Author Topic: FBI Follies, Entrapment Attempts, & Stasi-Like Schemes (CIA too)  (Read 2455 times)

Body-by-Guinness

  • Power User
  • ***
  • Posts: 1877
    • View Profile
This could likely be folded into an existing thread, but I’d like to start cataloging FBI-specific malfeasance as, it seems to me, they have morphed into a champions of the status quo as preferred by the Democratic Party, an organ of the Deep State, and generally an agency that regularly violates constitutional protections to political ends, as this piece demonstrates.

https://www.realclearinvestigations.com/articles/2024/01/03/the_fbi-tainted_whitmer_kidnap_plot_youve_heard_next_to_nothing_about_1001971.html

If anyone is aware of other posts re FBI malfeasance please pass ‘em on so I can add a link to ‘em here.
« Last Edit: April 09, 2024, 06:02:58 PM by Crafty_Dog »

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile
Re: FBI Follies, Entrapment Attempts, & Stasi-Like Schemes
« Reply #1 on: January 03, 2024, 08:58:47 AM »
I get your logic, but does this thread serve your purposes?

https://firehydrantoffreedom.com/index.php?topic=2385.msg69227#msg69227

BTW, nice find!

Body-by-Guinness

  • Power User
  • ***
  • Posts: 1877
    • View Profile
Re: FBI Follies, Entrapment Attempts, & Stasi-Like Schemes
« Reply #2 on: January 03, 2024, 12:10:37 PM »
I get your logic, but does this thread serve your purposes?

https://firehydrantoffreedom.com/index.php?topic=2385.msg69227#msg69227

BTW, nice find!

I'm seeing the FBI's heavy hand immersed in all sorts of various un-American efforts and so was hoping to develop a standalone compilation, but will certainly abide by the preferences of our esteemed global moderator....

Body-by-Guinness

  • Power User
  • ***
  • Posts: 1877
    • View Profile
Re: FBI Follies, Entrapment Attempts, & Stasi-Like Schemes
« Reply #3 on: January 03, 2024, 12:44:14 PM »
An aside: while laid up with my various medical travails I spent a lot of time checking out the offerings of various streaming services, which quickly latched on to my shoot-‘em-up predilections and started suggesting various TV shows, many of which had the term “FBI” in the title or subtitle. Indeed, there were so many I started counting ‘em and think I found close to two dozen across various services

This stuff doesn’t happen by accident. Sure, there are plenty of shows that introduce the FBI in a less than flattering light, but they don’t tend to have the term “FBI” in the title. Those that do tend to cast a positive light on this org. Indeed, I came to conclude there has to be some sort of effort out there to present FBI case files and fictional treatments thereof in a positive light. I’m willing to bet, in short, that somewhere in the bowels of some FBI edifice are some Hollywood types devoted to assisting and promoting series that present the agency in a positive light.

So we have a federal agency that recent events cast as a keeper of the Deep State status quo, one that appears to relentlessly self-promote via all these gee-whiz TV shows, a set of circumstances that, if I’m guessing correctly, give me the creeps. What could possibly go wrong with an agency with snoop powers the KGB, Stasi and the like could only dream of, one that time and again has defaulted to behaviors that support political ends of the Progressive side of the Democratic Party, that then seeks to airbrush their tainted reputation—they’ve had a lot of huge gaffes over the years from tainted crime labs to tainted agents—via a relentless barrage of aggrandizing propaganda?

Bottom line I suspect there are dots to be connected here, hence this effort to aggregate accounts of FBI misbehavior. 

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile
Re: FBI Follies, Entrapment Attempts, & Stasi-Like Schemes
« Reply #4 on: January 03, 2024, 02:37:10 PM »
Well, my concern is that we already have quite the volume of threads of fairly substantial specificity-- which often traps me into playing thread nazi haha.

For what it sounds like what you want to accomplish, may I suggest that you cull through the various material of FBI malfeasance on that thread and file them for your personal use as you see fit?

Body-by-Guinness

  • Power User
  • ***
  • Posts: 1877
    • View Profile
Re: FBI Follies, Entrapment Attempts, & Stasi-Like Schemes
« Reply #5 on: January 03, 2024, 03:02:36 PM »
Well, my concern is that we already have quite the volume of threads of fairly substantial specificity-- which often traps me into playing thread nazi haha.

For what it sounds like what you want to accomplish, may I suggest that you cull through the various material of FBI malfeasance on that thread and file them for your personal use as you see fit?

Well sure, assuming I can find them, which is why I was seeking a place to aggregate as, given the FBI’s role in the false Trump is a Russian stooge claims, FISA falsehoods and all the attendant constitutional questions arising there, various entrapment schemes (back in the day GM and I were at odds re several septuagenarians or something in Missouri or somewhere that got sucked into something similar I’ve since had trouble finding info regarding on the outcomes front), the FBI’s entanglements in the various impeachment boondoggles, this Michigan stuff, J6, et al there would seem to be a fair amount of material that’s out there, yet unassembled and hence not viewed in a manner where commonalities, patterns, players, etc. can be compared and commented on.

Then again a dime will get you a dollar if there ISN’T some federal stooge already tracking things here and noodling on some means to use it as a means of career advancement guised as legit law enforcement, applied in a one-sided manner albeit. Perhaps a thread thumbing its nose at the utter hypocrisy of it all might prove to be more than such a creature could bear….

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile
Re: FBI Follies, Entrapment Attempts, & Stasi-Like Schemes
« Reply #6 on: January 03, 2024, 03:19:35 PM »
Well, you seem to have a sense of mission here so go for it on the condition that you double post them on the War on the Rule of Law thread as well  :-)


Body-by-Guinness

  • Power User
  • ***
  • Posts: 1877
    • View Profile
Re: FBI Follies, Entrapment Attempts, & Stasi-Like Schemes
« Reply #8 on: January 03, 2024, 07:15:35 PM »
Well, you seem to have a sense of mission here so go for it on the condition that you double post them on the War on the Rule of Law thread as well  :-)

I certainly am annoyed that a putative premier law enforcement agency so often ends up with its tit in a wringer with few in the media connecting those dots. But yes, I’ll cross post.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile
Comer fundraiser email
« Reply #9 on: January 05, 2024, 12:51:38 PM »

Marc,

 

Just a year ago, it was unfathomable to me that I would be writing this email. It’s a bit long, but I would ask you to read it in its entirety. I spent a lot of time writing it and did my best to make every word count.

 

I write it with great sadness and astonishment, sadness for our country which I hold so dear, and astonishment at Joe Biden’s desecration of the Oath of Office he took with his hand on the Bible in front of the world.

 

It has come to light that the Federal Bureau of Investigation has had 40 informants inside the Biden family over the past 15 years.

 

For 15 years, Credible Informants have been providing criminal information against the Biden’s to FBI Field Offices across the country, and for 15 years, everytime the information has been brought to FBI HQ, the leadership of the FBI shuts it down.

 

But it’s not just the FBI, it’s the Department of Justice as well.

 

I just heard sworn witness testimony that the Biden Bribery allegations on the FD-1023 Form were CREDIBLE, and that he referred the criminal matters originating from it to three separate U.S. Attorney’s offices in Brooklyn, Manhattan and Delaware for further investigation.

 

Then, just like at the FBI, nothing happened.

 

As I’ve been saying since I started this investigation; the allegations about Joe Biden are being covered up… because they are TRUE!

 

While words don’t have any meaning to the Left, they still mean something to me and the law in this country.

 

CONSPIRACY NOUN

con·spir·a·cy

An agreement between two or more people to commit an illegal act, along with an intent to achieve the agreement's goal.

 

The media loves to talk about how Republicans believe in “conspiracy theories” like the Russian-Collusion Hoax, the origins of COVID, and the Steele-Dossier… but they sure have been silent about the conspiracy at the highest levels of government to cover up the expansive criminal operation being run by the Biden Crime Family.

DEFEND COMER
It’s because they are complicit in the cover-up. I’ve said it before, and it’s more true today than ever before; I am facing down and exposing the rotten corruption of the most powerful and unholy triumvirate in American history, the Biden Family, the Federal Bureaucracy, and the Corporate Media.

 

They are hellbent on stopping my investigation and they are throwing everything they have at me.

 

I’ll be honest, it is brutal… but I’m a country boy from West Kentucky who was taught to stand up for what’s right, and who certainly doesn’t back down from a fight.

DEFEND COMER
I’ve only been able to weather the attacks with the support of patriotic Americans across the country, and I’m once again asking for your help to defend my good name as I delve deeper into the belly of the corrupt beast that is ravaging our country: THE BIDEN CRIME FAMILY.


As Theodore Roosevelt said “Nothing worth having is easy” and having an honest government free of corruption is not just worth having, it’s the promise of America to all of her citizens.


If you’re with me, I’d be honored to have your support.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile
second

Jack Smith is no straight shooter: It's no secret that Trump special prosecutor Jack Smith is a zealot. Indeed, as we noted earlier this week, he's both unscrupulous and unconstitutional. After all, it's not every lawyer who can boast that his legal tactics have been unanimously rebuked by the U.S. Supreme Court. More evidence of Smith's anti-Republican bias came to light this week when, as Fox News reports, we learned that one of his top prosecutors, Ray Hulser, "discouraged the FBI from pursuing an investigation into the Clinton Foundation in 2016 due to what he viewed as negligible evidence, despite multiple Suspicious Activity Reports (SARs) related to hundreds of thousands of dollars in foreign transactions." According to the Durham report, three separate FBI field offices had opened investigations into the Clinton Foundation for possible criminal activity back in 2016, but, well, nothing to see here. Move along. And we trust this guy, Jack Smith, to give Donald Trump a fair shake?

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile
FBI and phones 2006
« Reply #13 on: January 09, 2024, 10:56:15 AM »

Body-by-Guinness

  • Power User
  • ***
  • Posts: 1877
    • View Profile
Re: FBI and phones 2006
« Reply #14 on: January 09, 2024, 03:21:01 PM »
second

https://firehydrantoffreedom.com/index.php?topic=1093.msg8479#msg8479

Thanks Marc.

At some point I will type in “FBI” as a search term here and see what all comes up, but with a semester about to start that’s not gonna happen anytime soon.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile
WSJ From 2021
« Reply #15 on: January 11, 2024, 06:19:48 AM »
The FBI’s Other Secret Warrant Abuses
More evidence that the bureau abuses the FISA court process.


By
The Editorial Board
Oct. 5, 2021 6:53 pm ET

Congress has failed to reform federal surveillance laws, despite the FBI’s 2016 abuse of a secret court to spy on the Trump presidential campaign. The latest report from Justice Department Inspector General Michael Horowitz on the FBI’s other surveillance abuses is more evidence of the need to overhaul the Foreign Intelligence Surveillance Act.

Mr. Horowitz’s 2019 report found the FBI had gulled the FISA court into letting it spy on former Trump aide Carter Page by presenting false information. The scandal inspired the Horowitz team to conduct a broader audit of FBI compliance, and the results are damning.


The FBI must abide by what are known as Woods Procedures that include a file supporting every factual assertion in a warrant application. As the IG notes, surveillance warrants are among the Justice Department’s “most intrusive investigative authorities” and must be “scrupulously accurate.”

The IG’s preliminary look last year into a sample of 29 wiretap applications said the FBI couldn’t locate Woods files for four applications, and the IG found errors in the remaining 25. As last week’s full report explains, the FBI and Justice have since acknowledged the 29 applications contained a total of 209 errors. These range from typographical (38) and date (42) errors, to unsupported facts (17), misidentified sources of information (15), and deviations from source documents (93).


The IG also found 209 examples in the 29 applications of the FBI failing to provide “adequate documentation to support factual assertions.” In all “there were over 400 instances of non-compliance with the Woods Procedures.”

Most alarming are the four errors that DOJ and the FBI admit were “material”—serious enough to have potentially changed the FISA court’s determination of “probable cause” to issue a warrant. The errors related to three applications in which the FBI omitted important or relevant information about targets, or provided outdated or unverified facts.

In response to the IG’s preliminary findings last year, the FBI reviewed more than 7,000 FISA applications from January 2015 to March 2020, and the IG reports that for 183 of them “the required Woods File was missing, destroyed, or incomplete.” This is supposed to be America’s premier law-enforcement body.

The IG criticizes an FBI culture that believes it is above the rules, and he devotes an entire section to spanking its leadership for its reaction to the 2020 preliminary findings. While FBI director Christopher Wray instituted some reforms, the agency minimized the findings with statements that “appeared to display a tolerance for error.”

No one has taken responsibility—including Mr. Wray, on whose watch many of these mistakes happened. He has proposed more reforms to the very (Woods) reforms instituted 20 years ago to improve FBI behavior. Sure.

Introducing the Constitution’s independent Article III judges into intelligence collection in the executive branch was always a mistake, as we wrote in the 1970s. The system dilutes accountability for wiretaps, letting the court and FBI blame each other for mistakes and political abuses like those in 2016.

Congress should abolish the FISA court and return authority to the law enforcement leaders making surveillance decisions. Then hold them accountable, including jail time for abuses.




Body-by-Guinness

  • Power User
  • ***
  • Posts: 1877
    • View Profile
Carr Runs Down FBI
« Reply #19 on: January 29, 2024, 06:38:04 AM »
Howie Carr slaps around some federal bitches and incompetents:

https://www.bostonherald.com/2024/01/27/howie-carr-this-is-your-fbi-thanks-to-dei/

Body-by-Guinness

  • Power User
  • ***
  • Posts: 1877
    • View Profile
Some Old Ones
« Reply #20 on: January 29, 2024, 06:04:39 PM »
Marc suggested I use Qwant for a search engine. Plunked in “FBI entrapment cases) as I did before in DuckDuckGo, and got far more early returns, including this one:

https://www.theguardian.com/world/2011/nov/16/fbi-entrapment-fake-terror-plots

ETA: a couple more:

https://www.washingtontimes.com/news/2022/sep/22/fbi-whistleblower-counterterrorism-cases-against-a/

https://theintercept.com/2023/06/15/fbi-undercover-isis-teenager-terrorist/

I’m digging Qwant.
« Last Edit: January 29, 2024, 06:14:31 PM by Body-by-Guinness »

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile
Re: FBI Follies, Entrapment Attempts, & Stasi-Like Schemes
« Reply #21 on: January 29, 2024, 06:50:11 PM »
 8-) 8-) 8-)

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile
WSJ: Ninth Circuit spanks FBI
« Reply #22 on: February 08, 2024, 03:18:16 AM »
A Spanking for the FBI
The Ninth Circuit rebukes the bureau for a lawless search and seizure.
By The Editorial Board
Feb. 7, 2024 6:36 pm ET




In 2021 the FBI raided a private safe-deposit company and seized more than $86 million in cash and valuables from people accused of no wrongdoing. At the time we called this a dangerous violation of their constitutional rights. It took three years, but a three-judge panel of the Ninth Circuit Court of Appeals has agreed.


U.S. Private Vaults was a private business in Beverly Hills the government was investigating for money laundering and other things. The FBI had a warrant, but this didn’t authorize a search of individual safe deposit boxes. Agents were supposed to open the boxes only to identify owners and safeguard their property until it could be returned.

But the FBI overstepped, seizing the property of innocents along with criminals. As the Ninth Circuit noted, one of U.S. Private Vaults’s selling points was not asking customers too many questions—e.g., demanding a Social Security number—which made it attractive to drug dealers and other criminals. But that’s still no excuse for the FBI to overstep its authority and then invoke civil forfeiture to keep everything it found worth more than $5,000, all without charging anyone with a crime. A group of seven safe-deposit renters sued in what became a class action, represented by the Institute for Justice.

The district court found for the government, but the Ninth Circuit has now reversed. Judge Milan Smith Jr., said the government had opened the door to the “limitless searches of an individual’s personal belongings” that the British used in colonial America. This, the judge noted, “led to the adoption of the Fourth Amendment” and its protection against “unreasonable searches and seizures.”

If the FBI has evidence of something illegal, it can get a warrant. But the Ninth Circuit ruling is a welcome reminder that the government can’t go on a fishing expedition that snares the innocent with the guilty.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile
Feds bust Tennessee man
« Reply #23 on: February 08, 2024, 04:52:18 AM »

Tennessee man who was working with militias planned to act as a sniper and attack Southern border, feds say
Paul Faye was arrested Monday after he allegedly sold an undercover agent working with the FBI an unregistered suppressor for an AK-47, according to federal court records.
Read in NBC News: https://apple.news/AM6mfhQMpTRGUhhPxOKZDhA

Jesse Waters ranted on this last night.


Body-by-Guinness

  • Power User
  • ***
  • Posts: 1877
    • View Profile
Re: Feds bust Tennessee man
« Reply #24 on: February 08, 2024, 07:10:20 AM »

Tennessee man who was working with militias planned to act as a sniper and attack Southern border, feds say
Paul Faye was arrested Monday after he allegedly sold an undercover agent working with the FBI an unregistered suppressor for an AK-47, according to federal court records.
Read in NBC News: https://apple.news/AM6mfhQMpTRGUhhPxOKZDhA

Jesse Waters ranted on this last night.
It'll be interesting to see what drips out here. I'd bet big money some sort of FBI informant was whispering in this guy's ear.

Again, be careful should someone start nudging you to commit, or talk about committing, a crime. It's clear to me the FBI is more about knocking down bowling pins they or people they work with have stood up at the end of the aisle. Don't be one of those pins.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile
Re: FBI Follies, Entrapment Attempts, & Stasi-Like Schemes
« Reply #25 on: February 08, 2024, 02:25:33 PM »
Can someone here track down Jesse's segment last night on this?

Body-by-Guinness

  • Power User
  • ***
  • Posts: 1877
    • View Profile
Re: FBI Follies, Entrapment Attempts, & Stasi-Like Schemes
« Reply #26 on: February 08, 2024, 03:49:12 PM »
Can someone here track down Jesse's segment last night on this?
\

My info junkie failings will be revealed: who is Jesse?

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile
Re: FBI Follies, Entrapment Attempts, & Stasi-Like Schemes
« Reply #27 on: February 08, 2024, 05:52:53 PM »
Jesse Waters on FOX at 8 PM

Body-by-Guinness

  • Power User
  • ***
  • Posts: 1877
    • View Profile
Re: FBI Follies, Entrapment Attempts, & Stasi-Like Schemes
« Reply #28 on: February 08, 2024, 07:58:17 PM »
Jesse Waters on FOX at 8 PM
I was worried you were alluding to Ventura, in which case I was gonna suggest you take some of whatever hapless Joe is taking.

And hope it does a better job for you.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile
Re: FBI Follies, Entrapment Attempts, & Stasi-Like Schemes
« Reply #29 on: February 08, 2024, 08:08:44 PM »
 :-D

Body-by-Guinness

  • Power User
  • ***
  • Posts: 1877
    • View Profile
FBI Informants: They are Whatever is Useful for the Deep State (Smirnov)
« Reply #30 on: February 23, 2024, 08:15:22 AM »
So a 13-year FBI "trusted informant" turns into a fabulist the moment it is politically useful ... for Democrats and the Deep State, as synonymous as those two terms are, while the MSM buries the lede:

https://archive.is/Y9iHg

Links to a WSJ opinion piece.
« Last Edit: February 23, 2024, 11:25:31 AM by Crafty_Dog »

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile
Re: FBI Follies, Entrapment Attempts, & Stasi-Like Schemes
« Reply #31 on: February 23, 2024, 11:26:27 AM »
Nice save on that WSJ piece.   Worth posting on the Deep State thread to save for posterity additionally.



Body-by-Guinness

  • Power User
  • ***
  • Posts: 1877
    • View Profile
Michigan Entrapment Follies
« Reply #34 on: March 07, 2024, 06:14:39 AM »
This one has it all, just about every unscrupulous tactic and willingness to turn a blind eye to certain crimes this thread is devoted to. The FBI's willingness to service the political need of the moment as well as the narrative foisted by the left are demonstrated throughout:

https://theintercept.com/2024/03/06/gretchen-whitmer-kidnapping-informant/


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile
Should FBI be on its own most wanted list
« Reply #35 on: March 11, 2024, 01:56:56 PM »

Body-by-Guinness

  • Power User
  • ***
  • Posts: 1877
    • View Profile
It’s Risky to Tell Whopping Lies on Social Media
« Reply #36 on: April 01, 2024, 04:33:44 AM »
Director Wray testifies that the FBI abides by all legal requirements as he testifies in support of 702, the surveillance regimen that replaced the Patriot Act. Social media jumps in can corrects his lies:

https://townhall.com/tipsheet/mattvespa/2024/03/30/this-fbi-tweet-just-got-nuked-by-community-notes-n2637139?fbclid=IwAR1rh92TQfrLdYL1uMripGsKJmOWd83oS9PRaDLo7V4rVnWzcQ-l_QVkXuY


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 69338
    • View Profile
JW: FBI and Ashli Babbit
« Reply #38 on: April 13, 2024, 07:17:59 AM »
OUTRAGE: FBI Records Reveal Posthumous Criminal Investigation of Ashli Babbitt

I was astonished when I learned the details of the 62 pages of records Judicial Watch extracted from the Justice Department showing that the FBI opened a criminal investigation of Air Force veteran Ashli Babbitt after her killing and listed four “potential violations of federal law,” including felony rioting and civil disorder.

It is beyond belief that the Biden FBI gave Babbitt’s killer a free pass while engaging in a malicious months-long “criminal” investigation of Babbitt herself.

The records were produced in our Freedom of Information Act (FOIA) lawsuit against the Justice Department and FBI for records related to the death of Ashli Babbitt (Judicial Watch v. U.S. Department of Justice (No. 1:21-cv-02462)).

These records may also be responsive to a recent FOIA suit for the family for FBI files and potentially related to the $30 million wrongful death lawsuit we brought on behalf of the Babbitt family.

The unarmed Babbitt was shot and killed as she climbed into a broken interior window in the United States Capitol. The identity of the shooter was kept secret by Congress, the Justice Department, and DC police for eight months until former U.S. Capitol Police Lt. Michael Byrd went public to try to defend his killing of Babbitt.

The newly obtained records include a January 14, 2021, Electronic Communication indicating that eight days after Babbitt’s death, under “Case ID#: 176-SD-3367083 (U) Ashli Elizabeth Babbitt,” a posthumous investigation was initiated from San Diego, California:
Details:

Captioned investigation is being initiated based on photographic and video evidence that Ashli Elizabeth Babbitt unlawfully entered the United States Capitol Building, a Restricted Building, on 6 January 2021, in violation of federal laws to include violations of 18 U.S.C. Section 1752 and 40 U.S.C. Section 5104.

CDC [Chief Division Counsel] Approval

Field Office CDC has reviewed and concurred with the opening of this investigation. The investigation will be reviewed by the CDC at least semi-annually.

Summary of Predication:

***
Babbitt was fatally shot by police as she attempted to leap through the broken window of a door inside the Capitol…

Potential Violations of Federal Law:

Potential violations of federal criminal statutes include:

Title 18 U.S.C 231 Civil Disorder
Title 18 U.S.C 1752(a) Unlawful Entry - Restricted Building or Grounds
Title 18 U.S.C 2101 - Riots
Title 40 U.S.C 5104 - Injuries to property
(U) It is therefore requested that a [redacted] case be opened and assigned to Special Agent [Redacted]


A January 7, 2021, Electronic Communication regarding Babbitt following her shooting death the previous day reports that during the protests two “subjects” were shot at the Capitol that day:
Multiple officers were injured during the incident and two subjects were shot, with one fatal injury…. Ashli Elizabeth Babbitt, a San Diego resident, was present in D.C. on January 6, 2021, and entered the United States Capitol building where she was fatally shot. Babbitt was an Air Force veteran.

An FBI Interview Report Form FD-302 dated April 23, 2021, indicates FBI agents interviewed a witness by telephone on April 15 who provided background information on Babbitt:
In 2008, Babbitt transitioned to the Air Force Reserve at Sheppard Air Force Base but continued to serve on active duty orders. In 2009, [Redacted] and Babbitt [redacted] where Babbitt continued to serve out the remainder of her career in either the Reserves of Air National Guard at Andrews Air Force Base. At one point Babbitt transitioned Military Occupational Specialties to serve as a mechanic, but ultimately returned to Security Forces. According to [Redacted] Babbitt was excellent at her job and [redacted].

Babbitt deployed several times throughout her service. In 2005, Babbitt deployed to Manas Air Base in Kyrgyzstan. In 2006, Babbitt was deployed to Camp Bucca in southern Iraq which served as a Theater Internment facility. In approximately 2012-2014, Babbitt deployed to the United Arab Emirates. Babbit did not suffer any physical or mental injuries stemming from her deployments and [redacted]. While stationed in Alaska, Babbitt did suffer from a torn meniscus [a common knee injury] which had occurred while she was previously stationed in Texas. While deployed to Camp Bucca, Babbitt did fly to Camp Arifjan in Kuwait [redacted].

[Redacted] characterized Babbitt as very outgoing, opinionated, loud, very intelligent, loyal, sweet, very loving and caring. At times, Babbitt was not a fan of her chain of command and made her views known. Babbitt was a leader rather than a follower and liked being her own boss. Consequently, she was happy running her pool company in California. Babbitt loved her family and loved her country.

***
[Redacted] judged that she likely did not know the risk of passing through the window. Babbitt would never “go after someone physically” according to [redacted].

[Redacted] was not aware of Babbitt’s political views as she was not political [redacted]. [Redacted] did know that Babbitt had voted for President Obama. [Redacted] did not know if Babbitt belonged to any political groups or organizations. [Redacted] was frustrated by media portrayals of Babbitt as being associated with white nationalists, which was not accurate.

A January 19, 2021, entry into the file indicates that two people were shot at the Capitol on January 6: “Multiple officers were injured during the incident and two subjects were shot, with one fatal injury.”

A separate record dated January 19 indicates that “information from a public tip” was submitted to the FBI related to Babbitt that was submitted through the fbi.gov/uscapitol online portal. The description of the information submitted is redacted.

A January 20 record regarding a “public tip” is titled “Upload of Digital Media Report,” however, the substance of the report is redacted.

A report dated January 21 indicates a tip had been submitted to the FBI’s web portal, but the information is redacted.

A January 29 FBI witness interview summary indicates that on January 23, 2021, two FBI agents interviewed an acquaintance of Babbitt, however, the substance of what the witness said is entirely redacted.

An Electronic Communication dated January 29 indicates that FBI agents from the San Diego office interviewed another acquaintance of Babbitt on January 18, but the substance of what that person said is also entirely redacted.

We are extensively investigating the events of January 6.

We recently were pleading in court for the denial of the U.S. Government’s request to transfer the Ashli Babbitt wrongful death lawsuit from California to Washington, DC. Among other legal points, we argue that it would prejudice the case and be unjust for Ashli’s family if it were transferred to the hostile forum of District of Columbia.

In January 2024, we filed a FOIA lawsuit on behalf of Aaron Babbitt and the Ashli Babbitt Estate against the U.S. Department of Justice for all FBI files on Ashli Babbitt.

In October 2023, we received the court-ordered declaration of James W. Joyce, senior counsel in the Office of the General Counsel for the Capitol Police, in which he describes emails among senior officials of the United States Capitol Police in January 2021 that show warnings of possible January 6 protests that could lead to serious disruptions at the U.S. Capitol.

In September 2023, we received records from the Executive Office for United States Attorneys, a component of the Department of Justice, in a FOIA lawsuit that detailed the extensive apparatus the Biden Justice Department set up to investigate and prosecute January 6 protestors.

A previous review of records from that lawsuit highlighted the prosecution declination memorandum documenting the decision not to prosecute U.S. Capitol Police Lt. Michael Byrd for the shooting death of Babbitt.

In January 2023, documents from the Department of the Air Force, Joint Base Andrews, MD, showed U.S. Capitol Police Lieutenant Michael Byrd was housed at taxpayer expense at Joint Base Andrews after he shot and killed U.S. Air Force veteran Ashli Babbitt inside the U.S. Capitol on January 6, 2021.

In November 2021, we released multiple audio, visual and photo records from the DC Metropolitan Police Department about the shooting death of Babbitt on January 6, 2021, in the U.S. Capitol Building. The records included a cell phone video of the shooting and an audio of a brief police interview of the shooter, Byrd.

In October 2021, United States Park Police records related to the January 6, 2021, demonstrations at the U.S. Capitol showed that on the day before the January 6 rally featuring President Trump, U.S. Park Police expected a “large portion” of the attendees to march to the U.S. Capitol and that the FBI was monitoring the January 6 demonstrations, including travel to the events by “subjects of interest.”

Judicial Watch will continue to work to ensure justice for Ashli Babbitt and her family in the months ahead. This latest release detailing FBI abuse of her memory only spurs us on!

Body-by-Guinness

  • Power User
  • ***
  • Posts: 1877
    • View Profile
FBI Interferes w/ Chinese Electoral Interference Investigation
« Reply #39 on: April 18, 2024, 07:04:13 AM »
This could go a number of places, but given that the FBI is threatening the people revealing this apparent Chinese penetration into electoral databases and research center I'm dropping it in. Could this, perchance, reflect a quid for Biden's numerous Chinese pro quos?

Note: these X posts are graphics heavy and hence this piece should be viewed in the oringal, which starts here:

https://x.com/KanekoaTheGreat/status/1666490357469822976

KanekoaTheGreat

@KanekoaTheGreat

KONNECH #1🚨: Evidence shockingly suggests that the FBI is shielding two firms closely tied to the Chinese government, which have financed and developed an American election software company for the past 15 years, all while transferring confidential election data back to China.

2) Konnech has provided election administration and logistics software to many prominent cities and counties in the United States, including: 

•Alameda County, California
•Allegheny County, Pennsylvania
•Contra Costa County, California
•Denver, Colorado
•Detroit, Michigan
•Fairfax County, Virginia
•Hillsborough County, Florida
•Maron County, Indiana
•Los Angeles, California
•San Francisco, California
•Santa Clara County, California
•St. Louis County, Missouri
•Travis County, Texas
•Washington, D.C.

3) On August 13, 2022, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) convened a group of researchers to discuss how the FBI's headquarters had betrayed them following a 15-month investigation into Konnech's storage of American election data on Chinese servers. The data involved various sensitive information, including:

•Name, DOB, SSN, Address
•Phone, Email, Bank Account
•Voting Machine Passwords
•Thumb Drive Passwords
•Voter Registration Rolls
•Provisional Ballot Serial Numbers
•RFID Tags On Voting Equipment
•Election Building Schematics
•And More...

"You'd be startled to know that this server lives on the main Unicom backbone in China. And it's in a Chinese University in Wuhan, China. I'm not talking about this just being a storage place for data process here.

The app server for this particular application was in China... We're confronted with the fact that everything there was to know about elections in America, and in key counties in key cities, was in this server in Wuhan, China... So what do you do with this information?

Well, we went to the FBI because this was a matter of national security. And, they agreed. So, we started working with the local FBI community. From January of 2021 until April of 2022, the FBI opened up a significant counterintelligence operation on this.

The problem with it was that it wasn't just American information. It was Australian information. It was Canadian information, it was Mexican information. And we ultimately found out that the CCPs own elections are on this same server set in that university...

Everyone involved on the counter intelligence teams at the Bureau agreed on one thing, this software, this penetration, and this opening was a significant national security threat...

So two weeks before the 2000 Mules movie came out, I get a call from an agent and he says this has risen now to the level of a national security threat and headquarters has gotten involved. I don't know who he was referring to, but he said two women saw the case differently, and felt as though we were the criminals.

They had instructed the Detroit FBI office to notify Konnech that we had breached their firewalls, none of which is true... We later found out they were accusing me of stealing three servers from the Chinese Unicom backbone and having illegal possession of American private information.

And they were shopping that around to the other agencies that would be involved NSA, CIA and others. Trying to get somebody to pick up on this so that they could come Roger Stone me...

But the challenge we all have is this software is still in place... When you dig into Konnech's CEO Eugene Yu, in particular the other URLs that he owns, it will take you to the underlying URL that runs the Chinese Communist Party's elections.

It lives on that server, on that same URL address and that URL is owned by Eugene Yu."

https://open.ink/konnech

4) In 2002, Konnech CEO Eugene Yu was an "officer" on the "finance committee" of a Chinese foundation that flew Professor Charles Lieber, the head of Harvard’s Chemistry Department, to Zhejiang University to give a speech on “Nanotech in Today’s World.”

This discovery was made in a Chinese magazine entitled "Overseas Scholars," written by the China Association for Science and Technology in the United States (CAST-USA) and the American Zhu Kezhen Education Foundation (AZKEF).

CAST is a transnational organization and constituent member of the Chinese People's Political Consultative Conference (CPPCC), whose stated mission is to “maintain close ties with millions of Chinese scientists, engineers and other people working in the fields of science and technology” and to operate as “the bridge linking Chinese science and technology community with the Communist Party of China and the Chinese government,” according to organization’s archived “About Us” webpage.

In 2003, CAST established the Help Our Motherland through Elite Intellectual Resources from Overseas Program (HOME) in concert with the Organization Department of the Chinese Communist Party to recruit overseas science and technology talent to transfer technology and intellectual property back to China.

The CPPCC’s role in channeling overseas science and technology knowledge toward China’s development has grown since a 2013 directive from General Secretary Xi Jinping to focus on incentivizing overseas Chinese to contribute their technical skills and expertise to China’s national rejuvenation.

By 2020, a United States congressional body warned that the Chinese government has built a “sprawling ecosystem of structures, programs, and incentives to coopt and exploit overseas experts for the science and technology they acquire abroad.”

“Chinese leaders have long viewed advanced science and technology (S&T) as key to China’s comprehensive national power and sought to acquire it through licit and illicit means from developed countries like the United States,” the US-China Economic and Security Review Commission (USCC) said in the report.

“This ecosystem sponsors promising Chinese students and scholars at the U.S. and other foreign universities, incentivizes their return to China for the long term, and employs transnational organizations to channel S&T know-how from those remaining abroad back to mainland China.”

The U.S. Senate report continues:

“Many programs associated with Beijing’s S&T transfer ecosystem—including scholarships to study abroad, talent recruitment plans, and entrepreneurship parks—contribute to China’s military-civil fusion strategy by collecting specific technologies and know-how that improve the capabilities of the People’s Liberation Army (PLA) and advance the goals” of the Chinese Communist Party (CCP).”

“This ecosystem sponsors promising Chinese students and scholars to study at foreign universities, incentivizes or requires their return to China in exchange for this support, and recruits researchers via hundreds of talent programs. Moreover, it integrates Chinese students and scholars remaining abroad with organizations that facilitate the transfer of S&T back to the Mainland, where it can be exploited by the PLA, government ministries, state-owned enterprises (SOEs), state-run laboratories, and startups.”

“Even when overseas Chinese students and scholars do stay in the United States after graduation, China’s transnational technology transfer organizations and talent recruitment plans provide a means to contribute to China’s national rejuvenation by transferring technology and know-how without requiring physical return.”

In the magazine, CAST-USA refers to Eugene Yu by his Chinese name YU Jianwei (于建伟), and says that he is an “officer” on the “finance committee” of the American Zhu Kezhen Education Foundation. The foundation’s mission is “to promote exchange and cooperation between Zhejiang University and universities in the United States” and “invite United States professors or scientists to Zhejiang University.”

In 2020, Prof. Charles Lieber was arrested for concealing his funding from the Wuhan University of Technology and participating in China’s Thousand Talents Program.

At a Senate Judiciary Committee hearing, Bill Priestap, the former Assistant Director of the FBI’s Counterintelligence Division, stated that China’s talent recruitment plans are effective “brain gain programs” that “encourage theft of intellectual property from U.S. institutions.”

Priestap continued, “For example, China’s talent recruitment plans, such as the Thousand Talents Program, offer competitive salaries, state-of-the-art research facilities, and honorific titles, luring both Chinese overseas talent and foreign experts alike to bring their knowledge and experience to China, even if that means stealing proprietary information or violating export controls to do so.”

Eugene Yu was an “officer” on the “finance committee” of a Chinese foundation in the United States tasked with flying professors like Charles Lieber to China. This discovery was made in a China Association for Science and Technology in the United States magazine entitled “Overseas Scholars.”

Similarly to how the U.S. congressional report described CAST’s overseas science and technology acquisition efforts, AZKEF keeps a list of talented overseas Chinese students, offers incentives for prominent scientists to fly to China, and focuses on bridging Zhejiang University with universities in the United States.

https://archive.ph/OFVCf

https://web.archive.org/web/20011119103624/http://www.azkef.org/

https://web.archive.org/web/20031220030107/http://azkef.org:80/programs.htm

https://web.archive.org/web/20030402092120/http://azkef.org:80/lecture2002.pdf

https://web.archive.org/web/20140206035502/http://english.cast.org.cn/n1181872/n1257426/47099.html
https://uscc.gov/sites/default/files/2020-10/Overseas_Chinese_Students_and_Scholars_in_Chinas_Drive_for_Innovation.pdf

5) On November 29, 2005, Eugene Yu, also known as YU Jianwei (于建伟), established a shadow subsidiary named Jinhua Yulian Network Technology Co., Ltd. (金华宇联网络科技有限公司) in Jinhua City, Zhejiang Province, China, two years after founding Konnech in the United States.

6) On January 25, 2006, Jinhua Yulian Network was accepted into the Entrepreneurship Service Center at the Chinese Academy of Sciences Jinhua Science and Technology Park. 

The Chinese government has funded and overseen the development of Konnech's American election software ever since.

https://web.archive.org/web/20090413172501/http://www.jhcy.cn/yqqy.asp?page=3

7) On February 25, 2006, Eugene Yu registered the website domain "http://yu-lian.cn" for Jinhua Yulian Network with the email address eyu@konnech.com. 

https://archive.is/YaRv1#

8) On http://yu-lian.cn, Eugene Yu wrote in Chinese that he provides election software "with Chinese characteristics" to various levels of the Chinese government, including the National People’s Congress and the Chinese People's Political Consultative Conference.

https://web.archive.org/web/20131207150515/http://yu-lian.cn/Services.html

9) On http://yu-lian.cn, Eugene Yu praised "Comrade Jiang Zemin" and emphasized Konnech's philosophy of prioritizing "political tasks first, and economic benefits second." 

He highlighted his success stories of "Election Management, Detroit" and "US Overseas Voters." 

The entire website was written in Chinese.

https://web.archive.org/web/20131207151051/http://yu-lian.cn/Case.html

10) In December 2006, Konnech announced on Facebook that they had partnered with Michigan State University and the Confucius Institute to build, http://ChineseBrief.com, an "interactive communication platform and Chinese language learning tool."

https://web.archive.org/web/20120729201212/http://www.confucius.msu.edu/news.htm

11) On July 18, 2007, Eugene Yu posted an ad on the Chinese Academy of Sciences Jinhua Science and Technology Park's website, offering "5 million yuan" for developing "software packages" for Jinhua Yulian Network and http://konnech.com

In 2007, 5 million yuan was worth around $700,000 and was the prize money offered by the Chinese government to members of the Thousand Talents Program and other elite overseas entrepreneurs.

https://web.archive.org/web/20131019061139/http://www.jhcy.cn/jsnt_detail.asp?id=16

12) The Chinese Academy of Sciences (CAS) is a national think tank with extensive research facilities and over 50,000 researchers. CAS has been linked to Chinese military, nuclear, and cyber espionage programs. 

The U.S. Department of Defense acknowledges the CAS as China's leading academic institution for comprehensive research and development.

CAS and its affiliated companies are involved in developing AI initiatives, hypersonic spaceplanes, robotic submarines, and missile technology for the Chinese military. 

The Justice Department has indicted several individuals associated with CAS for their roles in transferring trade secrets and military technology from U.S. companies through Chinese overseas talent programs. 

In October 2002, the Jinhua Science and Technology Park became the first collaboration between the Chinese Academy of Sciences (CAS) and a prefecture-level government.

The Chinese government has built more than 150 "Overseas Chinese scholar pioneering parks" in the hearts of 54 "National New and High Technology Development Zones."

These ultra-modern facilities were designed for returning specialists to "incubate" (find commercial or military applications for) technologies acquired overseas as part of China's strategy of "serving in place" that allows Chinese scholars to stay abroad while transferring foreign technology back home.

https://uscc.gov/sites/default/files/Research/Interos_Supply%20Chain%20Vulnerabilities%20from%20China%20in%20U.S.%20Federal%20ICT_final.pdf

https://media.defense.gov/2019/May/02/2002127082/-1/-1/1/2019_CHINA_MILITARY_POWER_REPORT.pdf

https://web.archive.org/web/20100628161736/http://www.jhkjy.ac.cn/about/index.asp

13) Jinhua Yulian Network's initial address was located at No. 988 Shuanglong South Street, Jinhua City, Zhejiang Province, China, which is situated 500 meters away from the Jinhua People's Government building (No. 801 Shuanglong South Street) and across the street from the Jinhua Science and Technology Bureau (No. 828 Shuanglong South Street).

14) The Jinhua Science and Technology Park (JHTP) offers Chinese government-funded support to domestic and overseas enterprises, including financial assistance, living facilities, server hosting, internet access, university partnerships, technology transfers, research assistance, and patent support. 

In 1988, the State Council launched the Ministry of Science and Technology’s national Torch Program to speed up the nation’s “science and technological industrialization.” 

In 2005, the Ministry of Science and Technology awarded JHTP the distinction of a national-level technology business incubator. 

In 2006, JHTP was granted 3 million yuan by the Ministry of Science and Technology through China's national Torch Program to establish the Park's Internet Data Center, where Jinhua Yulian Network would develop, test, and maintain Konnech's American election software.

https://web.archive.org/web/20091017113128/http://www.jhcy.cn/yqgk_01.asp?flag=%B7%FE%CE%F1%B9%A6%C4%DC&lmbm=2405&lmmc=%B7%FE%CE%F1%B9%A6%C4%DC&url=yqgk_01.asp

https://web.archive.org/web/20090413171900/http://www.jhcy.cn/cxzt_01.asp

http://jhcy.cn/jhkjy/town_details/28.html

http://jhcy.cn/jhkjy/town_details/50.html

15) A 2008 Chinese document titled "International Elite Entrepreneurship Modern Service Outsourcing" reveals that Eugene Yu worked for the Chinese government as a Project Manager of the Guangzhou Economic and Technological Development Zone (GETDZ) from 1983 until 1985.

The document features 46 Chinese high-tech companies operating overseas and describes Konnech as an "Intelligent Web Communications" company with the mission of becoming "one of the top 50 e-commerce service providers for schools and government in the United States within 10 years.”

The document mentions Konnech's Chinese venture fund and describes the company's goal of developing advanced technology in cooperation with Zhejiang University:

“The company will enter a phase of rapid development after the implementation of the venture fund in Wuzhong.”

"In terms of specialized technology, we have been developing and hiring technical personnel with expertise in the field in a rapid manner by utilizing the role of corporate and university professors and graduate classes for project development, with the aim of receiving advanced applied technology."

"... it is an indisputable fact that many cutting-edge products come from American university campuses. We must take the corresponding path and cooperate with American universities and Zhejiang University and other domestic institutions to focus on the development of applied technologies and the application-oriented development of specialized technologies."

The document describes the problems facing the U.S. market, citing “expensive software programming fees and talent shortages” and reduced “funding for IT projects” before concluding, “In this environment, the role of our China branch is fully demonstrated.”

When Eugene Yu’s attorneys filed a motion to dismiss his criminal case in California, they included a section entitled FACTUAL BACKGROUND that says he “worked in various locations” after he graduated from Zhejiang University and before he was accepted into Wake Forest University.

However, it failed to mention his prior employment as a Project Manager in the Guangzhou Economic and Technological Development Zone, where he worked in the Industrial Project Negotiation Department and "completed the introduction of several major projects":

"Eugene Yu was born and raised in Jinhua City, Zhejiang Province, China. In 1974, as part of China’s cultural revolution, Mr. Yu was sent to a communal farm where he labored for four years in squalor conditions. In 1977, after Chairman Mao died, Mr. Yu scored high on a nationwide test, qualifying him for admission to study engineering at Zhejiang University.

After graduating from college, he was sent to work in various locations in China. Mr. Yu then met and married his wife Donna Wang. In 1986, Mr. Yu and Dr. Wang were accepted to graduate school programs at Wake Forest University, where Mr. Yu obtained his MBA degree."

Since the launch of the GETDZ in 1984, China has established 219 national-level Economic and Technological Development Zones (ETDZs), which helped launch China’s rise to a global economic superpower.

In order to promote science and technology-intensive industries, ETDZs offer financial incentives and preferential policies that target domestic and overseas enterprises focused on manufacturing, scientific, and technological industries.

Two decades later, Eugene Yu would return to China to launch his company Jinhua Yulian Network Technology Co., Ltd. (金华宇联网络科技有限公司) in the Jinhua Economic and Technological Development Zone (JETDZ).

https://max.book118.com/html/2012/0222/1126480.shtm

https://cbbc.org/sites/default/files/2021-01/China-Britain%20Business%20Council%20-%20In%20the%20Zone%20-%20A%20Comprehensive%20Guide%20to%20China%E2%80%99s%20Economic%20and%20Technological%20Development%20Zones%20-%20October%202020.pdf

https://documentcloud.org/documents/2317

16) On January 4, 2011, Lin Yu, a managing supervisor at Jinhua Yulian Network, established Jinhua Red Date Software Co., Ltd., also known as Jinhua Jujube Software Co., Ltd. 

On January 16, 2011, Konnech registered the domain reddatesoft[.]com with the email eyu@konnech.com. 

Jinhua Red Date Software and Jinhua Yulian Network shared the same address at No. 1583 Binhong Road, Jinhua City, Zhejiang Province.

Jinhua Yulian Network's website included "Jinhua Red Date Software Co., Ltd." and "reddatesoft[.]com" in its copyright statement.

Peter McCallister, the General Manager of Konnech Australia, later affirmed in an affidavit that Lin Yu is Eugene Yu's older brother and a Chinese national.

(Note: The modified domain URL "reddatesoft[.]com" is used because of safety concerns with the URL raised by Twitter.)

https://web.archive.org/web/20220822014930/https://www.11467.com/jinhua/co/273669.htm

https://web.archive.org/web/20130718125224/http://yu-lian.cn/

17) On April 13, 2015, Lin Yu established Jinhua Hongzheng Technology Co., Ltd. (金华鸿正科技有限公司) in Jinhua, Zhejiang Province, China.

Lin Yu (Eugene Yu's brother) owned 99.4% of the company.

Jun Yu (Eugene Yu's nephew) and Guojun Shao, who co-invented a Konnech patent with Eugene Yu, were among the other equity holders.

Jinhua Yulian Network later transferred a voting patent, co-invented with a Zhejiang University professor, to Jinhua Hongzheng Technology.  In a future thread, there will be a detailed discussion about Konnech's patents, employees, and the involvement of this professor.

18) Jinhua Hongzheng Technology provides election administration software, including web and mobile applications, to more than 430 National People's Congresses across over 20 provinces. 

The company has established partnerships with Huawei, Lenovo, China Telecom, China Mobile, China Unicom, and the highest levels of the Chinese government.

19) On July 31, 2015, Eugene Yu registered the website domain "hongzhengtech[.]cn" for Jinhua Hongzheng Technology using the email address admin@konnech.com.

As a result, Konnech held significant control over a company that provides election administration software to the highest levels of the Chinese government.

Shortly after Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) exposed Konnech's connection to China's National People's Congress, the domain registration email address was changed to jiadeng@hongzhengtech.com.

(Note: The modified domain URL "hongzhengtech[.]cn" is used because of safety concerns with the URL raised by Twitter.)

https://web.archive.org/web/20220824173140/https://whois-history.whoisxmlapi.com/lookup-report/AVkvG34MR7

20) In a September 1, 2022, live chat, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) discussed the FBI's betrayal, Konnech programming software for China's National People's Congress, and the company's storage of U.S. election data on Chinese servers.

In January 2021, Phillips said that the cyber analyst he had been working with encountered an “oddity in some of the URLs” such as http://vote4la.com, http://vote4detroit.com, and http://vote4boston.com, which Konnech’s “PollChief” software application used to gather personally-identifying information about poll workers.

Using Binary Edge, a software product companies use to identify and assess the risk of cyber breaches, “We began to look at where these URLs resolve to.

We found that most of them resolve to one I.P. address and that I.P. address — the URL resolved in China,” Phillips said. “What we also learned in our review, http://apps.konnech.net, resolved into this same URL in China, meaning that the application itself was residing in China,” he continued.

“In Binary Edge, you can figure out what type of database they are using, their database port, and all the different services offered by ports in this particular application living in China. It turned out that not only did it live there, but they left the database open.”

This database “stored the personally identifying information of over a million Americans,” he emphasized. Engelbrecht and Phillips decided that “this was a major national security risk” and immediately took the information to the FBI.

When Engelbrecht and Phillips took this information to the FBI, the FBI “said the information was forwarded to their counter-intelligence operation, and a counter-intelligence op was opened up in January or February of 2021,” Phillips said.

Phillips described how he and Engelbrecht played an active role in the FBI’s operation, “They engaged us in the operation, they were communicating with us on a regular basis. They were communicating with Catherine regarding communications with the target and this went on for approximately 15 months.”

Phillips and Engelbrecht noted that the field office they worked with for those 15 months was “legitimate” and not “political law enforcement.”

“These were legitimate people who believed that this software posed a national security risk to the United States of America and they were working with us closely to try to stop this from being in place during the midterms,” Phillips said.

“The focus point was always we needed to remove this software from the election, but taking a step further, there were a lot of other concerns that the bureau had.”

In April 2022, Engelbrecht received a call from one of the FBI agents, who informed her that the FBI’s “Washington D.C. headquarters” was now involved in the investigation.

Engelbrecht described how everything changed after this call, “There was no more goodwill, there was no more let's work together, the script had been flipped, and now we were the target,” she said. “That was a very disturbing call.”

The agent informed Engelbrecht that “two women” at the FBI’s headquarters believed that Phillips and Engelbrecht were “in the wrong for doing this” and that the D.C. office was now trying “to figure out how you guys broke the law to find all of this.”

Engelbrecht added, “which of course we didn't, but that was kind of their Modus Operandi, they were going to try to pin something on us, and today you can pick your headlines about how the FBI has done this time and again.”

Phillips remarked, “The problem is they know about this, and they chose to do nothing. They chose to investigate it, and in the end, they chose to blame us, but this is China. These are Chinese operatives in the United States; these are Chinese citizens who are programming this.”

Engelbrecht explained how the FBI agents initially hoped they could persuade the Washington D.C. office to do the right thing, “Our contacts were saying we are going to try and smooth this out, but as the days clicked on, they re-contacted us and one of them said you may need to be ready to — his term was to use the nuclear option and go to the press,” she said.

With the FBI no longer interested in pursuing Konnech, Englebrecht and Phillips organized an event for Saturday, August 13th in Arizona called “the Pit” where they brought together about two hundred “researchers, independent journalists, and big thinkers” to share their story.

“We asked the people in attendance for help, we didn't know what the FBI's plans were for us, we didn't know if we didn't speak this publicly if we would ever have the chance to, but we felt like our best chance was to share this with people we trusted who had the wherewithal to get the word out,” Englebrecht said.

She continued, “There have been so many great things that have happened since that event, but one of the greatest, was this community that came out shoulder to shoulder saying let’s dig this, let's see how much more information we can find.”

“The quality of research that has been done to supplement what we already had and to corroborate what we already had has been incredible.”

Phillips added, “This is some of the best research I have ever seen. The quality of it, the depth of it, we were with a prosecutor the other day and we had an opportunity to share some of this information with them.”

He continued, “There's likely going to be a grand jury convened here in the next week or so. It's supported by not just the research that my team OPSEC did for Catherine and True the Vote, but by the research of one of the best research teams I've ever seen come together.”

“The data and research all stand on their own.”

https://truethevote.locals.com/post/2664780/the-tiger-project

21) On September 12, 2022, Konnech filed a defamation lawsuit against Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
), accusing them of spreading baseless "conspiracy theories" and engaging in "racism and xenophobia."   

Konnech denied any affiliation with the Communist Party of China and stated that they had never stored American election data on servers in China. 

The legacy media echoed Konnech's claims against
@TrueTheVote
 and
@onwardsocial
 without conducting any examination of the company's connections to Jinhua Yulian Network, Jinhua Hongzheng Technology, or China's National People's Congress.

22) In an unusual move, U.S. District Court Judge Kenneth Hoyt issued an ex-parte temporary restraining order in favor of Konnech without providing an opportunity for
@TrueTheVote
 and
@OnwardSocial
 to respond to the complaint. 

Furthermore, Judge Hoyt immediately ordered them to disclose the identities of all individuals involved in their investigation of Konnech at the outset of the trial, prior to the discovery phase. 

Failure to comply would result in the imprisonment of Catherine Engelbrecht and Gregg Phillips for contempt of court.

23) On October 4, 2022, Eugene Yu, the CEO of Konnech, was arrested by the Los Angeles District Attorney's office for storing the data of American election workers on servers in China. 

Deputy District Attorney Eric Neff described the scale of the data breach as "astounding," suggesting that it could be "the largest data breach in United States history." 

Prosecutors alleged that Konnech employees shared the personal information of Los Angeles election workers with third-party software developers in China, who were involved in creating and fixing Konnech's software called PollChief. 

Furthermore, software developers in China had "super administration access" to PollChief software and confidential election data from the United States.

https://truethevote.org/wp-content/uploads/2022/11/eugene-yu-complaint-101322.pdf

24) On October 5, 2022, during Eugene Yu's bond hearing, his attorney contended that he posed no risk of fleeing as he had been actively cooperating with the FBI for the preceding month, and his arrest had taken the agency by surprise.

However, the Los Angeles District Attorney's office argued that Yu presented a substantial flight risk due to his strong business ties in China. 

Additionally, the prosecution raised concerns about the suspicious nature of Yu's arrest, noting that he was taken into custody without his cell phone while on his way to the airport.

25) On October 28, 2022,
@TrueTheVote
 and
@OnwardSocial
 submitted an affidavit containing approximately 10% of their text messages exchanged with FBI Agents in Detroit and San Antonio, supporting their claim of working with the FBI on a 15-month "counter-intelligence operation" against Eugene Yu, prior to the involvement of FBI headquarters in Washington D.C.

The text messages included conversations with the following individuals:

-Special Agent Bruce Fowler, Detroit
-SA Huy Nguyen, San Antonio
-SA Kevin McKenna, San Antonio
-SA Kristina Spindel, San Antonio

In one text message exchange, Fowler provided his FBI email address and mentioned receiving three thumb drives from the San Antonio office. He asked Engelbrecht to guide him on where to find information on those drives.

In another text message exchange, Engelbrecht asked for the name of an agent in Georgia. Nguyen responded that he would provide the name later, but “in the meantime, you can tell them that you filed the complaint with SA Huy Nguyen and SA Kevin McKenna with San Antonio Division.”

In another exchange, Engelbrecht texted Nguyen, stating:

"I wanted to let you know that we took the nuclear option and went public (in a very limited way, but nonetheless we did it). Konnech quickly filed a civil suit against us in Houston federal court and got an ex parte [temporary restraining order].

Part of the TRO required that we name who we’d gotten the election worker data from, same person who’d provided it to you. We gave the court the name under seal. Our attorney also notified the Houston FBI office, where the case was filed.

I’m very concerned about everyone’s safety at this point. Please do whatever possible to help ensure that name never comes out. I can provide you with whatever you may need."

Nguyen did not respond to Engelbrecht’s text. According to further texts provided by Engelbrecht, she reached out to “KayKay,” saying she hoped to talk, in person, if possible.

“KayKay” replied that she was on a temporary assignment out of state until January and asked if Engelbrecht still had Nguyen’s number. Engelbrecht then explained that she had “called and written him but no response.”

The text then explained: “We have been drug into a vicious lawsuit filed against us by Konnech.” “Our attorneys have contacted the FBI and been told that the Bureau has no interest in engaging with the court in order to maintain confidentiality.”

Engelbrecht added that she, Phillips, and “the researcher who originally provided us the data” are being “doxed,” and that it’s “a very serious situation and we’ve been left to hang.”

Engelbrecht then noted, “Yu has already been indicted by a Grand Jury and arrested,” but they “continue to hear chatter that the FBI is working with Konnech, against us, and still trying to accuse us of crimes we did not commit.”

The True the Vote founder then noted that “what Bobby said on the phone that day in April 22 (when you were reading the yearly CI disclaimer to me) has gone into full overdrive.” She added: “I also now believe Gregg and I have been set up. It’s appalling, heartbreaking, and wrong.”

https://thefederalist.com/2022/11/18/in-this-untold-story-of-poll-worker-data-chinese-servers-and-scandal-only-the-fbi-knows-the-truth/

https://storage.courtlistener.com/recap/gov.uscourts.txsd.1888133/gov.uscourts.txsd.1888133.46.2.pdf

26) On October 31, 2022, Catherine Engelbrecht (
@truethevote
) and Gregg Phillips (
@onwardsocial
) were imprisoned for contempt of court as they refused to disclose the identity of a researcher who provided information to the LADA that resulted in the indictment of Eugene Yu:

Despite Eugene Yu's arrest by the Los Angeles District Attorney based on the allegations he had previously denied in his defamation lawsuit, Judge Kenneth Hoyt refused to admit any evidence from the criminal proceedings against Konnech in his courtroom.

Furthermore, Judge Hoyt declined to respond to a phone call from the Los Angeles District Attorney's office and asserted that the criminal case against Eugene Yu was unrelated to the civil case involving Catherine Engelbrecht and Gregg Phillips.

27) On November 5, 2022, Tucker Carlson discussed Catherine Engelbrecht and Gregg Phillips being arrested for refusing to reveal the identity of a researcher who provided information to the LADA that resulted in criminal charges against Eugene Yu, the CEO of Konnech: 

"George Gascon actually indicted Eugene Yu for exfiltrating the personal records of American poll workers, including their social security numbers and home addresses, out of the country to servers in China. These researchers developed that information.   

Catherine attempted to give it to law enforcement at the FBI and elsewhere and was sued by Konnech for doing that. When Konnech sued them, they got a restraining order, ordering Catherine to turn over the names of these researchers.   

Catherine and Gregg, who are very courageous people, simply refused to do it, and as a result, while Yu is home on bail, Catherine and Gregg are in jail tonight...

The civil libertarians and the mainstream press are basically a flock of sheep that are each bleeding the exact same tune, and all they want to do is deny any conversation about the possibility of fraud in elections."

28) On November 7, 2022,
@TrueTheVote
 and
@OnwardSocial
 were released from prison following a decision by the U.S. Court of Appeals for the Fifth Circuit, which overturned Judge Kenneth Hoyt's order to unjustly detain them for contempt of court in a civil defamation case.

Two week later, the appeals court vacated the contempt order and wrote, "the record does not reveal what sort of emergency justified the district court's demand for that information before the parties could file Rule 12 motions before the defendants could file an answer, before the parties could file their initial disclosures, or before discovery could begin let alone conclude in the ordinary course."

"Much less did the district court explain what sort of emergency could warrant jailing the petitioner-defendants for not making such immediate disclosures. Rather, the district court made clear that it was imposing its disclosure requirements because it—the district court—wanted to add defendants to the lawsuit. Resp. 13; App. 188. That is not how the Federal Rules of Civil Procedure work."

Furthermore, the appeals court criticized Judge Kenneth Hoyt for "using a temporary restraining order, a preliminary injunction, and a civil-contempt order to litigate the case on Konnech's behalf."

https://storage.courtlistener.com/recap/gov.uscourts.txsd.1888133/gov.uscourts.txsd.1888133.62.0.pdf

@gatewaypundit
 about their arrest and subsequent solitary confinement and provided information about the Konnech data breach that occurred in Pittsburgh, Pennsylvania, or Allegheny County. 

The breach involved the unauthorized exposure of sensitive information belonging to election workers, election judges, the complete Pennsylvania voting registration file, voting machine serial numbers, passwords, and "everything that one would need to cheat." 

"This isn't software, guys. This is malware. This is spyware. They are sucking data from the United States, storing it in China, and then using it to create a Chinese-style social credit system where we're all scored.   

United States citizens are scored to manipulate votes, manipulate thought, manipulate pretty much everything you can imagine in our lives. And these people are the tip of the spear for that. They're not the only ones but they're there."

30) On November 9, 2022, the Los Angeles District Attorney's office dropped charges against Konnech and its CEO, Eugene Yu.

District Attorney George Gascon cited concerns over “potential bias” and the “pace of the investigation” as his reasons for the decision.

"We are concerned about both the pace of the investigation and the potential bias in the presentation and investigation of the evidence," Gascon said in a statement.

"We currently have an immense volume of digital data that will define this case, but the processing of that data will take months. We would not be able to fairly and accurately process and present all of that evidence within the statutory timeframes."

"As a result, we have decided to ask the court to dismiss the current case and alert the public in order to ensure transparency."

A few weeks later, Gascon placed Deputy District Attorney Eric Neff, who alleged in court that this was potentially "the largest data breach in United States history," on administrative leave.

31) On December 22, 2022, Grant Bradley, a former employee of Konnech, filed a whistleblower lawsuit against the company that stated he personally “witnessed customer’s data (specifically poll watcher information) being made accessible to foreign nationals from China.”

Additionally, Bradley stated that Konnech used “developers, designers, and coders” who “are all Chinese nationals based out of Wuhan, China.”

https://thefederalist.com/2023/01/20/whistleblower-yes-election-data-company-gave-u-s-poll-workers-personal-info-to-china/

https://scribd.com/document/620894361/22-12-22-Verified-Complaint-1#

32) On February 24, 2023, cybersecurity expert Harry Haury, who forensically imaged Konnech's devices for the Los Angeles District Attorney's office, signed an affidavit stating that he witnessed Konnech storing the personal data of U.S. election workers on servers in China.

Furthermore, the affidavit stated that Konnech's software was developed, tested, and maintained in China, and metadata indicated that Eugene Yu was involved in developing election software for the Chinese government.

Haury, who is the CEO of Cain & Associates, stated that his company assisted the Los Angeles District Attorney's office by following FBI and Justice Department protocols to forensically image servers, computers, cell phones, and other electronic storage devices belonging to Konnech and Eugene Yu.

Haury, who has over 28 years of experience working as a cybersecurity expert for prominent organizations such as the Department of Defense, NSA, CIA, U.S. Treasury, NorthCOM, Sandia National Laboratories, more than a dozen top American banks, and the U.S. Justice Department stated that Konnech's data security system, "amounted to by far the worst example of complete disregard or negligence regarding the protection of PII and sensitive data I have ever seen. We discovered a data breach of U.S. data, which is classified as a total loss of control.”

Substantial evidence was reportedly discovered on Konnech's seized devices, including:

• confirmed multiple instances of Konnech hosting, on servers based in China, U.S. citizens’ personally identifiable information (PII);
• found evidence in private company messages that software code was being developed, tested, and maintained in China;
• confirmed that Konnech was providing administrative credentials to Chinese developers;
• PollChief software suffered from a security vulnerability that allowed any PollChief or Konnech worker to gain "super user" status, giving him or her broad access to information on all U.S. poll workers in the system;
• has evidence that Konnech employees have shared election-related data through, from, and on Chinese servers and applications;
• has evidence in metadata pulled from relevant files indicating Eugene Yu was involved in developing Chinese government (i.e., Wucheng District People’s Congress) election software; and
• has evidence showing Konnech is associated with several companies based in mainland China that appear to be associated with if not subsidized by the Chinese government.

Haury stated, "We concluded that this incident is a very high risk indicator of an intrusion by a foreign intelligence into the U.S. strategic infrastructure, and as obliged by law, we informed the Defense Counterintelligence and Security Agency (DCSA) and other pertinent law enforcement agencies of this contact."

https://truethevote.org/wp-content/uploads/2023/02/2023.02.24-Konnech-Dkt.-87-Motion-to-Inspect-Property.pdf

33) On March 24, 2023, Peter McCallister, the former General Manager of Konnech Australia, signed an affidavit stating that he believed Konnech's software development was done in China by Jinhua Hongzheng Technology, a company owned by "Mr. Yu's older brother" and "Jun Yu, Mr. Yu's nephew, was the person responsible for depositing the data onto the server in China." 

Additionally, McCallister stated that after Eugene Yu's arrest, Konnech employees in China attempted to hack Konnech's CTO, Luis Nabergoi, and deleted "all conversations referencing or involving Eugene's nephew, Jun Yu." 

Lastly, McCallister believed that Jinhua Hongzheng Technology was "the main provider of election software products to the Communist Party of China" and that Eugene Yu had asked him to sell the same "meeting administration and voting software" to the Australian government.

34) On April 5, 2023, Grant Bradley, the former Konnech employee, signed another affidavit stating "Konnech provided programmers in China private data of U.S.-based election workers, to include social security numbers and other identifying information."

"Konnech appeared to employ at least 80 and perhaps around 100 Chinese nationals to work on its elections software for American clients."

"I witnessed customers' data (specifically poll-watcher information) being made accessible to foreign nationals in China."

"Konnech's election logistics software was (and may still be) substantially developed by developers, designers, and coders who (to the best of my knowledge, information and belief), are all Chinese nationals based out of Wuhan, China."

"The standard process Konnech used to onboard China-based programmers was to create customer environments for the programmers by uploading files containing all of the American customers' poll workers' information, polling locations, and other data to DingTalk or Jira, where the leaders from the Chinese team would have access to Jira, and the entire Chinese team would have access to DingTalk."

"During my employment, on or after October 4, 2022 I was instructed by my superiors to say outwardly to customers that poll worker data was not stored overseas, was not available to foreign nationals, and that we had no idea why Eugene Yu had been arrested... My superiors who instructed me in these regards, and I, knew these statements were false."

https://truethevote.org/wp-content/uploads/2023/04/2023.04.07-Konnech-Dkt.-94-1-Exhibit-H-Affidavit-of-Grant-Bradley.pdf

https://truethevote.org/wp-content/uploads/2023/03/2023.03.24-Konnech-Dkt.-91-Reply-ISO-Motion-to-Inspect.pdf

35) On April 14, 2023, cybersecurity expert Nate Cain (
@cain_nate
), who forensically imaged Konnech's devices for the Los Angeles District Attorney's office, stated that Konnech stored the personal data of U.S. election workers and judges on servers in China.

Furthermore, Cain stated that a "Chinese company that has ties to the CCP" did Konnech's "software development and maintenance," and a Defense Counterintelligence Security Agency (DCSA) analyst reviewed their report, verified that it was accurate, and forwarded it to the FBI.

However, Cain mentioned that he had provided evidence of a major Konnech data breach to the police superintendent of a prominent U.S. county, who subsequently took the information to the FBI, and the FBI had declined to provide assistance, informing the superintendent that they were not interested in pursuing the matter.

Additionally, Cain stated that Los Angeles County had refused to inform several other counties that their data had also been breached.

Cain, who has over 25 years of experience working as a cybersecurity expert for the Army, Navy, Marine Corps, DISA, and the FBI, received his cybersecurity training from the NSA as a member of the U.S. Marine Corps Forces Cyberspace Command (MARFORCYBER).

"We found that there was voter poll worker data, as well as election judge data, and election inventory system data found on Chinese servers."

"We weren't expecting to see what we saw, which was that there was a Chinese company that was essentially doing the software development and all of the software maintenance for this company.

And what we discovered was that we got behind the Chinese firewall, and we found documents that showed that this Chinese company actually had ties to the CCP.

And then at that point, I had no choice but to take that information, package it up and provide it to the Defense Counterintelligence Security Agency (DCSA) because as a cleared contractor, I have a sworn obligation to provide them that information that this could be a potential Chinese espionage or intelligence operation working against the United States and our critical infrastructure.

So, I provided that information to them, and now, we're in a difficult situation because I don't think that George Gascon was very happy about that."

36) On April 20, 2023, Konnech and Eugene Yu retracted their defamation case against Catherine Engelbrecht and Gregg Phillips, a day after
@truethevote
 and
@onwardsocial
 unveiled a website (http://openink.com/konnech) containing much of the information discussed in this Twitter thread.

37) In conclusion, Eugene Yu develops election administration software for the Chinese government in partnership with Huawei, China Telecom, China Unicom, China Mobile, and Lenovo. 

Two of his former employees have signed affidavits stating that he stored confidential U.S. election data on servers in China, where his software was developed, tested, and maintained. 

Two cybersecurity experts, who forensically imaged Konnech's devices for the LADA, have stated that he stored confidential U.S. election data on servers in China, where he developed election administration software for the Chinese government. 

This information is publicly available on the internet. 

So, why is the FBI still allowing Konnech's election administration software to be used across the country?

38) On April 14, 2016, Jinhua Hongzheng Technology announced on Weibo that it provides election administration software to China's National People's Congress, Detroit,  Michigan, St. Louis, Missouri, and Washington, D.C. 

Its predecessor is Jinhua Yulian Network and "Konnech."

https://archive.ph/8xIqe

39) So, why is the FBI shielding two firms closely tied to the Chinese government, which have financed and developed an American election software company for the past 15 years, all while transferring election data back to China?

40) And lastly, why is the FBI headquarters in Washington D.C., targeting Catherine (
@truethevote
) and Gregg (
@onwardsocial
) for exposing this while seemingly protecting Jianwei Yu (于建伟)?

41) If you would like Congress to hold the FBI accountable for betraying Catherine, Gregg, and their commitment to preserving the integrity of our election system, please visit
@TrueTheVote
's website, http://stopccpelectionfraud.com, and follow these three simple steps:

1. Sign the petition
2. Contact your representatives
3. Review these articles

42) In all of my interactions with Catherine and Gregg, despite facing lawsuits, wrongful arrests, and solitary confinement, their main concern has always been the removal of this national security threat from our election system. 

If you would like to support their election integrity efforts, you can donate at:
https://truethevote.org/donate/

43) Finally, if you'd like to support my journalism, please consider becoming a member of my Twitter subscriber community.

By joining, you'll gain exclusive access to my reporting, including:

• Exclusive Konnech threads
• Content creation tips
• OSINT research tools
• Monthly Q&A sessions

Thank you for your time!