CCP Officials Profit From Medical Supplies Amid Pandemic | Epoch News | China Insider

00:00 CCP Officials Profit From Medical Supplies Amid Pandemic
05:45 35,000+ Australians Are Spied on by Military-Linked Chinese Company
10:38 Overseas Chinese and Foreigners Are Being Monitored Through WeChat
15:13 Cai Xia: Second-Generation Chinese Communists Question the CCP

Jiang Pengyong, a Chinese senior official’s grandson, is going public with his story of participating in a scheme to purchase personal protective equipment from foreign countries and selling them to the Chinese regime.

Jiang initially agreed to the scheme because he thought he was contributing to the nation’s epidemic crisis. Jiang owns Shenzhen Jipingyong Tech Company, a Shenzhen-based e-commerce company. He procured the medical supplies through his company that has an office in South Korea where Jiang is based.

Huang Zhongnan, his broker in China, told Jiang that the medical supplies would be donated to frontline healthcare workers or ordinary citizens who needed it to fend against the spread of COVID-19.

But Huang later revealed that the medical supplies were handed off to officials in government and foundations, who sold them for a profit.

Jiang decided to go public with his story to unveil the corruption in China.

A Chinese company with links to Beijing’s military and secretive intelligence arm has amassed the personal details of more than 35,000 Australians as part of a giant global database targeting influential figures and their families,

The company, Zhenhua Data, is tied to the People’s Liberation Army, Ministry of State Security, and the Chinese Communist Party (CCP) and has collated the profiles of 2.4 million people across the world.

The data contains information on 35,558 Australian individuals, including prominent people in politics, business, law, academia, and defence. It includes birth dates, addresses, marital statuses, and political leanings.

Bank records, job applications and psychological profiles were also included in the data, much of which was taken from public documents, including news articles, criminal records, Twitter, Facebook, LinkedIn, Instagram, and TikTok.

However, 20 percent of the data is not open source, including confidential documents, indicating that the information was obtained through hacking or the dark web.

The database was leaked by an anonymous employee of Zhenhua Data and discovered by Professor Chris Balding, who worked at Peking University until 2018 when he fled to Vietnam over safety concerns.

——————
America’s Fastest-Growing Newspaper is Now Available on Any Device: 🔵 http://ept.ms/EpochNews

#China #CCP #EpochNews

——————
SUBSCRIBE OUR CHANNEL TODAY: 🔔 https://bit.ly/EpochSubs

——————
WATCH MORE ON YOUTUBE
🔵 [Exclusive investigative report] The first documentary movie on the origin of the CCP virus 👉https://bit.ly/OriginOfVirus

🔵 [Special Report] Manipulating America: The Chinese Communist Playbook 👉 https://bit.ly/ManipulatingAmerica

🔵 New Documentary Exposing ‘the CCP Method’ | Three-step Method 👉https://bit.ly/TheCCPMethod

🔵 Special Report Exploring the Pandemic’s Wall Street Connection 👉https://bit.ly/PandemicWallStreet

🔵 Investigative Report: The Coverup of the Century 👉 https://bit.ly/CoverupOfCentury

——————
Buy the book “How the Specter of Communism Is Ruling Our World” go to
https://epochshop.com/
NEW! How the Specter of Communism Is Ruling Our World (3 Books) Paperback
——————
Sign the Petition to Investigate, Condemn, and Reject the Chinese Communist Party👉 https://rejectccp.com

View on YouTube

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.