By Jim Hoft Jun. 4, 2023 8:00 am
The alleged stolen data belonged to poll workers and was the subject of TrueTheVote’s “PIT” in Arizona last August, where Catherine Engelbrecht and Gregg Phillips singled out the Michigan based company.
During the PIT conference, Phillips and Engelbrecht alleged they were cooperating with the FBI in Michigan about data being sent overseas by this company. The investigation quickly started to turn on them after the FBI started to distance itself from the investigation for some strange reason.
Journalist “incognito” Kanekoa covered this company and researched them better than anyone at the time.
Here is the link to the LA County website.
The theft of data only impacted the election workers, alleged Soros-funded Los Angeles District Attorney George Gascon. The LADA seized hard drives and other digital evidence from the Michigan software firm with the assistance of Meridian Township Police in MI. The LADA was seeking Yu’s extradition to Los Angeles.
Following the CEO’s arrest Fairfax County in Virginia announced they stopped using Konnech’s PollChief election officer management software.
True the Vote’s Catherine Engelbrecht and investigator Gregg Phillips were hauled into court by lawyers representing Konnech who are suing Catherine and Gregg for defamation.
In what was a strange twist, the court case started just days after the CEO of Konnech was arrested on October 4th.
U.S. District Judge Kenneth Hoyt demanded the conservative nonprofit group disclose their sources of the information central to the case, about sensitive poll worker data managed by Konnech Inc.
After Konnech sued True the Vote last month for defamation, Hoyt ordered True the Vote to turn over any Konnech data the organization still had and disclose the name of the individual who’d helped them obtain it.
Gregg and Catherine have refused to “burn” their source in the Konnech reporting and spent 10 days in prison for not turning over their source to Konnech and their corrupt attorneys.
The Soros-funded LA District Attorney dropped the charges against Konnech the day after the 2022 midterm election for some reason.
In April, Gregg Phillips and Catherine Engelbrecht released all of their information on the China-linked Konnech Company at Open.Ink. The next day Konnech dropped ALL CHARGES against Gregg and Catherine!
That brings us to today.
Kanekoa has another explosive investigative piece on the Konnech company. The FBI shielded and protected Konnech from investigation despite its ties to the Chinese Communist Party.
This is a Twitter post with 32 tweets for subscribers.
#1🚨: Evidence shockingly suggests that the FBI is shielding two firms closely tied to the Chinese government, which have financed and developed an American election software company for the past 15 years, all while transferring confidential election data back to China.
2) Konnech has provided election administration and logistics software to numerous prominent counties in the United States, including:
•Alameda County, California
•Allegheny County, Pennsylvania
•Contra Costa County, California
•Denver County, Colorado
•Detroit County, Michigan
•Fairfax County, Virginia
•Hillsborough County, Florida
•Maron County, Indiana
•Los Angeles County, California
•San Francisco County, California
•Santa Clara County, California
•St. Louis County, Missouri
•Travis County, Texas
16) Jinhua Hongzheng Technology – linked to Konnech – provides election, logistics, and administration software, including web and mobile applications, to more than 430 National People’s Congresses across over 20 provinces.
The company has established partnerships with Huawei, Lenovo, China Telecom, China Mobile, China Unicom, and the highest levels of China’s government.
18) In a September 1, 2022, live chat, Catherine Engelbrecht (@truethevote) and Gregg Phillips (@onwardsocial) discussed the FBI’s betrayal, Konnech programming software for China’s National People’s Congress, and the company’s storage of U.S. election data on Chinese servers.
In January 2021, Phillips said that the cyber analyst he had been working with encountered an “oddity in some of the URLs” such as http://vote4la.com, http://vote4detroit.com, and http://vote4boston.com, which Konnech’s “PollChief” software application used to gather personally-identifying information about poll workers.
Using Binary Edge, a software product companies use to identify and assess the risk of cyber breaches, “We began to look at where these URLs resolve to.
We found that most of them resolve to one I.P. address and that I.P. address — the URL resolved in China,” Phillips said. “What we also learned in our review, http://apps.konnech.net, resolved into this same URL in China, meaning that the application itself was residing in China,” he continued.
“In Binary Edge, you can figure out what type of database they are using, their database port, and all the different services offered by ports in this particular application living in China. It turned out that not only did it live there, but they left the database open.”
This database “stored the personally identifying information of over a million Americans,” he emphasized. Engelbrecht and Phillips decided that “this was a major national security risk” and immediately took the information to the FBI.
When Engelbrecht and Phillips took this information to the FBI, the FBI “said the information was forwarded to their counter-intelligence operation, and a counter-intelligence op was opened up in January or February of 2021,” Phillips said.
Phillips described how he and Engelbrecht played an active role in the FBI’s operation, “They engaged us in the operation, they were communicating with us on a regular basis. They were communicating with Catherine regarding communications with the target and this went on for approximately 15 months.”
Phillips and Engelbrecht noted that the field office they worked with for those 15 months was “legitimate” and not “political law enforcement.”
“These were legitimate people who believed that this software posed a national security risk to the United States of America and they were working with us closely to try to stop this from being in place during the midterms,” Phillips said.
“The focus point was always we needed to remove this software from the election, but taking a step further, there were a lot of other concerns that the bureau had.”
In April 2022, Engelbrecht received a call from one of the FBI agents, who informed her that the FBI’s “Washington D.C. headquarters” was now involved in the investigation.
Engelbrecht described how everything changed after this call, “There was no more goodwill, there was no more let’s work together, the script had been flipped, and now we were the target,” she said. “That was a very disturbing call.”
The agent informed Engelbrecht that “two women” at the FBI’s headquarters believed that Phillips and Engelbrecht were “in the wrong for doing this” and that the D.C. office was now trying “to figure out how you guys broke the law to find all of this.”
Engelbrecht added, “which of course we didn’t, but that was kind of their Modus Operandi, they were going to try to pin something on us, and today you can pick your headlines about how the FBI has done this time and again.”
Phillips remarked, “The problem is they know about this, and they chose to do nothing. They chose to investigate it, and in the end, they chose to blame us, but this is China. These are Chinese operatives in the United States; these are Chinese citizens who are programming this.”
Engelbrecht explained how the FBI agents initially hoped they could persuade the Washington D.C. office to do the right thing, “Our contacts were saying we are going to try and smooth this out, but as the days clicked on, they re-contacted us and one of them said you may need to be ready to — his term was to use the nuclear option and go to the press,” she said.
With the FBI no longer interested in pursuing Konnech, Englebrecht and Phillips organized an event for Saturday, August 13th in Arizona called “the Pit” where they brought together about two hundred “researchers, independent journalists, and big thinkers” to share their story.
“We asked the people in attendance for help, we didn’t know what the FBI’s plans were for us, we didn’t know if we didn’t speak this publicly if we would ever have the chance to, but we felt like our best chance was to share this with people we trusted who had the wherewithal to get the word out,” Englebrecht said.
She continued, “There have been so many great things that have happened since that event, but one of the greatest, was this community that came out shoulder to shoulder saying let’s dig this, let’s see how much more information we can find.”
“The quality of research that has been done to supplement what we already had and to corroborate what we already had has been incredible.”
Phillips added, “This is some of the best research I have ever seen. The quality of it, the depth of it, we were with a prosecutor the other day and we had an opportunity to share some of this information with them.”
He continued, “There’s likely going to be a grand jury convened here in the next week or so. It’s supported by not just the research that my team OPSEC did for Catherine and True the Vote, but by the research of one of the best research teams I’ve ever seen come together.”
“The data and research all stand on their own.”
23) On October 28, 2022, @TrueTheVote and @OnwardSocial submitted an affidavit containing approximately 10% of their text messages exchanged with FBI Agents in Detroit and San Antonio, supporting their claim of working with the FBI on a 15-month “counter-intelligence operation” against Eugene Yu, prior to the involvement of FBI headquarters in Washington D.C.
The text messages included conversations with the following individuals:
-Special Agent Bruce Fowler, Detroit
-SA Huy Nguyen, San Antonio
-SA Kevin McKenna, San Antonio
-SA Kristina, San Antonio
In one text message exchange, Fowler provided his FBI email address and mentioned receiving three thumb drives from the San Antonio office. He asked Engelbrecht to guide him on where to find information on those drives.
In another text message exchange, Engelbrecht asked for the name of an agent in Georgia. Nguyen responded that he would provide the name later, but “in the meantime, you can tell them that you filed the complaint with SA Huy Nguyen and SA Kevin McKenna with San Antonio Division.”
In another exchange, Engelbrecht texted Nguyen, stating:
“I wanted to let you know that we took the nuclear option and went public (in a very limited way, but nonetheless we did it). Konnech quickly filed a civil suit against us in Houston federal court and got an ex parte [temporary restraining order].
Part of the TRO required that we name who we’d gotten the election worker data from, same person who’d provided it to you. We gave the court the name under seal. Our attorney also notified the Houston FBI office, where the case was filed.
I’m very concerned about everyone’s safety at this point. Please do whatever possible to help ensure that name never comes out. I can provide you with whatever you may need.”
Nguyen did not respond to Engelbrecht’s text. According to further texts provided by Engelbrecht, she reached out to “KayKay,” saying she hoped to talk, in person, if possible.
“KayKay” replied that she was on a temporary assignment out of state until January and asked if Engelbrecht still had Nguyen’s number. Engelbrecht then explained that she had “called and written him but no response.”
The text then explained: “We have been drug into a vicious lawsuit filed against us by Konnech.” “Our attorneys have contacted the FBI and been told that the Bureau has no interest in engaging with the court in order to maintain confidentiality.”
Engelbrecht added that she, Phillips, and “the researcher who originally provided us the data” are being “doxed,” and that it’s “a very serious situation and we’ve been left to hang.”
Engelbrecht then noted, “Yu has already been indicted by a Grand Jury and arrested,” but they “continue to hear chatter that the FBI is working with Konnech, against us, and still trying to accuse us of crimes we did not commit.”
The True the Vote founder then noted that “what Bobby said on the phone that day in April 22 (when you were reading the yearly CI disclaimer to me) has gone into full overdrive.” She added: “I also now believe Gregg and I have been set up. It’s appalling, heartbreaking, and wrong.”
26) On November 17, 2022, @TrueTheVote and @OnwardSocial spoke to @gatewaypundit about their arrest and subsequent solitary confinement and provided information about the data breach that occurred in Pittsburgh, Pennsylvania, or Allegheny County.
The breach involved the unauthorized exposure of sensitive information belonging to election workers, election judges, the complete Pennsylvania voting registration file, voting machine serial numbers, passwords, and “everything that one would need to cheat.”
“This isn’t software, guys. This is malware. This is spyware. They are sucking data from the United States, storing it in China, and then using it to create a Chinese-style social credit system where we’re all scored.
United States citizens are scored to manipulate votes, manipulate thought, manipulate pretty much everything you can imagine in our lives. And these people are the tip of the spear for that. They’re not the only ones but they’re there.”
32) On April 14, 2023, cybersecurity expert Nate Cain (@cain_nate), who forensically imaged Konnech’s devices for the Los Angeles District Attorney’s office, stated that Konnech stored the personal data of U.S. election workers and judges on servers in China.
You can read the entire thread here at Kanekoa twitter page – for a $5 fee. It is well worth it.
Kanekoa confirms what has been previously reported. The FBI knew about Konnech and its ties to the Chinese Communist Party and its work with US elections. The DC FBI elites DROPPED the investigation into Konnech for some reason. This is just the latest example of the lawlessness of our top investigative agency.
In this instance it appears they are working for the Chinese Communists and against the American people. What else are they hiding?