Professional Documents
Culture Documents
Yu Appendix
Yu Appendix
NO. 22-20578
Case No. 4:22CV3096, Konnech Inc. v. True the Vote, Catherine Engelbrecht And
Gregg Phillips
Constantine Z. Pamphilis
Texas State Bar No. 00794419
Nathan W. Richardson
Texas State Bar No. 24094914
KASOWITZ BENSON TORRES LLP
1415 Louisiana Street, Suite 2100
Houston, Texas 77002
Telephone: (713) 220-8800
Facsimile: (713) 222-0843
Email: DPamphilis@kasowitz.com
Email: NRichardson@kasowitz.com
i
Case: 22-20578 Document: 00516542767 Page: 2 Date Filed: 11/11/2022
NO. 22-20578
Case No. 4:22CV3096, Konnech Inc. v. True the Vote, Catherine Engelbrecht And
Gregg Phillips
The undersigned counsel of record certifies that the following listed persons
and entities as described in the fourth sentence of Fifth Circuit Rule 28.2.1 have an
interest in the outcome of this case. These representations are made in order that the
ii
Case: 22-20578 Document: 00516542767 Page: 3 Date Filed: 11/11/2022
Respondent
Konnech, Inc.
Constantine Z. Pamphilis
Nathan W. Richardson
KASOWITZ BENSON TORRES LLP
1415 Louisiana Street, Suite 2100
Houston, Texas 77002
www.kasowitz.com
Telephone: (713) 220-8800
Facsimile: (713) 222-0843
Email: DPamphilis@kasowitz.com
Email: NRichardson@kasowitz.com
Petitioners
Catherine Engelbrecht
Gregg Phillips
True the Vote, Inc.
Michael J. Wynne
Cameron Powell
James L. Turner
GREGOR WYNNE ARNEY, PLLC
909 Fannin Street, Suite 3800
Houston, Texas 77010
Email: mwynne@gwafirm.com
Email: cpowell@gwafirm.com
Email: jturner@gwafirm.com
Brock C. Akers
The Akers Law Firm
3401 Allen Parkway, Suite 101
Houston, Texas 77019
Email: bca@akersfirm.com
iii
Case: 22-20578 Document: 00516542767 Page: 4 Date Filed: 11/11/2022
John C. Kiyonaga
Law Officers of John Kiyonaga
600 Cameron Street
Alexandria, Virginia 22314
Email: john@johnckiyonaga.com
s/ Constantine Z. Pamphilis
Constantine Z. Pamphilis
Attorney of Record for Respondent
iv
Case: 22-20578 Document: 00516542767 Page: 5 Date Filed: 11/11/2022
TABLE OF CONTENTS
I. The District Court Order Was In Effect and Required Certain Conduct ......17
II. Petitioners Did Not Comply with the District Court’s Orders ......................18
A. Petitioners Refuse to Identify Who Was Involved In Accessing
Respondent’s Computers ...........................................................................18
v
Case: 22-20578 Document: 00516542767 Page: 6 Date Filed: 11/11/2022
III. The District Court Properly Exercised Its Discretion in its Contempt
Finding .......................................................................................................24
IV. Petitioners’ Attempted Collateral Attack on the TRO is Improper ...........26
VI. Petitioners’ Petition for Mandamus Does Not Comply With the Rules ....31
CONCLUSION ........................................................................................................32
vi
Case: 22-20578 Document: 00516542767 Page: 7 Date Filed: 11/11/2022
TABLE OF AUTHORITIES
Page(s)
Cases
Shillitani v. U.S.,
384 U.S. 364 (1966) ............................................................................................ 25
vii
Case: 22-20578 Document: 00516542767 Page: 8 Date Filed: 11/11/2022
U.S. v. Nosal,
930 F. Supp. 2d 1051 (N.D. Ca. 2013) ............................................................... 30
U.S. v. Wilson,
421 U.S. 309 (1975) ............................................................................................ 19
Vioxx Prod. Liabl. Litig. Steering Comm. v. Merck & Co., Inc.,
No. 06-30378, 2006 WL 1726675 (5th Cir. May 26, 2006) .............................. 31
Statutes
viii
Case: 22-20578 Document: 00516542767 Page: 9 Date Filed: 11/11/2022
Whether Petitioners satisfied their burden to show that the District Court
This case involves Petitioners’ direct and admitted defiance of court orders
and the District Court’s efforts to secure their compliance. Petitioners’ contempt is
undeniable and inexcusable. For 2 months, Petitioners have defied court orders
requiring them to identify everyone who was involved in hacking into and inspecting
data on Respondent’s computers, to describe how they did it and to identify everyone
who has had possession of it. Petitioners have treated compliance with the court’s
orders like a game of cat and mouse. For example, for 6 weeks after the TRO was
Konnech’s data whose identity they were ordered to disclose. When they
cause hearing, they refused to identify him despite a direct order to do so. Further,
openly admit that they still have not disclosed, as required by the TRO, “how, when,
and by whom Konnech’s protected computers were accessed” even though the TRO
1
Case: 22-20578 Document: 00516542767 Page: 10 Date Filed: 11/11/2022
Far from abusing its discretion, the District Judge afforded Petitioners every
opportunity to comply with his orders and to purge their contempt, but Petitioners
have wasted every opportunity afforded to them. The District Judge correctly
exercised his coercive contempt power and should be permitted to continue to use
the coercive and compensatory contempt tools available to all federal judges to
Petitioners’ attempt to avoid complying with the TRO by claiming this is all
the TRO and, instead, agreed to extend the TRO. Further, even though Petitioners
opposed Respondent’s request for a preliminary injunction, they did not claim any
such, the District Court issued a preliminary injunction on October 31, which is in
all respects identical to the TRO. Petitioners’ desperate attempt to avoid complying
with the TRO based on a “misunderstanding” is simply too little too late.
STANDARD OF REVIEW
petitioner establishes that: (1) he has “no other adequate means to attain the relief he
desires,” (2) his “right to issuance of the writ is clear and indisputable,” and (3) “the
2
Case: 22-20578 Document: 00516542767 Page: 11 Date Filed: 11/11/2022
F.3d 304, 311 (5th Cir. 2008) (citing Cheney v. U.S. Dist. Ct., 542 U.S. 367, 380-81
(2004)).
Allied Pilots Ass’n, 228 F.3d 574, 578 (5th Cir. 2000). Where the decision of the
lower court is discretionary, “a clear and indisputable right to the issuance of the writ
of mandamus will arise only if the district court has clearly abused its discretion,
such that it amounts to a judicial usurpation of power.” In re Gee, 941 F.3d 153,
159 (5th Cir. 2019). Demonstrating this right “requires more than showing that the
district court misinterpreted the law, misapplied it to the facts, or otherwise engaged
in an abuse of discretion.” Leonard v. Martin, 38 F.4th 481, 489 (5th Cir. 2022)
amounting to a judicial usurpation of power.” Id. That is, petitioner “must show not
only that the district court erred, but that it clearly and indisputably erred[.]” Id.
(emphasis in original).
Konnech provides cities and counties with election logistics software called
PollChief which is used to recruit, train and schedule poll workers; coordinate the
3
Case: 22-20578 Document: 00516542767 Page: 12 Date Filed: 11/11/2022
personnel to address technical issues. (App 41). Konnech does not select,
communicate, or interface with any poll workers. (Id.) And Konnech is not involved
processing of ballots, nor the collection, counting or reporting of votes. (Id.) It thus
begs the question how Petitioners could believe that Respondent could ever be
involved in election fraud when Respondent is not involved with ballots in any U.S.
election.
Petitioners are in business to capitalize from their claim that the 2020
Presidential Election was “stolen.” (App 5-6 at ¶ 3). Petitioners, who are known as
the “Bonnie and Clyde” of election fraud1, have enriched themselves by spreading
conspiracy theories, which they present as factual in nature, largely funded by money
funneled through True the Vote, which some commentators have called a “big
fact that Respondent stored poll worker data on any server in China. Petitioners’
1
See Mimi Swartz, How True the Vote Fabricates Claims of Election Fraud, for Fun and Profit,
Texas Monthly (Aug. 22, 2022), available at, https://www.texasmonthly.com/news-politics/true-
the-vote-election-fraud/. (App 5-6 at ¶ 3).
2
See Cassandra Jaramillo, She Helped Create the Big Lie. Records Suggest She Turned It Into a
Big Grift, Reveal News (June 8, 2022), available at, https://revealnews.org/article/true-the-vote-
big-lie-election-fraud/. (Id.).
4
Case: 22-20578 Document: 00516542767 Page: 13 Date Filed: 11/11/2022
identifies the existence of a server but does not reveal any data contained on that
server. (App 109, 116:16-18) (“Q. My question is simply: BinaryEdge does not
show you the data; correct? A. No. That would be exposure of PII.”).
their involvement in the production of the “documentary” 2000 Mules in which they
sought to convince their followers that people, who they refer to as “mules,” were
paid to collect and deposit fake ballots into ballot boxes for the 2020 Presidential
Election. (App 6-7, at ¶ 4). The theories peddled in 2000 Mules, however, have
been repeatedly disproven. (Id.) Apparently realizing that 2000 Mules had run its
course, Petitioners have now shifted their focus and made Respondent their new
target. (Id.)
The events preceding this lawsuit began in the summer of 2022, when
Petitioners advertised an invite-only event they dubbed “The Pit,” scheduled for
August 13, 2022, at which they claimed they would disclose “devastating”
information as definitive proof that the 2020 Presidential Election was stolen. (App
7, at ¶ 5). During the event, Petitioners took the stage and claimed that they
Petitioners claimed that they hacked into using a default password and stole data
therefrom. (App 52). Petitioners admit to this Court that their co-conspirator
5
Case: 22-20578 Document: 00516542767 Page: 14 Date Filed: 11/11/2022
personal data on 1.8 million U.S. poll workers, including social security numbers,
phone numbers, email addresses, and banking information. (App 45-48 and 51-52;
App 53-87). Indeed, one attendee of The Pit, who is actually the producer of
of what was discussed by Petitioners at the event. (App 52). The Post was
Petitioners also falsely and maliciously claim that the hacked data from
Respondent’s computer demonstrates that they are “Chinese operatives,” who are
spearheading a “Red Chinese communist op run against the United States.” (App
20, at ¶ 37). Petitioners claim that they took the stolen information to the FBI, but
that the FBI started investigating Petitioners for hacking and stealing the data. (See
Following The Pit, Petitioners went on a media blitz to publicize their newly-
6
Case: 22-20578 Document: 00516542767 Page: 15 Date Filed: 11/11/2022
not only continued to spew baseless lies about Respondent, but repeatedly confessed
to hacking into and stealing Respondent’s data, and threatened to publicly release it.
For example, on August 23, 2022, Phillips appeared on the “Prophets and Patriots”
podcast where he described meeting his “guys” at a hotel room in Dallas, Texas,
where they put “towels under the doors” like “some kind of a James Bond kind of
thing,” and proceeded to hack into Respondent’s server. (App 45-46; App 54).3
Indeed, Phillips admitted on that podcast that he and his team “took [Respondent’s
data] directly” and that Petitioner True the Vote plans to publicly “release all of
Likewise, on an August 30, 2022 video podcast titled, “Here’s How They’ll
Try to Steal the Midterms,” Phillips again described how “[his] analysts” “brought
[him] to Dallas into a hotel room at the Anatole Hilton Hotel” at “nearly midnight”
where “they plugged one of their computers into the television” and began looking
at Respondent’s data on a server Petitioners claimed they hacked into. (See App 47-
48; App 66). Phillips admits that, on “that night, in mid-January of 2021, [he]
personally witnessed the scrolling through millions and millions of records about
3
Highlighted transcripts of these podcasts, which were also provided to the District Court, have
been included in the Appendix, and a flash drive of the podcasts has been mailed to the Court.
7
Case: 22-20578 Document: 00516542767 Page: 16 Date Filed: 11/11/2022
Games,”—during which he admits the FBI accused him of being “the thief that stole
Respondent filed suit on September 12, 2022 and asserted claims for (1)
defamation, libel, and slander; (2) tortious interference with existing and prospective
business relations; (3) violation of, and conspiracy to violate, the federal Computer
Fraud and Abuse Act, 18 U.S.C. § 1030; (4) violation of, and conspiracy to violate,
the Texas Harmful Access by Computer statute, TEX. CIV. PRAC. & REM. CODE §
143.001; (5) conversion; (6) violation of the Texas Theft Liability Act; and (7)
injunctive relief. (Id.). That same day, the District Court issued a TRO as a result
coupled with Petitioners threats to publicize the data ahead of the midterm elections.
(App 118-120). The TRO was based on Petitioners’ own public statements, which
8
Case: 22-20578 Document: 00516542767 Page: 17 Date Filed: 11/11/2022
The TRO ordered that Petitioners, directly or indirectly, and whether alone or
Respondent’s computers; (ii) return to Respondent all data obtained from its
computers; (iii) not use or exploit the data taken from Respondent’s computers; (iv)
preserve any data obtained from Respondent’s computers; (v) identify each
disclose to Respondent how, when and by whom its computers were accessed; and
(vii) identify all persons and/or entities who have had possession, custody or control
Since September 13, 2022, when Petitioners accepted service of the TRO,
Respondent has sought compliance with the TRO. (App 226-230). However, for
the last 2 months, Petitioners have engaged in an elaborate game of cat and mouse.
On September 14, counsel for Petitioners sent a letter to Respondent admitting that
they were not complying with the TRO. (App 141-144). The stated basis of
Petitioners’ initial refusal to comply with Sections v, vi, and vii of the TRO at that
time was that “this is a matter that has been turned over to the FBI,” and that “they
admitted is targeting the Defendants. (App 143). Petitioners also claimed in that
9
Case: 22-20578 Document: 00516542767 Page: 18 Date Filed: 11/11/2022
September 14 letter that their “independent contractor” was responsible for gaining
On September 15, Petitioners filed a sealed, ex parte letter with the District
Court which claimed that they could not comply with Section v of the TRO, and
instead revealed only to the Court the identity of a single individual Petitioners
claimed was responsible for accessing Respondent’s computers and stealing its data,
because they said that the individual was “integral” to an FBI investigation. (App
150-151). That same letter was sent to the FBI “to allow the FBI the opportunity to
be heard on this sensitive issue if that is its choice.” (Id.). That same day, counsel
for Petitioners sent a letter to Respondent contradicting their prior position on TRO
compliance. (App 145-147). Specifically, just one day after stating that the hacker
was their “independent contractor,” Petitioners claimed that the hacker was “not
claimed that they only viewed a “screen share” of “certain elements of the data,” and
data. (Id.) And notably—although Petitioners again changed their story at the
hacker “turned over to True the Vote a hard drive device containing” the data stolen
from Respondent, which Petitioners then turned over to the FBI. (Id.)
10
Case: 22-20578 Document: 00516542767 Page: 19 Date Filed: 11/11/2022
16, 17 and 20, 2022; but Petitioners would not comply. (See App 131-140).
in their counsel’s September 15 letter. But after initially indicating that Petitioners
Cause and For Contempt Against Petitioners. (App 124-149). That same day, the
parties filed a stipulation to extend the expiration of the TRO. (App 152-154). And
on September 26, 2022, the District Court approved the parties’ stipulation, and set
(App 155). To be clear, Petitioners never sought to modify or dissolve the TRO;
instead, they agreed to extend its force and effect without any objection.
District Court that, not only were they involved with hacking Respondent’s
computers, but they know how it was done: “In this case, the server in China that
was accessed had a pre-loaded password (i.e., ‘password’) that did not even require
typing in a password to enter the server[.]” (App 156-159; App 167). This is
11
Case: 22-20578 Document: 00516542767 Page: 20 Date Filed: 11/11/2022
authorization. (App 118-120). But Petitioners would later testify that this statement
Petitioners failed to present any evidence in response to either motion and instead
admitted that they had not complied with the TRO. (App 185, 19:20-24) (“Yes,
Your Honor. And it is a fact that we have not given up the name of the individual.”).
Counsel for Petitioners also admitted that Petitioners did have possession of
Respondent’s data before giving it to the FBI. (App 186, 22:7-10) (“THE COURT:
. . . when Phillips claims that he turned it over to the FBI, he had to have possession
of it at the time in order to turn it over? MR. AKERS: Actually, yes.”). Notably,
counsel for Petitioners also stated that there was only one person in that Dallas hotel
room with Phillips in January 2021, Mike Hasson, and provided that name to
Respondent after repeatedly refusing to comply with the District Judge’s orders that
he do so in open court. (App 191, 50:10-16). However, as is evident from the record
now, there was a third, still unidentified person in the hotel room that Petitioners
concealed until cross-examination at the show cause hearing, and who Petitioners
12
Case: 22-20578 Document: 00516542767 Page: 21 Date Filed: 11/11/2022
are now refusing to identify on the basis that he is an FBI confidential informant4 in
an unrelated matter. However, both Petitioners and their counsel have told the
District Judge that the FBI has no interest in protecting the information required by
the TRO. (App 187, 25:7-25 (answering that “they [the FBI] were not interested in
the protection of this information,” when asked by the District Court what the FBI’s
Unsurprisingly, the FBI has made no effort to intervene in this matter whatsoever.
(App 190, 38:9-14) (“THE COURT: . . . I need to know whether or not it is this
national security issue. I need to know whether or not the Department of Justice is
involved in this in some way. They have got thousands of lawyers all over this
country. Surely somebody could have contacted the Court by now.”). Accordingly,
the District Judge has made clear that he wants all individuals involved identified,
because he wants them added as parties to this lawsuit. (App 188, 28:21-23) (The
Court: “I’m ordering you right now to give the name to him. I want him in the
lawsuit. Whoever it is, I want him in the lawsuit. And I want all of them in the
lawsuit[.]”).
4
Phillips also claimed to be a confidential informant for the FBI as well (App 97, 46:25).
However, upon questioning by the District Court, Phillips admitted he had never entered into any
confidential informant agreement with the FBI, nor any other formal relationship with the agency,
and he was never paid for his work as a purported confidential informant. (App 98, 47:1-3; App
103-104, 84:2-85:19).
13
Case: 22-20578 Document: 00516542767 Page: 22 Date Filed: 11/11/2022
On October 17, 2022, the District Court issued a Show Cause Order requiring
Petitioners to appear and show cause on October 27, 2022 for why they should not
For the first time since the inception of this lawsuit, and despite the TRO’s
27 hearing to admit that there was a third person in the hotel room. (App 95, 39:3-
6). Phillips admitted under oath that this third, unnamed person, was “involved” in
accessing Respondent’s data. (App 100, 58:11-22). Petitioners make the same
that “[a]side from the other individuals in the hotel room and the FBI agents, Phillips
But when pressed and further ordered directly by the District Judge to reveal that
informant himself. (App 96, 40:3-14) (“THE COURT: You are at liberty to say
because I’m ordering you to give the name. THE WITNESS: I’m a confidential
informant, too. I can’t do it.”). To be sure, Phillips’ reason that he could not give
14
Case: 22-20578 Document: 00516542767 Page: 23 Date Filed: 11/11/2022
a short while later when he testified that “I’m not a confidential informant anymore.”
(App 105, 102:1-4). Engelbrecht, who admitted that “I believe I know the third
person,” likewise refused to provide the name of the third person involved, which
the District Court ordered disclosed. (App 113, 151:10; App 114, 152:20-22)
(answering “yes” to the District Court’s question if it was her “personal choice or
prior statements that they were provided a hard drive with Respondent’s data (App
145-147) when they testified that they were never provided with any copy of the
data. (App 93, 34:22-25). But just a short time later during his testimony, Phillips
again changed his testimony, saying that he could not recall if he ever was provided
with a hard drive of the data. (App 99, 51:10-23). Engelbrecht similarly could not
At the conclusion of the October 27 show cause hearing, the District Judge
found Petitioners in contempt and ordered the show cause hearing continued until
October 31 and directed the Petitioners to purge their contempt by that time or face
The day after the October 27 Show Cause hearing, Petitioners filed an
of Contempt.” (App 196-200). However, far from purging their contempt, Phillips
15
Case: 22-20578 Document: 00516542767 Page: 24 Date Filed: 11/11/2022
admitted his contempt when he swore that he would “with all diligence, expedience,
and in good faith,” provide the information required by Section vi of the TRO. (Id.).
But it has been 2 months since the TRO was granted, and 2 weeks since that affidavit
was submitted, and Petitioners have made no effort to comply despite the TRO’s
On October 31, 2022, the Petitioners asked to delay the second show cause
hearing by six hours while they waited for the FBI to contact them. (App 203, 7:1-
5). The District Court did not delay the proceeding and no FBI support for the
Petitioners’ position has materialized in the 12 days since that hearing. As a result
of their unabated contempt, the District Judge ordered Petitioners detained until they
complied. (App 205-206, 16:16-17:11). In doing so, the District Court addressed
the inconsistencies and the evasiveness of Petitioners’ answers to the District Court.
(App 203-204, 7:10-8:19) (“I have never gotten a straight answer from either of them
as to what happened in the hotel room . . . Whatever their knowledge is, they have
Petitioners were detained for coercive civil contempt, and Petitioners could “get out
any time they want to. All they have to do is comply with the Court’s orders.” (App
16
Case: 22-20578 Document: 00516542767 Page: 25 Date Filed: 11/11/2022
91, 22:1-15). The District Judge thus issued an Order for Confinement Pending
the court requiring him to perform or refrain from performing a particular act or acts
with knowledge of the court’s order.” Waste Mgmt. of Washington, Inc. v. Kattler,
776 F.3d 336, 341 (5th Cir. 2015). To hold a party in contempt, there must be (1) a
court order that was in effect; (2) the order required certain conduct; and (3) the order
was not complied with. Am. Airlines, Inc., 228 F.3d at 581. All three elements are
I. The District Court Order Was In Effect and Required Certain Conduct
There is clear and convincing evidence of the first element of contempt. The
TRO was indisputably in effect at the time Petitioners were held in contempt. (App
155). Additionally, at the October 27, 2022 hearing, Petitioners refused to identify
the third individual in the Dallas hotel room despite a direct order to do so. (App
17
Case: 22-20578 Document: 00516542767 Page: 26 Date Filed: 11/11/2022
Petitioners. (See App 118-120). The District Court’s direct order from the bench
also required Petitioners to disclose the identity of the third person. (App 96, 40:3-
II. Petitioners Did Not Comply with the District Court’s Orders
Petitioners also failed to comply with the District Court’s orders, thus
satisfying the third, and final, element of contempt by clear and convincing evidence.
See Am. Airlines, Inc., 228 F.3d at 582 (affirming district court’s finding of
contempt).
and the District Court’s direct order from the bench, to identify the third person in
the hotel room who, along with Phillips, was involved in accessing Respondent’s
data.
120; App 96, 40:3-14). Phillips acknowledged on the stand that, although this third
person may not have been the person who did the actual act of “accessing”
Respondent’s computers, the third person was in that room and nevertheless
involved. (App 100, 58:11-22). Phillips, however, refused to identify him despite
the TRO’s requirement to do so, and despite the District Judge’s direct bench order.
18
Case: 22-20578 Document: 00516542767 Page: 27 Date Filed: 11/11/2022
(App 96, 40:3-14) (“THE COURT: You are at liberty to say because I’m ordering
you to give the name.”); U.S. v. Wilson, 421 U.S. 309, 316 (1975) (“All that is
necessary is that the judge certify that he ‘saw or heard the conduct constituting the
contempt and that it was committed in the actual presence of the court’ . . . The face-
to-face refusal to comply with the court’s order itself constituted an affront to the
court . . . and summary contempt must be available[.]”). The District Judge thus
warned Phillips of his contempt if he refused to identify all persons in the Dallas
hotel room. (App 104, 88:4-14) (“THE COURT: And I want to know who these
people are. If you don’t tell me, then you’re going to be held in contempt.”).
Engelbrecht also refused based on “personal choice” to identify the third person even
though she testified that, “I believe I know the third person.” (App 113, 151:10; App
Phillips even refused to give the name to the District Judge confidentially. (App
106, 103:3-11); Young v. U.S. ex rel. Vuitton et Fils S.A., 481 U.S. 787, 801 (1987)
(“[W]hen confronted with a witness who refuses to testify, a trial judge should first
contempt.”).
Petitioners claim that they cannot identify the third person because he is an
19
Case: 22-20578 Document: 00516542767 Page: 28 Date Filed: 11/11/2022
presented no evidence and cited no authority to warrant their refusal to disclose the
individual’s identity. See In re Jankovic, 738 Fed. Appx. 268, 270 (5th Cir. 2018)
(mem. op.) (denying mandamus for civil contempt where there was clear and
convincing evidence that petitioner failed to comply with court order and “provided
Importantly, by their own admission, the FBI has eliminated their excuse for
that the FBI was “not interested in the protection of this information,” that is, the
information required by the TRO, including the names of the individuals acting in
concert with Petitioners. (App 187, 25:7-25). Engelbrecht confirmed the FBI’s
position while on the stand at the October 27 show cause hearing. (App 113-114,
Petitioners also claim for the first time in their Mandamus that they are not
required to identify the third person because Section v of the TRO, which requires
required to comply with the District Court’s orders without regard to their own
5
As the District Court correctly observed, nobody needed to know that this unnamed person is a
confidential informant, and that Phillips is the one who disclosed, not only that the third person is
a confidential informant, but also what he does as a confidential informant. (App 106-108,
103:12-105:12).
20
Case: 22-20578 Document: 00516542767 Page: 29 Date Filed: 11/11/2022
material to protect the data which this person was involved in accessing and to ensure
no further unauthorized access. Further, as the District Judge stated, the identity of
all persons involved is required because they should be added as a party to the
lawsuit. (App 188, 28:21-23) (The Court: “I’m ordering you right now to give the
name to him. I want him in the lawsuit. Whoever it is, I want him in the lawsuit.
And I want all of them in the lawsuit[.]”). At bottom, the third person’s identity is
needed to discover the truth about what really happened and remedy the situation.
The District Court correctly held Petitioners in contempt for their admitted
refusal to comply with Section v of the TRO and the District Judge’s direct bench
order to identify all individuals in the Dallas hotel room. See Powers v. Chicago
Transit Auth., 846 F.2d 1139, 143 (7th Cir. 1988) (denying mandamus where,
although the circuit court did not agree with the district court’s contempt ruling, there
was no “usurpation of power” necessary for mandamus where lower court order
There is clear and convincing evidence that Petitioners are also in contempt
21
Case: 22-20578 Document: 00516542767 Page: 30 Date Filed: 11/11/2022
further admitted that, not only were Petitioners involved with hacking Respondent’s
computers, but they knew how it was done: “In this case, the server in China that
was accessed had a pre-loaded password (i.e., ‘password’) that did not even require
typing in a password to enter the server[.]” (App 167). But when Phillips took the
stand, he would not testify as to how Respondent’s computers were accessed and did
not recall whether a default password was utilized. (App 101, 74:3-22).
admits that he still has not complied with the TRO and swears that he will “with all
Section vi of the TRO. (App 196-200). However, it has been 2 months since the
TRO was issued, and 2 weeks since that affidavit was filed, and Petitioners have still
“immediately.” (App 118-120); Am. Airlines, Inc., 228 F.3d at 582 (affirming
district court’s finding that defendants were in contempt for violating TRO); In re
22
Case: 22-20578 Document: 00516542767 Page: 31 Date Filed: 11/11/2022
The District Court correctly held Petitioners in contempt for their admitted
Section vii of the TRO which requires Petitioners to “identify all persons and/or
cause hearing. While Petitioners have repeatedly changed their story, their current
position on Section vii of the TRO is that, “to the best of [Phillips’] personal
knowledge, the only persons and/or entities who have had the electronic information
to which I understand the order is directed” are Mike Hasson and the FBI, “including
but not necessarily limited to Special Agents Huy “Bobby” Nguyen and/or Keven
McKenna.” (App 196-200). First, Section vii of the TRO required Petitioners to
base their disclosure on their “knowledge” (all 3 Petitioners); not the “best” of only
Phillips’ knowledge. Second, Section vii of the TRO is not limited to “electronic
23
Case: 22-20578 Document: 00516542767 Page: 32 Date Filed: 11/11/2022
Third, Section vii of the TRO required Petitioners to identify “all persons
and/or entities,” with any information or data from Respondent’s computers, but
they have admittedly refused to identify the third person in the hotel room that
viewed the data, or anyone at the FBI other than two agents and, most notably,
did have possession of Respondent’s data before giving it to the FBI. (App 186,
22:7-10) (“THE COURT: . . . when Phillips claims that he turned it over to the FBI,
he had to have possession of it at the time in order to turn it over? MR. AKERS:
Actually, yes.”).
it. (App 196-200). Petitioners are therefore in contempt of Section vii of the TRO,
III. The District Court Properly Exercised Its Discretion in its Contempt
Finding
orders. And there should be no dispute that the District Judge properly exercised his
It is well settled law that “the power to punish for contempt,” and in particular
civil contempt, “is an inherent power of the federal courts and that it includes the
power to punish violation of their own orders.” In re Bradley, 588 F.3d 254, 265
(5th Cir. 2009) (quoting United States v. Fidanian, 465 F.2d 755, 757 (5th Cir.
24
Case: 22-20578 Document: 00516542767 Page: 33 Date Filed: 11/11/2022
1972)); Shillitani v. U.S., 384 U.S. 364, 368 (1966) (“There can be no question that
courts have inherent power to enforce compliance with their lawful orders through
civil contempt.”). Upon a finding of contempt, courts have broad discretion in how
they choose to exercise their contempt power. Test Masters Ed. Svs., Inc. v. Singh,
428 F.3d 559, 582 (5th Cir. 2005) Hill v. Schilling, No. 3:07-cv-2020-L, 2018 WL
6492508, at *10 (N.D. Tex. Dec. 10, 2018). As the Fifth Circuit has explained,
re Bradley, 588 F.3d at 265. And as aptly described by the United States Supreme
Court, “[w]hen the petitioners carry the keys of their prison in their own pockets, the
action is essentially a civil remedy designed for the benefit of other parties and has
quite properly been exercised for centuries to secure compliance with judicial
decrees.” Shillitani, 384 U.S. at 368 (internal quotations and citations omitted). This
is precisely what the District Judge explained to Petitioners when he ordered them
confined. (App 91, 22:11-15) (“[T]he point of coercive contempt is they hold the
keys to the jailhouse, as we might say. They can get out any time they want to.”).
“Judicial Sanctions” likewise may be employed “to coerce the defendant into
compliance with the court’s order, and to compensate the complainant for losses
sustained.” American Airlines, Inc., 228 F.3d at 585. These losses can include both
direct losses “for the damages sustained” (id.), as well as attorneys’ fees incurred in
seeking compliance. Hill, 2018 WL 6492508 at *10. Further, though the United
25
Case: 22-20578 Document: 00516542767 Page: 34 Date Filed: 11/11/2022
States Supreme Court has noted that “the paradigmatic civil contempt sanction order
. . . involves confining the contemnor until he complies,” “the closest analogy to that
paradigm civil contempt situation” is a “per diem fine imposed for each day a
contemnor fails to comply[.]” Alberti v. Klevenhagen, 46 F.3d 1347, 1359 (5th Cir.
1995).
Respondent seeks compliance with the TRO and the District Court’s orders
by way of all available means to encourage Petitioners’ compliance with the District
Court’s orders and to compensate Respondent for the significant damages and fees
As set forth in Petitioners’ “Statement of the Issue,” the only question for this
Court to consider is whether the “district clearly erred and abused its discretion when
attempting to collaterally attack the issuance of the TRO even though they never
sought to dissolve nor otherwise modify it. Far from contesting the TRO, Petitioners
stipulated to extend its expiration date and the Court approved that stipulation. (App
152-155).
26
Case: 22-20578 Document: 00516542767 Page: 35 Date Filed: 11/11/2022
Petitioners also wrongly accuse the District Judge of some unspecified error
at the show cause hearing for not reconsidering the issuance of the TRO that
Petitioners had already violated. For example, Petitioners falsely claim that the
District Judge refused to let them call a Los Angeles County “Assistant” DA as a
witness, by cell phone call, who Petitioners clearly wanted to call to discuss the now
dismissed criminal complaint against Eugene Yu. (Mandamus at p. 23). But the
“witness” Petitioners claim they were not permitted to call was an unknown
individual on Petitioners’ counsel’s cell phone who, as a lawyer, should not have
compliance with the TRO. (App 222, 5:14-23). The District Court nevertheless
explained that it would welcome proper testimony from whomever would appear in
the courtroom to testify. (App 223, 6:6-12). And notably, on November 9, the day
after the midterm elections, the Los Angeles County District Attorney’s Office
dropped all charges against Konnech's founder and CEO, Eugene Yu. In asking the
Court to dismiss the case “in the interest of justice,” the prosecutor cited concerns
about “potential bias in the presentation and investigation of the evidence,”6 much
6
See Juma Sei, LA County drops charges against election software executive, citing ‘potential
bias’, NPR (Nov. 10, 2022), available at https://www.npr.org/2022/11/10/1135839608/los-
angeles-county-dropped-charges-konnech-true-the-vote.
27
Case: 22-20578 Document: 00516542767 Page: 36 Date Filed: 11/11/2022
of which was supplied by the Petitioners who bragged about enlisting the DA’s
In any event, a show cause hearing is not the proper time to challenge the
issuance of the TRO at issue. United States v. Rylander, 460 U.S. 752, 756–57
(1983) (explaining that “it would be a disservice to the law if we were to depart from
the long-standing rule that a contempt proceeding does not open to reconsideration
the legal or factual basis of the order alleged to have been disobeyed and thus become
Wellington Precious Metals, Inc., 950 F.2d 1525, 1528 (11th Cir. 1992) (“[T]he
court will not reconsider the legal or factual basis of the order alleged to have been
the District Court erred in failing to reconsider the TRO at the Petitioners’ show
cause hearing.
The TRO is valid and was properly issued ex parte as permitted by Rule
65(b)(1) of the Federal Rules of Civil Procedure. (App 118-120). Also, contrary to
Petitioners’ false claims, the TRO was not issued solely on the basis of Mr. Yu’s
affidavit. (Mandamus at p. 3, n.2). Rather, the TRO was issued on the basis of Mr
28
Case: 22-20578 Document: 00516542767 Page: 37 Date Filed: 11/11/2022
Assocs., Inc. v. Saban Entertainment, Inc., 60 F.3d 27, 34 (2d Cir. 1995) (explaining
that mandatory injunctions calling for specific performance are proper “upon a clear
showing that the moving party is entitled to the relief requested, or where extreme
or very serious damage will result from a denial of preliminary relief.”). Here, the
TRO specifically states that Konnech has shown “a substantial likelihood of success
on the merits” of its claims against Defendants. (App 118-120). The TRO further
enumerates the specific reasons why serious damage would result from the failure
to issue the TRO. (Id.) This was particularly true at the time because Respondent,
which provides governmental entities in the U.S. with an election logistics software,
was rightfully concerned with the security of its data ahead of the 2022 midterm
elections. (Id.)
for the first time in their Mandamus that the word “access” in the TRO is ambiguous
to mean “having some access to the data inside the computer.” (App 92, 30:23-25).
This is consistent with how other federal courts have interpreted the term as used in
the federal Computer Fraud and Abuse Act which formed the basis for the TRO. See
29
Case: 22-20578 Document: 00516542767 Page: 38 Date Filed: 11/11/2022
U.S. v. Nosal, 930 F. Supp. 2d 1051, 1063 (N.D. Ca. 2013) (“Nothing in the CFAA
suggests anything other than a common definition of the term ‘access,’ applies. The
Oxford English Dictionary defines ‘access’ as, inter alia, ‘[t]he opportunity, means,
or permission to gain entrance to or use a system, network, file, etc.”). And when
Petitioners also claim that because Respondent found no breach of its system
the fact that Respondent could not find a breach doesn’t mean it didn’t happen,
Respondent’s computers, and their testimony that Mike Hasson did just that. (Supra
at pp. 5-8). The District Court properly understood this distinction. (App 189, 33:3-
5) (“THE COURT: . . . In the face of your client’s own admissions, I don’t know
that that is what is being said.”). Petitioners would therefore have this Court believe
that they should be exonerated merely because Respondent did not detect their
breaking and entering their computers, all while they publicly confess to their
unlawful activity.
unabated.
30
Case: 22-20578 Document: 00516542767 Page: 39 Date Filed: 11/11/2022
The Court should also deny Petitioners’ Petition for Mandamus because they
have an adequate remedy on appeal. For a writ to issue, a Petitioner must first show
that they have no other adequate means to attain the relief requested. Cheney, 542
Jankovic, 738 Fed. Appx. at 270 (citing and quoting Doyle v. London Guar. &
Accident Co., 204 U.S. 599, 603 (1997) (“[A]n order punishing for contempt . . . is
. . . to be reviewed only upon appeal from a final decree in the case.”)). Indeed,
“Mandamus may not serve as a substitute for the appeal process.” Id. This is true
“even though hardship may result from delay and perhaps unnecessary trial.” Vioxx
Prod. Liabl. Litig. Steering Comm. v. Merck & Co., Inc., No. 06-30378, 2006 WL
point alone.
VI. Petitioners’ Petition for Mandamus Does Not Comply With the Rules
The Court should deny Petitioners’ Petition for Mandamus because it does not
comply with the Rules. Rule 21(a)(2)(c) of the Federal Rules of Appellate Procedure
requires that any petition for mandamus “must include a copy of any order or opinion
or parts of the record that may be essential to understand the matters set forth in the
petition.” FRAP 21(a)(2)(c). Likewise, Fifth Circuit Rule 21 states that “the
31
Case: 22-20578 Document: 00516542767 Page: 40 Date Filed: 11/11/2022
application must contain a copy of any memoranda or briefs filed in the district court
supporting the application . . . as well as a transcript of any reasons the district court
gave for its action.” Fifth Cir. L.R. 21. Although Petitioners cite and refer to the
District Court’s docket and hearing transcripts at least 50 times, Petitioners did not
submit any such documents for the Court to consider, and, as such, Petitioners have
Petitioners further did not comply with the basic requirement that the brief be
signed, as required by FRAP 32(d) and Local Rule 25.2.10, which requires any
The Court should deny Petitioners’ Petition for Mandamus for failure to
CONCLUSION
Respondent respectfully requests that the Court deny Petitioners’ Petition for
Mandamus.
Respectfully submitted,
s/ Constantine Z. Pamphilis
Constantine Z. Pamphilis
Texas State Bar No. 00794419
Nathan W. Richardson
Texas State Bar No. 24094914
32
Case: 22-20578 Document: 00516542767 Page: 41 Date Filed: 11/11/2022
33
Case: 22-20578 Document: 00516542767 Page: 42 Date Filed: 11/11/2022
CERTIFICATE OF SERVICE
I hereby certify that today, November 11, 2022, an electronic copy of the
foregoing brief was filed with the Clerk of Court for the United States Court of
Appeals for the Fifth Circuit using the appellate CM/ECF system, and that service
s/ Constantine Z. Pamphilis
Constantine Z. Pamphilis
34
Case: 22-20578 Document: 00516542767 Page: 43 Date Filed: 11/11/2022
CERTIFICATE OF COMPLIANCE
32(g)(1) and 21(d) because it contains 7,774 words, as determined by the word-count
function of Microsoft Word 2019, excluding parts of the brief exempted by FED. R.
32(a)(5) and the type style requirements of FED. R. APP. P. 32(a)(6) because it has
Times New Roman 14-point font in text and Times New Roman 12-point font in
footnotes.
s/ Constantine Z. Pamphilis
Constantine Z. Pamphilis
35
Case: 22-20578 Document: 00516542768 Page: 1 Date Filed: 11/11/2022
NO. 22-20578
Case No. 4:22CV3096, Konnech Inc. v. True the Vote, Catherine Engelbrecht And
Gregg Phillips
Constantine Z. Pamphilis
Texas State Bar No. 00794419
Nathan W. Richardson
Texas State Bar No. 24094914
KASOWITZ BENSON TORRES LLP
1415 Louisiana Street, Suite 2100
Houston, Texas 77002
Telephone: (713) 220-8800
Facsimile: (713) 222-0843
Email: DPamphilis@kasowitz.com
Email: NRichardson@kasowitz.com
1
Case: 22-20578 Document: 00516542768 Page: 2 Date Filed: 11/11/2022
2
Case: 22-20578 Document: 00516542768 Page: 3 Date Filed: 11/11/2022
3
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 4 in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
1 of 37
KONNECH, INC., §
§
PLAINTIFF, §
§
v. § CIVIL ACTION NO. _______________
§
TRUE THE VOTE, INC., GREGG §
PHILLIPS, and CATHERINE §
ENGELBRECHT, §
§
DEFENDANTS. §
COMES NOW, Plaintiff Konnech, Inc. (“Konnech”), in the above styled cause, and files
this Original Complaint, and would respectfully show the Court as follows:
INTRODUCTION
1. Defendants True the Vote, Inc., its founder and President Catherine Engelbrecht,
and board member Gregg Phillips (“Defendants”) have intentionally, repeatedly, and relentlessly
attacked Konnech and its founder Eugene Yu with Defendants’ unique brand of racism and
xenophobia by their completely baseless claims that Konnech, its founder, and employees are
“Chinese operatives,” who are spearheading a “Red Chinese communist op run against the United
States,” that Konnech is tied to the Confucius Institute, which Defendants say is part of the Chinese
Communist Party, that Konnech was the subject of a long-running FBI counterintelligence
investigation, that Konnech obtained contracts with certain U.S. city and county voting districts
after bribing public officials, and that the Chinese Communist Party is somehow controlling U.S.
elections through Konnech because its founder and some of its employees are of Chinese descent.
Defendants’ false accusations of treason, espionage, bribery, and election fraud, which they peddle
4
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 5 in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
2 of 37
to enrich themselves at Konnech’s expense, are completely fabricated and constitute defamation
per se.
2. The truth is that Konnech is a U.S. company founded and operated by a U.S. citizen
who has no affiliation with the Chinese Communist Party whatsoever. Konnech obtains its
contracts through transparent public government bidding processes, and has never engaged in
bribery or any other criminal activity of any sort. All of Konnech’s U.S. customer data is secured
and stored exclusively on protected computers located within the United States. Konnech’s
software products are not involved in any way in the registration of voters, the production,
Indeed, Konnech never handles any ballots and no ballots or other voting counts ever enter any of
Konnech’s computer servers. It thus begs the question how Defendants could believe that
Konnech could ever be involved in election fraud—or how it otherwise could have helped “steal”
the 2020 Presidential Election from former President Donald Trump—when Konnech has had no
involvement with ballots in any U.S. election. But the simple matter is, Defendants have no regard
for the truth or the consequences of their actions, because the truth would not profit them.
3. Indeed, Defendants are in business to capitalize from their claim that the 2020
Presidential Election was “stolen.” Defendants Phillips and Engelbrecht have been referred to as
the “Bonnie and Clyde” of election fraud 1, and they have enriched themselves by spreading
conspiracy theories, which they present as factual in nature, about the 2020 Presidential Election,
largely funded by money funneled through Defendant True the Vote, which some commentators
1
See Mimi Swartz, How True the Vote Fabricates Claims of Election Fraud, for Fun and Profit,
Texas Monthly (Aug. 22, 2022), available at, https://www.texasmonthly.com/news-politics/true-
the-vote-election-fraud/.
5
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 6 in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
3 of 37
have called a “big grift.”2 Defendants were in fact the subject of a suit filed in 2020 by a
conservative megadonor, who, after speaking with Defendant Engelbrecht, donated $2.5 million
to help fund Defendant True the Vote’s efforts to fight election fraud. The donor later discovered,
however, that his money was instead siphoned through Defendant True the Vote, and other entities
established by Defendants Phillips and Engelbrecht, for their own personal gain. 3
4. Defendants most recently capitalized on their claims of election fraud through their
involvement in the production of a so-called “documentary” titled 2000 Mules in which they
sought to convince their followers that people, who they refer to as “mules,” were paid to collect
and deposit fake ballots into ballot boxes for the 2020 Presidential Election which they contend
changed its outcome. The theories peddled in 2000 Mules, however, have been repeatedly
disproven. 4 Apparently realizing that their 2000 Mules tale had run its course, Defendants Phillips
2
See Cassandra Jaramillo, She Helped Create the Big Lie. Records Suggest She Turned It Into a
Big Grift, Reveal News (June 8, 2022), available at, https://revealnews.org/article/true-the-vote-
big-lie-election-fraud/.
3
See Eshelman v. True the Vote, Inc., OSPEC Group, LLC, Engelbrecht, Bopp, Jr., Phillips, and
The Bopp Law Firm, 4:2020-cv-04034, filed November 25, 2020 in the U.S. District Court for the
Southern District of Texas; see also Richard Salame, Was Election Denial Just a Get-Rich-Quick
Scheme? Donors’ Lawsuits Look for Answers (Feb. 6, 2021), available at,
https://www.typeinvestigations.org/investigation/2021/02/06/was-election-denial-just-a-get-rich-
quick-scheme-donors-lawsuits-look-for-answers/.
4
See Fact Check-Does ‘2000 Mules’ provide evidence of voter fraud in the 2020 U.S. presidential
election?, Reuters (May 27, 2022), available at, https://www.reuters.com/article/factcheck-usa-
mules-idUSL2N2XJ0OQ; FACT FOCUS: Gaping Holes in the Claims of 2k Ballot ‘Mules’,
Associated Press (May 3, 2022), available at,
https://www.usnews.com/news/politics/articles/2022-05-03/fact-focus-gaping-holes-in-the-
claim-of-2k-ballot-mules; Tom Dreisbach, A pro-Trump film suggests its data are so accurate, it
solved a murder. That’s false, NPR (May 17, 2022), available at,
https://www.npr.org/2022/05/17/1098787088/a-pro-trump-film-suggests-its-data-are-so-
accurate-it-solved-a-murder-thats-fals; Phillip Bump, Even the geolocation maps in ‘2000 Mules’
are misleading, The Washington Post (May 19, 2022), available at,
https://www.washingtonpost.com/politics/2022/05/19/even-geolocation-maps-2000-mules-are-
misleading/.
6
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 7 in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
4 of 37
and Engelbrecht declared an end to “mules” at an August 2022 True the Vote, invitation-only event
5. The Pit, they promised, would be the event where Defendants would finally release
“devastating information” that would definitively prove the 2020 U.S. Presidential election was
stolen. Instead, Defendants used The Pit as a platform to announce their website, and publicly
6. In an attempt to bolster their false accusations, Defendants claim that they have
obtained financial and other sensitive personal data of 1.8 million U.S. poll workers—including
social security numbers, phone numbers, email addresses, and banking information—from
Konnech’s protected computers. As an initial matter, Konnech has never managed customer data
for that many poll workers or even a small percentage of that many poll workers. But regardless,
based on the extensive security measures Konnech has in place, Defendants could only access any
of Konnech’s data if they illegally hacked into and stole data from Konnech’s protected computers.
Engelbrecht had an idea and asked him to look into Konnech’s election software, how he then
traveled to a Dallas, Texas hotel room to meet his “analysts,” how they put “towels under the
doors” in an effort to conceal their knowingly unlawful conduct, and then how “analysts,” who
were acting at his direction, successfully hacked into Konnech’s servers and unlawfully
downloaded its data. Defendants even admit they are now the subject of an ongoing FBI
investigation due to their misconduct targeting Konnech. But apparently undeterred, Defendants
7
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 8 in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
5 of 37
have continued their attacks on Konnech and have publicly and repeatedly declared their intent to
8. Defendants have pushed their false narrative with social media posts that “ReTruth”
(the Truth Social equivalent of a Retweet on Twitter) conspiracy theories published by armchair
“experts” and anonymous sources. Defendants lead a chorus of online adherents who are
in further attacks against Konnech. Numerous conspiracy theories attempting to affiliate Konnech
with the Chinese Communist Party have appeared online since The Pit. To be clear, Konnech, a
previously relatively unknown entity, has gone viral since The Pit, with countless Tweets and
Truth Social postings using the #Konnech hashtag. But the consequences of Defendants’ actions
are far more serious in that Defendants’ public smear campaign has resulted in repeated death
threats against Konnech’s founder and his family which have forced them out of their home in fear
Presidential Election would be ignored by the Federal Government—and, in fact, concealed by the
FBI—but proven by conspiracy theorists and con artists using basic internet searches and posts on
social media, demonstrates Defendants’ recklessness and disdain for the truth.
10. Defendants know what they are doing is wrong, and have tried, in vain, to avoid
responsibility for their misconduct by encouraging and using others to perform their dirty work for
them. But Defendants have already gone too far, and they cannot avoid liability for their own
misconduct and for masterminding this entirely fabricated conspiracy against Konnech.
11. Absent intervention of this Court, such damaging behavior will continue to occur,
which is particularly problematic in light of the upcoming 2022 midterm elections, for which
8
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 9 in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
6 of 37
Konnech has contracts to provide election logistics software for voting districts across the country.
Konnech thus files this action to recover damages as a result of Defendants’ defamatory
statements, and interference with Konnech’s current and prospective business relationships, and
seeks a restraining order to immediately and permanently restrain Defendants and those acting in
concert with them from accessing, obtaining, using and/or disclosing any data from Konnech’s
protected computers.
PARTIES
Lansing, Michigan.
13. Defendant True the Vote, Inc. is a Texas Nonprofit Corporation which is
headquartered in Houston, Texas, at 18720 FM 249, Suite A, Houston, Texas 77070, and can be
served through its registered agent, Registered Agents, Inc., at 5900 Balcones Drive, Suite 100,
14. Defendant Catherine Engelbrecht resides at 13909 Track Rd. East, Cat Spring,
Texas 78933, and can be served at said address or wherever else she may be found.
15. Defendant Gregg Phillips resides at 1752 Coates Pass, Birmingham, Alabama
35244, and can be served at said address or wherever else he may be found.
16. This Court has subject matter jurisdiction over this matter pursuant to 28 U.S.C. §
1331, because Konnech has asserted claims against Defendants under the Computer Fraud and
Abuse Act, 18 U.S.C. § 1030, et seq. This Court also has supplemental jurisdiction over Konnech’s
state law claims pursuant to 28 U.S.C. § 1367(a). This Court further has subject matter jurisdiction
over this matter pursuant to 28 U.S.C. § 1332(a), because the parties have diversity of citizenship
9
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 10in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
7 of 37
17. Venue is proper in the Southern District of Texas (Houston Division) because a
substantial part of the events giving rise to the claims occurred in Houston, Texas where Defendant
True the Vote is headquartered and Cat Spring, Texas where Defendant Engelbrecht resides, and
a substantial part of the property that is the subject of the action is situated in Houston, Texas
and/or Cat Spring, Texas. Additionally, venue is proper in the Southern District of Texas (Houston
Division) because Defendants and, in particular, Defendants Engelbrecht and True the Vote, have
published defamatory statements that are the subject of this action from within the Southern
18. This Court has personal jurisdiction over Defendant True the Vote because it is
incorporated in Texas and has its principal place of business in Texas. This Court has personal
jurisdiction over Defendant Engelbrecht because she is domiciled in Texas. This Court has
personal jurisdiction over Defendant Phillips because he availed himself of the benefits and
protections of the laws of the State of Texas by, among other things, committing a tort and other
unlawful misconduct against Konnech while in Texas. Specifically, Defendant Phillips, while
acting in concert with Defendants Engelbrecht and True the Vote, has admitted that he obtained
confidential information and data from Konnech’s protected computers while located in Texas,
and obtained data from Konnech’s protected computers while located in Texas which has also
been provided to Defendant True the Vote which is headquartered in Houston, Texas.
FACTUAL BACKGROUND
Konnech, Inc.
19. Konnech, Inc. is a U.S. company which is incorporated in Michigan and was
founded by its President and CEO, Eugene Yu, who is a U.S. citizen. Mr. Yu built Konnech on
his own from the ground up. Konnech provides governmental entities in the U.S. with an election
logistics software product called PollChief which those governmental entities use to recruit, train
10
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 11in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
8 of 37
and schedule poll workers; coordinate the distribution of equipment and supplies to polling places;
and dispatch support personnel to address technical and other issues. Konnech does not select,
communicate, or otherwise interface with any poll workers. And Konnech’s software products are
not involved in any way in the registration of voters, the production, distribution, scanning, or
processing of ballots, nor the collection, counting or reporting of votes. Indeed, Konnech never
handles any ballots and no ballots or other voting counts ever enter any of Konnech’s computer
servers.
20. In the summer of 2022, Defendants advertised an event they dubbed “The Pit,”
scheduled for August 13, 2022, at which they claimed they would disclose “devastating”
information that would be definitive proof that the 2020 Presidential Election was stolen from
21. The Pit was hosted by Defendants and attended by over 100 by-invitation-only
guests who were handpicked by Defendants Engelbrecht and Phillips based on who they believed
would be supportive of their conspiracy and who would best spread the disinformation they
planned to disclose. The Pit was also livestreamed on Right Side Broadcasting Network.
22. The event featured many different speakers, including Defendants Engelbrecht and
Phillips, and served as a pep rally for election fraud conspiracy theorists in anticipation of the 2022
midterm elections. But the main attraction for The Pit was the supposed proof that Defendants
claimed they planned to disclose, which was not part of 2000 Mules, but, in their words, would
serve as definitive proof that the 2020 Presidential election was a sham.
23. While The Pit was still livestreaming, Defendants Phillips and Engelbrecht took the
stage to finally make the big announcement. The announcement, however, was nothing more than
11
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 12in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
9 of 37
an advertisement for a website Defendants created, where Defendants claim their subscribers can
24. Upon information and belief, and according to social media posts from those in
attendance at The Pit, Defendants turned off the livestream and then disclosed to attendees that
they had been secretly working on something they called “The Tiger Project”—which is the code
name and hashtag for their campaign against Konnech—during which they sent dozens of FOIA
otherwise raise customers’ suspicions about Konnech. But even more shocking, Defendants
falsely claimed that they discovered that Konnech had an unsecured server located in Wuhan,
China, which Defendants hacked into and stole data from. Specifically, Defendants claimed to
have illegally downloaded from Konnech’s server personal data on 1.8 million U.S. poll workers,
which they claim is a vehicle for the Chinese Communist Party to breach U.S. elections.
25. To be clear, however, all of Konnech’s U.S. customer data is secured and stored
exclusively on protected computers located within the United States. Konnech controls access to
its offices, enters into confidentiality agreements with its customers and employees, and uses two-
12
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 13in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
10 of 37
factor authentication, restricted access, and other security measures to control access to its
protected computers. Only a select group of Konnech employees that have been provided with
that two-factor authentication have authority to access the protected computers which contain poll
worker data.
26. Defendants additionally claimed that they brought all of their information to the
FBI and made a formal complaint. Unsurprisingly, Defendants sought to capitalize on certain
public sentiment against the FBI on the heels of the recent raid on Mar-a-Lago, and claimed that
the FBI turned the tables on them, and began an investigation of Defendants for hacking Konnech’s
27. Then, to ensure maximum damage from their defamatory statements, Defendants
encouraged The Pit attendees, as documented in the following social media post, to spread what
they learned at the event, to do their own research on Konnech, to publish their findings on the
And as things typically evolve with the internet in the 21 st century, the conspiracy theory and
attacks against Konnech—all of which were initiated by Defendants at The Pit—quickly spread,
13
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 14in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
11 of 37
against Konnech, Mr. Yu has been the target of repeated death threats, which have forced him and
29. Following The Pit, Defendants went on a media blitz to publicize their newly
Konnech, all under the guise of being “Patriots” who are supposedly uncovering election fraud—
which one can supposedly learn about, but only by subscribing to Defendants’ various web-based
platforms.
30. Defendants have further perpetuated their attacks by posting and ReTruthing
everything from Mark Zuckerberg, to George Soros, the Chinese Communist Party, and even the
origins of COVID-19.
14
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 15in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
12 of 37
31. As one example of many, on August 15, 2022, True the Vote posted an article which
falsely claims, among other factually incorrect assertions, that Konnech built software for the
Confucius Institute, an organization which they claim is linked to the Chinese Communist Party,
15
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 16in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
13 of 37
32. On August 17, 2022, True the Vote posted to Truth Social representing that
everything they said at The Pit was a factual matter and, again, encouraged others to continue to
16
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 17in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
14 of 37
33. On August 21, 2022, True the Vote directly accused Konnech of unlawful acts in
connection with a government contract and handling of ballots, even though Konnech has never
17
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 18in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
15 of 37
34. On August 27, 2022, True the Vote posted an article claiming that Konnech is
“owned by the Chinese Communist Party,” even though Konnech is owned by U.S. citizens who
are not affiliated with the Chinese Communist Party, and claiming that Konnech is involved in the
“subversion of our elections” which is tantamount to falsely accusing Konnech of election fraud,
18
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 19in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
16 of 37
35. On August 26, 2022, Defendant Phillips also ReTruthed allegations that Konnech
is directly connected to a “jump” of votes for President Biden even though Konnech has never
36. On September 5, 2022, True the Vote hosted a “Q&A” podcast concerning their
“Tiger Project,” which claimed to be an event where Defendants would reveal “How the CCP is
Breaching US Elections.” The podcast, however, merely summarized the same baseless rhetoric
against Konnech, and Defendants did not produce any evidence to support their baseless
accusations:
19
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 20in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
17 of 37
37. And on September 8, 2022, Defendant Phillips ReTruthed an article claiming that
the “FBI Conceals Chinese Infiltration of U.S. Election Software,” and quotes a prior statement
by Phillips that “[t]his is a red Chinese communist op run against the United States by Chinese
38. Defendants’ attacks on Konnech, however, are not just limited to social media
their own and others’ podcasts where they have further spewed and perpetuated their lies about
Konnech and, in fact, repeatedly confessed to hacking Konnech’s protected computers and stealing
its data.
39. For example, Defendants have falsely accused Konnech of bribing the City of
Specifically, on an August 15, 2022 podcast titled “Devolution Power Hour – Gregg Phillips
20
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 21in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
18 of 37
Interview,” Defendant Phillips (pictured below on the right) falsely implied that Konnech only
received its contract with Detroit because Konnech bribed the officials there: “The two biggest
donations . . . were from, guess who, Konnech. And then all of a sudden, they get, they get this
fast ballot counting software contract and, and next thing, you know, the election counting stops[.]”
But, as explained throughout, Konnech does not, and has never, performed any ballot counting,
scanning, or processing in any U.S. election. And Konnech has never engaged in bribery of any
Defendants Falsely Accuse Konnech of Maintaining Unsecure Chinese Servers and Admit to
Hacking and Stealing Konnech’s Data
40. Defendants have also falsely accused Konnech of maintaining unsecure Chinese
servers for their election logistics software and, in the process, admit to hacking and stealing
Konnech’s data. For example, on an August 23 podcast titled “Prophets and Patriots,” Defendant
Phillips described meeting his “guys” at a hotel room in Dallas, where they put “towels under the
doors” like “some kind of a James Bond kind of thing,” and proceeded to hack into a Konnech
server. Indeed, Defendant Phillips admitted on that podcast that “[w]e took [Konnech’s data]
21
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 22in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
19 of 37
directly” and that Defendant True the Vote plans to publicly “release all of [Konnech’s] data”
41. Defendant Phillips repeated these claims on an August 30, 2022 podcast titled,
“Here’s How They’ll Try to Steal the Midterms,” where Phillips described, once again, traveling
to Dallas, Texas to meet his so-called “analysts,” where they “plugged one of their computers into
the television” and began “scrolling through millions and millions of records about Americans,”
all of which he claims to have obtained by gaining unauthorized access to Konnech’s protected
computers. Defendant Phillips also described how he “immediately drove down to Houston” and
got Defendant Engelbrecht “to come over and meet [him]” that next morning, where they came up
with a plan to file a complaint with the FBI and turn over the data they stole.
“Patriot Games”—during which he admits the FBI accused him of being “the thief that stole the
Defendants conspired to unlawfully access Konnech’s protected computers, and how she and True
the Vote “pulled in [Defendant Phillip’s] team, and asked them to take a deeper dive” around the
security of Konnech’s software. Defendant Phillips told The Pit attendees that they accessed
Konnech’s alleged Chinese server by using a password after finding vulnerabilities in the server.
22
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 23in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
20 of 37
43. Additionally, Defendants have falsely claimed that Konnech is the subject of a
long-running FBI investigation, and that a grand jury indictment against Konnech is imminent.
Specifically, during the “Prophets and Patriots” podcast, Defendant Phillips claimed to have been
“involved in a major and mature counterintelligence operation with the FBI” investigating
Konnech.
44. And during the “Patriot Games” podcast, Defendants claimed that they are working
with people “to bring this work to, to a grand jury for the first time,” and that they have the “support
of, of a major prosecutorial office in the United States . . . and [that] they are moving this along,”
thus further claiming, as a factual matter, that Konnech has committed unlawful acts worthy of
prosecution.
45. But contrary to these unfounded accusations, Defendants admit they are the ones
who are the subject of an ongoing FBI investigation, which they have freely and repeatedly
admitted (if not boasted about) at the Pit and in each podcast on which they appear.
Defendants Falsely Accuse Konnech of Storing U.S. Poll Worker Data on Chinese Servers
46. Further, Defendants have falsely accused Konnech of storing sensitive and personal
data—including social security numbers, email addresses, phone numbers, and banking
information—on 1.8 million U.S. poll workers on servers in China, and otherwise running their
election logistics application through Chinese servers. For example, on an August 31, 2022
podcast called “Stealing the Chinese Internet w/ Gregg Phillips of 2000 Mules,” Defendant Phillips
falsely claimed that he found an “unbelievable amount of data from a US company run by a
Chinese national . . . Yeah, the CCP. We later found out that there’s all kinds of data on this server.
23
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 24in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
21 of 37
There’s, there’s data from counties all over the United States where the servers installed, there’s
47. And during the September 5, 2022 “Tiger Project” podcast advertised by
Defendants, Defendant Phillips falsely claimed that Konnech “left a database open that had the
personal identifying information of over a million Americans living on an open server in China.”
48. Similarly, on the “Here’s How They’ll Try to Steal the Midterm” podcast
mentioned above, Defendant Phillips falsely claimed that Konnech’s election software “apps were
running from China, the database is running in China. It’s on the Chinese internet, meaning the
49. And on the “Prophets and Patriots” podcast mentioned above, Defendant Phillips
falsely claimed that Konnech has “done military ballots,” and has “online voting systems that
they’ve created,” and that they were all “created by Chinese programmers[.]”
50. But the truth of the matter is, all of Konnech’s U.S. customer data is secured and
stored exclusively on protected computers located within the United States. Konnech does not,
and has never, stored any actual customer or poll worker data on any server in China as Defendants
falsely claim. Konnech does not, and has never, performed any ballot counting, scanning, or
processing in any U.S. election. And furthermore, Konnech has never managed customer data for
1.8 million poll workers, or even a small fraction of that number, despite Defendants’ claiming to
find 1.8 million U.S. poll worker records on a Konnech server in China.
Defendants Falsely Accuse Konnech of Being a Vehicle for the Chinese Communist Party
51. Moreover, Defendants have maliciously and dangerously claimed that Konnech
and its founder and CEO are members of and, in fact, spies for the Chinese Communist Party, who
are using Konnech to spy and commit fraud in connection with U.S. elections.
24
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 25in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
22 of 37
52. During the “Prophets and Patriots” podcast, Defendant Phillips claimed that
Konnech, through its alleged Chinese Communist affiliates, “pulled this [election fraud] off on the
United States.”
53. And during the “Tiger Project” podcast, Defendants Phillips and Engelbrecht made
further absolutely baseless and defamatory allegations against Konnech by expressly claiming that
“these are Chinese operatives in the United States,” and that “this is a, a Red Chinese communist
op run against the United States by Chinese operatives, and it’s, it’s a disaster.”
54. To set the record straight, neither Konnech, nor its founder and CEO, have any
affiliation with the Chinese Communist Party. Konnech is not a “Chinese operative,” and Konnech
is not used by the Chinese Communist Party for any purpose, whatsoever.
55. Defendants’ statements have been made with actual malice, knowing or reckless
disregard for the truth, including intentional lies concerning their possession of evidence of fraud
or meddling by the Chinese Communist Party that simply does not exist. Defendants have further
unsubstantiated connections to support their false accusations. They have purposely avoided or
intentionally disregarded publicly available evidence, facts, and reliable resources rebutting and
disproving their false claims. And they have formed and stuck to a false preconceived narrative
in spite of the facts, by relying on and putting forward facially unreliable and anonymous sources,
56. Defendants have perpetuated their claims after being put on notice of the falsity of
their accusations. They have ignored former President Donald Trump’s own Attorney General
William Barr—the former chief law enforcement officer of the United States Federal
Government—who has repeatedly declared that there was no evidence of voter fraud to overturn
25
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 26in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
23 of 37
the 2020 Presidential Election.5 And moreover, the notion that a vast international conspiracy
concerning the U.S. Presidential Election would be ignored by the Federal Government—and, in
fact, concealed by the FBI—but proven by conspiracy theorists and con artists using basic internet
searches and posts on social media, demonstrates Defendants’ recklessness and disdain for the
truth.
57. Unfortunately, although Defendants live in a world of make believe which they
have created for the sole purpose of enriching themselves, their actions have real world
consequences, including substantial harm to Konnech and its business reputation that has been
built over decades, but is at risk of being destroyed by Defendants’ baseless lies.
58. For example, on August 27, 2022, an anonymous poster on Truth Social posted the
name and email address of the board members of DeKalb County, Georgia’s Board of Registration
& Elections, and a Konnech contract proposal for DeKalb County, and encouraged followers to
contact the board members because the board was considering using Konnech for their voter
software. The post was ReTruthed at least 246 times and, just a few days later, Defendant Phillips
“Truthed” about DeKalb County, and posted the same Konnech contract proposal that the
anonymous source posted. Defendant Phillips’s actions are thus directly intended to damage
59. Indeed, ever since Defendants’ attacks on Konnech began, Konnech has had to
perform additional, costly security audits, and spent time and money investigating Defendants’
5
See Michael Balsamo, Disputing Trump, Barr says no widespread election fraud, AP News (June
28, 2022), available at, https://apnews.com/article/barr-no-widespread-election-fraud-
b1f1488796c9a98c4b1a9061a6c7f49d.
26
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 27in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
24 of 37
hacking, and to ensure that it has no security breach. Additionally, Defendants’ conduct
demonstrates their intent to prevent Konnech from developing business relationships with other
prospective governmental entities in the U.S., apparently solely on the basis that Konnech has
employees of Chinese descent. Defendants’ conduct is not only damaging to Konnech, it also
deters other would-be election logistic companies from entering the market—or will cause other
such companies to shutter—without which, elections would be unmanageable for cities and
60. Absent intervention from this Court, Konnech believes that Defendants will
continue its campaign to destroy Konnech’s current and prospective business relationships,
Defendants will make continued efforts to hack and otherwise compromise Konnech’s protected
computers, Defendants will continue their possession of data that they claim they stole from
Konnech, and Defendants will publicly disclose the data they stole.
harm to Konnech and its business, including harm to its reputation, customer confidence, and
62. Konnech repeats and realleges the allegations in paragraphs 1 through 61, as if fully
6
For example, conspiracy theorists have recently caused one Texas county’s entire elections
department to resign. See Neil Vigdor, 3 Election Officials Resigned in a Texas County, The New
York Times (Aug. 18, 2022), available at, https://www.nytimes.com/2022/08/18/us/politics/texas-
gillespie-elections-threats.html; see also Michael Murney, Anti-flouride conspiracists harassed
Texas county election workers until they all quit, MSN (Aug. 29, 2022), available at,
https://www.msn.com/en-us/news/us/anti-fluoride-conspiracists-harassed-texas-county-election-
workers-until-they-all-quit/ar-AA11fir2.
27
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 28in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
25 of 37
Konnech.
64. The foregoing statements by Defendants were false in their particular details and
their gist and essence in the entire context in which they were made.
65. The foregoing statements by Defendants were defamatory, libelous and slanderous
(collectively, “defamatory” or “defamation”) and in making the statements, Defendants acted with
actual malice, with knowledge of the falsity of the defamatory statements, or at least with reckless
disregard of their falsity by purposely avoiding the truth, making inherently improbable assertions
and, in fact, lying about Konnech’s commission of what are serious crimes in the United States.
67. The foregoing statements by Defendants constitute defamation per se in that they
falsely state that Konnech committed the crimes of treason, espionage, bribery and election fraud,
reputation and exposed Konnech to public hatred, animus, contempt or ridicule, or financial injury.
These false statements were made to impeach Konnech’s honesty, integrity, virtue, or reputation
and thereby expose it to financial injury. The defamatory statements are therefore defamatory per
se.
69. A reasonable reader would understand that all of the foregoing statements referred
to Konnech because, among other things, they referred to it by name, nickname, affiliation, or the
name of their “Tiger Project,” which is specifically directed at and targets Konnech.
70. Defendants are strictly liable for the damages caused by their defamatory
statements. Alternatively, Defendants were negligent with respect to the truth or falsity of the
defamatory statements of purported fact. Alternatively, Defendants knew and know that the
28
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 29in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
26 of 37
defamatory statements of fact were false, or were reckless with regard to whether the statements
72. Konnech repeats and realleges the allegations in paragraphs 1 through 71, as if fully
73. Defendants willfully and intentionally interfered with the existing and/or
74. Konnech has many existing contracts with various governmental entities in the U.S.
breach or cancel contracts with Konnech. Defendants have further encouraged others to contact
Konnech’s customers in an effort to cause those customers to breach or cancel contracts with
Konnech.
Konnech’s current customers have required Konnech to undergo costly audits that would not have
77. There is also a reasonable probability that Konnech would have entered into
additional business relationships with other governmental entities in the U.S. but for Defendants’
actions.
78. Defendants have acted willfully and intentionally to prevent those business
relationships from occurring by way of their independently tortious acts, which began with their
29
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 30in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
27 of 37
defamation and violation and conspiracy to violate the federal Computer Fraud and Abuse Act and
the Texas Harmful Access by Computer statute, and the disclosure of information stolen from
Konnech’s servers.
79. Upon information and belief, Konnech has suffered damages as a result of
Defendants’ interference.
80. Konnech repeats and realleges each allegation in paragraphs 1 through 79, as if
communication in the course of Konnech’s business and therefore are “protected computers” under
without authorization, and as a result of such conduct, caused Konnech damage and loss.
84. Defendants, by, among other things, knowingly disclosed, or otherwise have
threatened to disclose, the information stolen from Konnech’s protected computers, knowingly
caused the transmission of a program, information, code, or command, and as a result of such
protected computers, Konnech has suffered loss in an amount to be proven at trial, well in excess
of $5,000, which includes, but is not limited to, investigating, and assessing the need to remediate
30
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 31in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
28 of 37
Defendants’ unauthorized access, and responding to the attacks and assessing the damage, if any,
computers, by, among other things, impairing the integrity of Konnech’s protected computers, and
87. Konnech has suffered further injury and harm in the loss of confidential and
protected personal identifying information which was misappropriated by Defendants, and damage
88. Defendants’ misconduct constitutes a violation of the federal Computer Fraud and
Abuse Act, 18 U.S.C. et. seq., and Konnech is entitled to damages under the Act.
89. Konnech repeats and realleges each allegation in paragraphs 1 through 88, as if
90. Konnech’s protected computers are used in interstate and/or foreign commerce or
communication in the course of Konnech’s business and therefore are “protected computers” under
computers without authorization and obtaining information from Konnech’s protected computers.
computers without authorization, and as a result of such conduct, caused Konnech damage and
loss.
31
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 32in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
29 of 37
94. Defendants, by, among other things, knowingly conspired to disclose, or are
otherwise knowingly conspiring to disclose, the information stolen from Konnech’s protected
computers, knowingly caused the transmission of a program, information, code, or command, and
95. Specifically, Defendants admit they were part of a group who gained unauthorized
96. Defendants admit the objective of their group was to accomplish the violation of
the federal Computer Fraud and Abuse Act, by way of gaining unauthorized access to Konnech’s
protected computers and obtaining and disseminating information taken from those protected
computers.
97. Defendants admit to a meeting of the minds to violate the federal Computer Fraud
and Abuse Act by way of gaining unauthorized access to Konnech’s protected computers and
98. Defendants committed overt acts to further the objective of their conspiracy by
taking actions to gain unauthorized access to Konnech’s protected computers and obtaining and
to Konnech’s protected computers, Konnech has suffered loss in an amount to be proven at trial,
well in excess of $5,000, which includes, but is not limited to, investigating, and assessing the need
to remediate Defendants’ unauthorized access, and responding to the attacks and assessing the
protected computers, by, among other things, impairing the integrity of Konnech’s protected
32
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 33in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
30 of 37
computers, and intentionally stealing data and information contained on Konnech’s protected
computers.
101. Konnech has suffered further injury and harm in the loss of confidential and
protected personal identifying information which was misappropriated by Defendants, and damage
Fraud and Abuse Act, 18 U.S.C. et. seq., and Konnech is entitled to damages under the Act.
103. Konnech repeats and realleges the allegations in paragraphs 1 through 102, as if
systems” (hereinafter, collectively “computers”), as those terms are defined in TEXAS PENAL CODE
§ 33.01.
105. Konnech’s computers are secured by numerous security features, including two-
without the effective consent of Konnech, and as a result of such conduct, caused Konnech damage
and loss.
consent, Konnech has suffered damages in an amount to be proven at trial, which includes, but is
not limited to, investigating, and assessing the need to remediate Defendants’ unauthorized access,
and responding to the attacks and assessing the damage, if any, caused to Konnech’s computers
by Defendants.
33
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 34in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
31 of 37
by, among other things, impairing the integrity of Konnech’s computers, and knowingly and
109. Konnech has suffered further injury and harm in the loss of confidential and
protected personal identifying information which was misappropriated by Defendants, and damage
which may be brought as a civil action pursuant to TEX. CIV. PRAC. & REM. CODE § 143.001.
111. Konnech repeats and realleges the allegations in paragraphs 1 through 110, as if
systems” (hereinafter, collectively “computers”), as those terms are defined in TEXAS PENAL CODE
§ 33.01.
without effective consent, and as a result of such conduct, caused Konnech damage and loss.
115. Specifically, Defendants admit they were part of a group who gained access to
34
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 35in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
32 of 37
116. Defendants admit the objective of their group was to gain access to Konnech’s
computers without effective access, and obtaining and disseminating information taken from those
computers.
117. Defendants admit to a meeting of the minds to gain access to Konnech’s computers
without effective consent, and obtaining and disseminating information taken from those
computers.
118. Defendants committed overt acts to further the objective of their conspiracy by
taking actions to gain access to Konnech’s computers without effective consent and obtaining and
computers without effective consent, Konnech has suffered damages in an amount to be proven at
trial, which includes, but is not limited to, investigating, and assessing the need to remediate
Defendants’ unauthorized access, and responding to the attacks and assessing the damage, if any,
computers, by, among other things, impairing the integrity of Konnech’s computers, and
121. Konnech has suffered further injury and harm in the loss of confidential and
protected personal identifying information which was misappropriated by Defendants, and damage
33.02, which may be brought as a civil action pursuant to TEX. CIV. PRAC. & REM. CODE § 143.001.
35
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 36in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
33 of 37
CLAIM 7: CONVERSION
123. Konnech repeats and realleges the allegations in paragraphs 1 through 122, as if
125. Defendants unlawfully and without authorization assumed and exercised dominion
and control over the property to the exclusion of, or inconsistent with Konnech’s rights as owner
of the property, which removed the need for Konnech to demand the return of the property.
However, Konnech demanded the return of the data Defendants claim to have taken and
126. Defendants’ actions were intentional, malicious, oppressive, or fraudulent, and give
exemplary damages, a constructive trust over the converted materials, and an injunction requiring
CLAIM 8: VIOLATION
OF THE TEXAS THEFT LIABILITY ACT
128. Konnech repeats and realleges the allegations in paragraphs 1 through 127, as if
129. Konnech had the possessory right to property taken from its protected computers
by Defendants.
130. Defendants unlawfully appropriated the property Konnech had a possessory right
36
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 37in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
34 of 37
malicious because they intentionally tried to steal Konnech’s property as a means to enrich
132. Defendants’ conduct constitutes a violation of the Texas Theft Liability Act,
133. As remedies for Defendants’ theft, Konnech seeks compensatory and exemplary
damages, a constructive trust over the stolen materials, costs and reasonable and necessary
attorneys’ fees, and an injunction requiring Defendants to return the stolen materials to Konnech.
134. Konnech repeats and realleges the allegations in paragraphs 1 through 133, as if
135. As set forth in the Third, Fourth, Fifth, and Sixth Causes of Action, supra,
Defendants have admitted to violating and conspiring to violate the federal Computer Fraud and
Abuse Act, 18 U.S.C.A., et. seq. and the Texas Harmful Access by Computer statute. There is
thus a strong likelihood that Konnech will succeed on its claims in this action.
136. Defendants’ misconduct has caused, and continues to cause, Konnech injury
including, without limitation, irreparable harm for which there is no adequate remedy at law.
137. There is no adequate remedy at law to compensate Konnech for the irreparable
harm caused by the interference with its control and the integrity of its protected computers, the
harm to Konnech’s reputation, customer confidence, and goodwill it has suffered and will continue
to suffer due to Defendants’ hacking of Konnech’s protected computers and the disclosure of
information obtained therefrom. And there is no adequate remedy at law to compensate Konnech
37
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 38in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
35 of 37
138. To protect Konnech from such irreparable harm, the Court should enjoin
Defendants, directly or indirectly, and whether alone or in concert with others: (1) from accessing
or attempting to access Konnech’s protected computers; (2) to return to Konnech all property and
data obtained from Konnech’s protected computers, whether original, duplicated, computerized,
handwritten, or any other form whatsoever; (3) from using, disclosing, or exploiting the property
and data downloaded from Konnech’s protected computers; (4) to preserve, and not to delete,
destroy, conceal or otherwise alter, any files or other data obtained from Konnech’s protected
computers; (5) to identify each individual and/or organization involved in accessing Konnech’s
protected computers; (6) ordering Defendants to confidentially disclose to Konnech how, when,
and by whom its servers were accessed without authority so that additional necessary security
measures can be implemented by Konnech to maintain the integrity of the data therein in light of
the upcoming midterm elections; and (7) to identify all persons and/or entities, in Defendants’
knowledge, who have had possession, custody or control of any information or data from
139. The balance of equities strongly favors issuing injunctive relief in favor of Konnech
as Defendants will suffer no hardship from being ordered to cease and desist from committing
continued unlawful acts and, specifically, from gaining unauthorized access to Konnech’s
protected computers, and to return the data that belongs to Konnech, but was stolen by Defendants.
140. An injunction will not adversely affect the public interest. Rather, an injunction
will benefit the public interest because the public has an interest in preventing conduct which the
United States Congress and Texas Legislature has determined is unlawful, and an interest in
JURY DEMAND
38
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 39in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
36 of 37
Plaintiff Konnech, Inc. prays that Defendants True the Vote, Inc., Gregg Phillips, and
Catherine Engelbrecht be cited to appear and answer herein, and that Konnech, Inc. recover
c. A constructive trust for the return of Konnech’s stolen and converted property;
g. All such other and further relief, both general and special, at law or in equity, to
which Konnech may show itself to be justly entitled or as this Court may deem
appropriate.
39
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page: 40in TXSD
1 Filed on 09/12/22 Date Filed:
Page11/11/2022
37 of 37
40
Case: 22-20578 Document: 00516542768 Page: 41 Date Filed: 11/11/2022
KONNECH, INC., §
§
PLAINTIFF, §
§
v. § CIVIL ACTION NO. 4:22-CV-03096
§
TRUE THE VOTE, INC., GREGG §
PHILLIPS, and CATHERINE §
ENGELBRECHT, §
§
DEFENDANTS. §
AFFIDAVIT OF EUGENE YU
STATE OF MICHIGAN )
)
COUNTY OF INGHAM )
BEFORE ME the undersigned official on this day appeared EUGENE YU, who is
personally known to me, and being duly sworn according to law upon his oath deposed and said:
1. My name is Eugene Yu. I am a citizen of the United States of America. I am over the
age of 18 years and suffer no form of legal or mental disabilities. I have personal
knowledge of the facts stated in this affidavit which are true and correct.
2. I am the President and CEO of Plaintiff Konnech, Inc. (“Konnech”). Konnech provides
governmental entities in the U.S. with election logistics software, called PollChief, that is
used by those governmental entities to recruit, train and schedule poll workers; coordinate
the distribution of equipment and supplies to polling places; and dispatch support personnel
to address technical and other issues. Konnech does not select, communicate, or otherwise
interface with any poll workers. And Konnech’s software products are in no way involved
in the registration of voters, the production, distribution, scanning, or processing of ballots,
or the collection, counting or reporting of votes. Konnech never handles any ballots and
no ballots or voting counts ever enter any of Konnech’s protected computers, as that term
is defined by 18 U.S.C. 1030, et. seq.
41
Case: 22-20578 Document: 00516542768 Page: 42 Date Filed: 11/11/2022
3. In connection with its business, Konnech maintains protected computers which are used in
or affect interstate commerce. Konnech controls access to its offices, enters into
confidentiality agreements with its customers and employees, and uses two-factor
authentication and other security measures to control access to its protected computers.
Only a select group of Konnech employees that have been provided with that two-factor
authentication have authority to access Konnech’s protected computers.
4. True the Vote, Inc., Gregg Phillips, and Catherine Engelbrecht (“Defendants”) have
directly, repeatedly and improperly targeted Konnech and its protected computers.
Defendants have publicized that they held an event on August 13, 2022, called “The Pit,”
during which they announced their attack campaign against Konnech, falsely and
maliciously claiming that Konnech maintains U.S. poll worker data on servers located in
Wuhan, China, and falsely and maliciously claiming that Konnech is otherwise being used
to enable the Chinese Communist Party to breach U.S. elections.
5. On August 13, 2022, and on multiple different occasions since then, Defendants claim that
they and/or those acting in concert with them have directly or indirectly gained access to
Konnech’s protected computers and obtained, used and/or disclosed data allegedly
contained on those protected computers including, according to Defendants, the personal
identifying and banking information of 1.8 million U.S. poll workers. Konnech has never
authorized Defendants, nor anyone acting in concert with them, to access Konnech’s
protected computers or to obtain, use, and/or disclose any data contained on those protected
computers. Defendants have threatened to imminently publicly disclose all of the data
that they allegedly obtained from Konnech’s protected computers.
6. Konnech has thus spent over $5,000 within a one-year period in connection with
Defendants’ unauthorized access of Konnech’s protected computers, because Konnech has
been required to investigate, assess, and respond to Defendants’ alleged attacks on
Konnech’s protected computers, and to assess the damage, if any, caused to Konnech’s
protected computers by Defendants’ alleged unauthorized access of same.
7. Unless Defendants and anyone acting in concert with Defendants are immediately enjoined
from accessing Konnech’s protected computers and obtaining, using and/or disclosing any
data contained on those protected computers, Konnech will be irreparably harmed by:
42
Case: 22-20578 Document: 00516542768 Page: 43 Date Filed: 11/11/2022
f. loss of confidence and trust of Konnech’s customers, loss of goodwill, and loss of
business reputation.
8. Attached hereto as Exhibit A-1 is a true and correct copy of a video entitled “Prophets and
Patriots – Episode 20 with Gregg Phillips and Steve Shultz” published by Elijah Streams
on Rumble on August 23, 2022. In the podcast, Defendant Gregg Phillips sits for an
interview for approximately one hour and four minutes. The video can be found here
https://rumble.com/v1h1pj9-rumble-only-prophets-and-patriots-episode-20-with-gregg-
phillips-and-steve-.html and a flash drive with a copy of the recording will be filed with
the Court contemporaneously with the filing of Konnech’s Motion for Temporary
Restraining Order and Preliminary Injunction (“Motion”) and this Affidavit of Eugene Yu
(“Affidavit”).
9. Attached hereto as Exhibit A-2 is a true and correct copy of a video entitled “Here’s How
They’ll Try to Steal the Midterms – Gregg Phillips Interview with Seth Holehouse (AKA
ManInAmerica) August 30, 2022” published by Man In America on Rumble on August
30, 2022. In the video, Defendant Gregg Phillips sits for an interview for approximately
one hour and fifteen minutes. The video can be found here https://rumble.com/v1hz1jr-
heres-how-theyll-try-to-steal-the-midterms-gregg-phillips-interview.html and a flash drive
with a copy of the recording will be filed with the Court contemporaneously with the filing
of the Motion and Affidavit.
10. Attached hereto as Exhibit A-3 is a true and correct copy of a video entitled “Episode 6:
Gamechanger” published by Patriot Games on Rumble on September 2, 2022. In the
video Defendants Gregg Phillips and Catherine Engelbrecht speak for approximately forty-
six minutes. The video can be found here https://rumble.com/v1idjwj-episode-6-
gamechanger.html and a flash drive with a copy of the recording will be filed with the
Court contemporaneously with the filing of the Motion and Affidavit.
11. Attached hereto as Exhibit A-4 is a true and correct copy of an August 13, 2022 Truth
Social post by an individual named Taylor Phillips, and “ReTruthed” by Defendant Gregg
Phillips.
12. I submit this affidavit in support of Konnech’s application for a temporary restraining order
and preliminary injunction.
13. No previous application for the relief requested herein has heretofore been made to this or
any other Court.
43
Case: 22-20578 Document: 00516542768 Page: 44 Date Filed: 11/11/2022
44
Case: 22-20578 Document: 00516542768 Page: 45 Date Filed: 11/11/2022
EXHIBIT A-1
45
Case: 22-20578 Document: 00516542768 Page: 46 Date Filed: 11/11/2022
46
Case: 22-20578 Document: 00516542768 Page: 47 Date Filed: 11/11/2022
EXHIBIT A-2
47
Case: 22-20578 Document: 00516542768 Page: 48 Date Filed: 11/11/2022
48
Case: 22-20578 Document: 00516542768 Page: 49 Date Filed: 11/11/2022
EXHIBIT A-3
49
Case: 22-20578 Document: 00516542768 Page: 50 Date Filed: 11/11/2022
50
Case: 22-20578 Document: 00516542768 Page: 51 Date Filed: 11/11/2022
EXHIBIT A-4
51
Case: 22-20578 Document: 00516542768 Page: 52 Date Filed: 11/11/2022
52
Case: 22-20578 Document: 00516542768 Page: 53 Date Filed: 11/11/2022
Prophets and Patriots – Episode 20 with Gregg Phillips August 23, 2022
53
Case: 22-20578 Document: 00516542768 Page: 54 Date Filed: 11/11/2022
anyone to believe us. We took it directly. That was on a Friday after Friday. Now, my guys
invited me to Dallas. On a Friday night, we went met at hotel room towels under the doors, you
know, we were pretty weird. I mean, it was like some kind of a James Bond kind of thing or
some sort of weirdness like that. And, and they proceeded to show me everything. They showed
me the database, they showed me where it lived. And it lives on the main, the main backbone,
the Unicom backbone in China, which is the main internet, in China, all the poll workers, is that
what you're saying of everything, everything. And they have, they have software that counts that
count that does FastCap ballot counting. They have software, all of this is done in China,
42:46
who gave China all of this information? I mean, how did this even happen?
54
Case: 22-20578 Document: 00516542768 Page: 55 Date Filed: 11/11/2022
turned this whole thing on us, Steve and EPA. So here's the key, the software is still in place.
And so and so they said, well, we'll work on it, we'll try to figure it out. Don't worry about it, don't
worry about it. About a week, about a week later. They we find out that, that they they had the
meeting that they were going to have and and in the end as it as it began to sort of unpack the
I'm gonna have my car cut off, I'm sorry, it's gonna dig for a second. Okay. They they had
basically unwound that, but they hadn't fixed it. They're still the software there. And by now that
we're into the movie, the movie was out. And I get a call. A few weeks after the member, we had
all manner of things happening, right? And I'm still I'm still on my listen to God. You know, my
kids. I'm still listening. I get a call from a senior agent at the FBI. And he says, Listen, we've
received a report that you stole, meaning me, Greg stole three servers on the Unicom backbone
in China. What
48:24
it the enemies? Maybe I'm stating the obvious, but are we just looking at absolute corruption at
the top? He's turning it on you because he's turning it on you not because he really believes it.
Because he he's trying to stop your work. That's only right. I
55
Case: 22-20578 Document: 00516542768 Page: 56 Date Filed: 11/11/2022
have no idea what we have. And they have no idea what's it, what's in these what's in our
records. And when it all comes out. And it's all said and done. And we dump all of it, we called
the this Chinese thing and Tiger project, when we dumped the Tiger project out into the world,
and there are already 180 People that have it, and they're doing some amazing work, you could
go in and read onto socialism of the work that's being done by some of the folks that already
have some of the info. But that's just a smidgen of info, we have so much more. And, and when
it all comes out, it's going to, it's going to devastate the left. And that's what they're doing.
They're trying to stop it before the election, then
51:00
when you say when it comes out, you're talking about the movie that they keep shutting down
that one,
52:04
I was gonna say so great. How can people I want to watch this movie that you're trying to get
out? What do people do to try and find it? Do they go to their soulmate website? Or what what
do we do?
56
Case: 22-20578 Document: 00516542768 Page: 57 Date Filed: 11/11/2022
exactly like that, but we have some really great people that are stepping up and really doing
some amazing research. And while you know, they're probably not going to go to church with
me, and you know, they won't be in these prayer groups. And, and, and, you know, probably
didn't come to the pit. And when we when we did pray at the bid, they probably weren't in the
prayer circle. But But, but they're important to the process. And it's important that we, we, you
know, keep some of our own emotions out of the way and always tell everybody look that my
TrueNorth is freedom, in this case, and yeah, and if and if you're if anyone's willing to fight for
freedom, and well, yeah,
57
Case: 22-20578 Document: 00516542768 Page: 58 Date Filed: 11/11/2022
SUMMARY KEYWORDS
people, election, vote, fbi, china, patriots, confucius institute, happen, chinese, overwhelm, information,
data, run, ballots, greg phillips, important, folks, america, steal, day
SPEAKERS
Gregg Phillips
00:00
You? Ladies and gentlemen, welcome to man in America. I'm your host Seth Holehouse. So by now it's
obvious that dark and powerful forces are manipulating our elections. Recently, Mark Zuckerberg
basically admitted to Joe Rogan that the FBI and Facebook intentionally steered the outcome of 2020
by censoring news about Hunter Biden's laptop from hell. Meanwhile, in China, a server has been
discovered containing the personal data of 1.8 million US poll workers. And as we head into the
midterms, the mainstream media is already starting the exact same narrative like they did in 2020. The
big question is, how will they attempt to steal the midterms? And more importantly, can they get away
with it, even if we have a red tsunami? So joining me today is Greg Phillips to discuss all of this and
more. Before we get started, today's show is brought to you by rise TV, a patriot owned streaming
platform. With all the big tech censorship and the monetization going on right now. The subscribers that
rise TV are literally the reason I can bring you this critical information today. Over at Rhys, our mission
is to uncover the truth no matter how dark and difficult, we'll always holding on to hope you can have a
few laughs along the way. Over and rise, we have a massive, massive content library with amazing
content, and an incredible community of patriots that you're gonna get to know on day one. And you get
to hang out with me and my guests for the second half of every show and ask your questions and share
your thoughts and ideas. So if you have any specific questions that you want Greg to answer, make
sure you join us on righ t rise TV, there's a link for a free trial in the description below. You should go
ahead and click it now. So that way, you're all set up and we cut the public streams for the exclusive
q&a During the second half of the show. Also, make sure you're following me on telegram and true
social at man in America. You can also catch every episode as a podcast, if you just want to listen, the
links to my podcasts and all the social media are in the description below. And folks, by now we've all
sensed that we're in for a bumpy ride for the foreseeable future. Russia and China are truly flexing their
58
Case: 22-20578 Document: 00516542768 Page: 59 Date Filed: 11/11/2022
muscles on the global stage. And they've aligned with India, Brazil, South Africa and dozens of other
countries to transition away from the US Dollar as the dominant global currency. So what does this
mean? Well, for most of us, Americans, the US dollar is all we know, right? All of our hard earned
money is completely tied to it, whether it's through the stock market, or bank accounts, pensions, 401k,
etc. But you see, the rest of the world is fed up with the US printing money out of thin air and
demanding to trade it for things of real value. So this is why Russia has already back its currency with
gold and many other nations are expected to follow. But what happens to the US dollar if it loses its
global reserve status? Well, the value of our dollars our life savings could literally be wiped out
overnight. And look, I'm not a financial advisor. So please do your own research. But I believe that now
more than ever, it's a good time to consider transferring at least some of your wealth into physical gold
and silver. Real world assets have stood the test of time we're talking five 1000 years. And for this, I'm
confident recommending noble gold, you can buy gold and silver directly or you can even transfer your
IRA into physical gold and silver with zero taxes or penalties. Most importantly, you can trust noble gold
with your wealth, they have an A plus rating with the Better Business Bureau and hundreds of positive
reviews from the folks like you they've already helped. Now look, I want to be really, really clear with
you. You don't buy gold and silver to get rich, you do it to protect your wealth. But if things get really
tough history has left us with many stories of folks scooping up land and other valuable assets for a few
gold coins. So now's the time, folks, if you want to learn more about this, open up a new tab right now
and go to gold with seth.com. Or you can call 877-646-5347 to speak to someone right now, the folks at
Noble gold who will answer all your questions and take care of you every step of the way. Again, that's
877-646-5347. And look, I'm not saying noble goal is the only option if you already know something
sells gold and silver. Great. All I'm saying is that you should please act now and protect your wealth
before it's too late. So folks, this is going to be a fantastic, fantastic interview with the patriot, Greg
Phillips. But I have a quick note, for those of you that are watching on YouTube, we're not going to be
publishing this interview on YouTube. Right, this is going to be a very, very important interview. And
we're gonna be talking about a lot of what happened in 2020, what they're lining up for 2022. And I
can't publish this on YouTube. So if you want to join us and watch the rest of this show, which is gonna
be incredible, please click on the link in the YouTube description. And you can go over to rumble to
watch it where we can actually talk about things openly over there. So Dom, you can go ahead and cut
the YouTube stream. So we can go ahead and talk about all these things that the commies don't want
us to talk about. So without further ado, let we're gonna bring on my guest today. Mr. Greg Phillips. So
Greg, thank you so very, very much for joining me again.
07:22
Thank you. You know, some people are calling this the Battle of the beards. But I think we're on the
same team. So I'm just I'm really worried for years on the opposite side of you, and on the front lines of
this. So it's
59
Case: 22-20578 Document: 00516542768 Page: 60 Date Filed: 11/11/2022
so many people recognize me because of my beard, but it's actually a little bit silly, I'll walk down an
airport, people come up and want to take pictures of me and be sure you get his beard in the picture.
It's just it's kind of funny, but you know, I've, I've been able to laugh about it and enjoy it. And I just, you
know, again, I'm super thankful for not just your listeners, but all the people that have supported
Catherine through the vote. And some of the work that we've been able to accomplish is surely been
extraordinary.
08:08
It's really, really important because the I think that for a lot of us, we're going through this process of
realizing that our country hasn't been in the control of weather people for quite some time. And you
know, without getting into the corporatocracy and, and all the corruption and bureaucracy that exists
just looking at the elections, which are really the foundation of us being able to choose who we want to
represent us. Right? That is, like we're not, you know, we're not saying that if you're a leader, you have
full command, or as we're saying, Look, we're giving you permission to rule us. And this that this is one
of the big problems we're facing right now is that they have hijacked that entire process of us being able
to choose our leaders and adjust in fair way. And so, you know, I want to first dig into a few things that
are just more topical, the first one being, I'm not sure if you saw the recent interview with Mark
Zuckerberg and Joe Rogan, where Zuckerberg has come out and he I'm not sure if he was intending to
do it on purpose or not. But he basically admitted that the FBI pressured Facebook, to censor the
Hunter Biden laptop information, which we know and Trump was very open about this untrue social
saying, Look, if that would have gotten out there, it would have turned to the times of the election, and
the damning evidence was so strong. So this we have, really this is almost what you call the fascism.
This is a wing of of of our government working with a private corporation to change the course of our
own elections. I mean, this is a very slippery slope. So and you've also had some dealings with the FBI.
You guys brought your information to the FBI. So I wanted to get your take on what you think the FBI is
role is in our elections.
60
Case: 22-20578 Document: 00516542768 Page: 61 Date Filed: 11/11/2022
intelligence community presence. So the intelligence community is made up by people inside of each of
these organizations, whether it's DHS, or whether it's the FBI, or the NSA, or the CIA, so on and so
forth. All of the defense agencies, and their job is to surface information, to get information from from
people to get information from confidential informants to get information from human sources that they
have, and that they've acquired and maintained on the ground. It's important on in trafficking is
important drug trafficking, human trafficking, you know, all of the border issues, all of these issues have
an intelligence community component to them. So that if someone say in the Air Force I see comes up
with some information, he or she might be able to give it then to someone at DHS that might need it
that they would do. So that's the way the community is sort of formed, and obviously horribly,
oversimplifying something that's far more complex. But that's, that's really what the IC is our experience
with these people that are out there. And their job is to surface things that is pretty extraordinary. I
mean, these people have been, you know, mostly good to us. They've, they've kept us out of trouble.
They've alerted us when bad things were happening around us. We've been able to go to them when
we've had, like servers taken down. And I mean, we can we actually have people we can go to and talk
to. But similarly, these people's job is to surface information. So if we find something that is so
important, from a national security perspective, that we just can't deal with, I mean, we're just people,
right? And we're just citizens, citizens, researchers, in a way, we happen to have a few, maybe better
connections or not. We happen to have data sources, maybe some tools that the average the average
man or woman may not have. But the process of taking that information, understanding that as an
actual national security application, and then and then presenting it to your anyone's icy contacts.
That's the way the game is supposed to work. And that that's what America is, is really how it's
designed to work and, and those people are really good people. We don't we don't really run into any
bad guys at that level and or at least as far as we know.
14:24
That's then once they get encouraging, I'll say that's encouraging to me because I think that it's really
easy to look at these giant organizations or even these new 87,000 IRS agents and, and just think that
like, Okay, if you were the FBI bad, you're a Storm Trooper, you're working for Darth Vader, so you're a
storm trooper. But actually, I think that this what they want us to believe is that it's the behemoth of his
agencies that are all against us. But actually, you make a really good point and that that even that like
there gives me the sliver of hope instead thinking that there's actually a lot of patriots and constitute you
people that love the Constitution, that it's just their job, and they don't like the fact that they hand that
information up the ladder. And then it gets you to say, three levels above and then something bad
happens with it. So just it's good to know that there are a lot more good people out there, and they want
us to believe sorry to interrupt you. But it's I think it's important point to me.
61
Case: 22-20578 Document: 00516542768 Page: 62 Date Filed: 11/11/2022
that had something to do with Ukraine and Russia. And it was super important. And what do you do
with that, so you're just an average guy sitting in your office, somebody presents you with something
that seems like oh, my gosh, somebody needs to know about this. If I took that to, say, the intelligence
community representative from the FBI, he or she may not be able to do anything with that, but they
might be able to hand that off then to or oil and Dora introduce us to someone say at the agency, or, or
the CIA or at the NSA, or someone or DOD for that, for that matter, that that might have some
knowledge or interest or whatever, and then handing that off, and then letting us go make the
presentation to that individual, or, or really share kind of what we know and then walk away. What
happens occasionally is really what happened to us. And all of this is that is that there are times, and I
was just talking to a retired FBI agent this morning on this very topic, a very senior person. I mean, he's
really somebody I really admire his his career and his trajectory. And, and I was talking to him this
morning about this. And I said, one of my frustrations is that, you know, if we stay in it, we never know
where those those lines are those bright, there is no bright white line, right, it's more of a gray kind of
chalky line that you sort of get there you step on, like, oh, like, I'm not sure I'm supposed to be here.
Because sometimes you are given information from from a human source or acquire information from
from open source research, or whatever it is. But in sometimes it doesn't even matter, right?
Sometimes, you know, they don't care, we don't care. So we've tried to hand it off to and they're like,
and whatever, you know, we don't care about that. However, there are times when you do encounter
things, that that you need to hand off. And, and having people that you can go to that you can trust to
say, look, here's how we receive this information, we don't want it, we want to get rid, we don't want it in
our offices or whatever. Here you go, go do this. And these people are really great at handing off to
people that they know, and they trust inside of, say, a local field office of the FBI, or, or maybe maybe
maybe a, you know, a CIA Case Officer at the agency or something like that. And so being able to hand
off that data
62
Case: 22-20578 Document: 00516542768 Page: 63 Date Filed: 11/11/2022
shared phone calls, shared text, hey, what do you know about this? Do you know about that? You know
anything about the banking relationship? Do you know anything about these new patterns, or these
new trademarks that we found and what's going on with this? And it was a very collegial in this case, a
very collegial relationship with with with true patriots. I mean, their job was what would prevent them
from being out, you know, like, like me, or you would, you know, trying to uncover something just for the
sake of patriotism. But there's no question these people were good people and patriots, and they
worked with us right up until right up until the very end. And, and and we never, mostly, it wasn't until
the near the end, where we really had a sense that something went wrong, that it wasn't any longer
about learning about who this company was or what they were doing or their involvement in elections?
Or could we prove it? Or what was the connection between this company and that company or this
bank and that bank out at all? What do you know what, it stopped being that. And, and the challenge
that we had was really post that. And we knew it was changing. around mid April or So Katherine
received a call from one of our somebody that we were in close contact with, at the FBI saying, Hey, I
don't want you to tell Greg this, but we got a problem. And the problem is, we went up and presented
18 months worth of research, or some people went up and, and presented 18 months worth of
research. And during the presentation, the counterintelligence operators, were basically ordered to go
tell the target that we had penetrated his systems illegally and, and really turn it on us and go to and it
was China based. And so you know, and it goes, and I'll come back to that in just a minute. Because
that's the most striking thing of all that.
24:54
63
Case: 22-20578 Document: 00516542768 Page: 64 Date Filed: 11/11/2022
Internet, right.
64
Case: 22-20578 Document: 00516542768 Page: 65 Date Filed: 11/11/2022
whatever other calls in between where they were saying, Look, you guys need to get ready for the
nuclear option here. And we need to go public with this. And it was those admissions that ultimately,
like well, we can't wait. And I mean, we went to a few. We went to Senator Johnson. I think Catherine
contacted Jim Jordan's office. We contacted a few people high placed in the media and they could
touch it. It was just too hot. hematogenous Gosh, literally days before the pit, that raid at Mar a Lago,
you know, advice and credit was it was fortuitous, to say the least.
30:12
How much Xenos, I read a really good article detailing the server that you guys discovered in China,
where you found one around 1.8 million poll workers that the detail right the details on almost 2 million
United States poll workers, but not just that their family members, maps of the buildings where the
voting machines are kept. I mean, how much in your just in your understanding and through your
research? How much of this goes back to the CCP, right? And back to, you know, the Chinese
Communist Party, really working to sway our elections, like layout me what you found that led you back
to them?
32:12
group, a quick note out for the viewers. So the Confucius Institute, it's basically it's one of China's main
ways of bringing propaganda into the school systems across America. So university level will have the
Confucius Institute will fund teachers all kinds of programming for people going to, you know, your local
university to learn about China. But the entire thing is a CCP run infiltration and propaganda operation.
Like it's completely a communist operation. And it Mike Pompeo, yeah, he was very, very on top of
trying to expose under the Epoch Times has done that a lot. So you're telling me that this guy who was
when the lead programmers of the Confucius Institute itself, is also the one that is spinning his data off
to China? So is it through their infiltration into these tech companies into this? And how are they getting
this? How is the CCP getting their hands on the data of these poll workers and maybe throw using tick
tock? It'd be easy, right? But how are they getting that kind of information?
65
Case: 22-20578 Document: 00516542768 Page: 66 Date Filed: 11/11/2022
next thing you know, it's in Travis County, Texas. We're Austin is and and we started looking around
and it's in Detroit. And, and it's in all of these places. We're like what is happening here. And so we
started, Catherine started doing open records requests, and started learning a little more about these
contracts. And a little more about it, as we dug into using some open source tools that help you track
these things. One called binary edge, we realize that there's one particular IP address, where all of the
software and this this, basically this company created a software that manages elections. It manages all
of the information, human information, facility based information, it manages the RFID codes on the
machines, everything there is to know about an election and manages the hours that people work in
these elections. And all of this data rolls up into into depending on let's just say it's in Fairfax County,
Virginia, vote for fairfax.com and then vote for boston.com. Vote for the number four la.com. And all
over the country. These M Johnson, Johnson County, Kansas and I mean all over the country. This this
software is emerging out there. And we're like, what, what is even happening with this? In binary ads,
one of the things that it does is it not only tells you what URLs resolved there, all of those ones that I
just mentioned, but it tells you where it lives. Where does this server live? And you can actually track it
down and you track it down to China. it on the main Unicom backbone in China. And, and it was almost
impossible for me to believe it came to me from some of my analysts who got me to, they uncovered it.
They brought me to Dallas into a hotel room at the Anatole Hilton Hotel and in Dallas, just off the
campus of SMU. I mean, I got there like nearly midnight, and we started get rolling up into this data,
they plugged one of their computers into the television, and we're we're looking at this stuff live by 430.
In the morning, we were we were, I was pretty well scared that this was bad. You know, this wasn't our
geo data. This wasn't what we normally do. And by the way, that's being tracked too. But that's a whole
different topic. The the, the volume of data that was went beyond just this, because the way China
operates in their social scoring system is the data is all way or Dan. So they and they, they are the
largest owners of American of data about Americans in the world. And so as data sells in its
36:10
largest owner of data about America.
66
Case: 22-20578 Document: 00516542768 Page: 67 Date Filed: 11/11/2022
the database is running in China. It's on the Chinese internet, meaning the Chinese own it. So that so
that is on a Friday, that was on a Friday night or Saturday morning, 430. In the morning, by the time I
left, I immediately drove down to Houston never went to sleep that night, got a Catherine to come over
Cand meet me in Houston on Saturday morning. And by Sunday, we had made a plan to hand this off
this idea, this concept off to the FBI. Because it was national security. We knew that there were at the
time before the Chinese scrubbed at all. There was a similar incident that happened in Australia. They
had servers in Canada. There were there was all sorts of underpinnings around all of this that were just
absolutely frightening. They have multiple offices in or near Michigan State including one right across
the street in the same building that had housed the the Confucius Institute when it was still there. So
there were lots of reasons for us to be oh my gosh, we have to do something about this. One other
interesting point is we so we pointed this out, we took it to the FBI, and they got engaged in almost
immediately the target. The guy that ran the company started communicating with us about the open
records request. And so, so we're like, Well, that's what we do. Yeah, we'll happily meet with you and
talk to you about it. We did this all with the permission and the cooperation of the Bureau, because they
had already opened up an investigation because this guy was already on their radar. It wasn't just that
we brought something in, he was already on their radar, but they could never pin him down with
anything. They didn't have the you know, they just didn't have the line of sight. Like we just accidentally
stumbled on that in that launched an 18 month investigation that brought me up to the pit. And so us
having to explain what I just you know, and I did it I think a little bit more eloquently at the pit. But that
said, this is real. This isn't this isn't just a joke. This isn't just Oh, believe me about these, these pee
caps that are flying through the air. And, you know, I actually happen to know a little about pee caps.
But this is not that. What we're saying is the data being being processed by an app, run by a company
based in Michigan is processing, storing, analyzing, and utilizing all of the data that is gathered from
these elections. In from their own website. It says they're in 1000s of counties across the country. And
we know they're in places like Los Angeles, you know, we know that there. I can tell you today there
are 43,000 records of Los Angeles poll workers that are that are on this list. What's even more
frightening about that particular one?
41:39
And that is what's frightening to me. So I wanted to ask you about so do you think from what you're
seeing that the CCP is using a variety of, you know, we know they're using tick tock has all kinds of
backdoors that they're using, including election software, to build a database of Americans and that
they're layering their social credit system in with that database? And that's a frightening thing to ask
about is why on earth would the CCP be building a digital database of American citizens that ties into
their social credit scoring system that is frightening.
- 10 - Transcribed by https://otter.ai
67
Case: 22-20578 Document: 00516542768 Page: 68 Date Filed: 11/11/2022
44:27
Why it's even you because this is a my
44:33
yeah, but even it's a mayor's mayors of small towns in Ohio. And so, you know, back when I used to
work with the Epoch Times, I made a lot of contacts of people that really understand China and they've
got access to China, like no media I've seen on Earth, what they're able to uncover there. And I was
speaking to a woman that was very well connected. And what she told me was that the CCP has
studied every single level of our society to know how everything works even down to the the board level
of a local school. They know how it works. They know who the key influencers are. And so they invite
people over to China for these trips. And it's, it's not just like, you know, you might see like, say Mitch
McConnell, and, you know, we know his wife is very tied into the jungles and men regime and all these
kinds of things. But it's literally mayors of small towns in a place like Ohio, for instance. And what they
do, then what this woman explained to me, is that it's it's bribery and blackmail. And that's the purpose
of these trips. So these hotels are staying in each hotel room might have 3040 50 cameras and
recording devices. And so say that there's a mayor from small town, Ohio, it's a good Christian man,
family, guys, like why I get a trip to China to talk to them, they want to learn how we're successfully
running our small towns in America, you know, what an honor? Well, you know, he's at dinner with
- 11 - Transcribed by https://otter.ai
68
Case: 22-20578 Document: 00516542768 Page: 69 Date Filed: 11/11/2022
somebody, and so impose Messiah sit down and say, Look, we're gonna give you half a million dollars
for you to work with us. But it means you're going to do what we say, and we're gonna get information
when you access your information, etc. He might say, Look, you know, look, I'm a God fearing man,
and I'm a patriot, I'm not going to do that. He goes up to his room, and a woman shows up, beautiful
young Chinese woman shows up at his door, and she knocks in and she says, hey, you know, kind of
come in, and he goes, Look, nope, like, I'm a Christian man, I've got a wife and four kids at home. Not
gonna happen. He wakes up the next morning with her in his bed. Next to him. He didn't realize they
already planned it, they knew that they don't accept, Oh, he didn't accept our bribe. So it's not going to
work. They already poisoned, they already put something in his drink at night, you know, and she
doesn't go up there, there's no option. They've got it all recorded. And if he's lucky, that's all it was. It
might have been a young child, it might have been a young child that he wakes up debt with a child
debt next to him, you know, everyone looks at Epstein, the communists, they're the ones that mastered
the use of pedophilia as blackmail. And that was me that's that's old Soviet Soviet campaigns, I that
was a deep thing that they did. So this is, you know, it's it's honey potting to the nth degree. And this is
how they've compromised so many people in America. And it's not just you know, you look at Congress
and say, all, you know, Crenshaw, or you know, your Kissinger or whoever you want to, you want to
kind of point that it's on the small local levels, and what you're telling me it just, it matches up perfectly
to so much other stuff that I've heard, but the fact that they're layering all this information they're getting
with a social credit system, and it's just like, Oh, my goodness, like, what have we gotten ourselves
into? What have we gotten ourselves into? But I want to talk to you a little bit as we're heading into the
midterms, right? I just saw an article this morning, how, you know, CNN is saying, you know, we
thought it was going to be a red tsunami, and now it's going to be a red puddle. So the media is already
laying out the narrative that a lot more people are actually not going to be voting Republican, even
though we know it's the opposite. We know that it's like, after the last two years, who in their right mind
is still going to look at that and say, you know, I want more liberals and in Congress, I want more
liberals in the Senate, etc. And so they're already laying the foundation for this. So to me, it's almost it's
a given that they're going to try to steal the midterm elections, especially with Biden recently coming out
and talking about look, once we win the midterms, we're going to ban assault weapons, we're going to,
you know, get roe Roe v. Wade back, you know, it's right place. So what do you think their game plan
is? Because we're watching them now. Right? I know that a lot of what you guys are doing with the pit
with with the sheriff's with empowering the citizens with your teaching people about how the mule
networks work like we're uncovering, you're uncovering a lot of their methods of deception and
treachery. But to me, I don't expect them to say you know what, you know, Greg Phillips, and they're
doing such a great job, we probably can't steal the election. Right? I'm sure they've got intricate plan.
So how do you think they're still going to attempt this? And more importantly, after that, how can we
stop it? How can we ensure that we can still somehow get the right America first patriots into office?
- 12 - Transcribed by https://otter.ai
69
Case: 22-20578 Document: 00516542768 Page: 70 Date Filed: 11/11/2022
frankly almost made it worse than then better. And by the way, I said that earlier in the week and lo and
behold I start getting beat up in Giorgia again for, for the meal stuff. But it's just true that there was no
leadership. But here's what did happen along the way, that great awakening amongst people, you
know, whether it was because of meals or meals was just one of the reasons or whatever, there is a
real understanding. And there's some amazing people out there that don't know anything about deals
that are just doing their own thing and, and thinking how can I help? What can I do? Catherine has long
Catherine Cabrera has long said that, that sometimes it's not enough just to vote. And this is one of
those times. So here's, here's our view of what what needs to happen. And everybody's got a different
opinion. And I embrace those opinions. I mean, many of these people are my friends, they just disagree
with me about whether you should really vote or vote on election day, or, you know, how you should do
this, what we should all do. One thing we've learned through all of our research, and all of the work that
we're doing is that while some people believe that this was really sophisticated, and that these
machines are programmed in a way to do certain things, and flip boats, and do all this kind of stuff. One
thing that we believe that we know is that much of what's happened from a what people likely call fraud
is really process based. And, and you can, you can watch them manipulating the processes that that
they believe can help them win. Now, I'm sure there are some of these machines and some of this
other stuff that are happening out there, we just didn't look at that. Because we don't believe that the
bulk of the cheat is that sophisticated. If it is that sophisticated, then we do have a problem. But here's
what we know. And we've tested some of this out, we tested some of this out in Arizona this year, we've
done it in some other elections across the country during the primaries that they build in the CI into the
process and into the safety of the machines or the algorithm, the software that runs the machines. And
if we can just agree on that, then then the extension is okay. They have to build that, that process or
they have to build the cheat into those processes, and well in advance. The reason that they fight so
hard not to change, you know, to make the process that, you know, they had all those consent decrees
back in 2021, and 2020. Most of them expired in 2021. A few of them are still around that so many, I
mean, there's there's been some some positive sort of process based things that have happened,
- 13 - Transcribed by https://otter.ai
70
Case: 22-20578 Document: 00516542768 Page: 71 Date Filed: 11/11/2022
year mandatory sentence if you if you're the meal runner, that you're causing these ballots to be stuck
these meals don't want to go to jail make it a five year mandatory sentence if you if you're caught
stuffing ballots, you're going to jail for five years.
54:36
Yeah should be offense. I mean it should be no question
- 14 - Transcribed by https://otter.ai
71
Case: 22-20578 Document: 00516542768 Page: 72 Date Filed: 11/11/2022
counted those votes. Everything that happened on election night, was the early vote with signature
verification. So the next day, so that was on Tuesday, so Wednesday's count where they added
another 25,000 votes or so was the stragglers, the extra stuff, the yield kava stuff all these extra ballots
that dribbled in or there was just something confusing about them, or they couldn't verify signature, they
were curing signatures, whatever else it was, that happened on Wednesday. And then by Thursday,
what they were counting was the verified signatures from Tuesday. So there were three separate
counts. And, and had, everybody just voted on election day, they would have been able to potentially
overwhelm it by Thursday, when they actually counted Election Day ballots. Our point was just take that
option away from them. So we overwhelmed them with early votes. And and somebody if somebody
wanted to go back on and in truth and look at my timeline.
- 15 - Transcribed by https://otter.ai
72
Case: 22-20578 Document: 00516542768 Page: 73 Date Filed: 11/11/2022
they don't want to go to jail. Some of these people are going to be charged with perjury, some of these
people are going to be charged with fraud.
- 16 - Transcribed by https://otter.ai
73
Case: 22-20578 Document: 00516542768 Page: 74 Date Filed: 11/11/2022
registered. Take them, you take them to get in your car, pick them up and take them that's up to you.
Think about if the Patriots just I think I have like 150,000 or something people that follow me. They get
Think about if 150,000 people that just follow me went and picked somebody up and got them
registered to vote. That's 150,000 votes. Right.
1:08:16
And I think that what you know, what you've shown with Arizona, which was a critical, a critical election
with Kerry Lake is that their fortress is not impenetrable. And that if we do if we overwhelm them, if we
the people take control, we can actually do this, we can cast them off, as as we're supposed to. So
Greg, we're gonna be heading over to Rhys TV for some q&a Very soon on was a few, a few points.
And once we get over there, actually, I want to ask you, whether you think there's a path for Trump to
get back into the White House before 2024. So I want to have that kind of brief discussion are there
because it's something that just is eating away at me and whether we're there's a possibility that how
we can make that happen. And then we also have some other questions that are answering your feels
either or watching live right now. If you want to ask your questions, come join us over on rice TV, it's
free there's a link for a free trial. So it's free today, go over there, set an account up you can come in it's
a very it's a fantastic place. You can get your question answered most likely by Greg which would be
fantastic. But Greg, before we do that, where can people follow you? And what resource have you guys
been working on building resources for people that want to get more involved in the voting process? So
for all people that are watching and actually I'll say really quickly, I really I hope that those you're
watching can share this video. I know right now you're watching live you're hanging on the edge of your
seats. You don't want to do it right now. But after you're finished watching email to a few friends put up
on through social put on Telegram, Facebook, you'll probably get banned on Facebook for a week or
so. Unfortunately, it just Facebook and it is how it is but you'll just get this out there and it's just
important for this information to be get out a The details you've given us about how we can actually
make this election successful. But also, I feel like our conversations has really helped people see that a
lot of you who the real enemies are and really seeing China's role in our election system and what the
threat is So, you know, so again, share this show. And also, Greg, if you feel let me know if I can pull
any websites off or something but let me know where should people go to get more involved in what
you're doing both on the ground or to support what you're doing I want people to really know how to
access your your work.
- 17 - Transcribed by https://otter.ai
74
Case: 22-20578 Document: 00516542768 Page: 75 Date Filed: 11/11/2022
Well, first of all, let me say through the vote.org Katherine and the true devote team are doing some
amazing things and creating some amazing opportunities. So true the vote.org and sign up and and I
promise you, they'll fill it can get you engaged. The second group is another group that Katherine
founded with Sheriff Mark Lam. And that's Protect America dot vote, protect American vote, there's a
cool video up there, you can kind of see what they're doing. You could sign up there, you can nominate
your sheriff to participate with us. It's a key thing to do. TEF America, games dot.as. For me, patriot
games.com. We started it as kind of a just a little podcast because we were what we're hoping to do is
create sort of a reality podcast so that as we were going to educate people on what we're doing, we
have a fusion data fusion center that we're pulling people into, it's called Ground fusion. You can
access dot.com, okay, and think of it as sort of a Rio reality podcast, we're going to you're going to be
able to listen in to us and our analysts. We're going to be taken, we're going to be taking information
that we gather from people in the field, we're going to be working that information, and we're going to
show you how we actually run ops. So that's a kind of a fun thing, if you're interested in doing that, in
man between the three of those and folks like you, Seth, and so many others that are out there. Let's
see, we're on rumble. You're on rumble Catherine's on rumble. I think I think hers is true the vote I think
mine's real patriot games. And, and then she's on locals. We haven't started on locals yet. I don't know
that I actually will. But I think she's got a Monday night show at 6pm, Central 7pm. Eastern, where that
she's bringing folks in and and really doing a good job and having an interesting conversation on her
local show. So we're everywhere all the time. We're spending as much time as we can talking to folks.
And as we start approaching this election, and and really get back into the cycle where folks need to be
thinking about, you know, what, what can I do? Reach out to one of those groups reach out to us, we'll
absolutely join with you go lock arms, I may not agree with everything you think. And you certainly won't
agree with everything, I think. But you know, if we're all heading in the same general direction, and
God's freedom and the true north, that we can all agree on that all our shields with anyone, and I'll
trudge forward, I don't need to agree with you on every single issue, I don't need to agree with you that
you're only out to vote on Election Day. It's just a difference of opinion, where we all know is that we
have to overwhelm this this time. And we have to beat these people back at the polls, and there's
nothing they can do if we do overwhelming.
1:13:18
I couldn't agree more. I think you'd probably agree on most things. And that's my my guess. But again,
it's that the the fundamental thing is that look, whether you're liberal or white, or black, or gay, or
straight, doesn't matter. Like all of us as Americans right now we're free, right? We're one of the freest
countries in the world. And they're trying to take that away from us. And so I really hope that every
American can really recognize what's at stake here. And, and just stand up and fight for it. Because we
have to, and we also have to really help our fellow citizens, even the ones that are very brainwashed,
see the truth of what's happening and get them to realize that it's not just the the Magga that are having
their freedoms taken away. That's just the first step, right? Because at the end of this, every person in
America has a freedom taken away, go look at Communist China look at their social credit system.
That's what we're up against. And the more Americans that can realize that, then the more we can
stand together and lock shields, as you say, to fight against this enemy. So right, so folks, we're not
going to head over to Rhys TV for the q&a portion. Also, I want to dig into what you think is unfolding
with Trump because it to me, it seems like they're trying to take some some pre emptive steps to
prevent him from getting in, obviously, in 2024. But, you know, it could be that they're trying to prevent
- 18 - Transcribed by https://otter.ai
75
Case: 22-20578 Document: 00516542768 Page: 76 Date Filed: 11/11/2022
things from happening sooner than that. So I really want to hear your thoughts on that. So again, folks,
if you want to come join us, there's a link for a free trial in the description below. pay rise TV is a patriot
own streaming platform. So by if you want to choose a stick around, it's 10 bucks a month, it's up to
you, but it's a great way to support the work that I'm doing and my team is doing and so I hope to see
you there. So, again, all you They're watching, thank you so much for watching this on the public
platforms Dom, you can go ahead and cut those public feeds. And now we're going to be on rice TV
exclusively. So, Greg, as it relates to Trump, I know there's been, I don't want to get too deep into the
rabbit hole because I've dug deep into devolution, a lot kind of stuff. And, and that's a longer
discussion, right to kind of get into that. But, I mean, do you think that, especially if we can really do well
at the midterms and we can take back control of a lot of the major Institute's in DC? I mean, is there a
- 19 - Transcribed by https://otter.ai
76
Case: 22-20578 Document: 00516542768 Page: 77 Date Filed: 11/11/2022
SUMMARY KEYWORDS
vote, people, election, sheriff, overwhelm, began, catherine, ballots, folks, fbi, cheat, project, early
voting, information, happened, patriot, started, count, games, support
SPEAKERS
Gregg Phillips, Catherine Engelbrecht
77
Case: 22-20578 Document: 00516542768 Page: 78 Date Filed: 11/11/2022
78
Case: 22-20578 Document: 00516542768 Page: 79 Date Filed: 11/11/2022
assessment that this had major national security implications, we needed to move forward. And we
needed to be able to share this with the FBI, which we ultimately did. Over the ensuing 1718 months,
our team and Katherine and some outside contractors and some other people really began to really dig
into this issue with this company that was running the selection management software, the company is
based in Michigan, just outside of Lansing. And as we began to unpack all of this and really say, Wow,
this is really incredible. One of the first things that really came to us was that this data from this
company, and these apps apps.connick.com is one of the one of the URLs lives in China, it lives on the
main Unicom backbone in China. And that came back to us very quickly. But as we went through the
process of really trying to ascertain whether this was real or not, all of a sudden, the company, you
know, got wind of what we were doing. And they started changing a few things on their side. And even
to this day, as analysts are beginning to look at it, I would encourage all of you that are doing this
analysis on these guys, be sure you save your work, be sure you get screenshots, be sure you record
it, anything that you're up to anything, and archive it, because it's going to disappear. And you can
count on that. So as we began the process of really, really, you know, unpacking all of this and doing it
with the FBI, we learned all sorts of things, they had some information that we didn't have, we had to
information, they didn't have an across a period of 17 or 18 months, we engaged with them as an
operational asset and a counterintelligence operation that really span the gap, that distance of time,
between January 2021, and late spring, April, May of 2022. The information that we ultimately
gathered, while it's been dramatically augmented by the Anons, and by people, since the pit, that have
been doing research and doing some amazing work, I mean, gathering what you talk a little bit about
what some of the people have done. But what we've learned has really led us now to a path wherein
we had hiccups along the way the FBI betrayed us first they were they were with us for 18 months then
and for a period of time, they were against us and, and we're blaming us for having stolen the Chinese
internet and all manner of other nonsense. And so you know, for any of you that kind of wonder who I
am, just remember, just put this down on your notes, that I'm the thief that stole the Chinese internet for
whatever that actually means. That's what they accused us. And as it began to, you know, dissipate
that kind of stuff, we started to realize that the there was so much more to what was actually
happening. And even though we were being betrayed, and the script was flipping on us, and they were
blaming us, there was still a story to be told. And that story was that this software is still installed in we
don't even know how many jurisdictions in the country. We know that installed installed in hundreds, I
think their website, or somewhere in some of their their marketing materials is 1000s of locations in the
United States. But we also know that it's installed in Canada, it's installed in Australia. There's some
references to Mexico, although we haven't seen any real installations there. But primarily, it's in the
United States. Their programmers are Chinese, Chinese national, some that ran the the
communications for the Confucius Institute, a group that was, you know, soundly kicked out of here by
by Secretary Pompeo. And it just goes on and on and on and on. And the more we uncover, the more
frightening I think it actually becomes.
79
Case: 22-20578 Document: 00516542768 Page: 80 Date Filed: 11/11/2022
lot of things at the pit. It wasn't ever supposed to be video that kind of happened at the last minute and
we're glad that it did for sure half a million or more people saw a lot of information but what you didn't
see was that very last piece, where we sat down with the 150 some odd people that were and shared
this very story. And we asked for their help, because all indications, as far as we could tell was that we
had been made the target, and that things were heating up in a not good right way for us. And so we
we gave them all of our source material. And as much background as we could and guidance as as we
were not able. And we said, go for it. And I mean, to tell you, here we are little more than two weeks out
from that event. And the amount of research that has been done, and I'm talking solid, reliable, well
sourced, well drawn papers. It's just breathtaking. And so this, this community has developed around
proving out, you know, frankly, what the federal government was not. I don't know if they weren't able,
but they certainly weren't willing to take on and in our token was able to turn to the jurisdictions where
we know it's installed and begin to have conversations at the local level, or whatever level, I mean, at
this point we're in with with attorneys general and district attorneys, and sheriffs, and governors, and
any level that will, that will take action to do what we can to stop this from happening again, in the
midterms. And I really, I can't I don't think, overstate how significant this discovery is, and how
important it is that we stand together to secure our elections from enemies foreign and domestic. And
it's happening, it is happening on our watch. And so that's, that's what we're doing right now. It's, it's
what's gotten, it's taking all of our attention, we're traveling to as many jurisdictions as we can, to begin
to lay out options or support potential options for investigations or prosecutions.
80
Case: 22-20578 Document: 00516542768 Page: 81 Date Filed: 11/11/2022
been, it's changed. It's, I'll tell you what, it's changed the way I think about Patriot Games, right?
Because now I'm thinking, Okay, let's check this one off the list. And we have, you know, a dozen
others that we want to approach similarly. And then let's look at it you know, I mean, there's nothing,
there's, there's there's no subject that we couldn't tackle in this way. It's very, I think, empowering. Need
to really wrap your mind around, you know, even though the federal government had chose to do what
they did and wasted a lot of time and in the process, you know, we find ourselves now maybe better off
than we've ever been. Because we've got a growing group of people that are becoming more and more
familiar with working together and getting get in the facts together, getting this getting the truth out. And
I just think it's everything good about America, you know, when that when we stand and fight together,
there's nothing that can come against. And so it's, it's very encouraging. And it gives me great hope for
the for the many problems that we have in this country, we can be reminded that if we stick together,
the same method is the same approaches can be applied time and time again. And locally, we can hold
the line.
81
Case: 22-20578 Document: 00516542768 Page: 82 Date Filed: 11/11/2022
presentation went. And how important it is to have the backing of some of these open source
researchers and open source data gatherers in our presentations.
82
Case: 22-20578 Document: 00516542768 Page: 83 Date Filed: 11/11/2022
update today. Going from Texas, to Florida, to Pennsylvania, to Michigan, to Kansas and to Arizona
and to California. We are really sort of reaching not just into the heartlands, but reaching into the, you
know, sort of the den of the bad guys, right. I mean, we were I think we we both and everybody we
know are experiencing some spiritual warfare. It seems like every time we go to do something in one of
these communities, you know, something bad happens to one of us or they take a site down or they
send us a you know, the technology folks send us a zillion dollar bill for something that we didn't know.
And, you know, and it's really just this process, I think of, of dealing with, with the Patriot Games. And
just for those of you who you know, tend to want to, you know, not really pay attention. Games is a
euphemism for battle. It's a euphemism people, it's a literary device, so don't get all upset, we're not
playing games. It's a it's it's another word for battle. And so, anyway, I'm just so excited to be part of it.
And even though I had to bounce on and off the call with the with the last Sheriff, you know, knowing
that at the end of the week, you and I are going to be sitting in front of some people that are about to
bring this work to, to a grand jury for the first time, and we're looking at, you know, some potential
significant movement. We've gotten the support of, of a major prosecutorial office in the United States,
and they are moving and they are moving this along. And I just have no way to express how exciting
this is, after everything we've been through and all of the dismissals and all of the lies and all of the
Philip bump articles in the New York Times and MPR, blah, blah, blah, blah, blah, to know that we are
already starting to contact law enforcement and they are moving forward. We have prosecutors that are
moving forward from a prosecutorial perspective. And we are opening up more and more and more
doors. So as all of these Patriot Games continue to open, and all of these doors continue to open and
true the vote, you know, walk is leading the way through these doors. This, we are not just moving the
needle like we did with the mules. We're making changes now. Because if they say that they're going to
go to prison and some of these companies that are running these bogus operations, and and really, you
know, selling out America and you know, as it says in one of the Patriot game songs, the quislings I
mean, that's who these people are. These people are traitors, they're quislings, and they are supporting
not just foreign operators or foreign operations, but foreign infiltrations into the United States, and the
left the media, and now possibly even the FBI and other agencies in the federal government are
supporting this nonsense. This is crazy.
83
Case: 22-20578 Document: 00516542768 Page: 84 Date Filed: 11/11/2022
84
Case: 22-20578 Document: 00516542768 Page: 85 Date Filed: 11/11/2022
that we can gather the information quicker. But the what the fusion center is going to be doing is
gathering all that information and then handing it off in near real time, to the sheriff's and to other law
enforcement folks. That can take action. That's how you affect 2022. So we work on 2020, if you want
to, we want you to we're doing it, we want we need you, we also need you to be engaged in 2022. And
that doesn't just mean voting. The final thing I want to talk about this, it's just harder. So I'm going to
take just a few seconds to kind of give some backdrop on it. The reason that Carrie Lake one in
Arizona, is because they overwhelmed the vote. They overwhelmed early voting and in Arizona they
early vote for a month, there are states that are going to start early voting for 2022 and 27 days, 27
days think about that. We're going to be early voting, and they're going to be early voting for six weeks.
There are states that for four weeks, there are states for two weeks, but there's early voting out there.
Here's what we've learned. When they cheat, they want they need to be able to predict. And they have
some incredibly accurate prediction mechanisms. They are all generated from the from the perspective
that Republicans conservatives and others will stay home during early voting and only vote on Election
Day that helps them meet their predictions and it helps them build the algorithms and formulas that
allow them to inject more into the cheat. That's what they do. What we learned in Arizona was that
there's two component three components to this. The first thing is we have to overwhelm them in early
voting, we have to overwhelm them in early voting. The second thing we have to do is we have to
overwhelm them in on election day. If you do both, or if you only do one if you only vote heavy on
election day, they can predict that they have great prediction tools, they will beat you they beat us in
2020 doing that they think they beat us in 2016 Doing that we just over whelmed them in the polls,
overwhelm them early, it will cause them to make mistakes. They will try to change something that they
couldn't change in Arizona, there was a situation where a an election official panicked and said, he said
sent out some bad ballots. And to fix it, he sent out more bad ballots. And so 63,000 bogus ballots were
sent into the system. But because we had eyes on, we were able to catch it. But we what really
happened was, he panicked because he did he he realized all of a sudden that early voting was going
to overwhelm their predictions. And that's what happened. The second thing that happened was having
a an understanding of process. And having a knowledge of the process of what those predictions are, is
critically important. The other thing that happened was, you may remember on election day in Arizona,
on Tuesday night, they stopped counting. The reason they stopped counting was those ballots that they
counted on Tuesday were the early votes, whose signatures had been verified. So they stopped taking
early voting, they verified their signatures. And that count that you saw on Tuesday night was the was
the early voting
85
Case: 22-20578 Document: 00516542768 Page: 86 Date Filed: 11/11/2022
counting. And we were even I think I went on true true social and declared carry one. That's it. They
can't beat us now. And the reason that they couldn't beat us is because they couldn't cheat fast
enough. They couldn't cheat with those interim votes. And they couldn't cheat with what ultimately were
put into the system on Thursday. And those were the Election Day votes that were signature verified on
Wednesday, and then put into the system on Thursday. So by Tuesday night, when when Karis team
and Carrie had overwhelmed the early vote, we knew we had one, they couldn't do anything about it,
they couldn't cheat fast enough. And then Wednesday, once we added to it with some of the EO Cava
votes, military votes and other things, and those signatures were verified, it confirmed further that we
had won. And while there was still a little bit of panic that ensued on on Thursday, amongst the I think
people like us that had been watching this, we knew they had won. In fact, I think I sent Carrie a note,
both Tuesday night, Wednesday. And then finally again on Thursday. Look, you got this thing, they
can't beat you. And sure enough, she she blew it out from there. It was up by by 10s of 1000s of votes.
So my point with all of that is overwhelm the vote, overwhelm them, overwhelm them early and
overwhelm them on election day, they can't cheat fast enough, they don't know what to do. And
because those algorithms are already written, they've already done this, they've already assumed that
this was going that this was going to happen. So So my point is, vote early, overwhelm them. If you're
in a state where you can vote early, vote on Election Day, overwhelm them there. They can't overcome
this, we can overwhelm them with the vote next year in 2023. When we have more state legislators and
we could do a better job of of attacking this, we need to do a bunch of things. We need to get these
roles, clean, mandatory roles cleaning every 30 days. We need to eliminate drop boxes, eliminate
them, eliminate all this mail in ballot nonsense. Do single day voting everybody votes on paper until we
fix the technology problems. And then finally, May these legislators need to be held responsible for this.
They need to make it a certainty and absolute certainty that someone's going to jail if they cheat, make
it a mandatory sentence five years for mules and 10 years for the meal runners, put him in jail, put him
in prison, it will stop it will stop straightaway and so on Our view of it is that we can overwhelm all the
machine problems, we can overwhelm all the software problems if you vote heavy early. And if you vote
heavy on election day, if you're in a state where Election day is all there is, of course, vote heavy there.
Everyone else. Do what you want to do. If you want to vote early, great if you don't want to vote early,
great. But that's Catherine, you know, the kind of the political side of this from an old political operative?
Brett like me, I can tell you, this is the only way to do this.
- 10 - Transcribed by https://otter.ai
86
Case: 22-20578 Document: 00516542768 Page: 87 Date Filed: 11/11/2022
for your leadership. I think the world appreciate you so much. You're not the left so much. But but the
rest of us do. And thanks again to everybody for joining Patriot Games.
- 11 - Transcribed by https://otter.ai
87
Case: 22-20578 Document: 00516542768 Page: 88 Date Filed: 11/11/2022
5 Plaintiff,
6 vs.
8 Defendants.
10 HEARING
12 Houston, Texas
14
15 APPEARANCES:
On behalf of the Plaintiff:
16 Constantine Z. Pamphilis, Esq.
Nathan Richardson, Esq.
17
On behalf of the Defendants:
18 Brock Cordt Akers, Esq. (Not present)
Michael John Wynne, Esq
19 John C. Kiyonaga, Esq.
20
88
Case: 22-20578 Document: 00516542768 Page: 89 Date Filed: 11/11/2022
1 EXAMINATION INDEX
2 WITNESSES PAGE
3 GREGG PHILLIPS
Direct Examination By Mr. Wynne 29
4 Cross-Examination By Mr. Pamphilis 37
5 CATHERINE ENGELBRECHT
Direct Examination By Mr. Wynne 106
6 Cross-Examination By Mr. Richardson 109
Redirect Examination By Mr. Wynne 166
7
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
89
Case: 22-20578 Document: 00516542768 Page: 90 Date Filed: 11/11/2022
20
16 whom.
90
Case: 22-20578 Document: 00516542768 Page: 91 Date Filed: 11/11/2022
22
5 themselves.
10 are about.
14 might say. They can get out any time they want to.
22 years old. So --
91
Case: 22-20578 Document: 00516542768 Page: 92 Date Filed: 11/11/2022
92
Case: 22-20578 Document: 00516542768 Page: 93 Date Filed: 11/11/2022
34
6 knowledge.
9 BY MR. WYNNE:
11 knowledge here. So --
14 BY MR. WYNNE:
21 to the bureau.
24 possession?
25 A. No.
93
Case: 22-20578 Document: 00516542768 Page: 94 Date Filed: 11/11/2022
36
3 2021.
4 BY MR. WYNNE:
7 A. Yes.
11 A. Mike Hasson.
25 answer?
94
Case: 22-20578 Document: 00516542768 Page: 95 Date Filed: 11/11/2022
39
6 A. Yes.
11 mic, please?
18 MR. WYNNE: I --
20 question.
95
Case: 22-20578 Document: 00516542768 Page: 96 Date Filed: 11/11/2022
40
2 BY MR. PAMPHILIS:
12 BY MR. PAMPHILIS:
14 A. Yes.
22 identified.
25 BY MR. PAMPHILIS:
96
Case: 22-20578 Document: 00516542768 Page: 97 Date Filed: 11/11/2022
46
1 A. It might be.
5 A. I think so.
8 A. Sure.
12 in China.
14 regard?
17 was.
20 in China?
97
Case: 22-20578 Document: 00516542768 Page: 98 Date Filed: 11/11/2022
47
2 informant?
3 A. No.
5 confidential informant?
25 me.
98
Case: 22-20578 Document: 00516542768 Page: 99 Date Filed: 11/11/2022
99
Case: 22-20578 Document: 00516542768 Page: 100 Date Filed: 11/11/2022
58
5 BY MR. PAMPHILIS:
12 this data in that hotel room that you saw, other than
14 not identify?
22 A. No.
25 hotel room?
100
Case: 22-20578 Document: 00516542768 Page: 101 Date Filed: 11/11/2022
74
2 BY MR. PAMPHILIS:
7 recollection.
15 actually.
19 it.
22 A. No.
25 A. No, sir.
101
Case: 22-20578 Document: 00516542768 Page: 102 Date Filed: 11/11/2022
84
5 contracts.
7 FBI?
102
Case: 22-20578 Document: 00516542768 Page: 103 Date Filed: 11/11/2022
85
8 capacity --
10 correct.
15 documents?
18 any documents?
21 for?
103
Case: 22-20578 Document: 00516542768 Page: 104 Date Filed: 11/11/2022
88
6 to be held in contempt.
9 disclose.
11 person.
104
Case: 22-20578 Document: 00516542768 Page: 105 Date Filed: 11/11/2022
102
6 confidential informant?
14 confidential informant?
24 confidential informant.
105
Case: 22-20578 Document: 00516542768 Page: 106 Date Filed: 11/11/2022
103
5 confidentially?
13 doing that?
106
Case: 22-20578 Document: 00516542768 Page: 107 Date Filed: 11/11/2022
104
18 he's doing?
107
Case: 22-20578 Document: 00516542768 Page: 108 Date Filed: 11/11/2022
105
1 confidential informant --
14 Go ahead, counsel.
24 to me.
108
Case: 22-20578 Document: 00516542768 Page: 109 Date Filed: 11/11/2022
116
4 data?
5 A. No.
9 correct?
14 that correct?
23 correct?
24 A. No.
109
Case: 22-20578 Document: 00516542768 Page: 110 Date Filed: 11/11/2022
132
4 Q. John what?
6 Q. Who else?
8 blank. I apologize.
11 different things.
13 A. Open-source intelligence.
110
Case: 22-20578 Document: 00516542768 Page: 111 Date Filed: 11/11/2022
133
6 vulnerabilities?
8 vulnerabilities.
10 vulnerabilities?
15 something?
19 be, for example, vote for L.A., vote for Fairfax, vote
24 Nonresponsive.
111
Case: 22-20578 Document: 00516542768 Page: 112 Date Filed: 11/11/2022
144
1 A. Correct.
3 on it?
4 A. No.
10 A. No.
16 that if it happened.
18 A. I don't know.
112
Case: 22-20578 Document: 00516542768 Page: 113 Date Filed: 11/11/2022
151
5 right?
12 A. -- very cautious.
13 I am sorry?
16 name of.
18 that name?
22 Nonresponsive.
23 BY MR. RICHARDSON:
113
Case: 22-20578 Document: 00516542768 Page: 114 Date Filed: 11/11/2022
152
3 specifically.
5 today?
9 your counsel told Your Honor here that the FBI told
12 A. Yes.
16 A. Yes.
25 said?
114
Case: 22-20578 Document: 00516542768 Page: 115 Date Filed: 11/11/2022
172
1 A. Yes.
7 Your Honor.
15 confidential.
115
Case: 22-20578 Document: 00516542768 Page: 116 Date Filed: 11/11/2022
173
3 Understood?
8 on Monday.
15 attorney-in-charge.
22 in the case.
23 Understood?
116
Case: 22-20578 Document: 00516542768 Page: 117 Date Filed: 11/11/2022
175
1 CERTIFICATE
10
12
13
/s/ Nichole Forrest
14 Nichole Forrest, RDR, CRR, CRC
15
16
17
18
19
20
21
22
23
24
25
117
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 9 Filed onPage: 118in TXSD
09/12/22 Date Filed:
Page11/11/2022
1 of 3
United States District Court
Southern District of Texas
ENTERED
UNITED STATES DISTRICT COURT September 12, 2022
SOUTHERN DISTRICT OF TEXAS Nathan Ochsner, Clerk
HOUSTON DIVISION
KONNECH INC., §
§
Plaintiff, §
§
VS. § CIVIL ACTION NO. 4:22-CV-03096
§
TRUE THE VOTE INC., et al., §
§
Defendants. §
This cause having come before the Court on the Motion of plaintiff Konnech, Inc.
(“Konnech” or “Plaintiff”) for a Temporary Restraining Order (“TRO”), and the Court having
reviewed Plaintiff’s Original Complaint, Plaintiff’s Motion for Temporary Restraining Order and
Brief in Support (“Motion”), and the supporting affidavit of Eugene Yu, the Court finds that there
is a substantial likelihood that Konnech will suffer irreparable injury if this TRO is not granted.
Specifically, evidence was presented to the Court to substantiate Konnech’s claim that: (1)
Konnech has a substantial likelihood of success on the merits with respect to its claim against
Defendants True the Vote, Inc., Gregg Phillips, and Catherine Engelbrecht (“Defendants”) for
violation of the federal Computer Fraud and Abuse Act, 18 U.S.C. § 1030, et. seq., and the Texas
Harmful Access by Computer statute (TEX. CIV. PRAC. & REM. CODE § 143.002), as
Defendants have admitted to gaining unauthorized access to Konnech’s protected computers and
obtaining information therefrom; (2) Konnech will suffer immediate irreparable harm absent the
issuance of a TRO because there is a threat that (a) Defendants will seek unauthorized access to
Konnech’s protected computers; (b) Defendants will use and/or disclose data from Konnech’s
protected computers without authorization; (c) Defendants will interfere with Konnech’s control
1/3
118
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 9 Filed onPage: 119in TXSD
09/12/22 Date Filed:
Page11/11/2022
2 of 3
of its protected computers; (d) Konnech will suffer a breach of security of Konnech’s protected
protected computers; and (f) Defendants will cause a loss of confidence and trust of Konnech’s
customers, loss of goodwill, and loss of business reputation; (3) this harm outweighs any potential
harm that Defendants might suffer if a TRO was granted because Defendants will not be damaged
by being enjoined from committing further unlawful acts, by returning the property stolen from
Konnech, and by identifying how Defendants obtained data from Konnech’s protected computers
without authorization; and (4) the TRO is in the public interest because it is in the public’s interest
to enjoin conduct that the United States Congress has found to be unlawful, to prevent the
disclosure of personal identifying and banking information, and the TRO would in fact benefit the
Additionally, the evidence demonstrates that emergency conditions exist, that irreparable
harm to Konnech is threatened to imminently occur and will continue to occur unless Defendants,
and anyone acting in concert with them, are restrained, and that Konnech has no adequate remedy
at law.
Further, this Order is issued ex parte, and no notice was required to be given to Defendants
or their counsel, as there is a risk that Defendants would publicly release the information stolen
from Konnech, or otherwise destroy the evidence establishing their misconduct. It is therefore:
ORDERED that Defendants, directly or indirectly, and whether alone or in concert with
2/3
119
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 9 Filed onPage: 120in TXSD
09/12/22 Date Filed:
Page11/11/2022
3 of 3
ii. ordered to return to Konnech all property and data obtained from Konnech’s protected
computers, whether original, duplicated, computerized, handwritten, or any other form
whatsoever;
iii. enjoined from using, disclosing, or exploiting the property and data downloaded from
Konnech’s protected computers;
iv. ordered to preserve, and not to delete, destroy, conceal or otherwise alter, any files or
other data obtained from Konnech’s protected computers;
v. ordered to identify each individual and/or organization involved in accessing Konnech’s
protected computers;
vi. ordered to confidentially disclose to Konnech how, when, and by whom Konnech’s
protected computers were accessed; and
vii. ordered to identify all persons and/or entities, in Defendants’ knowledge, who have
had possession, custody or control of any information or data from Konnech’s protected
computers; It is further,
ORDERED that Konnech shall post bond with sufficient surety in the amount of $100.00;
it is further,
ORDERED that a hearing on Plaintiff’s preliminary injunction is set for September 26,
_________________________________
Kenneth M. Hoyt
United States District Judge
3/3
120
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 11 Filed onPage: 121 in TXSD
09/14/22 Date Filed:
Page11/11/2022
1 of 1
121
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 12 Filed onPage: 122 in TXSD
09/14/22 Date Filed:
Page11/11/2022
1 of 1
122
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 13 Filed onPage: 123 in TXSD
09/14/22 Date Filed:
Page11/11/2022
1 of 1
123
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed onPage: 124in TXSD
09/21/22 Date Filed:
Page11/11/2022
1 of 24
KONNECH, INC., §
§
PLAINTIFF, §
§
v. § CIVIL ACTION NO. 4:22-CV-03096
§
TRUE THE VOTE, INC., GREGG §
PHILLIPS, and CATHERINE §
ENGELBRECHT, §
§
DEFENDANTS. §
Plaintiff Konnech, Inc. (“Konnech”) requests that this Court order Defendants True the
Vote, Inc., Gregg Phillips, and Catherine Engelbrecht (“Defendants”) and their counsel of record
to appear and show cause why they should not be held in contempt for violating the Temporary
Restraining Order (“TRO”) entered by this Court on September 12, 2022, based on the following
grounds:
PRELIMINARY STATEMENT
Since this Court granted the TRO nine days ago, Konnech has endeavored, on an almost
daily basis, to obtain Defendants’ voluntary compliance with the TRO. Instead of complying,
however, Defendants have treated compliance with the TRO like a game of cat and mouse.
Initially, Defendants took a blanket position that any Konnech data was obtained by an
“independent contractor” and that they never took Konnech data from a “protected computer” and,
therefore, the data they had was not covered by the TRO. However, when Konnech corrected
by the federal Computer Fraud and Abuse Act, simply means a computer connected to the
124
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed onPage: 125in TXSD
09/21/22 Date Filed:
Page11/11/2022
2 of 24
internet—Defendants changed their position to claim that any Konnech data that they obtained
was from a “third party” who “was not contracted to us or paid by us,” that the data was “turned
over to the FBI,” and that they no longer possess any Konnech data. Defendants’ position stands
in stark contrast to their repeated public statements that their “guys” and “analysts” helped them
to obtain Konnech’s data, and their repeated threats to publicly disclose it even after they said they
In any event, Defendants now openly admit that they will not comply with subsections v,
vi, or vii of the TRO because they turned over to the FBI what they now say they believe, but do
not know, was Konnech’s data, and because it is otherwise a “matter for the FBI.” In so doing,
Defendants are refusing to identify to Konnech those people involved in allegedly taking
Konnech’s data, how, when and where they took it and who else has the data. Instead, Defendants
have filed a letter addressed to this Court under seal which purports to identify a single individual
(whose identity was hidden from Konnech and the public) that was involved in taking Konnech’s
data, even though Defendants’ prior statements clearly indicated that multiple people were
involved.
blatantly defying the TRO and should be held in contempt of Court for their misconduct.
FACTUAL BACKGROUND
On September 12, 2022, Konnech filed suit against Defendants claiming, among other
things, violation of the federal Computer Fraud and Abuse Act, 18 U.S.C. § 1030, et. seq., and the
Texas Harmful Access by Computer Statute, TEX. CIV. PRAC. & REM. CODE § 143.001. That same
day, the Court issued an ex parte TRO which ordered that Defendants, directly or indirectly, and
whether alone or in concert with others be (i) enjoined from accessing or attempting to access
125
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed onPage: 126in TXSD
09/21/22 Date Filed:
Page11/11/2022
3 of 24
Konnech’s protected computers; (ii) ordered to return to Konnech all property and data obtained
any other form whatsoever; (iii) enjoined from using, disclosing, or exploiting the property and
data downloaded from Konnech’s protected computers; (iv) ordered to preserve, and not to delete,
destroy, conceal or otherwise alter, any files or other data obtained from Konnech’s protected
computers; (v) ordered to identify each individual and/or organization involved in accessing
Konnech’s protected computers; (vi) ordered to confidentially disclose to Konnech how, when,
and by whom Konnech’s protected computers were accessed; and (vii) ordered to identify all
persons and/or entities, in Defendants’ knowledge, who have had possession, custody or control
ARGUMENT
Although the TRO was signed nine days ago (Doc. 9) and Defendants accepted service of
it seven days ago (Doc. 14), Defendants have still not complied with subsections v, vi, and vii of
the TRO.1 Konnech has repeatedly sought Defendants’ voluntary compliance with these
subsections of the TRO by letters and e-mails to Defendants’ lawyer dated September 15, 2022,
September 16, 2022, September 17, 2022, and a conference call on September 20, 2022; but
1
In addition to subsections v, vi, and vii of the TRO, Konnech has worked extensively to obtain
confirmation of Defendants’ compliance with the other provisions of the TRO. Specifically,
because of Defendants’ contradictory pre-suit statements and threats to release data they now claim
to have never possessed, Konnech is seeking sworn statements from Defendants to confirm their
unsworn representations that conflict with their attorneys’ unsworn statements claiming their
compliance with the TRO. Defendants, however, have still not provided Konnech with the
requested sworn statements or any comments to the affidavits which Konnech drafted for their
review based on Defendants’ attorney’s unsworn representations.
3
126
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed onPage: 127in TXSD
09/21/22 Date Filed:
Page11/11/2022
4 of 24
The stated basis of Defendants’ refusal to comply with subsections v, vi, and vii of the
TRO is that “this is a matter that has been turned over to the FBI,” and that “they do not want to
compromise an ongoing [FBI] investigation[.],” which they have admitted is targeting the
Defendants. (See Exhibit D attached hereto; see also Doc. 15.) But before the TRO was issued,
Konnech specifically addressed in its Original Complaint and Motion for TRO the Defendants’
pre-suit statements that they provided the FBI with Konnech’s data, while at the same time
repeatedly threatening to publicly release the data they now claim to not possess. Moreover,
Defendants’ other stated basis for refusing to comply with the TRO—i.e., that Defendants only
viewed a “screen share” of “certain elements of the data” and that the data was merely
“characterized” to Defendants as showing Konnech data, and that Defendants never viewed any
Konnech data that was provided to them on a hard drive by an undisclosed third party—is contrary
to Defendants’ pre-suit statements as outlined in Konnech’s Original Complaint and Motion for
TRO. (See Exhibit E attached hereto; see also Docs. 1 & 5.)
On September 15, 2022, and in lieu of complying with the TRO, Defendants’ counsel filed
under seal an ex parte letter addressed to the Court which states that it identifies an individual
whom they claim is actually responsible for the alleged unauthorized access of Konnech’s
computers and the theft of its data. (Doc. 15.) However, the individual’s name was redacted from
Konnech’s copy of the letter, and Defendants did not otherwise purport to comply with subsections
v, vi, or vii of the TRO. Specifically, subsection v of the TRO required Defendants to identify
Defendant Phillips previously referred to the persons who allegedly gained unauthorized access to
Konnech’s computers as his “analysts,” and his “guys,” thus signifying more than one person.2
2 See Motion for Temporary Restraining Order and Preliminary Injunction, at p. 6 (Doc. 5); see
4
127
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed onPage: 128in TXSD
09/21/22 Date Filed:
Page11/11/2022
5 of 24
However, in their September 15, 2022 ex parte letter, Defendants do not confirm that the individual
whose name was provided to the Court is the only person or organization involved in accessing
Konnech’s computers.
Further, although Defendants previously refused to comply with subsections vi and vii of
the TRO because of the FBI’s alleged involvement, they still have not provided Konnech or the
Court with any of the information required by those subsections of the TRO. By their refusal to
comply with the TRO, and specifically subsections v, vi, and vii, Defendants are flagrantly
violating the TRO and transparently seeking to protect those that they acted in concert with from
Konnech therefore seeks Defendants’ immediate compliance with subsections v, vi, and
vii of the TRO, including making public a fully unredacted copy of Defendants’ September 15,
2022 ex parte letter to the Court. In the event that Defendants do not immediately comply,
Konnech requests that the Court set a hearing requiring Defendants to show cause why they should
not be held in contempt of the TRO. See FED. R. CIV. P. 70(e); 18 U.S.C. § 401 (providing the
Court with power to punish by fine or imprisonment, or both, for a party’s disobedience or
resistance to its order); American Airlines, Inc. v. Allied Pilots Ass’n, 228 F.3d 574, 585 (5th Cir.
2000) (“The district court ‘has broad discretion in the assessment of damages in a civil contempt
proceeding.’”) (quoting Long Island Rail Co. v. Brotherhood of Rail. Trainmen, 298 F. Supp. 1347,
1347 (E.D.N.Y. 1969)). Konnech also requests that the Court order that Defendants and their
counsel pay the attorneys’ fees and costs that Konnech has incurred in seeking their compliance
with the TRO as well as sanctions for Defendants’ blatant contempt of the TRO and, should
also Exhibits A-1 and A-2 in support of Konnech’s Motion for Temporary Restraining Order and
Preliminary Injunction (Doc. 6).
128
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed onPage: 129in TXSD
09/21/22 Date Filed:
Page11/11/2022
6 of 24
Defendants continue to refuse to comply with the TRO or any other orders issued by the Court,
that Defendants be jailed or otherwise punished in a manner that this Court sees fit.
PRAYER
In sum, Konnech, Inc. respectfully requests that the Court, without a hearing, enter an order
directing that (i) Defendants and their counsel appear before the Court and show why they should
not be held in contempt of the TRO; and (ii) make public a fully unredacted copy of Defendants’
September 15, 2022 ex parte letter to the Court. Konnech, Inc. further respectfully requests that,
after hearing, the Court enter an order: (i) holding Defendants and their counsel in contempt; (ii)
awarding Konnech attorneys’ fees and costs; (iii) sanctioning Defendants for their contempt; and
(iv) for such other and further relief to which Konnech may be justly entitled.
129
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed onPage: 130in TXSD
09/21/22 Date Filed:
Page11/11/2022
7 of 24
CERTIFICATE OF CONFERENCE
I hereby certify that, as stated herein, I have made numerous attempts to obtain Defendants’
voluntary compliance with the TRO, but Defendants have either ignored my requests or outright
refused because they claim the matter has been turned over to the FBI.
CERTIFICATE OF SERVICE
I hereby certify that on September 21, 2022, true and correct copies of the above and
foregoing were forwarded via email and through the ECF system, to all parties and counsel of
record.
130
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed onPage: 131in TXSD
09/21/22 Date Filed:
Page11/11/2022
8 of 24
EXHIBIT A
131
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed onPage: 132in TXSD
09/21/22 Date Filed:
Page11/11/2022
9 of 24
Kasowrrz BTNSoN TonRES LLP
I4I5 LOUISIANASTREET, SUITE 2IOO ArLeNre
HOUSTON, TEXAS 77OO2 LoS ANGELES
ConsraNrrrue Z. Denru Pavpxrt-rs MrAMr
Drnecr DrAL: (713) aeO-4452 (7 t3) 2zo-aaoo NEW YORK
Drnecr Fax: (7 l3) ???-OA43
DPav pg ruts@xAsowrrz.coM FAX: (7 r3) 222-o443/o94o N EwnRN
SnN FnnNcrsco
SrLrcoN VALLIY
WASHINGTON DC
September 15,2022
VIA EMAIL
Brock Akers
The Akers Firm
3401 Allen Parkway
Suite l0l
Houston, Texas 77019
bca@akersfinn.com
RE Cause No. 4:22-cv-03096; Konnech, Inc. v. True the Vote, et al,,In the United
States District Court, Southern District of Texas, Houston Division.
I write in response to your September 14, 2022 letter ("Letter") to seek Defendants'
voluntary compliance with the TRO.
First, the Defendants' refusal to comply with significant portions of the TRO (ltem nos. 5,
6 and 7 in your Letter, which are subparagraphs v, vi and vii in the TRO) because they have
provided the FBI with the same information does not excuse their non-compliance with the TRO.
Your Letter admits the Defendants know who stole Konnech's data, how it was stolen, and who
else has it, but that Defendants will not disclose such information even though the TRO requires
it. Three days ago, Judge Hoyt ordered the Defendants to immediately:
V fl]dentify each individual and/or organization involved in accessing Konnech's
protected computers;
132
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed on Page: 133in TXSD
09/21/22 Date Filed:
Page11/11/2022
10 of 24
Kasowrrz BpNSoN TonRES LLP
Brock Akers
September 15,2022
Page 2
vll fl]dentify all persons and/or entities, in Defendants' knowledge, who have had
possession, custody or control of any information or data from Konnech's protected
computers.
And, even though the Courl was not required to consider it, the Defendants' allegations of the
FBI's involvement was brought to the Court's attention before the TRO was issued, Defendants'
refusal to provide Konnech with this information directly violates the TRO and is frankly stunning.
This information is essential to enable Konnech to protect its data and needs to be turned over
immediately,
Second, Defendants' refusal to immediately "return to Konnech all property and data
obtained from Konnech's protected computers, whether original, duplicated, computerized,
handwritten, or any other form whatsoever" is also shocking, particularly because it is apparent
that Defendants are acting in concert with others that still have Konnech's property and data. The
basis for your clients' refusal to comply -- that they turned all of Konnech's data over to the FBI -
- is also demonstrably false. In the event that you are planning to make such representation to the
Court, you should first review the Complaint and Motion for TRO carefully as both demonstrate
that your clients have recently, repeatedly and publicly stated that they plan to release, or already
have released, stolen Konnech data to their subscribers and/or others, including The Pit
attendees-even after claiming they had turned over all such data to the FBL
133
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed on Page: 134in TXSD
09/21/22 Date Filed:
Page11/11/2022
11 of 24
K,tsowrrz BnNSoN TonRES LLP
Brock Akers
September 15,2022
Page 3
Defendants' admission that they obtained Konnech's data on an "open sourceo' from the internet.
See Merritt Hawkins & Assoc., LLC v. Gresham,948 F. Supp. 2d 671,673-74 (N.D. Tex. 2013)
(explaining that any computer connected to the internet is a "protected computer" under the
CFAA).r
With the above in mind, we ask that you ensure Defendants immediately comply with the
TRO bv 3:00 PM CT today. Defendants' failure to do so will leave us no option but to seek
immediate court intervention
Separately, in response to your request, we can agree to extend the expiration date of the
TRO. However, since that agreement will require the entry of an agreed TRO, I would suggest
that the parties agree to convert the TRO into a preliminary injunction and avoid the preliminary
injunction hearing altogether.
ly,
Z.
134
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed on Page: 135in TXSD
09/21/22 Date Filed:
Page11/11/2022
12 of 24
EXHIBIT B
135
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed on Page: 136in TXSD
09/21/22 Date Filed:
Page11/11/2022
13 of 24
VIA EMAIL
Brock Akers
The Akers Firm
3401 Allen Parkway
Suite 101
Houston, Texas 77019
bca@akersfirm.com
RE: Cause No. 4:22-cv-03096; Konnech, Inc. v. True the Vote, et al., In the United
States District Court, Southern District of Texas, Houston Division.
I write in further response to your September 14 and September 15, 2022 letters, and to
again seek Defendants’ voluntary compliance with the TRO in a final attempt to avoid contempt
proceedings.
First, Defendants’ position concerning Konnech’s property and data has repeatedly
changed since the emergence of their attacks against Konnech. Defendants initially claimed at
The Pit—and then repeatedly on podcast appearances and social media postings following the
event—that, as a factual matter, they were the ones who found data and personal identifying
information on 1.8 million U.S. poll workers located on a Konnech Server that was allegedly only
restricted by a default password; that it was Defendant Phillips’ “analysts,” or otherwise his “guys”
(signifying more than one person), who gained unauthorized access to Konnech’s servers and took
data therefrom; that Defendants “took [Konnech’s data] directly,” and that they already did, or
otherwise planned to release the data to their subscribers in an effort to somehow substantiate their
false and malicious claims that Konnech is involved in election fraud or is otherwise affiliated with
the Chinese Communist Party; and further, that this was all done at the direction of Defendants
Engelbrecht and True the Vote.
136
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed on Page: 137in TXSD
09/21/22 Date Filed:
Page11/11/2022
14 of 24
Brock Akers
September 16, 2022
Page 2
After the TRO was issued, your correspondence has contradicted Defendants’ prior
statements. In your September 14 Letter, although you admit that Konnech data was acquired by
Defendants, you claim the data and information was obtained by an “independent contractor” who
contacted Defendant Phillips after having first obtained the information themselves. And now,
your September 15 Letter claims for the first time that this alleged third party was not “contracted”
by Defendants as your prior letter claimed (though, glaringly, neither letter denies that the third
party was working in concert with Defendants). Further, and contrary to prior public statements
by Defendants, Defendants suddenly claim in your September 15 Letter that they only saw “certain
elements of the data” which was merely “characterized” by the undisclosed third party as
containing sensitive poll worker data. Unsurprisingly, the repeated change in Defendants’ position
and, indeed, the contradictory nature of it all, makes it impossible for Konnech to take Defendants
at their word.
Second, Defendants have still not complied with substantial obligations in the TRO and
you have still not addressed those items, including in your September 15, 2022, ex parte
communication with the Court.1 Specifically, Defendants have not confirmed (1) who, other than
a single undisclosed third-party and the FBI, in Defendants’ knowledge, has had possession,
custody, or control of any of the information or data taken from Konnech; and (2) how and when
Konnech’s servers were accessed. The answers to these questions is paramount to Konnech’s
ability to maintain a secure system and, therefore, the integrity of the upcoming midterm elections.
Moreover, and most significantly, Defendants were ordered by Judge Hoyt to provide this
information to Konnech immediately 4 days ago.
To be clear, Defendants’ continued failure to comply with all provisions of the TRO will
subject Defendants to contempt proceedings. Accordingly, please immediately provide the
answers to these open questions as ordered by the TRO.
Third, to avoid any misunderstanding, please confirm that your September 15 Letter’s
reference to “True the Vote” encompasses the other two Defendants as well. 2 In other words,
confirm that (1) neither Defendants Phillips, Engelbrecht, nor True the Vote viewed the contents
of the alleged hard drive or connected it to their network or any device; (2) that Defendants
Phillips’ and Engelbrecht’s knowledge about the data is likewise limited to what they were told by
the undisclosed third party and as shown through a shared screen; and (3) that Defendants Phillips
and Engelbrecht have likewise never obtained nor held any Konnech data, aside from their alleged
transfer of said data to the FBI.
1
Your September 15, 2022 ex parte letter only addressed the identity of the supposed hacker, and did not address the
question of how and when Konnech’s server was accessed, which Defendants have been ordered to do.
2
For example, your September 15 Letter states that “True the Vote did not view the contents of this hard drive or
connect it to their network or any device,” that “True the Vote’s knowledge about this data is limited to what they
were told and shown by a ‘screen share,’” and that “True the Vote has never obtained or held” Konnech data. But the
letter is silent as to Defendants Phillips and Engelbrecht.
137
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed on Page: 138in TXSD
09/21/22 Date Filed:
Page11/11/2022
15 of 24
Brock Akers
September 16, 2022
Page 3
And fourth, to avoid any further shifts in Defendants’ positions and to confirm that we have
Defendants’ final position on the TRO, we ask that Defendants each sign an affidavit that swears
to the key factual statements identified in your September 15 Letter, and other key facts concerning
Defendants’ alleged involvement (or lack thereof) in accessing and obtaining data from Konnech’s
servers. I do think this would go a long way toward resolving the obvious issues with Defendants’
TRO compliance. If Defendants are amenable, we will draft the proposed affidavits for your
review and if agreed upon affidavits are executed, we are willing to negotiate an agreed preliminary
injunction on the basis of such affidavit and avoid the preliminary injunction hearing altogether.
Please provide me with the information requested in this letter by 12:00 PM CT today.
Sincerely,
138
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed on Page: 139in TXSD
09/21/22 Date Filed:
Page11/11/2022
16 of 24
EXHIBIT C
139
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed on Page: 140in TXSD
09/21/22 Date Filed:
Page11/11/2022
17 of 24
Archived: Wednesday, September 21, 2022 1:38:27 PM
From: Dean Pamphilis
Mail received time: Sat, 17 Sep 2022 12:57:19
Sent: Sat, 17 Sep 2022 12:57:18
To: Brock Akers
Cc: Nathan W. Richardson
Subject: RE: Konnech Inc. v. True the Vote, Inc., et al.
Importance: Normal
Sensitivity: None
Brock – Though we shouldn’t have to—because the Court has ordered your clients to do so—we have asked repeatedly for your clients to confirm if they know (1) who, other than
a single undisclosed third-party and the FBI, in Defendants’ knowledge, has had possession, custody, or control of any of the information or data taken from Konnech; and (2) how
and when Konnech’s servers were accessed. Stated simply, we need to know if your clients know how the servers were accessed (if at all), and who else, if anyone, has had the
data. Please provide us with this information immediately.
Thanks, Dean
See attached
Brock – Please see the attached on behalf of Mr. Dean Pamphilis, which requires your immediate attention. Thank you.
140
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed on Page: 141in TXSD
09/21/22 Date Filed:
Page11/11/2022
18 of 24
EXHIBIT D
141
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed on Page: 142in TXSD
09/21/22 Date Filed:
Page11/11/2022
19 of 24
Dean Pamphilis
Kasowitz Benson Torres LLP
1415 Louisiana Street, Suite 2100
Houston, Texas 77002
Re: Konnech, Inc. v. True the Vote, et al; No. 4:22-cv-03096; In the United States
District Court, Southern District of Texas, Houston Division
This letter is in response to your email relating to the TRO against my clients. It was not
until Nathan Richardson sent the waivers to us that we were aware that you had
acquired a TRO. Previously, my clients knew of the lawsuit itself from reading about it
in the press, but not the TRO.
As to that which is covered by the TRO, it is easy for them to comply with its
terms. Despite the allegations to the contrary, my clients did not obtain any property or
data that was used, generated or stored by Konnech on a "protected computer." As you
will learn through the course of this matter, anything acquired from Konnech was
retrieved from an open source. There was no "hacking" involved in getting this data.
The information relevant to the voter integrity issues that was acquired was actually
stumbled upon in the course of doing other research on matters involving security of
elections and election data bases. Neither Catherine Engelbrecht, Gregg Phillips nor
anyone employed or associated with True the Vote was responsible for this data
retrieval. Instead, it was an independent contractor who located the information and in
turn contacted Gregg Phillips.
Mr. Phillips' immediate reaction, knowing and sensing the national security
implications of the information, was to contact the FBI. He did so and handed all of the
information he had been given to the FBI.
The Akers Firm PLLC ,The Clocktower Building, 3401 Allen Parkway, Suite 101 Houston, TX 77019 Phone. (713) 877-2500 Fax. 1-713-
583-8662 www.akersfirm.com
142
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed on Page: 143in TXSD
09/21/22 Date Filed:
Page11/11/2022
20 of 24
With regard to the seven items in the TRO, we can respond directly to them. Please
note that all of the items are properly modified by "Konnech's protected
computers." Inasmuch as no data was obtained from a "protected computer" by anyone
to our knowledge, there is nothing for us to produce or to refrain from
doing. Nevertheless, and so that we are not accused of playing semantics on these
matters, we can respond more specifically:
2. We are to return all property and data obtained from Konnech's protected
computers.
We have not acquired anything from a protected computer. All
of the information that we have given to the FBI was from an open
source. Importantly, you should know that all of the data and information
was turned over to the FBI and my clients do not possess anything from
Konnech’s files or activities. Therefore, there is nothing to turn over.
3. We are enjoined from using, disclosing or exploiting the property and data.
We
have not done that, and will not do so, per the court’s order.
4. We shall not delete, destroy, conceal or alter files or data obtained.
We will not
delete, destroy or alter anything.
6. We shall confidentially disclose how, when and by whom.
This is a matter that
has been turned over to the FBI and it ought to be up to them to provide this
information.
7. We shall identify all persons who have possession, custody or control of information
or data.
This is a matter for the FBI, not us. We know they have the data and
information; we do not. Since the information was gained from an open
source, we of course have no idea how many other people may have had
access to the information.
143
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed on Page: 144in TXSD
09/21/22 Date Filed:
Page11/11/2022
21 of 24
Because of the possibility of counterclaims, we ask that you inform your clients to
preserve all records, data of any sort, including logs, server configurations, emails, texts,
written communications, records of phone calls and other documents that may pertain
to this matter.
Sincerely,
Brock C. Akers
BCA:pdg
144
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed on Page: 145in TXSD
09/21/22 Date Filed:
Page11/11/2022
22 of 24
EXHIBIT E
145
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed on Page: 146in TXSD
09/21/22 Date Filed:
Page11/11/2022
23 of 24
Dean Pamphilis
Kasowitz Benson Torres LLP
1415 Louisiana Street, Suite 2100
Houston, Texas 77002
Re: Konnech, Inc. v. True the Vote, et al; No. 4:22-cv-03096; In the United States
District Court, Southern District of Texas, Houston Division
Thank you for your letter of this morning. It reflects multiple inaccuracies and
misrepresentations regarding True the Vote’s actions.
Apparently, I did not do a good enough job explaining how my clients became aware of
and in contact with the source information you describe. These facts hopefully provide
additional information so you will better understand our involvement.
1. As evidence will show, True the Vote was approached by a third party who
claimed to have data originating from your client. He had already obtained that
data prior to contacting us. He was not contracted to us or paid by us. We were
led to understand that he acquired the information from an open, not protected
source.
2. This individual “screen shared” certain elements of the data and characterized it
as showing large amounts of personal and confidential information about poll
workers and other sensitive material having been exfiltrated and stored on
servers located in China.
3. He turned over to True the Vote a hard drive device containing the evidence of
this, including the data. True the Vote did not view the contents of this hard
drive or connect it to their network or any device. They turned it over to the FBI
immediately with the representations made about it. No portion of that which
was turned over was retained.
4. True the Vote’s knowledge about this data is limited to what they were told and
shown by “screen share.” They never possessed the actual data or any part of it
The Akers Firm PLLC ,The Clocktower Building, 3401 Allen Parkway, Suite 101 Houston, TX 77019 Phone. (713) 877-2500 Fax. 1-713-
583-8662 www.akersfirm.com
146
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 16 Filed on Page: 147in TXSD
09/21/22 Date Filed:
Page11/11/2022
24 of 24
except as above. True the Vote has been advised that this person is in
communication with the FBI.
5. Thus, True the Vote has never obtained or held any data as described in your
petition. This is just one of many inaccuracies contained therein.
6. We reject your contention that we have publicly communicated contrary to this.
Given this, we once again assure you that we are complying with all aspects of the TRO.
We have been led to understand in the course of this process that this is an active and
confidential matter with the FBI. We are uncertain as to our authority to make public
this identity, and feel as though we are being forced to violate federal disclosure laws
on the basis of your ex parte order. We will, therefore, provide the name and identity of
this individual to the court under seal, and will simultaneously offer the FBI the
opportunity to weigh in on its disclosure. We predict the Court would most prefer the
input of the FBI in this manner. Upon further direction from the Court or the FBI we
will release the name of the individual and what contact information we possess.
Sincerely,
Brock C. Akers
BCA:pdg
147
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page:
16-1 Filed on 148 inDate
09/21/22 TXSD Filed: 11/11/2022
Page 1 of 2
KONNECH, INC., §
§
PLAINTIFF, §
§
v. § CIVIL ACTION NO. 4:22-CV-03096
§
TRUE THE VOTE, INC., GREGG §
PHILLIPS, and CATHERINE §
ENGELBRECHT, §
§
DEFENDANTS. §
Came on for consideration Plaintiff Konnech, Inc.’s Motion to Show Cause and For
Contempt Against Defendants of the September 12, 2022 Temporary Restraining Order (“TRO”)
(hereinafter “Contempt Motion”). There is good cause to grant the initial relief set forth below. It
is therefore:
ORDERED that on _______________, 2022, at ____.m, that Defendants and their Counsel
appear at The United States Court House, Courtroom No. 11A, 515 Rusk, 11th Floor, Room 11-
144, and the Court shall conduct a hearing on the Contempt Motion (the “Contempt Hearing”); it
is further
ORDERED that Defendants and their counsel shall (i) appear at the above-described
Contempt Hearing; (ii) show why he/she/it should not be (a) held in contempt of the TRO, (b)
ordered to pay the attorneys’ fees and costs that Konnech incurred bringing and prosecuting the
Contempt Motion, and (c) be ordered to pay additional sanctions; and (iii) that the Clerk of the
148
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page:
16-1 Filed on 149 inDate
09/21/22 TXSD Filed: 11/11/2022
Page 2 of 2
Court immediately make public on the Court’s electronic filing system a fully unredacted copy of
the September 15, 2022 ex parte letter to the Court (Doc. 15).
_______________________________
UNITED STATES DISTRICT JUDGE
149
Case: 22-20578 Document: 00516542768 Page: 150 Date Filed: 11/11/2022
Re: Konnech, Inc. v. True the Vote, et al; No. 4:22-cv-03096; In the United States
District Court, Southern District of Texas, Houston Division
I represent the Defendants in the above action, recently filed, and in which you have
entered a Temporary Restraining Order. The TRO was, as is most often the case,
entered on an ex parte basis. Had we been present at the hearing, we would have
raised an important matter with the Court relative to some aspects of that which we
have been ordered to do.
Plaintiff alleges that the Defendants have inappropriately acquired information from
them. Discovery will reveal that the information which is the subject of their complaint
was actually acquired by a third person who in turn contacted Gregg Phillips, one of
my clients. Sensing that the information itself was a matter of potential national
security, Mr. Phillips immediately contacted the FBI and provided all that he was given
to the FBI. We were led to understand an investigation by the FBI followed, though we
do not know the current status of that investigation.
One of the matters which the TRO order requires of Defendants is to identify the person
or persons who acquired the data from Plaintiff. That individual is, to our
understanding, integral to the FBI investigation. That investigation may be hindered or
compromised if the identity of this individual was revealed at this time to Plaintiff. We
do not believe that it is our call to make as to whether this person should be identified
at this time. Plaintiff objects to our withholding the identity, citing the TRO itself which
directs us to provide the name.
The Akers Firm PLLC ,The Clocktower Building, 3401 Allen Parkway, Suite 101 Houston, TX 77019 Phone. (713) 877-2500 Fax. 1-713-
583-8662 www.akersfirm.com
150
Case: 22-20578 Document: 00516542768 Page: 151 Date Filed: 11/11/2022
Defendants are of course anxious to comply with the Court's orders, but
understandably concerned that they do not want to compromise an ongoing
investigation as a result where perhaps the Court has not been made aware of the
inherent risk created by providing this information as Plaintiff demands. With that in
mind, and being guided mostly by that which seems to make most sense given the
stakeholders involved, Defendants propose to provide the name and contact
information to the Court under seal, while at the same time providing notice to the FBI
that this process is taking place so as to allow the FBI the opportunity to be heard on
this sensitive issue if that is its choice.
This letter is copied to Plaintiff. However, the name which follows has been redacted
from their copy of this letter, the name only being provided under seal and in a letter to
the FBI Special Agent in Charge.
The identity of the person whom we understand obtained the data from Plaintiff is:
(REDACTED)
Your honor, we are willing and anxious to comply with any and all of the Court's
orders, as we are anxious to have the opportunity to defend ourselves against the
allegations that have been made.
Sincerely,
Brock C. Akers
cc:
Dean Pamphilis
Kasowitz Benson Torres LLP
1415 Louisiana Street, Suite 2100
Houston, Texas 77002
Attorney for Plaintiff
(with redaction)
James Smith
Special Agent in Charge
Federal Bureau of Investigation,
Houston Field Office
1 Justice park Drive
Houston, Texas 77092
(without redaction)
151
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 18 Filed onPage: 152 in TXSD
09/23/22 Date Filed:
Page11/11/2022
1 of 2
KONNECH,INC., s
$
PLAINTTFF, $
$
v $ CML ACTION NO. 4:22-CV-03096
$
TRUE THE VOTE,INC., GREGG $
PHILLPS, and CATHERINE $
ENGELBRECHT, $
$
DEF'EI\[DANTS. s
for Temporary Restraining Order and Preliminary Injunction and Brief in Support ("Motion").
("TRO") against Defendants True the Vote, Inc., Gregg Phillips, and Catherine Engelbrecht
WHEREAS, the TRO is set to expire on September 26, 2022, and a preliminary
Parties concerning an agreed preliminary injunction, the Parties agree and wish to reset the
hearing on Konnech's preliminary injunction for a date after October 5,2022 when Defendants
preliminary injunction, the Parties agree and wish to extend the TRO until such time after the
152
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 18 Filed onPage: 153 in TXSD
09/23/22 Date Filed:
Page11/11/2022
2 of 2
Parties enter an agreed preliminary injunction or until such time after the Court has ruled on
subject to approval of the Court, that: 1) the preliminary injunction hearing in the above-
captioned action which is currently set for September 26,2022, be reset for a date after October
5, 2022; and 2) the expiration date of the TRO be extended until the earlier of the date when the
Parties enter an agreed preliminary injunction that is signed by the Court or until such time after
the Court has ruled on Konnech's Motion for preliminary injunction in this action.
to and
Constantine Z.
Counselfor Plaintiff Inc.
Akers
Counselfor Defendants True the Vote,Inc.,
Gregg Phillips, and Catherine Engelbrecht
153
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page:
18-1 Filed on 154 inDate
09/23/22 TXSD Filed: 11/11/2022
Page 1 of 1
KONNECH, INC., §
§
PLAINTIFF, §
§
v. § CIVIL ACTION NO. 4:22-CV-03096
§
TRUE THE VOTE, INC., GREGG §
PHILLIPS, and CATHERINE §
ENGELBRECHT, §
§
DEFENDANTS. §
captioned action which is currently set for September 26, 2022, is reset to ________________,
ORDERED that the expiration date of the TRO is hereby extended until the earlier of the
date when: (a) the Parties enter an agreed preliminary injunction that is signed by the Court; or
(b) the Court has ruled on Konnech’s Motion for preliminary injunction.
________________________________
UNITED STATES DISTRICT JUDGE
154
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 20 Filed onPage: 155 in TXSD
09/26/22 Date Filed:
Page11/11/2022
1 of 1
United States District Court
Southern District of Texas
ENTERED
UNITED STATES DISTRICT COURT September 26, 2022
SOUTHERN DISTRICT OF TEXAS Nathan Ochsner, Clerk
HOUSTON DIVISION
KONNECH INC., §
§
Plaintiff, §
§
VS. § CIVIL ACTION NO. 4:22-CV-03096
§
TRUE THE VOTE INC., et al., §
§
Defendants. §
captioned action which is currently set for September 26, 2022, is reset to October 6, 2022 at 11:00
a.m.; it is further
ORDERED that the expiration date of the TRO is hereby extended until the earlier of the
date when: (a) the Parties enter an agreed preliminary injunction that is signed by the Court; or (b)
_________________________________
Kenneth M. Hoyt
United States District Judge
1/1
155
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 19 Filed onPage: 156 in TXSD
09/23/22 Date Filed:
Page11/11/2022
1 of 4
KONNECH, INC. §
§
Plaintiff, §
§
v. § CIVIL ACTION NO. 4 :22-CV-03096
§
TRUE THE VOTE, INC., GREGG §
PHILLIPS AND CATHERINE §
ENGELBRECHT, §
Defendants §
COME NOW DEFENDANTS, True the Vote, Inc., Gregg Phillips and Catherine
Engelbrecht and hereby file their Response to Motion to Show Cause and Contempt, and with
1. Plaintiff Konnech, Inc. has brought action against Defendants, alleging a plethora of
matters that are simply false, and accusing these Defendants of not only improper but illegal
conduct. At the time of the filing of this lawsuit, Plaintiff sought and acquired a Temporary
Restraining Order which was predicated on the supposed truth of the allegations in the
Complaint. Defendants learned first of this filing in the press. Upon notice of the entry of this
Temporary Restraining Order, obtained ex parte and without an effort to engage Defendants
prior to its entry, Defendants corresponded with Konnech counsel to explain facts relating to
these allegations. Such correspondence was attached to Plaintiff’s Motion to Show Cause and
156
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 19 Filed onPage: 157 in TXSD
09/23/22 Date Filed:
Page11/11/2022
2 of 4
Contempt. As is evident from the correspondence, Defendants explain that the fundamentals of
the allegations made by Konnech are untrue, and provided a general explanation as to what
occurred. Further, Defendants pointed out that there was no problem with adhering to the
Temporary Restraining Order because Defendants had not committed the conduct about which
they were accused, and were not going to start doing so. Defendants have neither improperly
acquired nor disclosed the data acquired on a server in China to anyone other than the FBI.
2. Significantly, though, there is one matter relating to the Temporary Injunction which
Defendants have not complied with in every respect. This is the basis of the Motion to Show
Cause and Contempt. Specifically, and as fully explained in the correspondence to Konnech
counsel, Defendants turned over data and information to the Federal Bureau of Investigation
which had been given to them. The data and information that was turned over then became what
Defendants understood to be an investigation by the FBI. Providing the identity of the individual
from whom this data was acquired has the potential of disrupting the FBI investigation, pure and
simple. Significantly, Defendants believe that revealing the name of this individual has
significant national security and law enforcement implications that should be addressed outside
of this Court.
3. Defendants did not simply refuse to provide the name, however, and ignore this Court’s
Order. Instead, Defendants’ counsel sent the Court a letter on September 15, 2022 under seal
explaining the reason for not providing the name, but in turn providing the name to the Court in a
manner that has not been shared publicly or to Konnech’s counsel. Further, Defendants wrote to
the FBI the same day to alert them of this matter and to the potential risk of what might be to
them an undesirable interference in their investigation, inviting the FBI to assert itself on this
matter. To date, the FBI has taken no position despite the invitation to do so.
157
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 19 Filed onPage: 158 in TXSD
09/23/22 Date Filed:
Page11/11/2022
3 of 4
4. Faced with the problem of complying with a Temporary Restraining Order, acquired
from the Court without input of any sort from Defendants where an FBI investigation might be
placed at risk, Defendants took what they thought was the most reasonable and prudent position
as to the identity of this individual. Defendants have a legal obligation, pursuant to 18 U.S.C.
§798 to not make available to an unauthorized person information prejudicial to the interest of
5. This is far from a circumstance where Defendants are being unreasonable and refusing to
cooperate with the Court or Konnech in this matter. Indeed, Defendants have agreed to an
Agreed Preliminary Injunction wherein they agree to not go and improperly gain access to
Konnech’s servers and purloin its data, among other things. This is an easy position for
Defendants to take since they have not improperly gained access to Konnech’s servers in the past
and have not purloined Konnech’s data. Defendants are unwilling to violate 18 U.S.C. §798 and
thwart the efforts of the FBI to investigate massive improprieties by being imprudent in the
Phillips and Catherine Engelbrecht respectfully pray that this Court deny the Motion to Show
Cause and for Contempt, withhold the name provided to the Court under seal until the FBI
expresses disinterest in its being revealed, and for other and further relief to which Defendants
By:
Brock C. Akers
Federal I.D. No. 2046
158
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 19 Filed onPage: 159 in TXSD
09/23/22 Date Filed:
Page11/11/2022
4 of 4
CERTIFICATE OF SERVICE
filed the foregoing document with the Clerk of the Court using CM/ECF. We also certify that
the foregoing document is being served this day on all counsel of record identified on the
attached Service List in the manner specified, either via transmission of Notice of Electronic
Filing generated by CM/ECF or in some other authorized manner to those counsel or parties who
Brock C. Akers
159
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 24 Filed onPage: 160in TXSD
10/05/22 Date Filed:
Page11/11/2022
1 of 15
KONNECH, INC., §
§
Plaintiff, §
§ Civil Action No. 4:22-cv-03096
v. §
§
TRUE THE VOTE, INC., et al., §
§
Defendants. §
COME NOW DEFENDANTS, True the Vote, Inc., Gregg Phillips, and Catherine
Engelbrecht, by counsel, to file this Opposition to Plaintiff’s Motion for Preliminary Injunction,
and to contest the basis for the Plaintiff’s Motion for Temporary Restraining Order.
INTRODUCTION
The matter comes before the Court on Plaintiff’s Motion for a Preliminary Injunction, and
this opposition, prior to this Court’s hearing on Thursday, October 6, 2022. Defendants contend
that the Motion for a Preliminary Injunction, based on an alleged violation of the federal and Texas
computer security statutes, and claims of conspiracy under each, should not be granted, because
immediately prior to filing their Complaint, Plaintiff admitted that it knew that no hacking of
Plaintiff’s computer occurred and moreover, that Plaintiff has made false representations about
statements allegedly made by Defendants. For example, Plaintiff incorrectly argue that
founder and CEO was indicted in Los Angeles County, in coordination with Michigan authorities,
and arrested for maintaining sensitive “personal identifying information” on servers in Communist
_____________________________________________________________________________________________
DEFENDANTS’ OPPOSITION TO PLAINTIFF’S MOTION FOR PRELIMINARY INJUNCTION PAGE 1
160
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 24 Filed onPage: 161in TXSD
10/05/22 Date Filed:
Page11/11/2022
2 of 15
China. Defendant asserts that Plaintiff has failed to prove any of the four elements for injunctive
relief: likelihood of prevailing on the merits, irreparable harm, balance of the equities, and the
public interest.
TABLE OF CONTENTS
I. Procedural Background
VII. Konnech Is Seeking to Have this Court Enjoin Investigation into Election Fraud
TABLE OF AUTHORITIES
STATUTES
18 U.S.C. § 1030
28 U.S.C. § 1331
28 U.S.C. § 1332
CASES
Goodarzi v. Hartzog, No. H-12-2870, 2013 U.S. Dist. LEXIS 85727 (S.D. Tex. May 14, 2013)
hiQ Labs, Inc. v. LinkedIn Corp., 31 F.4th 1180 (9th Cir. 2022)
Van Buren v. United States, 141 S. Ct. 1648 (2021)
MISCELLANEOUS
Dr. John R. Lott, “Simple tests for the extent of vote fraud with absentee and provisional ballots
in the 2020 US presidential election,” Public Choice, forthcoming (May 12, 2022)
“October 4, 2022: Head of Election Worker Management Company Arrested in Connection with
Theft of Personal Data,” L.A. County District Attorney’s Office (October 4, 2022)
_____________________________________________________________________________________________
DEFENDANTS’ OPPOSITION TO PLAINTIFF’S MOTION FOR PRELIMINARY INJUNCTION PAGE 2
161
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 24 Filed onPage: 162in TXSD
10/05/22 Date Filed:
Page11/11/2022
3 of 15
ARGUMENT
I. Procedural Background.
On September 12, 2022, Plaintiff Konnech, Inc. (“Konnech”) filed a complaint against
Defendants True the Vote, Inc., Gregg Phillips, and Catherine Engelbrecht asserting eight claims,
along with a request for injunctive relief (claim 9). The request for injunctive relief was based on
claim 3 (Computer Fraud and Abuse Act); claim 4 (Conspiracy re claim 3); claim 5 (Texas Harmful
On that same day, Konnech also filed a Motion for Temporary Restraining Order and
Preliminary Injunction and Brief in Support, supported by a single affidavit of Konnech President
and CEO Eugene Yu. 1 The Motion asked the Court to consider the matter ex parte, based on its
representations that if Defendants learn about the suit, they may follow through on threats to
publicly release data or destroy evidence. See Motion at 3 (pages unnumbered). Based on the
many representations made by Plaintiff and Yu, the Court issued a Temporary Restraining Order
on September 12, 2022. Subsequently, Defendants waived service. Now their answer or other
responsive pleading is due by November 14, 2022. This Opposition is being filed in advance of
the scheduled October 6, 2022 hearing on the Motion for a Preliminary Injunction.
Konnech identifies itself as a Michigan company founded by its President and CEO,
Eugene Yu, which contracts with governmental entities in the United States to provide election
related software — a product called “PollChief” is one of several. Konnech advised the Court that
“Konnech’s software products are not involved in any way in the registration of voters, the
1
As discussed below, Eugene Yu was placed under arrest in Michigan on October 4,
2022.
_____________________________________________________________________________________________
DEFENDANTS’ OPPOSITION TO PLAINTIFF’S MOTION FOR PRELIMINARY INJUNCTION PAGE 3
162
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 24 Filed onPage: 163in TXSD
10/05/22 Date Filed:
Page11/11/2022
4 of 15
of votes.” Complaint para. 2. However, prior to filing the Complaint, a great deal more about the
election-related products offered by Konnech was described on its own public-facing website, but
a significant amount of that and other information has been removed from its website, including
True the Vote is a nonprofit organization exempt from federal income taxation under
Internal Revenue Code section 501(c)(3). It has worked in support of election integrity since 2009.
Its mission is to promote the security and integrity of the voting process. It has become a
nationwide resource for information and training of citizens to ensure the accuracy of voter rolls
and voting. True the Vote extensively researched the 2020 election, and its research has been cited
True the Vote has deep concern about the intervention by the People’s Republic of China
in United States elections. Konnech seeks to compensate for weak allegations by libeling
Defendant True the Vote. Konnech falsely accuses Defendant True the Vote of racism and
xenophobia against Chinese. Defendants categorically denies Konnech’s false allegations, and
there is no evidence to support them. Konnech also accuses True the Vote of having “peddled”
claims of election fraud to “enrich” and “profit” itself. See complaint at paras. 1-2. This also is
false.
As Konnech claims, True the Vote has availed itself of Freedom of Information Act laws
to make requests to obtain public documents from various governmental entities. However,
Konnech pejoratively describes these FOIA requests as “an apparent effort to intimidate ...
customers....” Complaint para. 24. Konnech objects to public disclosure of its contracts with
government agencies. Konnech contends that its principal Yu has received death threats from his
_____________________________________________________________________________________________
DEFENDANTS’ OPPOSITION TO PLAINTIFF’S MOTION FOR PRELIMINARY INJUNCTION PAGE 4
163
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 24 Filed onPage: 164in TXSD
10/05/22 Date Filed:
Page11/11/2022
5 of 15
involvement in this controversial matter (Complaint paras. 8 and 28), yet Konnech feels no
reluctance to unnecessarily identify the home addresses of the individually named Defendants in
Efforts were made by counsel for both Plaintiff and Defendants to negotiate an agreed
preliminary injunction, that could be in effect until the case could be fully briefed to and resolved
by the Court. Defendants were willing to seriously consider this option because most of the claims
that Defendants were about to engage in actions harmful to various parties were fanciful, enjoining
actions the Defendants had not and would not take. However, as the scope of the demands were
made clear, seemingly designed to prevent all investigation into Konnech under any
circumstances, and given the arrest of Konnech’s CEO, it became clear there could be no
agreement. The matter requires judicial intervention to vacate the stipulated extension of the
a key document that supports its statements, but Konnech scrubbed it from their website. This
face-saving remedial measure alone demonstrates that Konnech knew that its computers were
There are a variety of allegations in the Complaint and Motion about possible investigation
and indictment of Eugene Yu. Those allegations are a bit dated as on October 4, 2022, the Los
Angeles County District Attorney George Gascon announced that Konnech President and CEO
Eugene Yu “has been arrested as part of an investigation into the possible theft of personal
identifying information of those workers.” See “October 4, 2022: Head of Election Worker
_____________________________________________________________________________________________
DEFENDANTS’ OPPOSITION TO PLAINTIFF’S MOTION FOR PRELIMINARY INJUNCTION PAGE 5
164
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 24 Filed onPage: 165in TXSD
10/05/22 Date Filed:
Page11/11/2022
6 of 15
Management Company Arrested in Connection with Theft of Personal Data,” L.A. County District
Attorney’s Office (October 4, 2022) (Attachment I). The press release continued:
While the Complaint is peppered with hotly disputed allegations of defamation against
Konnech and claims about “debunked” election fraud conspiracy theories, if necessary, those
issues will be addressed more fully at a later time, but are wholly irrelevant to this Court’s
consideration of the claimed basis for Plaintiff’s Motion for a Preliminary Injunction. That Motion
Addressing the two conspiracy claims first, it appears that no claim for conspiracy has been
properly asserted by Plaintiff. The Complaint admits that Catherine Engelbrecht and Gregg
Phillips have been both acting on behalf of the corporate entity True the Vote, such as:
• “Defendants True the Vote, Inc., its founder and President Catherine Engelbrecht,
165
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 24 Filed onPage: 166in TXSD
10/05/22 Date Filed:
Page11/11/2022
7 of 15
True the Vote, has admitted that he obtained confidential information and data
Indeed, except for a few statements attributed to either Engelbrecht or Phillips, the
allegations are against both individuals, who are agents of True the Vote. This Court recognizes
the intracorporate conspiracy doctrine under which there cannot be a civil conspiracy between a
2
“The doctrine arose in the antitrust area, but has been extended, inter alia, to civil rights
conspiracies under § 1983 and § 1985. Collins v. Bauer, 2012 U.S. Dist. LEXIS 17769, 2012 WL
443010, *7 (N.D. Tex. Jan. 23, 2012). Three recognized exceptions to the doctrine are (1) where
the alleged conspirators have “‘an independent stake in achieving the object of the conspiracy’”;
(2) where the alleged conspirators are acting for their own purposes, thus becoming independent
actors; and (3) where they act outside of the scope of their employment beyond the bounds of their
authority or when they engage in unauthorized acts. Id., quoting H&B Equip. Co. v. Int’l Harvester
Co., 577 F.2d 239, 244 (5th Cir. 1978), Dussouy v. Gulf Coast Inv. Corp., 660 F.2d 594, 603 (5th
Cir. 1981), and Buschi v. Kirven, 775 F.2d 1240, 1252-53 (4th Cir. 1985).”
_____________________________________________________________________________________________
DEFENDANTS’ OPPOSITION TO PLAINTIFF’S MOTION FOR PRELIMINARY INJUNCTION PAGE 7
166
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 24 Filed onPage: 167in TXSD
10/05/22 Date Filed:
Page11/11/2022
8 of 15
As to the federal and Texas anti-hacking statutes, Konnech made numerous false
1. “hacked into Konnech’s servers and unlawfully downloaded its data.” Complaint para.
7.
2. “repeatedly declared their intent to release the information they stole from Konnech’s
3. “falsely claimed that they discovered that Konnech had an unsecured server located in
Wuhan, China, which Defendants hacked into and stole data from.” Complaint para. 24 (emphasis
added).
Earlier this year, in hiQ Labs, Inc. v. LinkedIn Corp., 31 F.4th 1180 (9th Cir. 2022), the
Ninth Circuit narrowed the application of the Computer Fraud and Abuse Act to clarify that there
was no violation when accessing public websites which could be readily accessed. In this case,
the server in China that was accessed had a pre-loaded password (i.e., “password”) that did not
even require typing in a password to enter the server, but more importantly, the Plaintiffs have
represented that Defendants did not access Konnech’s computers, as it had no servers in China.
Accordingly, there could be no violation of the federal statute, and by extension, the state statute.
Additionally, as the Supreme Court recently made clear, even if Konnech’s computers had
been accessed in some way, that does not constitute a violation of the Computer Fraud and Abuse
Act which forms the basis for claims 3 and 4. The Complaint alleges that Defendants have stated
that the data base was “unsecured” and was left “with default password on database....” Complaint
_____________________________________________________________________________________________
DEFENDANTS’ OPPOSITION TO PLAINTIFF’S MOTION FOR PRELIMINARY INJUNCTION PAGE 8
167
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 24 Filed onPage: 168in TXSD
10/05/22 Date Filed:
Page11/11/2022
9 of 15
Reinforcing the policy undergirding hiQ Labs, Inc. v. LinkedIn Corp, the Supreme Court,
in Van Buren v. United States, 141 S. Ct. 1648 (2021), narrowed what would be considered hacking
in a different respect. While Defendants vehemently deny hacking any computers, including
Konnech’s servers, Van Buren demonstrates that courts should read the federal statute narrowly.
Particularly since being sued by Konnech, True the Vote has examined and monitored
Konnech’s website. This monitoring led to the identification of a document which demonstrates
that Plaintiff does not believe the truth of the central allegation that it made against True the Vote
In response to criticism of Konnech by True the Vote occurring on August 13, 2022,
Attachment II).
The document THE TRUTH ABOUT KONNECH admits that Plaintiff does not accually
Accusation: True the Vote claims to have downloaded personal data on 1.8 million U.S.
China.
Truth: Konnech thoroughly investigated True the Vote’s claims and found no
(emphasis added).]
3
Konnech’s Complaint states: “All of Konnech’s U.S. customer data is secured and stored
exclusively on protected computers located within the United States.” Complaint para. 2. If that
were true, Konnech would have had no reason to deny that its data was breached “anywhere in the
_____________________________________________________________________________________________
DEFENDANTS’ OPPOSITION TO PLAINTIFF’S MOTION FOR PRELIMINARY INJUNCTION PAGE 9
168
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 24 Filed on Page: 169in TXSD
10/05/22 Date Filed:
Page11/11/2022
10 of 15
Since Konnech believed and publicly represented that “Konnech thoroughly investigated”
and “found” that there was “no evidence whatsoever of any breach” then there was no basis
whatsoever for its suit and much less, the seeking of a TRO to prevent imminent release of
Konnech’s data.
The file date on that posting was September 10, 2022 — just two days before it filed its
Complaint and Motion for Injunctive Relief. That document has since been scrubbed – removed
Importantly, it appears the Complaint has been worded carefully to avoid making an
express misrepresentation to the Court that Defendants actually hacked Konnech’s servers —
only alleging that Defendants claimed that they hacked the Konnech server. To be sure, there are
multiple allegations that seem designed to give the Court the distinct impression that such hacking
actually occurred (e.g., “Defendants know what they are doing is wrong...” Complaint para. 10),
while steering clear of a clearly fabricated allegation. And Konnech denies having a server in
China, which is what Plaintiff alleges that Defendants claim to have hacked. Complaint para. 40.
Lastly, Konnech asserts “all of Konnech’s U.S. customer data is secured and stored exclusively on
protected computers located within the United States.” Complaint para. 25. 5
world.” In any event, it is not true that Konnech’s data is secured and stored exclusively in the
United States, as clearly alleged by the Los Angeles County District Attorney.
4
A similar inconsistency was revealed in the Complaint, whereby Konnech accused
Defendants of falsely claiming “they have obtained financial and other sensitive personal data of
1.8 million U.S. poll workers — including social security numbers, phone numbers, email
addresses, and banking information — from Konnech’s protected computers.” Complaint para. 6.
Then Konnech claims that “it never managed customer data for that many poll workers or even a
small percentage of that many poll workers” which would undermine its allegation that it was
hacked. Id. Putting aside the fact that Konnech never obtained such data or claimed that it did, if
the Plaintiff knew this claim to be false as impossible, how could that justify a TRO?
5
It is not at all clear that Konnech’s vague and conclusory allegation that it expended
$5,000 in investigating the matter satisfies the jurisdictional requirement in 18 U.S.C. § 1030.
_____________________________________________________________________________________________
DEFENDANTS’ OPPOSITION TO PLAINTIFF’S MOTION FOR PRELIMINARY INJUNCTION PAGE 10
169
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 24 Filed on Page: 170in TXSD
10/05/22 Date Filed:
Page11/11/2022
11 of 15
Thus, Plaintiff alleges (falsely) that the Defendants claimed that they hacked Plaintiff’s
computers, but do not allege actual hacking and publicly have stated that it has not been hacked.
Plaintiff cannot have it both ways. Section 1030 requires a person to actually access a protected
computer without authorization, and Plaintiff never alleges facts describing this sine qua non of a
violation of that statute. Thus, Plaintiff has failed to allege a prima facie case of a violation of §
1030.
Consequently, without a properly pled federal claim, this Court lacks jurisdiction over this
matter under 28 U.S.C. § 1331, nor does it have supplemental jurisdiction over any of the
remaining state law claims. Plaintiff’s alternative assertion of diversity jurisdiction under 28
U.S.C. § 1332 also fails because there is no allegation of any amount in controversy anywhere in
VII. Konnech Is Seeking to Have this Court Enjoin Investigation into Election Fraud.
The document THE TRUTH ABOUT KONNECH describes claims of election fraud as
“disproven conspiracy theories.” Attachment II. This ipse dixit assertion lacks specific
substantiation. The fact that it can be stated as though it were a self-evident truth testifies to the
powerful forces which shape “the narrative” through those persons who “won” the 2020 election
and now exert influence over social media and the mainstream press, to oppose any investigation
into the legitimacy of United States elections — powerful forces with which Konnech has now
allied itself.
Despite repeated assertions of “debunked” election fraud claims, the truth is that almost no
claims have been ruled upon in court. Most courts have not ruled on the merits of election fraud
cases that have been brought but have ruled based on standing. By one analysis, 92 cases were
_____________________________________________________________________________________________
DEFENDANTS’ OPPOSITION TO PLAINTIFF’S MOTION FOR PRELIMINARY INJUNCTION PAGE 11
170
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 24 Filed on Page: 171in TXSD
10/05/22 Date Filed:
Page11/11/2022
12 of 15
filed, but only 30 decided on the merits, and those bringing claims of vote fraud prevailed in some
The Complaint states “[t]he theories peddled in 2000 Mules, however, have been
repeatedly disproven.” Complaint para. 4. There Konnech cites articles by three mainstream
media outlets (Reuters, Associated Press, and The Washington Post) and a government-owned
media outlet (NPR). Most of the criticisms about True the Vote’s research into dropbox abuse
using geospatial data, the findings of which were featured in the 2000 Mules movie, involved
speculation about the limitations of cell phone data. Such criticisms constituted only nibbling
around the edges of the film. In no way have these criticisms disproven True the Vote’s findings
True the Vote has been investigating the election fraud that occurred in the November 2020
election, and that much evidence of that fraud has been assembled despite the best efforts of
powerful forces to shut down any investigation. Konnech describes election fraud as being
advanced only by “conspiracy theorists and con artists” with “recklessness and disdain for the
truth.” Complaint para. 9. If Konnech has no involvement in voter registration, ballot counting,
or reporting in the 2020 elections, and if it did nothing other than assist with management of poll
workers, why would it feel necessary to so strongly defend the integrity of those elections in its
filings? 7 If those who believe claims of election fraud are bogus and easily disproved, why would
they not welcome, rather than try to shut down, every such investigation?
6
See 2020 US Presidential Election Related Lawsuits (as of 7-29-22). See also Dr. John
R. Lott, “Simple tests for the extent of vote fraud with absentee and provisional ballots in the 2020
US presidential election,” Public Choice, forthcoming (May 12, 2022) (“The estimates for
Arizona, Georgia, Michigan, Nevada, Pennsylvania, and Wisconsin combined indicate between
146,000 and 334,000 excess votes for Biden.”)
7
The notion that claims of election fraud leading to the election of President Biden in 2020
are new, novel, conspiratorial, and irrational is readily disproved by a brief video compiling the
_____________________________________________________________________________________________
DEFENDANTS’ OPPOSITION TO PLAINTIFF’S MOTION FOR PRELIMINARY INJUNCTION PAGE 12
171
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 24 Filed on Page: 172in TXSD
10/05/22 Date Filed:
Page11/11/2022
13 of 15
Konnech alleges at page 10 of its Motion that, “Konnech has suffered loss in an amount
exceeding $5,000 in a one-year period, because it has been required to investigate and assess
Defendants’ claims, it has been required to conduct additional costly security audits, and it has
expended other resources in responding to and assessing the need to remediate the offense. (Motion
for TRO, Ex. A, Yu Aff. at ¶ 6.)” But Defendants did not cause an audit at Konnech. Konnech’s
THE TRUTH ABOUT KONNECH admits that there simply was no “offense” to “remediate” and
It’s important to point out that in addition to Konnech’s own rigorous security
measures, our systems and software are subject to security audits, penetration
testing, source code reviews and similar efforts required periodically by individual
customers in the U.S. and other markets and carried out by their own third-party
experts. Konnech has never failed such a review over the course of our two decades
in business.
(Emphasis added).
Despite this demonstrably false allegation, Konnech seeks to order “Defendants to
confidentially disclose to Konnech how, when, and by whom its servers were accessed without
maintain the integrity of the data therein in light of the upcoming midterm elections.” Motion, pg.
15. This request is without merit given Konnech’s public admission that “Konnech thoroughly
investigated True the Vote’s claims and found no evidence whatsoever of any breach of our
systems or Konnech data anywhere in the world.” This is an admission against interest.
instances in which the very same politicians (e.g., President Joe Biden, President Jimmy Carter,
former Presidential candidate Hillary Clinton, Vice President Kamala Harris, Senator Chuck
Schumer, Senator Elizabeth Warren) and media outlets (e.g. CNN, MSNBC, Washington Post)
now claiming that any questioning of the 2020 election is a “CONSPIRACY THEORY” boldly
asserted that the 2016 election was “stolen,” caused by Russian “hacking” and election fraud,
resulting in the election of an “illegitimate President” — President Trump — in 2016.
_____________________________________________________________________________________________
DEFENDANTS’ OPPOSITION TO PLAINTIFF’S MOTION FOR PRELIMINARY INJUNCTION PAGE 13
172
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 24 Filed on Page: 173in TXSD
10/05/22 Date Filed:
Page11/11/2022
14 of 15
CONCLUSION
Defendants respectfully request the Court to deny Plaintiff’s Motion for a Preliminary
Injunction, and terminate the Temporary Restraining Order entered on September 12, 2022.
_____________________________________________________________________________________________
DEFENDANTS’ OPPOSITION TO PLAINTIFF’S MOTION FOR PRELIMINARY INJUNCTION PAGE 14
173
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document 24 Filed on Page: 174in TXSD
10/05/22 Date Filed:
Page11/11/2022
15 of 15
CERTIFICATE OF SERVICE
I certify that on October 5, 2022, I electronically filed the foregoing with the Clerk of the
Court using the CM/ECF system, which will send notification of such filing to all counsel of
record.
_____________________________________________________________________________________________
DEFENDANTS’ OPPOSITION TO PLAINTIFF’S MOTION FOR PRELIMINARY INJUNCTION PAGE 15
174
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page:
24-1 Filed on 175 inDate
10/05/22 TXSD Filed: 11/11/2022
Page 1 of 3
ATTACHMENT I
175
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page:
24-1 Filed on 176 inDate
10/05/22 TXSD Filed: 11/11/2022
Page 2 of 3
da.lacounty.gov /media/news/head-election-worker-management-software-arrested-connection-theft-personal-data
News Releases
Contact:
Media Relations Division
(213) 257-2000
Media@da.lacounty.gov
Los Angeles County District Attorney George Gascón announced today that an executive with a Michigan-
based company responsible for the software used in managing Los Angeles County election poll workers
has been arrested as part of an investigation into the possible theft of personal identifying information of
those workers.
“I want to thank my prosecutors and investigators for their commitment to eliminating cyber intrusions against
government entities and local businesses,” District Attorney Gascón said.
“Data breaches are an ongoing threat to our digital way of life. When we entrust a company to hold our
confidential data, they must be willing and able to protect our personal identifying information from theft.
Otherwise, we are all victims.
This investigation is concerned solely with the personal identifying information of election workers. In this
case, the alleged conduct had no impact on the tabulation of votes and did not alter election results. But
security in all aspects of any election is essential so that we all have full faith in the integrity of the election
process.”
Earlier today, Konnech Chief Executive Officer Eugene Yu was taken into custody on suspicion of theft of
personal identifying information by investigators from the District Attorney’s Office Bureau of Investigation
with assistance from the Meridian Township Police Department in Michigan. In addition, hard drives and
other digital evidence were seized by LADA investigators.
176 1/2
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page:
24-1 Filed on 177 inDate
10/05/22 TXSD Filed: 11/11/2022
Page 3 of 3
District Attorney investigators found that in contradiction to the contract, information was stored on servers in
the People’s Republic of China.
The East Lansing Police Department and Ingham County Sheriff’s Office in Michigan also assisted in the
investigation.
October 4, 2022
177 2/2
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page:
24-2 Filed on 178 inDate
10/05/22 TXSD Filed: 11/11/2022
Page 1 of 4
ATTACHMENT II
178
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page:
24-2 Filed on 179 inDate
10/05/22 TXSD Filed: 11/11/2022
Page 2 of 4
Konnech Inc. provides election logistics software used by U.S. cities and counties to recruit,
train and schedule poll workers; coordinate the distribution of equipment and supplies to polling
places; and dispatch support personnel to address technical and other issues. Konnech’s
software products are not involved in any way in the registration of voters, the production,
distribution or processing of ballots, or the collection, counting or reporting of votes.
On August 13, 2022, True the Vote, a group dedicated to perpetuating disproven conspiracy
theories regarding the 2020 U.S. presidential election, launched an attack against Konnech
claiming, among other things, that our company is affiliated with the Chinese Communist Party
and stores personal information about American poll workers on servers in China. To be clear,
these and other defamatory allegations being widely disseminated by True the Vote and its
founders and adherents are categorically and demonstrably false. Sadly, they are also clearly
based on ignorance, racism and xenophobia.
We are working closely with federal and other law enforcement agencies in connection with this
attack and related threats being made against our employees and families. As always, we are
continuing to take all necessary steps to ensure the security and integrity of our systems and
data. And we intend to pursue every avenue open to us to halt the blatant spread of
misinformation about our company, and the continued attacks on our nation’s democratic
institutions, dedicated election officials and organizations like Konnech that make it their mission
to uphold and support them.
These are just some of the false and malicious claims True the Vote and its followers
have made against Konnech, along with the facts:
Accusation: True the Vote and its adherents claim without any basis that Konnech is affiliated
with the Chinese Communist Party.
Truth: Konnech Inc. is 100% owned by U.S. citizens. Its founder and CEO, Eugene Yu,
immigrated to the United States from China in 1986. He was naturalized as a
U.S. citizen in 1997 and relinquished his Chinese citizenship in the process.
Neither he nor Konnech have ever had any association with the Chinese
Communist Party.
Accusation: True the Vote claims to have downloaded personal data on 1.8 million U.S. poll
workers early in 2021 from an unsecured Konnech server in Wuhan, China.
Truth: Konnech thoroughly investigated True the Vote’s claims and found no evidence
whatsoever of any breach of our systems or Konnech data anywhere in the
world.
Konnech has never stored customer data on servers in China. Konnech stores all
customer data exclusively in its country of origin. This means that data belonging
to Konnech’s U.S. customers is stored on secure servers within the United
States. It never leaves the U.S.
True the Vote could not have downloaded data on 1.8 million U.S. poll workers
from a Konnech server in early 2021 as they claim. Konnech’s poll worker
Page 1 of 3
179
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page:
24-2 Filed on 180 inDate
10/05/22 TXSD Filed: 11/11/2022
Page 3 of 4
management software at that time maintained records on fewer than 250,000 poll
workers—a far cry from the 1.8 million True the Vote purports to have found and
illegally downloaded. But even more important, these records do not exist
anywhere in a single database; software and data belonging to each customer
are managed and maintained in separate, secure databases completely
segregated from the software and data of other customers. There is no single
repository of customer data, and no single password as True the Vote’s claims
suggest.
Accusation: True the Vote supporters claim to have accessed the data using a default
password, implying that Konnech does not adequately safeguard customers’
data.
Truth: Konnech does not use default passwords. The information True the Vote’s
supporters claim to have found cannot be accessed by a single password
because data and software belonging to each customer are managed and
maintained in separate, secure databases.
It’s important to point out that in addition to Konnech’s own rigorous security
measures, our systems and software are subject to security audits, penetration
testing, source code reviews and similar efforts required periodically by individual
customers in the U.S. and other markets and carried out by their own third-party
experts. Konnech has never failed such a review over the course of our two
decades in business.
Accusation: True the Vote claims that Konnech stored U.S. election information “on the same
server in China that runs the Chinese Communist Party elections.”
Truth: Konnech has never stored any customer data on Chinese servers.
Accusation: Konnech outsources the coding of software for U.S. elections to developers in
China.
Konnech made the decision to close Jinhua Konnech in early 2020 in response
to changing business needs and the increasingly challenging environment for
Page 2 of 3
180
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page:
24-2 Filed on 181 inDate
10/05/22 TXSD Filed: 11/11/2022
Page 4 of 4
U.S. companies doing business in China. It completed the process in 2021 and
no longer has any employees in China.
Accusation: People associated with True the Vote suggest that Konnech “ballot-counting”
software was used to manipulate the results of the 2020 U.S. presidential
election in favor of Joe Biden.
Truth: Konnech has never provided ballot counting software to any client anywhere in
the world. Konnech software is not involved in any way in the collection,
processing, tabulation or reporting of votes by any U.S. election authority.
Accusation: True the Vote alleged that Konnech was hired to build a communications
platform for the Confucius Institute, a controversial organization affiliated with the
Chinese Government.
Accusation: True the Vote notes that Konnech founder and president Eugene Yu is on the
board of the online voting company Votem, implying that there is something
improper about his relationship with the company.
Truth: In 2016, Konnech sold 100% of its North America ABVote business to Ohio-
based Votem Corp. ABVote was a secure software platform used by two
jurisdictions to facilitate online absentee ballot requests for military, overseas and
disabled voters in response to the MOVE Act of 2009. Eugene Yu remained a
member of Votem’s board of advisors until early 2021 to enable the company to
continue to benefit from his insight and years of experience in the field.
###
Page 3 of 3
181
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page:
24-3 Filed on 182 inDate
10/05/22 TXSD Filed: 11/11/2022
Page 1 of 1
KONNECH, INC., §
§
Plaintiff, §
§ Civil Action No. 4:22-cv-03096
v. §
§
TRUE THE VOTE, INC., et al., §
§
Defendants. §
ORDER
The matter came before the Court on Plaintiff’s Motion for a Temporary Restraining Order
and Preliminary Injunction (#5), and the Defendants’ Opposition (filed 10/5/22) thereto, and
Plaintiff’s Motion to Show Cause and Contempt (#16) and the Defendants’ Response thereto
(#19), and argument of counsel heard today, it is, this day ___ of October, 2022 by the Court,
ORDERED that:
1. The Temporary Restraining Order entered ex parte by the Court on September 12,
_____________________________
KENNETH M. HOYT
U.S. District Court Judge
182
Case: 22-20578 Document: 00516542768 Page: 183 Date Filed: 11/11/2022 1
183
Case: 22-20578 Document: 00516542768 Page: 184 Date Filed: 11/11/2022 2
1 APPEARANCES - CONTINUED
2
3
4 OFFICIAL COURT REPORTER:
5 Mayra Malone, CSR, RMR, CRR
U.S. Courthouse
6 515 Rusk
Room 8004
7 Houston, Texas 77002
713-250-5787
8
9
10 Proceedings recorded by mechanical stenography. Transcript
produced by computer-aided transcription.
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
184
Case: 22-20578 Document: 00516542768 Page: 185 Date Filed: 11/11/2022 19
185
Case: 22-20578 Document: 00516542768 Page: 186 Date Filed: 11/11/2022 22
186
Case: 22-20578 Document: 00516542768 Page: 187 Date Filed: 11/11/2022 25
14:29 1 there and then for them to say, Well, you know, the judge
2 withheld this information from whatever. I mean, don't you
3 think that if the FBI -- let me ask it this way: Did
4 Mr. Phillips tell the FBI that he has been sued by Konnech? Or
14:30 5 do you know?
6 MR. AKERS: Would you ask that question again?
7 THE COURT: Oh, I'm sorry. Did Mr. Phillips -- or has
8 Mr. Phillips or Ms. Engelburt -- Engelbrecht -- I'm sorry --
9 told the FBI that they have been sued about this and that they
14:30 10 need to be -- need to have the backing of the FBI to stand in
11 the position they are standing in?
12 MR. AKERS: Yes, we have.
13 THE COURT: They have told them that?
14 MR. AKERS: Yes.
14:30 15 THE COURT: You did that?
16 MR. AKERS: Yes.
17 THE COURT: And what was the response from the FBI?
18 MR. AKERS: I was told by a different office --
19 THE COURT: What do you mean "different office"? The
14:30 20 people you reported it to was one place. The response came
21 from a different place. Is that what you mean?
22 MR. AKERS: Yes.
23 THE COURT: Okay. Go ahead.
24 MR. AKERS: That they were not interested in the
14:30 25 protection of this information.
187
Case: 22-20578 Document: 00516542768 Page: 188 Date Filed: 11/11/2022 28
188
Case: 22-20578 Document: 00516542768 Page: 189 Date Filed: 11/11/2022 33
14:40 1 lawsuit was filed, they are saying they were not hacked.
2 Nothing happened in those two days.
3 THE COURT: I don't know that that's what that says.
4 In the face of your client's own admission, I don't know that
14:41 5 that is what is being said. I don't need to decide that issue
6 though.
7 MR. AKERS: We don't have admissions from my client
8 that says that they have improperly gotten into their
9 computers.
14:41 10 THE COURT: You know, if I walked out on the street
11 and some guy says, I have got three brand new suits in the
12 trunk of my car. I will let you have them for $100 apiece.
13 And I walk over and I look at them. And I said, Tell you what,
14 I will give you $75 apiece for them. He says, Fine. I give
14:41 15 him the money. Walk away with the three suits.
16 Am I a thief or not? What does the law say about
17 me buying stolen goods?
18 MR. AKERS: As it relates to computer data, the U.S.
19 Supreme Court has issued a case in 2021 called Van Buren versus
14:42 20 the United States which dramatically narrows what would be
21 considered hacking.
22 THE COURT: I didn't say anything about hacking. I'm
23 giving you an example of having access and taking data that
24 someone else has taken or come into and saying, Well, I didn't
14:42 25 do it. That's what the guy says: I didn't steal anything. I
189
Case: 22-20578 Document: 00516542768 Page: 190 Date Filed: 11/11/2022 38
190
Case: 22-20578 Document: 00516542768 Page: 191 Date Filed: 11/11/2022 50
15:04 1 and call him, and I'm going to sit right here until I know it's
2 done.
3 MR. AKERS: I have the name.
4 THE COURT: I'm sorry?
15:05 5 MR. AKERS: I said I have the name.
6 THE COURT: Well, then deliver it.
7 MR. AKERS: I need to look it up.
8 THE COURT: And if there are any other names --
9 (Simultaneous crosstalk)
15:05 10 THE COURT: Let me just finish. If there are any
11 other names associated with this Dallas group, those names are
12 to be turned over. And I understand that I'm hearing you say
13 there is only one name that you have.
14 (Mr. Akers hands Mr. Pamphilis a piece of paper)
15:06 15 MR. AKERS: For the record, I just handed him the
16 name.
17 THE COURT: All right.
18 MR. PAMPHILIS: Your Honor, I would prefer that the
19 name be read by him into the record so that there is no dispute
15:06 20 about the name that I was given.
21 THE COURT: I don't think I have my copy here.
22 MR. AKERS: I have mine electronically.
23 THE COURT: Say what?
24 MR. AKERS: I have a copy of my letter electronically.
15:06 25 THE COURT: You need to read it for the record then.
191
Case: 22-20578 Document: 00516542768 Page: 192 Date Filed: 11/11/2022 54
15:10 1 submitted.
2 THE COURT: All right. I will not stand in the way of
3 lawyers filing responses or replies. He's filing a response.
4 You would be filing a reply to the response, and I'm saying
15:10 5 that I will not delay considering this matter waiting on a
6 reply. If you want to file it, that's fine.
7 MR. AKERS: Understood.
8 THE COURT: Thank you, gentlemen.
9 MR. PAMPHILIS: Thank you, Your Honor.
10 (Court adjourned at 3:10 PM)
11 * * * *
192
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 33 Filed onPage: 193 in TXSD
10/17/22 Date Filed:
Page11/11/2022
1 of 3
United States District Court
Southern District of Texas
ENTERED
UNITED STATES DISTRICT COURT October 17, 2022
SOUTHERN DISTRICT OF TEXAS Nathan Ochsner, Clerk
HOUSTON DIVISION
KONNECH INC., §
§
Plaintiff, §
§
VS. § CIVIL ACTION NO. 4:22-CV-03096
§
TRUE THE VOTE INC., et al., §
§
Defendants. §
I.
On September 12, 2022, the Court entertained an ex parte temporary restraining order
[“TRO”] [DE 9]1, that arises as a result of the plaintiff’s, Konnech, Inc., [“Konnech”], original
complaint [DE 1] and motion for a temporary restraining order and request for a preliminary
injunction [DE 5]. The Court granted Konnech’s motion for a TRO.
II.
After a review of the tendered documents, the Court determined that a TRO should issue
against the defendants, True the Vote, Inc., Gregg Phillips and Catherine Engelbrecht, because the
documents presented and the arguments of counsel substantiated Konnech’s claims that: (a) there
is a substantial likelihood that Konnech will succeed on the merits of its claims; (b) immediate and
irreparable injury or harm will be suffered by Konnech if a TRO were not issued: (1) in that the
defendants have obtained unauthorized access to Konnech’s protected computers and/or data and
1
Konnech filed a motion for emergency consideration of its request for a preliminary injunction and for contempt
[DE 17]. Consideration of that motion is subsumed in this order to show cause. A preliminary injunction will issue
shortly.
1/3
193
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 33 Filed onPage: 194 in TXSD
10/17/22 Date Filed:
Page11/11/2022
2 of 3
plans to publicly disclose private and confidential information that the defendants admit they
obtained unauthorizedly; (2) their plan will interfere with Konnech’s business contracts by
destroying trust in Konnech’s business reputation; (3) the harm to Konnech outweigh and harm
the defendants might suffer if the TRO is granted; and, (4) to issue a TRO is in the public’s best
interest because the private/confidential data of the individuals could potentially be released which
III.
The Court set a hearing on Konnech’s motion for a preliminary injunction on September
26, 2022, at 11:30 a.m., Courtroom 11A. In the interim, the parties entered into a stipulation to
reset the hearing for October 6, 2022, and to continue the TRO “until the earlier of the date when:
(a) the Parties enter into an agreed Preliminary injunction that is signed by the Court; or (b) the
Court has ruled on Konnech’s Motion for preliminary injunction. See [DE 20].
In addition to the stipulation, concerning the time for the hearing and extending its terms,
counsel for the defendant filed a “sealed” letter with the Court responding, in part, to the Court’s
TRO. The defendants refused to identify the source of its data, arguing that to do so would hinder
IV.
On September 21, Konnech filed its motion to show cause and for contempt against the
defendants [DE 16]. The defendants filed a response to the motion [DE 19] and the Court received
arguments from counsel from all parties. Konnech contends that the defendants’ have failed to
comply with “subsections V, VI and VII of the TRO.” Those subsections state that the defendants
are:
194
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 33 Filed onPage: 195 in TXSD
10/17/22 Date Filed:
Page11/11/2022
3 of 3
In response, the defendants, through counsel assert that the allegations made by Konnech
are untrue and the defendants had no problem complying with the TRO; the defendants turned
over their data and information to the FBI; the defendants believe that to turn over the name of the
individual from who they acquired their data, has significant national security and law enforcement
implications, and the defendants assert that pursuant to Title 18 U.S.C. § 798, they have a greater
duty to the United States not to make the name of the individual available to Konnech. The
defendants did not address further the Court’s TRO as it relates to subsections V, VI or VII.
V.
Based on the status of the record and the conduct of the defendants, the Court is of the
opinion that the defendants have failed and refused to comply with the TRO and ORDERS that
the defendants and their counsel appear in Courtroom 11-A on the 27th day of October, 2022, at
11:00 o’clock a.m., the United States Courthouse, 515 Rusk, Houston, Texas to show cause why
they should not be held in contempt of Court for failing to comply with the TRO entered in this
case.
It is so ORDERED.
_________________________________
Kenneth M. Hoyt
United States District Judge
3/3
195
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 46 Filed onPage: 196 in TXSD
10/28/22 Date Filed:
Page11/11/2022
1 of 2
KONNECH, INC., §
§
Plaintiff, § Civil Action No. 4:22-cv-03096
§
v. §
§
TRUE THE VOTE, INC., et al., §
§
Defendants. §
Defendants submit the attached exhibits in their request to purge contempt in advance of
the hearing set to resume October 31, 2022. To that end, Defendants submit the following:
B. Affidavit of Catherine Engelbrecht with text exchanges with FBI Special Agents;
196
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 46 Filed onPage: 197 in TXSD
10/28/22 Date Filed:
Page11/11/2022
2 of 2
Respectfully submitted,
CERTIFICATE OF SERVICE
I certify that a true and correct copy of this document was served upon counsel of record
on this 28th day of October, 2022.
PAGE 2 OF 2
197
Case:
Case22-20578 Document:
4:22-cv-03096 00516542768
Document Page:
46-1 Filed on 198 inDate
10/28/22 TXSD Filed: 11/11/2022
Page 1 of 3
EXHIBIT A
198
Case:Case 4:22-cv-03096
22-20578 Document
Document: 46-1 Filed on
00516542768 10/28/22
Page: 199 in TXSD Page11/11/2022
Date Filed: 2 of 3
199
Case:Case 4:22-cv-03096
22-20578 Document
Document: 46-1 Filed on
00516542768 10/28/22
Page: 200 in TXSD Page11/11/2022
Date Filed: 3 of 3
200
Case: 22-20578 Document: 00516542768 Page: 201 Date Filed: 11/11/2022 1
13
14 *******************************************************
15 APPEARANCES:
16 FOR THE PLAINTIFF:
17 Mr. Constantine Z. Pamphilis
MR. Nathan Richardson
18 Kasowitz Benson Torres LLP
Wedge International Tower
19 1415 Louisiana
Suite 2100
20 Houston, TX 77002
713-220-8852
21 Email: Dpamphilis@kasowitz.com
22
23 Proceedings recorded by mechanical stenography.
24 Transcript produced by computer-assisted transcription.
25
201
Case: 22-20578 Document: 00516542768 Page: 202 Date Filed: 11/11/2022 2
202
Case: 22-20578 Document: 00516542768 Page: 203 Date Filed: 11/11/2022 7
203
Case: 22-20578 Document: 00516542768 Page: 204 Date Filed: 11/11/2022 8
204
Case: 22-20578 Document: 00516542768 Page: 205 Date Filed: 11/11/2022 16
1 that, Judge.
2 THE COURT: All right. Irrespective as to how
3 this might be handled by the clerk's office, the Court is
4 going to deny your motion as it relates to opposed -- as
09:30:55 5 your opposed motion or your motion opposing the -- the --
6 placing, should I say, the picture under seal.
7 MR. WYNNE: Yes, sir.
8 THE COURT: And further, and finally, anything
9 else?
09:31:09 10 MR. PAMPHILIS: Not from the plaintiff, Your
11 Honor.
12 MR. WYNNE: May I confer with co-counsel one
13 moment?
14 THE COURT: Sure. Sure.
09:31:30 15 MR. WYNNE: Nothing further, Your Honor.
16 THE COURT: Then the Court, having previously
17 found the Defendants Gregg Phillips and Catherine
18 Engelbrecht in contempt for failure to comply with the
19 Court's ex parte temporary restraining order that address
09:31:45 20 unauthorized access by the Defendants, their agents,
21 assigns, or entities, on the plaintiff's protected computer
22 network, the return of all data belonging to Konnech, the
23 disclosure and/or the identity of all persons, entities who
24 had or have possession, custody, control, or access to any
09:32:03 25 information located on Konnech's protected computers, and
205
Case: 22-20578 Document: 00516542768 Page: 206 Date Filed: 11/11/2022 17
206
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 51 Filed onPage: 207 in TXSD
10/31/22 Date Filed:
Page11/11/2022
1 of 2
United States District Court
Southern District of Texas
ENTERED
October 31, 2022
UNITED STATES DISTRICT COURT
Nathan Ochsner, Clerk
SOUTHERN DISTRICT OF TEXAS
HOUSTON DIVISION
KONNECH INC., §
§
Plaintiff, §
§
VS. § CIVIL ACTION NO. 4:22-CV-03096
§
TRUE THE VOTE INC., et al., §
§
Defendants. §
The Court having previously found the defendants, Gregg Phillips and
Catherine Engelbrecht, in contempt for failure to comply with the Court’s ex parte
network; (b) the return of all data belonging to Konnech; (c) the disclosure and/or
the identity of all persons, entities who had or have possession, custody, control or
computers were access. The Court finds that, although time to cure and thereby
render the holding of contempt moot was provided, the defendants have yet to
1/2
207
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 51 Filed onPage: 208 in TXSD
10/31/22 Date Filed:
Page11/11/2022
2 of 2
ORDERED detained by the U.S. Marshal for one-day and further until they fully
comply with the Court’s Order as set out in the TRO. See [DEs 8 and 9].
It is so ORDERED.
_____________________________
Kenneth M. Hoyt
United States District Judge
2/2
208
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 57 Filed onPage: 209 in TXSD
10/31/22 Date Filed:
Page11/11/2022
1 of 9
United States District Court
Southern District of Texas
ENTERED
November 03, 2022
UNITED STATES DISTRICT COURT
Nathan Ochsner, Clerk
SOUTHERN DISTRICT OF TEXAS
HOUSTON DIVISION
KONNECH INC., §
§
Plaintiff, §
§
VS. § CIVIL ACTION NO. 4:22-CV-03096
§
TRUE THE VOTE INC., et al., §
§
Defendants. §
I. INTRODUCTION
Before the Court are the plaintiff’s, Konnech, motion for a preliminary injunction
and brief in support [DE 5] and the defendants, True the Vote, Inc., Gregg Phillips and
Catherine Engelbrecht’s, opposition to Konnech’s motion [DE 24]. The parties submitted
the matters to the Court on the evidence and arguments presented in open court. After a
careful review of the motion and response and the affidavit provided by Konnech, the Court
Konnech brings this suit for injunctive relief and damages based on allegations that
the defendants violated the federal Computer Fraud and Abuse Act, [Title 18 U.S.C. § 1030
et. seq] and the Texas Harmful Access by Computer statute also codified in the Texas penal
code, [Tex. Civ. Prac. & Rem. Code § 143.001; Texas Penal Code § 33.02, respectively].
1/9
209
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 57 Filed onPage: 210 in TXSD
10/31/22 Date Filed:
Page11/11/2022
2 of 9
contracts to provides governmental entities throughout the United States with technical
assistance and software that enables the governmental entities to recruit, train and schedule
poll workers, coordinate the distribution of equipment and supplies to polling places, and
to dispatch support personnel to address technical and other issues related to staffing,
security and the handling of ballots. Konnech’s contractual duties do not include the
does it collect, count or report votes. Indeed, because Konnech does not handle ballots, it
Finally, the evidence shows that Konnech acquired its contracts with governmental
entities through public government bidding processes. Therefore, all of the data acquired
and held by Konnech was acquired from the governmental entities it serves. Hence, the
computers located in the United States. The software program created by Konnech for
polling purposes, [the Poll Chief], is a product created for governmental entities to conduct
A. Konnech’s Contentions
Konnech contends that on several occasions the defendants and others unknown to
Konnech hosted an “event” dubbed “The Pit” podcast in August 2022, where the
defendants claimed that they would disclose information acquired from Konnech’s
2/9
210
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 57 Filed onPage: 211 in TXSD
10/31/22 Date Filed:
Page11/11/2022
3 of 9
computer servers that would constitute proof that the 2020 Presidential Election was stolen
from former President Donald Trump. The event featured multiple speakers and the
defendants’ announcement of a website that they had created or was in the process of
creating, for the purpose of displaying the evidence gathered, which evidence, would prove
election fraud.
Konnech contends that following The Pit event, the defendants posted messages on
social media that defendant Phillips, “and his guys”, had successfully hacked into
Konnech’s servers and downloaded Konnech’s data. The defendants also alleged that they
had met with, or turned over to FBI agents their findings and that they would, nevertheless,
Konnech asserts that the defendants have accused Konnech and its founder, Eugene
Yu, of being a “Chinese operative, spearheading a ‘Red Chinese communist op run against
the United States.” Konnech also asserts that the defendants have publicly accused Yu of
acts of treason, espionage, bribery and election fraud, all for the purpose of enriching
the following state and federal claims in its lawuist: (1) defamation, libel and slander; (2),
tortious interference with existing and prospective business relations; (3), violating the
Computer Fraud and Abuse Act, (18 U.S.C. § 1030); (4), conspiracy to violate the
Computer Fraud and Abuse Act (18 U.S.C. § 1030); (5 and 6), computer conspiracy to gain
3/9
211
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 57 Filed onPage: 212 in TXSD
10/31/22 Date Filed:
Page11/11/2022
4 of 9
harmful access by computer (Tex. Civ. Prac. & Rem. Code, § 143.001 and Texas Penal
Code § 33.02); (7), Conversion; (8), violation of the Texas Theft Liability Act (Tex. Civ.
Prac. and Remedies Code, Chapter 134); and, (9), injunctive relief, damages, attorneys’
The defendants contend that True the Vote is a nonprofit organization that, since
2009, has worked to support election integrity. “Its mission is to promote the security and
integrity of the voting process.” The defendants have “deep concern[s] about the
Konnech has falsely accused the defendants of racism and xenophobia against Yu and the
government of China; (2), Konnech also has falsely accused True the Vote of having
“peddled” claims of election fraud to “enrich” and “profit” itself; (3), True the Vote’s
requests, under the Freedom of Information Act, to obtain “public documents from various
governmental entities” do not constitute a violation of federal or state law; (4), True the
Vote has identified “a key document” that supports its (public domain) statements that also
shows up on Konnech’s website; (5), Konnech’s pleadings, affidavit and exhibits fail to
demonstrate that its computers were hacked; (6), Konnech has failed to properly assert its
two conspiracy claims against the defendants in that they are merely agents of True the
Vote, and a corporation cannot conspire with itself. This is so because their acts are the
4/9
212
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 57 Filed onPage: 213 in TXSD
10/31/22 Date Filed:
Page11/11/2022
5 of 9
As to the federal and state claims that the defendants hacked Konnech’s computers,
the defendants assert that they did not violate the statutes. They accessed a server in China
and acquired the data for a Chinese computer, therefore, the defendants contend, Konnech
The Federal Rules of Civil Procedure, Rule 65 addresses the circumstances under
which a TRO and preliminary injunction may issue. A TRO may be issued without written
(A) specific facts in an affidavit or verified complaint show that immediate and
irreparable injury, loss, or damage will result to the movant before the
adverse party can be heard in opposition; and,
(B) the movant’s attorney certifies in writing any efforts made to give notice and
the reasons why it should be required.
FRCP, Rule 65. A motion for a preliminary injunction must, however, be set for hearing
at the earliest possible date, at which time, the Court must proceed with the motion. Id. at
65(3).
In the case at bar the attorneys for both parties entered into a stipulation agreeing
that the TRO, that was entered by the Court, would continue in effect until the Court either
dissolves the TRO or enters a preliminary injunction. The parties also agreed that
Konnech’s motion for a preliminary injunction may be submitted to the Court on the papers
Procedure, Rule 65 which requires that a movant shows that he will suffer irreparable injury
5/9
213
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 57 Filed onPage: 214 in TXSD
10/31/22 Date Filed:
Page11/11/2022
6 of 9
if an injunction is not granted; there is relatively little or no harm visited on the non-movant
by the issuance of an injunction; the public interest is not harmed by the issuance of an
injunction; and the movant will likely prevail on the merits of his lawsuit. Daniels Health
Sciences, L.L.C. v. Vascular Health Sciences., L.L.C., 710 F.3d 579, 582 (5th Cir. 2013).
Konnech’s suit asserts claims against the defendants in common law and under
Texas and federal statutes. Konnech asserts that the defendants have, by their admissions
concerning data in their possession, that they claim they acquired from a Chinese server,
admit that they are in possession of data that belongs to Konnech. This data, whether
acquired from Konnech or China, is personal and confidential to Konnech and the poll
workers of the various counties and States in the United States where the workers are
Gregg and Catherine, gc, stumble onto voting software used to coordinate
elections was left with default password or database. GC research team
discovered sensitive information on election workers, etc. on server (bank
account info, kids’ names, ssn etc-gc takes to fbi . . .
In order to establish a prima facie violation of the federal Computer Fraud and
Abuse Act, a plaintiff must present evidence that a defendant has intentionally accessed a
defendant obtained and possesses the information or data and, the plaintiff will suffer
damages or loss of at least $5,000. See Title 18 U.S.C. § 1030 (c)(4), (e)(1 and 2)(b-c).
The State of Texas, in addressing alleged unauthorized access under state law,
couples unauthorized access to another’s computer with section. 33.02(a) of the State Penal
Code. There, the Code and defines access as communicat[ing] with, stor[ing] data in,
6/9
214
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 57 Filed onPage: 215 in TXSD
10/31/22 Date Filed:
Page11/11/2022
7 of 9
See Tex. Civ. Prac. & Rem. Code § 143.001; Texas Penal Code § 33.02(a).
known to belong to Konnech, the defendants have interfered with Konnech’s lawful right
to control its own computers and data, and, moreover, protect the personal and confidential
The evidence shows that Konnech provides governmental entities in the United
States with an election logistics software, called Poll Chief, that is used by the
governmental entities to recruit, train and schedule poll workers, including other polling
duties. On or about August 13, 2022, the defendants announced that they were engaged in
an attack against Konnech, claiming that Konnech and its President, Eugene Yu, were
Chinese operatives working for the Chinese Communist Party to interfere with elections in
Since the August event, Yu asserts, without challenge, that he and his family have
been personally threatened. Moreover, Konnech and Yu are under threats as a result of the
defendants’ media events, whereby they announced their intent to release to the public all
of the data that they acquired from Konnech’s protected computers. To do so, in the
Court’s opinion, would destroy trust in the governmental entities by the public and, trust
between the governmental entities and Konnech. See [Affidavit Attached to Motion for
TRO and Preliminary Injunction, DE 5-1]. Therefore, the Court is of the view that
Konnech has demonstrated facts that support the issuance of a preliminary injunction.
7/9
215
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 57 Filed onPage: 216 in TXSD
10/31/22 Date Filed:
Page11/11/2022
8 of 9
In response, the defendants have filed an unsworn written response. And, except
for taking issue with whether they “hacked” Konnech’s computers, they do not deny the
assertions stated in Yu’s affidavit. Therefore, the Court finds that a prima facie case is
established by the documents and record, that the defendants gained unauthorized access
to Konnech’s or another’s computer(s) and obtained personal and confidential data that is
stored on Konnech’s computers. Hence, the defendants are interfering with Konnech’s
control over its protected computer data to the detriment of Konnech, the governmental
(iv) ordered to return to Konnech all property and data obtained from
Konnech’s protected computers, whether original, duplicated,
computerized, handwritten, or any other form, whatsoever obtained
from any source;
8/9
216
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 57 Filed onPage: 217 in TXSD
10/31/22 Date Filed:
Page11/11/2022
9 of 9
_______________________________
Kenneth M. Hoyt
United States District Judge
9/9
217
Case: 22-20578 Document: 00516542768 Page: 218 Date Filed: 11/11/2022 1
218
Case: 22-20578 Document: 00516542768 Page: 219 Date Filed: 11/11/2022 2
1 APPEARANCES - CONTINUED
2
3
4 FOR THE DEFENDANT GREGG PHILLIPS:
5 John C. Kiyonaga
LAW OFFICE OF JOHN KIYONAGA
6 600 Cameron Street
Alexandria, Virginia 22314
7
8
9 OFFICIAL COURT REPORTER:
10 Mayra Malone, CSR, RMR, CRR
U.S. Courthouse
11 515 Rusk
Room 8004
12 Houston, Texas 77002
713-250-5787
13
14
15 Proceedings recorded by mechanical stenography. Transcript
produced by computer-aided transcription.
16
17
18
19
20
21
22
23
24
25
219
Case: 22-20578 Document: 00516542768 Page: 220 Date Filed: 11/11/2022 3
1 PROCEEDINGS
2 THE COURT: First, before I take a break and give
3 you -- you have already had a break, but you will get another
4 one so that I can address some other issues.
5 I need to have counsel -- as soon as you can
6 clear out over here, I would appreciate it so counsel may come
7 and take their places at these tables.
8 Feel free to move to the middle table. I won't
9 have to look so far to the right.
10 The first thing I want to do here is a little
11 roll call, but then I need to take a break. The court reporter
12 needs a break, and so we are going to take a break so that we
13 can certainly be ready to hear your arguments and concerns
14 regarding this case.
15 This is Case Number 2022-3096, Konnech,
16 Incorporated, versus True the Vote, Incorporated, and others.
17 I think the others are the two individual persons, I believe,
18 Phillips and Engelbrecht, named in the original petition.
19 So let me have an announcement of persons present
20 or counsel present, particularly leading counsel. You need to
21 make your name known and then other counsel that might be
22 assisting you and so forth.
23 What is your name, sir.
24 MR. PAMPHILIS: Your Honor, Dean Pamphilis for the
25 plaintiff Konnech.
220
Case: 22-20578 Document: 00516542768 Page: 221 Date Filed: 11/11/2022 4
221
Case: 22-20578 Document: 00516542768 Page: 222 Date Filed: 11/11/2022 5
222
Case: 22-20578 Document: 00516542768 Page: 223 Date Filed: 11/11/2022 6
223
Case: 22-20578 Document: 00516542768 Page: 224 Date Filed: 11/11/2022 7
224
Case: 22-20578 Document: 00516542768 Page: 225 Date Filed: 11/11/2022 8
1 * * * *
2
3 I certify that the foregoing is a correct transcript from
4 the record of proceedings in the above-entitled cause.
5
6 Date: October 28, 2022
7
/s/ Mayra Malone
8 --------------------------------------
Mayra Malone, CSR, RMR, CRR
9 Official Court Reporter
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
225
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 14 Filed onPage: 226 in TXSD
09/14/22 Date Filed:
Page11/11/2022
1 of 5
226
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 14 Filed onPage: 227 in TXSD
09/14/22 Date Filed:
Page11/11/2022
2 of 5
EXHIBIT A
227
Case: 22-20578
Case
Case Document:
4:22-cv-03096
4:22-cv-03096 00516542768
Document
Document 14 onPage:
Filedon
9 Filed 228ininTXSD
09/14/22
09/12/22 Date Filed:
TXSD Page
Page 11/11/2022
13of
of35
United States District Court
Southern District of Texas
ENTERED
UNITED STATES DISTRICT COURT September 12, 2022
SOUTHERN DISTRICT OF TEXAS Nathan Ochsner, Clerk
HOUSTON DIVISION
KONNECH INC., §
§
Plaintiff, §
§
VS. § CIVIL ACTION NO. 4:22-CV-03096
§
TRUE THE VOTE INC., et al., §
§
Defendants. §
This cause having come before the Court on the Motion of plaintiff Konnech, Inc.
(“Konnech” or “Plaintiff”) for a Temporary Restraining Order (“TRO”), and the Court having
reviewed Plaintiff’s Original Complaint, Plaintiff’s Motion for Temporary Restraining Order and
Brief in Support (“Motion”), and the supporting affidavit of Eugene Yu, the Court finds that there
is a substantial likelihood that Konnech will suffer irreparable injury if this TRO is not granted.
Specifically, evidence was presented to the Court to substantiate Konnech’s claim that: (1)
Konnech has a substantial likelihood of success on the merits with respect to its claim against
Defendants True the Vote, Inc., Gregg Phillips, and Catherine Engelbrecht (“Defendants”) for
violation of the federal Computer Fraud and Abuse Act, 18 U.S.C. § 1030, et. seq., and the Texas
Harmful Access by Computer statute (TEX. CIV. PRAC. & REM. CODE § 143.002), as
Defendants have admitted to gaining unauthorized access to Konnech’s protected computers and
obtaining information therefrom; (2) Konnech will suffer immediate irreparable harm absent the
issuance of a TRO because there is a threat that (a) Defendants will seek unauthorized access to
Konnech’s protected computers; (b) Defendants will use and/or disclose data from Konnech’s
protected computers without authorization; (c) Defendants will interfere with Konnech’s control
1/3
228
Case: 22-20578
Case
Case Document:
4:22-cv-03096
4:22-cv-03096 00516542768
Document
Document 14 onPage:
Filedon
9 Filed 229ininTXSD
09/14/22
09/12/22 Date Filed:
TXSD Page
Page 11/11/2022
24of
of35
of its protected computers; (d) Konnech will suffer a breach of security of Konnech’s protected
protected computers; and (f) Defendants will cause a loss of confidence and trust of Konnech’s
customers, loss of goodwill, and loss of business reputation; (3) this harm outweighs any potential
harm that Defendants might suffer if a TRO was granted because Defendants will not be damaged
by being enjoined from committing further unlawful acts, by returning the property stolen from
Konnech, and by identifying how Defendants obtained data from Konnech’s protected computers
without authorization; and (4) the TRO is in the public interest because it is in the public’s interest
to enjoin conduct that the United States Congress has found to be unlawful, to prevent the
disclosure of personal identifying and banking information, and the TRO would in fact benefit the
Additionally, the evidence demonstrates that emergency conditions exist, that irreparable
harm to Konnech is threatened to imminently occur and will continue to occur unless Defendants,
and anyone acting in concert with them, are restrained, and that Konnech has no adequate remedy
at law.
Further, this Order is issued ex parte, and no notice was required to be given to Defendants
or their counsel, as there is a risk that Defendants would publicly release the information stolen
from Konnech, or otherwise destroy the evidence establishing their misconduct. It is therefore:
ORDERED that Defendants, directly or indirectly, and whether alone or in concert with
2/3
229
Case: 22-20578
Case Document:
4:22-cv-03096 00516542768
Document 14 Filed onPage: 230 in TXSD
09/14/22 Date Filed:
Page11/11/2022
5 of 5
230