Monday, April 23, 2018

Fifteen Things To Know About ‘Pakistani Mystery Man’ Imran Awan

The “Pakistani Mystery Man” is Imran Awan, who worked as Rep. Debbie Wasserman Schultz’s email server administrator in the House of Representatives. Nearly his entire family then joined the payroll of other Democrats, until they worked for 1 in 5 House Democrats and had — as the House inspector general called it — the ‘keys to the kingdom‘ and ability to access any file.
1. Imran worked for Debbie Wasserman Schultz since 2004 and had the passwords to her devices
A search of his name on WikiLeaks shows the DNC summoned Imran when they needed her device unlocked.
2. During the 2016 election, the House’s Office of Inspector General warned that Imran and his family were making “unauthorized access” to data
A September 30, 2016, presentation alleged Imran Awan and his family members were logging into the servers of members who had previously fired him, funneling data off the network, and that evidence “suggests steps are being taken to conceal their activity.”
The Awan group’s behavior mirrored a “classic method for insiders to exfiltrate data from an organization,” the briefing materials allege. The presentation especially found problems on one server: that of the House Democratic Caucus, an entity similar to the DNC that was chaired at the time by then-Rep. Xavier Becerra.
3. The Awan group was left on the House computer network until February 2, 2017 — days after Donald Trump’s inauguration
Police then banned the Awan group from the network. The Committee on House Administration put out a statement saying “House Officials became aware of suspicious activity and alleged theft committed by certain House IT support staff.” Since then, no official body has ever publicly provided any information about the case. But the IG report, obtained by TheDCNF, shows that theft was not the primary issue being warned about. --->
Read the rest of the story HERE.

If you like what you see, please "Like" us on Facebook either here or here. Please follow us on Twitter here.


No comments: