🚨BREAKING: Explosive video surfaces of FOX News stars Tucker Carlson, Laura Ingraham, and Sean Hannity slamming Trump's "insane" voting machine fraud allegations as "absurd," "ridiculous," and "complete BS"!
#2 All electronic voting equipment can easily be hacked because all such equipment must receive programming before each election from memory cards prepared on election management systems which are computers often connected to the internet running out-of-date versions of Windows.… twitter.com/i/web/status/1…
#3 In 2019, the Associated Press reported that the vast majority of 10,000 election jurisdictions nationwide, including numerous swing states, were still using Windows 7 or older operating systems to produce ballots, program voting machines, count votes, and report results.… twitter.com/i/web/status/1…
#4 Furthermore, not only are U.S. elections being programmed on computers running out-of-date software, but voting machine manufacturers have also installed remote-access software and wireless modems connecting voting machines directly to the internet.
#5 Dominion Voting Systems, the second-largest U.S. election machine vendor, which has given public presentations acknowledging their use of modems in their voting machines, was also discovered to be running remote-access software during the 2020 election:
#6 This isn’t a problem exclusive to elections — all computers are hackable — and that is why election security experts have always recommended the use of hand-marked paper ballots and rigorous post-election audits.
#7 Professor Matt Blaze of Georgetown University's Computer Science Department provided testimony on the vulnerabilities of the United States' election system during a congressional hearing titled "2020 Election Security" on January 9, 2020:
#8 Professor J. Alex Halderman of the University of Michigan's Computer Science Department provided testimony on the vulnerabilities of the United States' election system during a congressional hearing titled "Russian Interference in U.S. Elections" on June 21, 2017:
#9 Professor Andrew Appel of Princeton University's Computer Science Department provided testimony on the vulnerabilities of the United States' election system during a congressional hearing titled "Election Cybersecurity" on September 28, 2016:
#10 Senator Ron Wyden provided testimony on the vulnerabilities of the United States' election system during a congressional hearing titled "Election Security" on July 15, 2019:
"The vast majority of ten thousand election jurisdictions nationwide use election management systems… twitter.com/i/web/status/1…
#11 Senator Elizabeth Warren published an article on her website on the vulnerabilities of the United States' election system titled "Strengthening Our Democracy" on June 25, 2019:
"The harsh truth is that our elections are extremely vulnerable to attack: Forty-two states use… twitter.com/i/web/status/1…
#12 In Dec. 2019, Senators Elizabeth Warren, Amy Klobuchar, Ron Wyden, and Mark Pocan sent letters to the three private equity firms that own the largest voting machine companies in the US expressing their concern about the industry's "vulnerabilities" and "lack of transparency."… twitter.com/i/web/status/1…
#13 Following Hillary Clinton's defeat in the 2016 election, the corporate media dedicated the next four years to writing hundreds of articles about the extent to which the United States' election system is online, compromised, and vulnerable to hackers.
#14 The Guardian: Voting machine password hacks as easy as 'abcde' (April 15, 2015)
“Touchscreen WinVote voting machines used in numerous elections between 2002 and 2014 used “abcde” and “admin” as passwords and could easily have been hacked from the parking lot outside the… twitter.com/i/web/status/1…
#15 New York Times: Millions of Voter Records Posted, and Some Fear Hacker Field Day (Dec. 30, 2015)
“First and last names. Recent addresses and phone numbers. Party affiliation. Voting history and demographics. A database of this information from 191 million voter records was… twitter.com/i/web/status/1…
“They are old, buggy, and insecure. If someone wanted to mess with the US election, these machines would be an easy way in. Most of these machines are running Windows XP, for which Microsoft… twitter.com/i/web/status/1…
#17 Politico: How to Hack an Election in 7 Minutes (Aug. 5, 2016)
“Princeton professor Andrew Appel decided to hack into a voting machine… He summoned a graduate student named Alex Halderman, who could pick the machine’s lock in seven seconds. Clutching a screwdriver, he deftly… twitter.com/i/web/status/1…
#18 CBS: Hacker demonstrates how voting machines can be compromised (Aug. 10, 2016)
“Concerns are growing over the possibility of a rigged presidential election. Roughly 70 percent of states in the U.S. use some form of electronic voting. Hackers told CBS News that problems with… twitter.com/i/web/status/1…
#19 ABC News: Yes, It's Possible to Hack the Election (Aug. 19, 2016)
“Slight meddling in some swing precincts in swing states could tip the scales. If it’s a computer, it can be hacked… if sophisticated hackers want to get into any computer or electronic device, even one that… twitter.com/i/web/status/1…
#20 The Atlantic: How Electronic Voting Could Undermine the Election (Aug. 29, 2016)
“…computer-security experts think electronic voting is a very, very bad idea. For years, security researchers and academics have urged election officials to hold off on adopting electronic… twitter.com/i/web/status/1…
#21 FOX: Princeton Professor demonstrates how to hack a voting machine (Sept. 18, 2016)
“I have demonstrated how to hack the AVC Advantage voting machines that we use in New Jersey... The touch screen voting machine, the type used in about ten states, can be tampered with... By… twitter.com/i/web/status/1…
#22 Fortune: Watch This Security Researcher Hack a Voting Machine (Nov. 4, 2016)
“Researchers at cybersecurity startup Cylance said they were able to hack into the Sequoia AVC Edge Mk1, used to count votes in states including California, Florida, and New Jersey, and change the… twitter.com/i/web/status/1…
#23 Vox: Here’s how hackers can wreak havoc on Election Day (Nov. 7, 2016)
“Voting machines are old and vulnerable, and voter databases are connected to the internet. Many voting machines are running software that’s over a decade old, like Windows XP, which Microsoft hasn’t… twitter.com/i/web/status/1…
#24 PBS: Here’s how hackers might mess with electronic voting on Election Day (Nov. 8, 2016)
“…vulnerabilities in electronic ballots, make hacking a major possibility on Election Day… Five states — New Jersey, Delaware, Georgia, Louisiana, and South Carolina — will cast votes… twitter.com/i/web/status/1…
#25 Slate: Now Is the Time to Replace Our Decrepit Voting Machines (Nov. 17, 2016)
“With antiquated voting devices at the end of their projected lifespans still in widespread use across the country, the U.S. is facing an impending crisis in which our most basic election… twitter.com/i/web/status/1…
#26 PBS: Recounts or no, U.S. elections are still vulnerable to hacking (Dec. 26, 2016)
“Pennsylvania is one of 11 states where the majority of voters use antiquated machines that store votes electronically, without printed ballots or other paper-based backups that could be used… twitter.com/i/web/status/1…
#27 Politico: U.S. elections are more vulnerable than ever to hacking (Dec. 29, 2016)
“America's political system will remain vulnerable to cyberattacks and infiltration from foreign and domestic enemies unless the government plugs major holes and commits millions of dollars in… twitter.com/i/web/status/1…
#28 ScientificAmerican: Our Voting System Is Hackable by Foreign Powers (March 1, 2017)
“It is entirely possible for an adversary to hack American computerized voting systems directly and select the next commander in chief. A dedicated group of technically sophisticated… twitter.com/i/web/status/1…
#29 Politico: Will the Georgia Special Election Get Hacked? (June 14, 2017)
“A 29-year-old former cybersecurity researcher with the federal government’s Oak Ridge National Laboratory in Tennessee, Lamb, who now works for a private internet security firm in Georgia, wanted to… twitter.com/i/web/status/1…
#30 NPR: If Voting Machines Were Hacked, Would Anyone Know? (June 14, 2017)
“U.S. officials are increasingly worried about how vulnerable American elections really are… But even if most voting machines aren't connected to the Internet, says cybersecurity expert Jeremy Epstein,… twitter.com/i/web/status/1…
#31 HuffPost: Good News For Russia: 15 States Use Easily Hackable Voting Machines (July 17, 2017)
"Touch-screen machines can be programmed to change votes and are nearly impossible to audit, computer experts say… Manufacturers like Diebold touted the touch screens, known as… twitter.com/i/web/status/1…
#32 CNET: Defcon hackers find it’s very easy to break voting machines (July 30, 2017)
“When the password for a voting machine is "abcde" and can't be changed, the integrity of our democracy might be in trouble. The Advanced Voting Solutions WinVote machine, dubbed "America's… twitter.com/i/web/status/1…
#33 CNN: We watched hackers break into voting machines (Aug. 11, 2017)
“These are supposed to be the latest machines, they're still used in elections, and they're running ancient software. I think that if somebody wanted to, it would be pretty easy to fake an election…So if you… twitter.com/i/web/status/1…
#34 The Intercept: The U.S. Election System Remains Deeply Vulnerable (Oct. 3, 2017)
"The Harvard report, titled “Voter Identity Theft: Submitting Changes to Voter Registrations Online to Disrupt Elections,” concludes that online attackers can alter voter registration… twitter.com/i/web/status/1…
#35 New York Times: The Myth of the Hacker-Proof Voting Machine (Feb. 2, 2018)
“Examining the election-management computer at the county’s office — the machine used to tally official election results and, in many counties, to program voting machines — they found that… twitter.com/i/web/status/1…
#36 Slate: America's Voting Systems Are Highly Vulnerable to Hackers (Feb. 22, 2018)
“Did Russia shift the election’s outcome by hacking registration rolls or voting machines? The fact is that it’s impossible to say. In September, the Department of Homeland Security informed… twitter.com/i/web/status/1…
#37 New York Times: I Hacked an Election. So Can the Russians. (April 5, 2018)
“After the chaos of the 2000 election, we were promised a modern and dependable way to vote, Halderman says in the video. “I’m here to tell you that the electronic voting machines Americans got to… twitter.com/i/web/status/1…
#38 The New Yorker: America Continues To Ignore Risks of Election Hacking (April 18, 2018)
“America’s voting systems are hackable in all kinds of ways. As a case in point, in 2016, the Election Assistance Commission, the bipartisan federal agency that certifies the integrity of… twitter.com/i/web/status/1…
#39 Reuters: Old voting machines stir concerns among U.S. officials (May 31, 2018)
“In 14 of the 40 most competitive races, Americans will cast ballots on voting machines that do not provide a paper trail to audit voters’ intentions if a close election is questioned… These… twitter.com/i/web/status/1…
#40 Axios: There's more than one way to hack an election (July 2, 2018)
“Here are the systems at risk in the election process: voter registration systems, voter registration databases (which the voter registration process produces), voter records at polling places (known as poll… twitter.com/i/web/status/1…
#41 Newsweek: Election Hacking: Voting-Machine Supplier Admits It Used Hackable Software Despite Past Denials (July 17, 2018)
“One of the country's largest voting machine makers has admitted in a letter to a U.S. senator that some of its past election-management systems had… twitter.com/i/web/status/1…
“A letter sent to Congress reveals that, between 2000 and 2006, one of America's top voting machine companies installed remote-access software in their products that… twitter.com/i/web/status/1…
#43 BBC: Hacking the US mid-terms? It's child's play (Aug. 11, 2018)
“Bianca Lewis, 11, has many hobbies. She likes Barbie, video games, fencing, singing… and hacking the infrastructure behind the world’s most powerful democracy…She’s taking part in a competition organized by… twitter.com/i/web/status/1…
#44 PBS: An 11-year-old changed election results on a replica Florida state website in under 10 minutes (Aug. 12, 2018)
“An 11-year-old boy on Friday was able to hack into a replica of the Florida state election website and change voting results found there in under 10 minutes… twitter.com/i/web/status/1…
#45 The Guardian: Why US elections remain 'dangerously vulnerable' to cyber-attacks (Aug. 13, 2018)
“By mid-evening, Jon Ossoff, the leading Democrat, had 50.3% of the vote, enough to win outright without the need for a run-off against his closest Republican challenger. Then… twitter.com/i/web/status/1…
#46 The Guardian: Kids at hacking conference show how easily US elections could be sabotaged (Aug. 22, 2018)
“The risk of a hacker casting the validity of an election into question through one of any number of other entry points is huge, and the actual difficulty of such an… twitter.com/i/web/status/1…
#47 CBS: Why voting machines in the U.S. are easy targets for hackers (Sept. 19, 2018)
“Tens of thousands of voting machines in the United States are vulnerable to hacking. They have been successfully dismantled and attacked by security researchers for years to demonstrate their… twitter.com/i/web/status/1…
#48 New York Times: The Crisis of Election Security (Sept. 26, 2018)
The Illinois intruders had quietly breached the network in June and spent weeks conducting reconnaissance. After alighting on the state’s voter registration database, they downloaded information on hundreds of… twitter.com/i/web/status/1…
#49 Politico: Attack on commonly used voting machine could tip an election (Sept. 27, 2018)
“A malicious hacker could alter the outcome of a U.S. presidential election by taking advantage of numerous flaws in one model of vote-tabulating machine used in 26 states, cybersecurity… twitter.com/i/web/status/1…
#50 WSJ: Voting Machine Used in Half of U.S. Is Vulnerable to Attack (Sept. 27, 2018)
“Election machines used in more than half of U.S. states carry a flaw disclosed more than a decade ago that makes them vulnerable to a cyberattack, according to a report to be delivered… twitter.com/i/web/status/1…
#51 CNN: Hackers Bring Stark Warning About Election Security (Sept. 27, 2018)
“The vulnerabilities in America’s voting systems are “staggering,” a group representing hackers warned lawmakers on Capitol Hill on Thursday – just over a month before the midterm elections. The… twitter.com/i/web/status/1…
#52 Wired: Voting Machines Are Still Absurdly Vulnerable to Attacks (Sept. 28, 2018)
“The report details vulnerabilities in seven models of voting machines and vote counters, found during the DefCon security conference's Voting Village event. All of the models are in active use… twitter.com/i/web/status/1…
#53 Slate: Can Paper Ballots Save Our Democracy? (Oct. 10, 2018)
“The machine was an AccuVote TSX used in 18 states, some with the same software version. Attackers don't need physical access--we showed how malicious code can spread from the election office when officials program… twitter.com/i/web/status/1…
#54 New York Times: America's Elections Could Be Hacked. Go Vote Anyway. (Oct. 19, 2018)
"In April, the nation’s top voting machine manufacturer told Senator Ron Wyden of Oregon that it had installed remote-access software on election-management systems that it sold from 2000 to… twitter.com/i/web/status/1…
#55 Vox: The hacking threat to the midterms is huge. (Oct. 25, 2018)
"On a scale of 1 to 10, with 10 being the Pentagon’s [security measures], elections have probably moved from a 2 to a 3… They laid out a number of scenarios that could exploit vulnerable election… twitter.com/i/web/status/1…
#56 Scientific American: The Vulnerabilities of Our Voting Machines (Nov. 1, 2018)
“This just isn’t a good idea to have elections be conducted by, essentially, black box technology.”…The voting machines themselves have received much, much, much less scrutiny post-2016 from… twitter.com/i/web/status/1…
#57 Salon: Philly ignores cybersecurity and disability access in voting system selection (Feb. 16, 2019)
"According to computer science professor Richard DeMillo of Georgia Tech, the barcodes also can be manipulated to instruct the scanners to flip votes. Adding insult to… twitter.com/i/web/status/1…
#58 Politico: State election officials opt for 2020 voting machines vulnerable to hacking (March 1, 2019)
“Security experts warn, however, that hackers could still manipulate the barcodes without voters noticing. The National Academies of Sciences, Engineering, and Medicine has… twitter.com/i/web/status/1…
#59 TechCrunch: Senators demand to know why election vendors still sell voting machines with ‘known vulnerabilities’ (March 27, 2019)
“The letter, sent Wednesday, calls on election equipment makers ES&S, Dominion Voting, and Hart InterCivic to explain why they continue to sell… twitter.com/i/web/status/1…
#60 Salon: New "hybrid" voting system can change paper ballot after it's been cast (March 28, 2019)
“Unfortunately, there is no universal definition of “paper ballot,” which has enabled vendors and their surrogates to characterize machine-marked paper printouts from hackable… twitter.com/i/web/status/1…
#61 Vice: Critical U.S. Election Systems Have Been Left Exposed Online Despite Official Denials (Aug. 8, 2019)
“The top voting machine company in the country insists that its election systems are never connected to the internet. But researchers found 35 of the systems have been… twitter.com/i/web/status/1…
#62 NBC News: How Hackers Can Target Voting Machines (Aug. 12, 2019)
"They had assembled some of the most common voting machines in the country, both systems on the front-end that you and I use to register our vote and the back-end tabulators and so forth that you feed a paper… twitter.com/i/web/status/1…
#63 MIT Technology Review: 16 million Americans will vote on hackable paperless machines (Aug. 13, 2019)
“Despite the obvious risk and years of warnings, at least eight American states and 16 million American voters will use completely paperless machines in the 2020 US… twitter.com/i/web/status/1…
#64 Salon: Hackers can easily break into voting machines used across the U.S. (Aug. 14, 2019)
“Voting machines used in states across the United States were easily penetrated by hackers at the Def Con conference in Las Vegas on Friday…A video published by CNN shows a hacker… twitter.com/i/web/status/1…
#65 FOX News: Election machine keys are on the Internet, hackers say (Aug. 22, 2019)
“I may have the keys to open voting machines used in states across the country, and that is not a good thing. I am not an election official. I am not a voting machine expert, operator, or… twitter.com/i/web/status/1…
#66 The Hill: Voting machines pose a greater threat to our elections than foreign agents (Oct. 2, 2019)
"In 2017, the largest U.S. voting machine vendor, ES&S, exposed encrypted employee passwords online. Using those passwords, hackers could have planted malware on the company’s… twitter.com/i/web/status/1…
"The machine he's investigating is a ballot-marking device used to help people with physical impairments or language barriers vote, and it's running a version of Windows that is more… twitter.com/i/web/status/1…
#68 Wired: Some Voting Machines Still Have Decade-Old Vulnerabilities (Sept. 26, 2019)
“Today's report highlights detailed vulnerability findings related to six models of voting machines, most of which are currently in use. That includes the ES&S AutoMARK, used in 28 states in… twitter.com/i/web/status/1…
#69 John Oliver Breaks Down Faulty Voting Machine Security on Last Week Tonight (Nov. 3, 2019)
John Oliver offered various examples of how easy it is to physically hack a voting machine (it can take only a few minutes), how easy it is to find unattended voting machines, and how… twitter.com/i/web/status/1…
• • •
Missing some Tweet in this thread? You can try to
force a refresh
🚨EXCLUSIVE: @FBIDirectorKash & @FBIDDBongino: Expose the FBI and Gascón’s Konnech–CCP Election Software Cover-Up
Strong evidence shows that corrupt FBI officials and former LADA George Gascón deliberately concealed CCP infiltration of U.S. election systems—because exposing it would have politically benefited @realDonaldTrump.
@Kash_Patel & @dbongino now have a rare opportunity: expose how deeply politicized the FBI became, remove CCP-controlled software from America’s elections, and finish an investigation that was already 90% complete before it was sabotaged.
At the center of the scandal is Konnech, a Michigan-based election software company secretly developed and financed by two Chinese firms—Jinhua Yulian Network and Jinhua Hongzheng Technology—under contract with China’s National People’s Congress and in partnership with state-owned giants like Huawei, China Telecom, China Unicom, China Mobile, and Lenovo.
Konnech’s flagship product, PollChief, is used to manage poll worker scheduling, equipment deployment, and logistics in major U.S. cities including Los Angeles, San Francisco, Detroit, Washington D.C., Fairfax County, and St. Louis.
In early 2021, @TrueTheVote's Catherine Engelbrecht and Gregg Phillips discovered that Konnech was storing the personally identifiable information (PII) of U.S. election workers, judges, and voters on servers in China. Using open-source tools like Binary Edge, they traced PollChief to Chinese IP addresses—where they found unsecured databases containing names, Social Security numbers, addresses, bank information, voter roll data, polling location schematics, provisional ballot serial numbers, and even passwords for voting machines.
They alerted FBI field offices in Detroit and San Antonio, where agents took the threat seriously and launched a 15-month counterintelligence investigation. But in April 2022—just before the release of Dinesh D’Souza’s 2000 Mules, a film on 2020 election fraud featuring True the Vote—FBI headquarters in Washington, D.C. intervened and flipped the investigation on its head.
Field agents warned Engelbrecht and Phillips that they, not Konnech, were now considered the threat. Two senior female FBI officials in Washington D.C. were reportedly preparing criminal charges against them rather than Konnech’s CEO Eugene Yu. Engelbrecht was warned she and Phillips might be prosecuted for accessing Konnech’s data on Chinese servers.
The FBI even tipped off Konnech about the investigation—compromising the case—and began circulating internal accusations that Phillips had committed cybercrimes, referring those allegations to the CIA and NSA. Phillips said their goal was to “Roger Stone” him—publicly smear and criminalize him as they had done to Trump allies.
In fear for their safety, a field agent advised Engelbrecht and Phillips to take the “nuclear option”—go public. On August 13, 2022, they did just that at The Pit, a closed-door briefing in Arizona with 200 cybersecurity experts, journalists, and election integrity investigators.
Two weeks later, Konnech sued them. In a stunning series of courtroom actions, Engelbrecht and Phillips were jailed and held in solitary confinement—until the Fifth Circuit Court of Appeals ordered their immediate release. The FBI stood by and let it happen. After their release, they published thousands of documents exposing Konnech’s ties to China. Within days, Konnech dropped the lawsuit.
Meanwhile, independent researchers quickly pieced together Eugene Yu’s background. Born in China, Jianwei Yu (于建伟) graduated from Zhejiang University in 1982 and worked for the CCP from 1983 to 1985 as a project manager in the Guangzhou Economic and Technological Development Zone. He moved to the U.S. in 1986 to pursue an MBA at Wake Forest University.
In 2002, Yu founded Konnech. By November 2005, he had launched a Chinese subsidiary—Jinhua Yulian Network—funded and overseen by the CCP. That same year, he was profiled as an “overseas scholar” in a Chinese-language publication by the China Association for Science and Technology (CAST) and the American Zhu Kezhen Education Foundation (AZKEF).
CAST is a formal CCP arm linking Chinese leadership with overseas scientists and technologists. AZKEF, where Yu served on the finance committee, flew U.S. researchers—including Harvard’s Charles Lieber—to Chinese universities. Lieber was later arrested for failing to disclose his ties to China’s Thousand Talents Plan, one of the CCP’s many programs that recruit foreign experts to encourage the illicit transfer of intellectual property back to China.
Konnech’s Chinese ties ran deep. It partnered with Michigan State University’s Confucius Institute, developed software in CCP-run tech parks, and directly served China’s National People’s Congress (NPC) and the Chinese People’s Political Consultative Conference (CPPCC).
On January 25, 2006, Yu’s Chinese company was accepted into the Chinese Academy of Sciences’ Jinhua Science and Technology Park—a CCP-controlled tech incubator. From that point on, Jinhua Yulian Network and Konnech, were financed, developed, and controlled by the Chinese Communist Party.
Just a month later, on February 25, 2006, Yu registered the domain yu-lian .cn for Jinhua Yulian Network using his Konnech email address (eyu@konnech .com). Archived versions of the company’s Chinese-language website show Yu praising “Comrade Jiang Zemin” and the Chinese Communist Party, while promoting Konnech’s software products used by the National People’s Congress, the Chinese People’s Political Consultative Conference, Election Management Solutions Detroit, and U.S. Overseas Voters.
In December 2006, Konnech partnered with the Confucius Institute to build a Chinese communication platform called ChineseBrief .com. Yu registered CNBrief LLC, launched www.cnbrief .com, and displayed a banner in Chinese that translated to: “Chinese Brief – Overseas Chinese Network.”
Confucius Institutes are CCP-funded cultural centers embedded in Western universities that U.S. intelligence agencies and lawmakers have long warned operate under the direction of the CCP.
On July 18, 2007, an archived Chinese government website showed Yu offering a 5 million yuan (~$700,000 USD) software development contract on behalf of Jinhua Yulian Network, again using his Konnech email address and website.
2/🚨Screenshot: Konnech’s official Facebook page announcing a partnership with Michigan State University’s Confucius Institute to develop ChineseBrief .com, a Chinese communication platform. The post highlights Konnech’s direct ties to Confucius Institutes—flagged by U.S. intelligence as CCP influence operations in U.S. universities. Source: Konnech Facebook
WHOIS Record: Eugene Yu registered yu-lian .cn—the domain for Jinhua Yulian Network—on February 25, 2006, using his Konnech email (eyu@konnech .com), directly linking Konnech to a China-based software company funded, developed, and controlled by the CCP. Source: WHOIS History
Screenshots: Chinese and English versions of Jinhua Yulian Network’s “Consulting Services” page, where Eugene Yu’s subsidiary promotes election software for the CCP's National People's Congress, Chinese People’s Political Consultative Conference, and Communist Youth Leagues—while praising "Comrade Jiang Zemin" and aligning its products with "China’s national conditions." Source: Jinhua Yulian Network (yu-lian .cn)
Screenshots: Chinese and English versions of the “Customer Cases” page on yu-lian .cn, where Eugene Yu’s CCP subsidiary promotes Konnech’s election software for Detroit and U.S. overseas voters—immediately after praising “Comrade Jiang Zemin” and showcasing its election systems built for the Chinese Communist Party. Source: Jinhua Yulian Network (yu-lian .cn)
*All source links provided within the article.
3/🚨Cover: December 2005 issue of Overseas Scholars, profiling Eugene Yu as an “overseas scholar.” Published by CAST and AZKEF—two CCP-linked organizations that connect overseas scientists and technologists with the Chinese government. Yu served as a finance committee officer at AZKEF, which flew Harvard’s Charles Lieber to Zhejiang University—years before Lieber was prosecuted for failing to disclose his involvement in a CCP talent recruitment program. Source: China Association of Science and Technology, U.S.A.
Screenshots: Official listing from the Jinhua Science & Technology Park showing Eugene Yu’s Chinese subsidiary, Jinhua Yulian Network, was accepted into the CCP-run incubator on January 25, 2006—marking the start of direct CCP oversight and support for Konnech’s China-based operations. Source: Jinhua Science and Technology Park (jhcy .cn)
Screenshots: Official listing from the CCP-run Jinhua Science and Technology Park showing Eugene Yu’s Chinese company, Jinhua Yulian Network, offering a 5 million yuan (~$700,000 USD) software development project on July 18, 2007. The listing uses konnech .com as the contact URL, directly linking Konnech’s U.S. software development to a CCP-run tech park. Source: Jinhua Science and Technology Park (jhcy .cn)
Screenshots: 2014 government record from Jinhua Science and Technology Bureau lists Jinhua Yulian Network Technology Co., Ltd.—Konnech’s China-based subsidiary—as a CCP-backed “provincial science and technology enterprise.” Source: Jinhua Science and Technology Government Affairs (jinhua .gov.cn)
🚨THREAD: @BretWeinstein tells @TuckerCarlson it's likely President Trump that is standing in the way of @RobertKennedyJr removing the COVID mRNA vaccine recommendations for children.
They highlight the case of Maddie de Garay, a 12-year-old girl who suffered severe injuries during Pfizer’s clinical trial.
@TuckerCarlson: "Where are we on the mRNA shots?"
@BretWeinstein: "I fear this question because everybody tells me there's no way forward by reaching President Trump. He can't hear it, and maybe I'll have to learn that myself."
"We are still recommending them for tiny children who don't stand to benefit at all... All mRNA shots induce a built-in vulnerability... The body will naturally attack the cells that are producing whatever protein you load into the mRNA platform..."
"The reason that the COVID shots produce such a wide range of pathologies is that they flow all around the body. There's no targeting mechanism in them. They invade tissues haphazardly, and then those tissues get targeted by the immune system, as of course they would, including the brain, including the heart."
"There's no justification scientifically, but injecting them into children for whom there was never a justification, because children didn't die from COVID, and they were injured by the shot. So why would you take a healthy child and give them something with a risk of a severe pathology when the disease it protects them from isn't a serious threat in the first place?"
"It's well beyond criminal negligence at this point. This is depraved indifference. This is the injection of these products into innocent people who are incapable of being informed and incapable of consenting in spite of the fact that you know that some substantial fraction of them will be profoundly injured. It is depraved indifference."
2/ @TuckerCarlson: "What's the process to stop recommending mRNA shots to children?"
@BretWeinstein: "I believe it could be done effectively, instantaneously, if the President were on board. The President has a certain amount of pride in Operation Warp Speed... That has caused him to dig his heels in."
"That is unnecessary. The President is in no way responsible for the appalling content of these shots. He's not a biologist. He listened to people who knew the material far better than he did, and they lied to him. That's entirely separate from the question of whether or not Operation Warp Speed was an accomplishment, whether he succeeded in bringing a shot to the public in record time, which he did."
"So, to my way of thinking, he can be proud of Operation Warp Speed, and he can be livid at the people who lied to him about the shot, and he can be horrified by all the damage that that shot has done, and I hope that he will see that. I'm wondering if maybe what might open his eyes to this is the plight of the vaccine-injured, which to me is one of the starkest horrors I've ever witnessed."
3/ @TuckerCarlson: "There are no Cabinet Secretaries that could act independently?"
@BretWeinstein: "You're surely talking about @RobertKennedyJr, who I believe absolutely would if he had the power. It must be a White House decision because Bobby knows the horror of these shots as well as or better than anyone."
"I think he must feel that he can't get there, or maybe he's working there overtime. But every month that we wait, more children are being injected with these things."
🚨THREAD: Paul Hyon Kim, 36, has been arrested for torching a row of Teslas with Molotov cocktails and spray-painting "RESIST" across the entrance of the Tesla service center in Las Vegas.
The legacy media radicalized this Democrat.
Here are his social media posts.👇
1/ On his IG, Kim links to his website (paulhyonkimdotcom) alongside a "Donations to Palestine" link.
His website identifies him as a cinematographer who relocated from the Pacific Northwest to Las Vegas.
On Vimeo, he lists his pronouns as he/him.
2/ His recent IG story labels @hasanthehun a "sellout" for gifting items to AOC and Bernie Sanders during a recent interview.
The post criticizes Hasan for not interviewing Jill Stein and for not challenging AOC and Bernie on "their support for Zionism and Iron Dome funding."