designed for returning specialists to "incubate" (find commercial or military applications for) technologies acquired overseas as part of China's strategy of "serving in place" that allows Chinese scholars to stay abroad while transferring foreign technology back home.

https://uscc.gov/sites/default/files/Research/Interos_Supply%20Chain%20Vulnerabilities%20from%20China%20in%20U.S.%20Federal%20ICT_final.pdf

https://media.defense.gov/2019/May/02/2002127082/-1/-1/1/2019_CHINA_MILITARY_POWER_REPORT.pdf

https://web.archive.org/web/20100628161736/http://www.jhkjy.ac.cn/about/index.asp

13) Jinhua Yulian Network's initial address was located at No. 988 Shuanglong South Street, Jinhua City, Zhejiang Province, China, which is situated 500 meters away from the Jinhua People's Government building (No. 801 Shuanglong South Street) and across the street from the Jinhua Science and Technology Bureau (No. 828 Shuanglong South Street).

14) The Jinhua Science and Technology Park (JHTP) offers Chinese government-funded support to domestic and overseas enterprises, including financial assistance, living facilities, server hosting, internet access, university partnerships, technology transfers, research assistance, and patent support.

In 1988, the State Council launched the Ministry of Science and Technology’s national Torch Program to speed up the nation’s “science and technological industrialization.”

In 2005, the Ministry of Science and Technology awarded JHTP the distinction of a national-level technology business incubator.

In 2006, JHTP was granted 3 million yuan by the Ministry of Science and Technology through China's national Torch Program to establish the Park's Internet Data Center, where Jinhua Yulian Network would develop, test, and maintain Konnech's American election software.

https://web.archive.org/web/20091017113128/http://www.jhcy.cn/yqgk_01.asp?flag=%B7%FE%CE%F1%B9%A6%C4%DC&lmbm=2405&lmmc=%B7%FE%CE%F1%B9%A6%C4%DC&url=yqgk_01.asp

https://web.archive.org/web/20090413171900/http://www.jhcy.cn/cxzt_01.asp

http://jhcy.cn/jhkjy/town_details/28.html

http://jhcy.cn/jhkjy/town_details/50.html

15) A 2008 Chinese document titled "International Elite Entrepreneurship Modern Service Outsourcing" reveals that Eugene Yu worked for the Chinese government as a Project Manager of the Guangzhou Economic and Technological Development Zone (GETDZ) from 1983 until 1985.

The document features 46 Chinese high-tech companies operating overseas and describes Konnech as an "Intelligent Web Communications" company with the mission of becoming "one of the top 50 e-commerce service providers for schools and government in the United States within 10 years.”

The document mentions Konnech's Chinese venture fund and describes the company's goal of developing advanced technology in cooperation with Zhejiang University:

“The company will enter a phase of rapid development after the implementation of the venture fund in Wuzhong.”

"In terms of specialized technology, we have been developing and hiring technical personnel with expertise in the field in a rapid manner by utilizing the role of corporate and university professors and graduate classes for project development, with the aim of receiving advanced applied technology."

"... it is an indisputable fact that many cutting-edge products come from American university campuses. We must take the corresponding path and cooperate with American universities and Zhejiang University and other domestic institutions to focus on the development of applied technologies and the application-oriented development of specialized technologies."

The document describes the problems facing the U.S. market, citing “expensive software programming fees and talent shortages” and reduced “funding for IT projects” before concluding, “In this environment, the role of our China branch is fully demonstrated.”

When Eugene Yu’s attorneys filed a motion to dismiss his criminal case in California, they included a section entitled FACTUAL BACKGROUND that says he “worked in various locations” after he graduated from Zhejiang University and before he was accepted into Wake Forest University.

However, it failed to mention his prior employment as a Project Manager in the Guangzhou Economic and Technological Development Zone, where he worked in the Industrial Project Negotiation Department and "completed the introduction of several major projects":

"Eugene Yu was born and raised in Jinhua City, Zhejiang Province, China. In 1974, as part of China’s cultural revolution, Mr. Yu was sent to a communal farm where he labored for four years in squalor conditions. In 1977, after Chairman Mao died, Mr. Yu scored high on a nationwide test, qualifying him for admission to study engineering at Zhejiang University.

After graduating from college, he was sent to work in various locations in China. Mr. Yu then met and married his wife Donna Wang. In 1986, Mr. Yu and Dr. Wang were accepted to graduate school programs at Wake Forest University, where Mr. Yu obtained his MBA degree."

Since the launch of the GETDZ in 1984, China has established 219 national-level Economic and Technological Development Zones (ETDZs), which helped launch China’s rise to a global economic superpower.

In order to promote science and technology-intensive industries, ETDZs offer financial incentives and preferential policies that target domestic and overseas enterprises focused on manufacturing, scientific, and technological industries.

Two decades later, Eugene Yu would return to China to launch his company Jinhua Yulian Network Technology Co., Ltd. (金华宇联网络科技有限公司) in the Jinhua Economic and Technological Development Zone (JETDZ).

https://max.book118.com/html/2012/0222/1126480.shtm

https://cbbc.org/sites/default/files/2021-01/China-Britain%20Business%20Council%20-%20In%20the%20Zone%20-%20A%20Comprehensive%20Guide%20to%20China%E2%80%99s%20Economic%20and%20Technological%20Development%20Zones%20-%20October%202020.pdf

https://documentcloud.org/documents/2317

16) On January 4, 2011, Lin Yu, a managing supervisor at Jinhua Yulian Network, established Jinhua Red Date Software Co., Ltd., also known as Jinhua Jujube Software Co., Ltd.

On January 16, 2011, Konnech registered the domain reddatesoft[.]com with the email eyu@konnech.com.

Jinhua Red Date Software and Jinhua Yulian Network shared the same address at No. 1583 Binhong Road, Jinhua City, Zhejiang Province.

Jinhua Yulian Network's website included "Jinhua Red Date Software Co., Ltd." and "reddatesoft[.]com" in its copyright statement.

Peter McCallister, the General Manager of Konnech Australia, later affirmed in an affidavit that Lin Yu is Eugene Yu's older brother and a Chinese national.

(Note: The modified domain URL "reddatesoft[.]com" is used because of safety concerns with the URL raised by Twitter.)

https://web.archive.org/web/20220822014930/https://www.11467.com/jinhua/co/273669.htm

https://web.archive.org/web/20130718125224/http://yu-lian.cn/

17) On April 13, 2015, Lin Yu established Jinhua Hongzheng Technology Co., Ltd. (金华鸿正科技有限公司) in Jinhua, Zhejiang Province, China.

Lin Yu (Eugene Yu's brother) owned 99.4% of the company.

Jun Yu (Eugene Yu's nephew) and Guojun Shao, who co-invented a Konnech patent with Eugene Yu, were among the other equity holders.

Jinhua Yulian Network later transferred a voting patent, co-invented with a Zhejiang University professor, to Jinhua Hongzheng Technology.  In a future thread, there will be a detailed discussion about Konnech's patents, employees, and the involvement of this professor.

18) Jinhua Hongzheng Technology provides election administration software, including web and mobile applications, to more than 430 National People's Congresses across over 20 provinces.

The company has established partnerships with Huawei, Lenovo, China Telecom, China Mobile, China Unicom, and the highest levels of the Chinese government.

19) On July 31, 2015, Eugene Yu registered the website domain "hongzhengtech[.]cn" for Jinhua Hongzheng Technology using the email address admin@konnech.com.

As a result, Konnech held significant control over a company that provides election administration software to the highest levels of the Chinese government.

Shortly after Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) exposed Konnech's connection to China's National People's Congress, the domain registration email address was changed to jiadeng@hongzhengtech.com.

(Note: The modified domain URL "hongzhengtech[.]cn" is used because of safety concerns with the URL raised by Twitter.)

https://web.archive.org/web/20220824173140/https://whois-history.whoisxmlapi.com/lookup-report/AVkvG34MR7

20) In a September 1, 2022, live chat, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) discussed the FBI's betrayal, Konnech programming software for China's National People's Congress, and the company's storage of U.S. election data on Chinese servers.

In January 2021, Phillips said that the cyber analyst he had been working with encountered an “oddity in some of the URLs” such as http://vote4la.com, http://vote4detroit.com, and http://vote4boston.com, which Konnech’s “PollChief” software application used to gather personally-identifying information about poll workers.

Using Binary Edge, a software product companies use to identify and assess the risk of cyber breaches, “We began to look at where these URLs resolve to.

We found that most of them resolve to one I.P. address and that I.P. address — the URL resolved in China,” Phillips said. “What we also learned in our review, http://apps.konnech.net, resolved into this same URL in China, meaning that the application itself was residing in China,” he continued.

“In Binary Edge, you can figure out what type of database they are using, their database port, and all the different services offered by ports in this particular application living in China. It turned out that not only did it live there, but they left the database open.”

This database “stored the personally identifying information of over a million Americans,” he emphasized. Engelbrecht and Phillips decided that “this was a major national security risk” and immediately took the information to the FBI.

When Engelbrecht and Phillips took this information to the FBI, the FBI “said the information was forwarded to their counter-intelligence operation, and a counter-intelligence op was opened up in January or February of 2021,” Phillips said.

Phillips described how he and Engelbrecht played an active role in the FBI’s operation, “They engaged us in the operation, they were communicating with us on a regular basis. They were communicating with Catherine regarding communications with the target and this went on for approximately 15 months.”

Phillips and Engelbrecht noted that the field office they worked with for those 15 months was “legitimate” and not “political law enforcement.”

“These were legitimate people who believed that this software posed a national security risk to the United States of America and they were working with us closely to try to stop this from being in place during the midterms,” Phillips said.

“The focus point was always we needed to remove this software from the election, but taking a step further, there were a lot of other concerns that the bureau had.”

In April 2022, Engelbrecht received a call from one of the FBI agents, who informed her that the FBI’s “Washington D.C. headquarters” was now involved in the investigation.

Engelbrecht described how everything changed after this call, “There was no more goodwill, there was no more let's work together, the script had been flipped, and now we were the target,” she said. “That was a very disturbing call.”

The agent informed Engelbrecht that “two women” at the FBI’s headquarters believed that Phillips and Engelbrecht were “in the wrong for doing this” and that the D.C. office was now trying “to figure out how you guys broke the law to find all of this.”

Engelbrecht added, “which of course we didn't, but that was kind of their Modus Operandi, they were going to try to pin something on us, and today you can pick your headlines about how the FBI has done this time and again.”

Phillips remarked, “The problem is they know about this, and they chose to do nothing. They chose to investigate it, and in the end, they chose to blame us, but this is China. These are Chinese operatives in the United States; these are Chinese citizens who are programming this.”

Engelbrecht explained how the FBI agents initially hoped they could persuade the Washington D.C. office to do the right thing, “Our contacts were saying we are going to try and smooth this out, but as the days clicked on, they re-contacted us and one of them said you may need to be ready to — his term was to use the nuclear option and go to the press,” she said.

With the FBI no longer interested in pursuing Konnech, Englebrecht and Phillips organized an event for Saturday, August 13th in Arizona called “the Pit” where they brought together about two hundred “researchers, independent journalists, and big thinkers” to share their story.

“We asked the people in attendance for help, we didn't know what the FBI's plans were for us, we didn't know if we didn't speak this publicly if we would ever have the chance to, but we felt like our best chance was to share this with people we trusted who had the wherewithal to get the word out,” Englebrecht said.

She continued, “There have been so many great things that have happened since that event, but one of the greatest, was this community that came out shoulder to shoulder saying let’s dig this, let's see how much more information we can find.”

“The quality of research that has been done to supplement what we already had and to corroborate what we already had has been incredible.”

Phillips added, “This is some of the best research I have ever seen. The quality of it, the depth of it, we were with a prosecutor the other day and we had an opportunity to share some of this information with them.”

He continued, “There's likely going to be a grand jury convened here in the next week or so. It's supported by not just the research that my team OPSEC did for Catherine and True the Vote, but by the research of one of the best research teams I've ever seen come together.”

“The data and research all stand on their own.”

https://truethevote.locals.com/post/2664780/the-tiger-project

21) On September 12, 2022, Konnech filed a defamation lawsuit against Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
), accusing them of spreading baseless "conspiracy theories" and engaging in "racism and xenophobia."   

Konnech denied any affiliation with the Communist Party of China and stated that they had never stored American election data on servers in China.

The legacy media echoed Konnech's claims against
@TrueTheVote
 and
@onwardsocial
 without conducting any examination of the company's connections to Jinhua Yulian Network, Jinhua Hongzheng Technology, or China's National People's Congress.

22) In an unusual move, U.S. District Court Judge Kenneth Hoyt issued an ex-parte temporary restraining order in favor of Konnech without providing an opportunity for
@TrueTheVote
 and
@OnwardSocial
 to respond to the complaint.

Furthermore, Judge Hoyt immediately ordered them to disclose the identities of all individuals involved in their investigation of Konnech at the outset of the trial, prior to the discovery phase.

Failure to comply would result in the imprisonment of Catherine Engelbrecht and Gregg Phillips for contempt of court.

23) On October 4, 2022, Eugene Yu, the CEO of Konnech, was arrested by the Los Angeles District Attorney's office for storing the data of American election workers on servers in China.

Deputy District Attorney Eric Neff described the scale of the data breach as "astounding," suggesting that it could be "the largest data breach in United States history."

Prosecutors alleged that Konnech employees shared the personal information of Los Angeles election workers with third-party software developers in China, who were involved in creating and fixing Konnech's software called PollChief.

Furthermore, software developers in China had "super administration access" to PollChief software and confidential election data from the United States.

https://truethevote.org/wp-content/uploads/2022/11/eugene-yu-complaint-101322.pdf

24) On October 5, 2022, during Eugene Yu's bond hearing, his attorney contended that he posed no risk of fleeing as he had been actively cooperating with the FBI for the preceding month, and his arrest had taken the agency by surprise.

However, the Los Angeles District Attorney's office argued that Yu presented a substantial flight risk due to his strong business ties in China.

Additionally, the prosecution raised concerns about the suspicious nature of Yu's arrest, noting that he was taken into custody without his cell phone while on his way to the airport.

25) On October 28, 2022,
@TrueTheVote
 and
@OnwardSocial
 submitted an affidavit containing approximately 10% of their text messages exchanged with FBI Agents in Detroit and San Antonio, supporting their claim of working with the FBI on a 15-month "counter-intelligence operation" against Eugene Yu, prior to the involvement of FBI headquarters in Washington D.C.

The text messages included conversations with the following individuals:

-Special Agent Bruce Fowler, Detroit
-SA Huy Nguyen, San Antonio
-SA Kevin McKenna, San Antonio
-SA Kristina Spindel, San Antonio

In one text message exchange, Fowler provided his FBI email address and mentioned receiving three thumb drives from the San Antonio office. He asked Engelbrecht to guide him on where to find information on those drives.

In another text message exchange, Engelbrecht asked for the name of an agent in Georgia. Nguyen responded that he would provide the name later, but “in the meantime, you can tell them that you filed the complaint with SA Huy Nguyen and SA Kevin McKenna with San Antonio Division.”

In another exchange, Engelbrecht texted Nguyen, stating:

"I wanted to let you know that we took the nuclear option and went public (in a very limited way, but nonetheless we did it). Konnech quickly filed a civil suit against us in Houston federal court and got an ex parte [temporary restraining order].

Part of the TRO required that we name who we’d gotten the election worker data from, same person who’d provided it to you. We gave the court the name under seal. Our attorney also notified the Houston FBI office, where the case was filed.

I’m very concerned about everyone’s safety at this point. Please do whatever possible to help ensure that name never comes out. I can provide you with whatever you may need."

Nguyen did not respond to Engelbrecht’s text. According to further texts provided by Engelbrecht, she reached out to “KayKay,” saying she hoped to talk, in person, if possible.

“KayKay” replied that she was on a temporary assignment out of state until January and asked if Engelbrecht still had Nguyen’s number. Engelbrecht then explained that she had “called and written him but no response.”

The text then explained: “We have been drug into a vicious lawsuit filed against us by Konnech.” “Our attorneys have contacted the FBI and been told that the Bureau has no interest in engaging with the court in order to maintain confidentiality.”

Engelbrecht added that she, Phillips, and “the researcher who originally provided us the data” are being “doxed,” and that it’s “a very serious situation and we’ve been left to hang.”

Engelbrecht then noted, “Yu has already been indicted by a Grand Jury and arrested,” but they “continue to hear chatter that the FBI is working with Konnech, against us, and still trying to accuse us of crimes we did not commit.”

The True the Vote founder then noted that “what Bobby said on the phone that day in April 22 (when you were reading the yearly CI disclaimer to me) has gone into full overdrive.” She added: “I also now believe Gregg and I have been set up. It’s appalling, heartbreaking, and wrong.”

https://thefederalist.com/2022/11/18/in-this-untold-story-of-poll-worker-data-chinese-servers-and-scandal-only-the-fbi-knows-the-truth/

https://storage.courtlistener.com/recap/gov.uscourts.txsd.1888133/gov.uscourts.txsd.1888133.46.2.pdf

26) On October 31, 2022, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) were imprisoned for contempt of court as they refused to disclose the identity of a researcher who provided information to the LADA that resulted in the indictment of Eugene Yu:

Despite Eugene Yu's arrest by the Los Angeles District Attorney based on the allegations he had previously denied in his defamation lawsuit, Judge Kenneth Hoyt refused to admit any evidence from the criminal proceedings against Konnech in his courtroom.

Furthermore, Judge Hoyt declined to respond to a phone call from the Los Angeles District Attorney's office and asserted that the criminal case against Eugene Yu was unrelated to the civil case involving Catherine Engelbrecht and Gregg Phillips.

27) On November 5, 2022, Tucker Carlson discussed Catherine Engelbrecht and Gregg Phillips being arrested for refusing to reveal the identity of a researcher who provided information to the LADA that resulted in criminal charges against Eugene Yu, the CEO of Konnech:

"George Gascon actually indicted Eugene Yu for exfiltrating the personal records of American poll workers, including their social security numbers and home addresses, out of the country to servers in China. These researchers developed that information.   

Catherine attempted to give it to law enforcement at the FBI and elsewhere and was sued by Konnech for doing that. When Konnech sued them, they got a restraining order, ordering Catherine to turn over the names of these researchers.   

Catherine and Gregg, who are very courageous people, simply refused to do it, and as a result, while Yu is home on bail, Catherine and Gregg are in jail tonight...

The civil libertarians and the mainstream press are basically a flock of sheep that are each bleeding the exact same tune, and all they want to do is deny any conversation about the possibility of fraud in elections."

28) On November 7, 2022,
@TrueTheVote
 and
@OnwardSocial
 were released from prison following a decision by the U.S. Court of Appeals for the Fifth Circuit, which overturned Judge Kenneth Hoyt's order to unjustly detain them for contempt of court in a civil defamation case.

Two week later, the appeals court vacated the contempt order and wrote, "the record does not reveal what sort of emergency justified the district court's demand for that information before the parties could file Rule 12 motions before the defendants could file an answer, before the parties could file their initial disclosures, or before discovery could begin let alone conclude in the ordinary course."

"Much less did the district court explain what sort of emergency could warrant jailing the petitioner-defendants for not making such immediate disclosures. Rather, the district court made clear that it was imposing its disclosure requirements because it—the district court—wanted to add defendants to the lawsuit. Resp. 13; App. 188. That is not how the Federal Rules of Civil Procedure work."

Furthermore, the appeals court criticized Judge Kenneth Hoyt for "using a temporary restraining order, a preliminary injunction, and a civil-contempt order to litigate the case on Konnech's behalf."

https://storage.courtlistener.com/recap/gov.uscourts.txsd.1888133/gov.uscourts.txsd.1888133.62.0.pdf

@gatewaypundit
 about their arrest and subsequent solitary confinement and provided information about the Konnech data breach that occurred in Pittsburgh, Pennsylvania, or Allegheny County.

The breach involved the unauthorized exposure of sensitive information belonging to election workers, election judges, the complete Pennsylvania voting registration file, voting machine serial numbers, passwords, and "everything that one would need to cheat."

"This isn't software, guys. This is malware. This is spyware. They are sucking data from the United States, storing it in China, and then using it to create a Chinese-style social credit system where we're all scored.   

United States citizens are scored to manipulate votes, manipulate thought, manipulate pretty much everything you can imagine in our lives. And these people are the tip of the spear for that. They're not the only ones but they're there."

30) On November 9, 2022, the Los Angeles District Attorney's office dropped charges against Konnech and its CEO, Eugene Yu.

District Attorney George Gascon cited concerns over “potential bias” and the “pace of the investigation” as his reasons for the decision.

"We are concerned about both the pace of the investigation and the potential bias in the presentation and investigation of the evidence," Gascon said in a statement.

"We currently have an immense volume of digital data that will define this case, but the processing of that data will take months. We would not be able to fairly and accurately process and present all of that evidence within the statutory timeframes."

"As a result, we have decided to ask the court to dismiss the current case and alert the public in order to ensure transparency."

A few weeks later, Gascon placed Deputy District Attorney Eric Neff, who alleged in court that this was potentially "the largest data breach in United States history," on administrative leave.

31) On December 22, 2022, Grant Bradley, a former employee of Konnech, filed a whistleblower lawsuit against the company that stated he personally “witnessed customer’s data (specifically poll watcher information) being made accessible to foreign nationals from China.”

Additionally, Bradley stated that Konnech used “developers, designers, and coders” who “are all Chinese nationals based out of Wuhan, China.”

https://thefederalist.com/2023/01/20/whistleblower-yes-election-data-company-gave-u-s-poll-workers-personal-info-to-china/

https://scribd.com/document/620894361/22-12-22-Verified-Complaint-1#

32) On February 24, 2023, cybersecurity expert Harry Haury, who forensically imaged Konnech's devices for the Los Angeles District Attorney's office, signed an affidavit stating that he witnessed Konnech storing the personal data of U.S. election workers on servers in China.

Furthermore, the affidavit stated that Konnech's software was developed, tested, and maintained in China, and metadata indicated that Eugene Yu was involved in developing election software for the Chinese government.

Haury, who is the CEO of Cain & Associates, stated that his company assisted the Los Angeles District Attorney's office by following FBI and Justice Department protocols to forensically image servers, computers, cell phones, and other electronic storage devices belonging to Konnech and Eugene Yu.

Haury, who has over 28 years of experience working as a cybersecurity expert for prominent organizations such as the Department of Defense, NSA, CIA, U.S. Treasury, NorthCOM, Sandia National Laboratories, more than a dozen top American banks, and the U.S. Justice Department stated that Konnech's data security system, "amounted to by far the worst example of complete disregard or negligence regarding the protection of PII and sensitive data I have ever seen. We discovered a data breach of U.S. data, which is classified as a total loss of control.”

Substantial evidence was reportedly discovered on Konnech's seized devices, including:

• confirmed multiple instances of Konnech hosting, on servers based in China, U.S. citizens’ personally identifiable information (PII);
• found evidence in private company messages that software code was being developed, tested, and maintained in China;
• confirmed that Konnech was providing administrative credentials to Chinese developers;
• PollChief software suffered from a security vulnerability that allowed any PollChief or Konnech worker to gain "super user" status, giving him or her broad access to information on all U.S. poll workers in the system;
• has evidence that Konnech employees have shared election-related data through, from, and on Chinese servers and applications;
• has evidence in metadata pulled from relevant files indicating Eugene Yu was involved in developing Chinese government (i.e., Wucheng District People’s Congress) election software; and
• has evidence showing Konnech is associated with several companies based in mainland China that appear to be associated with if not subsidized by the Chinese government.

Haury stated, "We concluded that this incident is a very high risk indicator of an intrusion by a foreign intelligence into the U.S. strategic infrastructure, and as obliged by law, we informed the Defense Counterintelligence and Security Agency (DCSA) and other pertinent law enforcement agencies of this contact."

https://truethevote.org/wp-content/uploads/2023/02/2023.02.24-Konnech-Dkt.-87-Motion-to-Inspect-Property.pdf

33) On March 24, 2023, Peter McCallister, the former General Manager of Konnech Australia, signed an affidavit stating that he believed Konnech's software development was done in China by Jinhua Hongzheng Technology, a company owned by "Mr. Yu's older brother" and "Jun Yu, Mr. Yu's nephew, was the person responsible for depositing the data onto the server in China."

Additionally, McCallister stated that after Eugene Yu's arrest, Konnech employees in China attempted to hack Konnech's CTO, Luis Nabergoi, and deleted "all conversations referencing or involving Eugene's nephew, Jun Yu."

Lastly, McCallister believed that Jinhua Hongzheng Technology was "the main provider of election software products to the Communist Party of China" and that Eugene Yu had asked him to sell the same "meeting administration and voting software" to the Australian government.

34) On April 5, 2023, Grant Bradley, the former Konnech employee, signed another affidavit stating "Konnech provided programmers in China private data of U.S.-based election workers, to include social security numbers and other identifying information."

"Konnech appeared to employ at least 80 and perhaps around 100 Chinese nationals to work on its elections software for American clients."

"I witnessed customers' data (specifically poll-watcher information) being made accessible to foreign nationals in China."

"Konnech's election logistics software was (and may still be) substantially developed by developers, designers, and coders who (to the best of my knowledge, information and belief), are all Chinese nationals based out of Wuhan, China."

"The standard process Konnech used to onboard China-based programmers was to create customer environments for the programmers by uploading files containing all of the American customers' poll workers' information, polling locations, and other data to DingTalk or Jira, where the leaders from the Chinese team would have access to Jira, and the entire Chinese team would have access to DingTalk."

"During my employment, on or after October 4, 2022 I was instructed by my superiors to say outwardly to customers that poll worker data was not stored overseas, was not available to foreign nationals, and that we had no idea why Eugene Yu had been arrested... My superiors who instructed me in these regards, and I, knew these statements were false."

https://truethevote.org/wp-content/uploads/2023/04/2023.04.07-Konnech-Dkt.-94-1-Exhibit-H-Affidavit-of-Grant-Bradley.pdf

https://truethevote.org/wp-content/uploads/2023/03/2023.03.24-Konnech-Dkt.-91-Reply-ISO-Motion-to-Inspect.pdf

35) On April 14, 2023, cybersecurity expert Nate Cain (
@cain_nate
), who forensically imaged Konnech's devices for the Los Angeles District Attorney's office, stated that Konnech stored the personal data of U.S. election workers and judges on servers in China.

Furthermore, Cain stated that a "Chinese company that has ties to the CCP" did Konnech's "software development and maintenance," and a Defense Counterintelligence Security Agency (DCSA) analyst reviewed their report, verified that it was accurate, and forwarded it to the FBI.

However, Cain mentioned that he had provided evidence of a major Konnech data breach to the police superintendent of a prominent U.S. county, who subsequently took the information to the FBI, and the FBI had declined to provide assistance, informing the superintendent that they were not interested in pursuing the matter.

Additionally, Cain stated that Los Angeles County had refused to inform several other counties that their data had also been breached.

Cain, who has over 25 years of experience working as a cybersecurity expert for the Army, Navy, Marine Corps, DISA, and the FBI, received his cybersecurity training from the NSA as a member of the U.S. Marine Corps Forces Cyberspace Command (MARFORCYBER).

"We found that there was voter poll worker data, as well as election judge data, and election inventory system data found on Chinese servers."

"We weren't expecting to see what we saw, which was that there was a Chinese company that was essentially doing the software development and all of the software maintenance for this company.

And what we discovered was that we got behind the Chinese firewall, and we found documents that showed that this Chinese company actually had ties to the CCP.

And then at that point, I had no choice but to take that information, package it up and provide it to the Defense Counterintelligence Security Agency (DCSA) because as a cleared contractor, I have a sworn obligation to provide them that information that this could be a potential Chinese espionage or intelligence operation working against the United States and our critical infrastructure.

So, I provided that information to them, and now, we're in a difficult situation because I don't think that George Gascon was very happy about that."

36) On April 20, 2023, Konnech and Eugene Yu retracted their defamation case against Catherine Engelbrecht and Gregg Phillips, a day after
@truethevote
 and
@onwardsocial
 unveiled a website (http://openink.com/konnech) containing much of the information discussed in this Twitter thread.

37) In conclusion, Eugene Yu develops election administration software for the Chinese government in partnership with Huawei, China Telecom, China Unicom, China Mobile, and Lenovo.

Two of his former employees have signed affidavits stating that he stored confidential U.S. election data on servers in China, where his software was developed, tested, and maintained.

Two cybersecurity experts, who forensically imaged Konnech's devices for the LADA, have stated that he stored confidential U.S. election data on servers in China, where he developed election administration software for the Chinese government.

This information is publicly available on the internet.

So, why is the FBI still allowing Konnech's election administration software to be used across the country?

38) On April 14, 2016, Jinhua Hongzheng Technology announced on Weibo that it provides election administration software to China's National People's Congress, Detroit,  Michigan, St. Louis, Missouri, and Washington, D.C.

Its predecessor is Jinhua Yulian Network and "Konnech."

https://archive.ph/8xIqe

39) So, why is the FBI shielding two firms closely tied to the Chinese government, which have financed and developed an American election software company for the past 15 years, all while transferring election data back to China?

40) And lastly, why is the FBI headquarters in Washington D.C., targeting Catherine (
@truethevote
) and Gregg (
@onwardsocial
) for exposing this while seemingly protecting Jianwei Yu (于建伟)?

41) If you would like Congress to hold the FBI accountable for betraying Catherine, Gregg, and their commitment to preserving the integrity of our election system, please visit
@TrueTheVote
's website, http://stopccpelectionfraud.com, and follow these three simple steps:

1. Sign the petition
2. Contact your representatives
3. Review these articles

42) In all of my interactions with Catherine and Gregg, despite facing lawsuits, wrongful arrests, and solitary confinement, their main concern has always been the removal of this national security threat from our election system.

If you would like to support their election integrity efforts, you can donate at:
https://truethevote.org/donate/

43) Finally, if you'd like to support my journalism, please consider becoming a member of my Twitter subscriber community.

By joining, you'll gain exclusive access to my reporting, including:

• Exclusive Konnech threads
• Content creation tips
• OSINT research tools
• Monthly Q&A sessions

Thank you for your time!

24
(4) FEDERAL JUDGE TOSSES RED STATE ASYLUM RULE LAWSUIT: U.S. District Judge David Joseph ruled that Louisiana, Florida, and 17 other states lack standing to challenge a Department of Homeland Security (DHS) and Department of Justice (DOJ) interim final rule that ended the adversarial process for asylum claims and gave asylum officers the power rather than immigration judges to decide asylum claims.

Judge Joseph said Biden administration policies resulted in a breakdown of government control on the border and general lawlessness, but the states lacked standing to challenge the rule.

Why It Matters: The Biden administration has used new rules interpreting immigration law, and failed to enforce certain immigration laws, to exacerbate the immigration crisis. The Democratic Party long-term political strategy remains to bolster the Democratic voter base ahead of an eventual move on illegal immigrant asylum. – R.C.

25
Politics & Religion / Re: Israel, and its neighbors
« on: April 18, 2024, 02:03:44 PM »
Or maybe we are being lied to?

Anyway, here's Zeihan:

https://www.youtube.com/watch?v=W4W0FHJ8A0o

26
I have done such training at PSR:

27
Politics & Religion / Re: Promises kept: Biden vs. America
« on: April 18, 2024, 01:59:22 PM »
I see I failed to post the intro I included when I posted this on FB:
=================


Biden makes his case-- but enables enemy invasion by 10+ million illegal aliens among whom are tens of thousands of likely fifth columnists from China and other hostile powers.  Then there is the matter of enabling $100B to Iran, and billions in aid to Hamas even as it holds American hostages.   

=================


33
Politics & Religion / Biden: Moment of Truth
« on: April 17, 2024, 04:10:11 PM »
Moment of Truth on Ukraine and Israel
Both countries urgently need U.S. aid to defend themselves against brazen adversaries that seek their annihilation.
By Joe Biden
April 17, 2024 9:05 am ET


Iran launched an unprecedented attack against Israel this weekend, with a barrage of missiles and drones. Around the same time, some 1,500 miles north, Russia continued its bombardment of Ukraine, which has intensified dramatically in the last month.

Both Ukraine and Israel defended themselves against these attacks, holding the line and protecting their citizens. And both did it with critical help from the U.S.

Now is not the time to abandon our friends. The House must pass urgent national-security legislation for Ukraine and Israel, as well as desperately needed humanitarian aid for Palestinians in Gaza.

In this third year of Russia’s war, Ukraine continues to defy the odds. Against a much larger military, the Ukrainians regained more than half the territory that Russia occupied after its 2022 invasion. They’ve struck the Russian navy time and again, winning important victories in the Black Sea. And they’ve developed innovative weapons, especially drones, to counter Russian forces. Theirs is a fighting force with the will and the skill to win.

Meanwhile, as we saw this weekend, Israel’s military has the technology and training to defend the country against even an attack of unprecedented scope and ferocity.

But while both countries can capably defend their own sovereignty, they depend on American assistance, including weaponry, to do it. And this is a pivotal moment.

Vladimir Putin is ramping up his onslaught with help from his friends. China is providing Russia with microelectronics and other equipment that is critical for defense production. Iran is sending hundreds of drones; North Korea is providing artillery and ballistic missiles. Ukraine, facing ammunition shortfalls, is losing hold of territory it had regained.

After years of backing Hezbollah, Hamas and other proxies in their attacks on Israel, including Hamas’s brutal attack on Oct. 7, Iran launched a direct attack of its own—hoping to penetrate Israel’s air defense, including David’s Sling and the Iron Dome, which saved countless lives this weekend.

Both Ukraine and Israel are under attack by brazen adversaries that seek their annihilation. Mr. Putin wants to subjugate the people of Ukraine and absorb their nation into a new Russian empire. The government of Iran wants to destroy Israel forever—wiping the world’s only Jewish state off the map.

America must never accept either outcome—not only because we stand up for our friends, but because our security is on the line, too.

If Russia triumphs, Mr. Putin’s forces will move closer than ever to our North Atlantic Treaty Organization allies. “An attack on one is an attack on all” means that if Mr. Putin invades a NATO ally, we will come to its aid—as our NATO allies did for us after the Sept. 11 attacks. We should surge support to Ukraine now, to stop Mr. Putin from encroaching on our NATO allies and ensure that he doesn’t draw U.S. troops into a future war in Europe.

Likewise, if Iran succeeds in significantly escalating its assault on Israel, the U.S. could be drawn in. Israel is our strongest partner in the Middle East; it’s unthinkable that we would stand by if its defenses were weakened and Iran was able to carry out the destruction it intended this weekend. We can make that outcome less likely by replenishing Israel’s air defenses and providing military aid now, so its defenses can remain fully stocked and ready.

If Congress passes military aid for Ukraine and Israel, we won’t write blank checks. We’d send military equipment from our own stockpiles, then use the money authorized by Congress to replenish those stockpiles—by buying from American suppliers. That includes Patriot missiles made in Arizona, Javelin missiles made in Alabama, and artillery shells made in Pennsylvania, Ohio and Texas. We’d be investing in America’s industrial base, buying American products made by American workers, supporting jobs in nearly 40 states, and strengthening our own national security. We’d help our friends while helping ourselves.

I’ve been clear about my concerns over the safety of civilians in Gaza amid the war with Hamas, but this aid package is focused on Israel’s long-term defensive needs to ensure it can maintain its military edge against Iran or any other adversary. Importantly, this bill has funding that will allow us to continue delivering urgent humanitarian aid for the people of Gaza as well as others who have felt the impact of conflicts around the world.

It’s a strong and sensible plan. It shouldn’t be held hostage any longer by a small group of extreme Republican House members.

Mr. Putin has tried relentlessly to break the will of the Ukrainian people. He has failed. Now he’s trying to break the will of the West. We cannot let him succeed.

There are moments in history that call for leadership and courage. This is one of them.

Mr. Biden is president of the United States.

Advertisement


37
Politics & Religion / GPF: Japan-AUKUS
« on: April 17, 2024, 09:43:08 AM »
April 17, 2024
View On Website
Open as PDF

Is Japan the Next AUKUS Member?
Washington’s push for Tokyo engagement shows a strategic focus.
By: Ronan Wordsworth
The partnership comprising Australia, the United Kingdom and the United States known as AUKUS is intended to be among the most closely integrated national security alliances of its kind. It’s no surprise, then, that when the U.S. ambassador to Tokyo floated the idea last week of adding Japan to the grouping, it caused quite a stir. Australia’s prime minister has since downplayed the suggestion, saying there will be no new AUKUS members, but Japan nonetheless seems to have already developed a special relationship with the group.

AUKUS was first announced in September 2021 as a direct response to the threat its members believe China poses to their respective national securities and collective regional dominance. (Notably, the group was formed independently of the Five Eyes intelligence-sharing organization, which comprises AUKUS members and Canada and New Zealand.) The first phase of the partnership is to provide Australia with conventionally armed, nuclear-powered attack submarines – the first time such technologies are being shared with a non-nuclear state. These submarines are far more advanced than the traditional diesel-powered ones, can travel underwater for far longer and give off no audio signature. They will be developed trilaterally, based on a next-generation British design that incorporates technology from all three nations, including cutting-edge U.S. submarine technologies, demonstrating the collaboration between the partners of the most important military technology secrets.

The second phase – the one in which Japan was proposed to join – supports a much tighter integration of the three allies' armed forces. This includes collaboration on developing emerging technologies including undersea capabilities, quantum technologies, artificial intelligence, advanced cyber capabilities, hypersonic and counter-hypersonic weapons, electronic warfare capabilities, combined innovation, and information and knowledge sharing. And because these applications depend on the utmost secrecy, they can be shared only with the most reliable allies – a point Australia and the U.K. have repeatedly made.

Japan is not the first U.S. ally to consider or be considered for closer integration with the AUKUS partnership. New Zealand, Canada and some unspecified European countries are all reportedly in talks about potential areas of collaboration. But Japan appears to be the preferred candidate, and Washington has even reportedly considered formalizing bilateral cooperation between AUKUS and Tokyo. To be sure, Japan can offer advanced technological capabilities that would have useful military applications. As important, it has become more assertive in regional security over the past few years. Whereas Tokyo’s only real security ally until recently was Washington, Japan has more overtly tried to build stronger relationships with traditional U.S. allies and has openly competed with China in the Asia-Pacific. Japan has also slowly revitalized its defense industry so that it can more actively participate in regional affairs and even export arms. During a recent trip to Washington, Japanese Prime Minister Fumio Kishida signed several defense agreements, among them a trilateral deal that includes the Philippines, which, like Japan, has been an important component in American efforts to hem in China. Japan, the U.S. and Australia also signed an agreement on a joint air defense strategy to counter “growing air and missile threats.”

Yet neither London nor Canberra are sold on Japanese membership. They have expressed concerns over information security in Japan that could put at risk the technological secrets that are being developed. Japan’s cybersecurity defenses are still in their infancy, and despite promises to develop the sector further and introduce legislation allowing proactive combat of cyber threats, its security architecture and background checks are still relatively immature. Australia and the U.K. have also said advancements are needed within the current AUKUS information-sharing process before new members can be considered.

At its core, AUKUS was designed to deter and contain China. The development of Australian submarines and the integration of intelligence and military technology help to accomplish that goal. Bringing Japan into the fold, however modestly, could do the same – even if Washington is the only one advocating its inclusion. That advocacy says a lot about U.S. priorities going forward, especially if it means Washington sees Tokyo as an ally on par with Canberra and London.

Japan is unlikely to officially join AUKUS anytime soon, but even if it never does, the talks around its accession and the flurry of agreements signed over the past year with Washington, the Philippines, South Korea and Australia clearly indicate the stock that has been placed in developing the relationship.

38
Politics & Religion / Re: The Surveillance/Omnipotent State
« on: April 17, 2024, 09:24:47 AM »
https://cointelegraph.com/news/nsa-days-from-taking-over-internet-whistleblower-edward-snowden

A very savvy tech friend responds:

"No. Also Snowden lives in a house paid for by Putin and has security from Putin.  He is guy responsible for maybe 200 cia deaths from the documents he stole and then passed to China/Russia which led to multiple networks being revealed and the people killed.  So I always take any article like this quoting him with a big piece of kosher salt."

That said the part about seizing servers etc seems both plausible and frightening.

40
Politics & Religion / WSJ: The 4th is not in jeopardy
« on: April 17, 2024, 08:33:57 AM »

The Fourth Amendment Isn’t in Jeopardy
A bill headed for a House vote would harm U.S. intelligence and law enforcement with little impact on privacy.
By
The Editorial Board
Follow
April 16, 2024 5:34 pm ET



There is no shortage of bad ideas in Congress, and too many have a chance to become law these days. An example is the Fourth Amendment Is Not For Sale Act, which would prohibit the U.S. government from buying digital information that would remain available to the likes of China and Russia.

The bill, scheduled for a House vote on Wednesday, would ban the government from buying information on Americans from data brokers. This would include many things in the cloud of digital exhaust most Americans leave behind online, from information on the websites they visit to credit-card information, health information and political opinions.

Our libertarian friends fret that letting the government buy data infringes on the Fourth Amendment’s guarantee against unreasonable searches. But the Supreme Court held in U.S. v Miller (1976) that “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” The Court updated Fourth Amendment law on tracking cellphone location data in Carpenter v. U.S. (2018), but the Not For Sale Act goes much further.

The Justice Department says the bill, sponsored by Rep. Warren Davidson (R., Ohio), would limit the ability of U.S. law enforcement to seek information online that often helps solve federal crimes, including hacks and other malicious digital acts. The bill also bans the purchase of records on Americans’ location information, a change that Justice says would hinder the ability to track missing children, hunt fugitives and investigate criminal networks.

The bill would force U.S. intelligence officials to avoid data that could include information on an American. That’s a burden on tools the Defense Department uses to protect foreign military bases and troops abroad.

In a letter to Judiciary Chairman Jim Jordan and ranking Democrat Jerrold Nadler in December 2023, the Fraternal Order of Police wrote that banning the use of digital information would end law enforcement’s access to “tools that generate leads into crucial and often complex cases.” The National Sheriffs Association says the proposal “empowers the cartels.”

The bill’s co-sponsors include voices on the extremes of both parties, including Rep. Andy Biggs (R., Ariz.) and Democrats Pramila Jayapal (D., Wash.) and Mr. Nadler. Let’s hope the sensible center prevails on this one.

46
Politics & Religion / FO: Possible sabotage of ammo plant?
« on: April 16, 2024, 06:34:56 PM »
(4) SCRANTON ARMY AMMO PLANT CATCHES FIRE: Local authorities are investigating a fire at the Scranton Army Ammunition Plant in Scranton, PA, that broke out yesterday and said the extent of damage is unknown at this point.

The Scranton plant is the only manufacturer in the U.S. of 105mm and 155mm shell casings for the U.S. military.

Why It Matters: There is no information yet on the cause of the fire, and the base case is likely an accident. However, the Scranton plant presents a target of opportunity for foreign adversaries or domestic far left radicals who called for disrupting U.S. defense contractors and defense logistics. The contraction of the U.S. defense industrial base created choke points in the U.S. defense supply chain, allowing single points of failure to have a potentially outsized impact on U.S. national security. – R.C.

48
Politics & Religion / FO: NIST overwhelmed
« on: April 16, 2024, 04:39:23 PM »
(2) FEDERAL AGENCY OVERWHELMED BY CYBER VULNERABILITY REPORTS: The National Institute of Standards and Technology (NIST) said the agency will temporarily pause the National Vulnerability Database (NVD) to “regroup and reprioritize” because the agency is being overwhelmed with software vulnerability reports.

Censys researcher Emily Austin said security professionals across disciplines and organizations rely on the NVD, and they are at a major disadvantage due to issues with the database.

FBI Director Christopher Wray told the American Bar Association’s Law and National Security Committee last week that state-linked hacking groups are ramping up threat activity against the United States.

Why It Matters: NIST covers a broader spectrum of cybersecurity threats than the Cybersecurity and Infrastructure Security Agency (CISA), and is overwhelmed by reports on software vulnerabilities at the same time foreign adversaries are increasing cyberattacks against U.S. critical infrastructure. According to reports from industry groups, there were 420 million cyber incidents in 2023, a 30% jump from 2022, and about one-third of all attacks targeted operational technology in the industry and the energy sector. – R.C.

49
(1) HOUSE PASSES FISA RENEWAL WITHOUT WARRANT REFORM: The House passed the Foreign Intelligence Surveillance Act (FISA) Section 702 renewal bill in a 273-147 vote on Friday, 12 April.

The amendment to add a warrant requirement for Section 702 database searches of American citizens’ data was defeated in a 212-212 vote after House Speaker Mike Johnson (R-LA) voted to break the tie.

“I will do everything in my power to stop this bill” when it reaches the senate, Senator Ron Wyden (D-OR) said. Wyden added, “The House bill represents one of the most dramatic and terrifying expansions of government surveillance authority in history.”

Why It Matters: Republican lawmakers who voted against the warrant reform amendment argue that a warrant requirement would undermine national security by slowing the process of collecting and analyzing data on foreign threats. However, the warrant requirement would have only applied to Section 702 database searches targeting Americans. The bill now moves to the Senate, which is likely to face bipartisan opposition ahead of the Friday deadline when Section 702 authorities lapse. – R.C.

Pages: [1] 2 3 ... 1241