Category: Clinton WikiLeak Emails

  • Had Access To Their Emails And Congressional Systems…

     

    We’re heard incessantly that Russians hacked the DNC.

    The FBI asked the DNC to turn over their servers, but the DNC refused.

    Maybe there’s a reason why.

    Maybe the reason that the emails were exposed had nothing to do with hacking or Russians and everything to do with Democrats leaving their computers and Congressional systems open to the unsavory people that they hired.

    From Daily Caller:

    Imran Awan — the lead suspect in a criminal probe into breaches of House of Representatives information security systems — possessed the password to an iPad used by then-Democratic National Committee Chairperson Debbie Wasserman Schultz when DNC emails were given to WikiLeaks, The Daily Caller News Foundation Investigative Group has learned.

    Wasserman Schultz resigned the DNC post in the wake of WikiLeaks posting damaging internal emails, blaming the scandal on hacking by Russians.

    But even after the scandal broke involving Imran Awan and his family allegedly breaching Congressional systems, Wasserman Schultz still was determined to retain him.

    Imran and his family members, all of whom worked as IT professionals for members of Congress, were banned from the House network Feb. 2, 2017, by the House Sergeant at Arms, but Wasserman Schultz has declined to fire him and circumvented the ban by having him “advise” her office.

    WikiLeaks emails show that although Imran was employed by her taxpayer-funded House office, the Florida Democrat’s world — and iPad — mixed DNC, House and campaign business, and that Imran was on call for, and on a first-name basis with, top DNC staff.

    Wasserman Schultz reportedly has a friendly relationship with Awan and his wife.

    But this next piece of information should send a chill down all of our spines.

    House authorities set their sights on the Awans while investigating the existence of a secret server that was funneling congressional data off-site. They also suspect Imran of stealing money and equipment. Soon after he joined Wasserman Schultz’s congressional payroll in 2005, four of his relatives and one of his friends began getting paid by House members. It is not clear whether ghost employees are part of the theft being investigated, but the family collected a combined $5 million.

    A secret server funneling congressional data off-site?

    Who were these people and what were they doing?

    Unbelievable, yet the mainstream media has been ignoring this whole story as they concentrate on smoke and Russians.

    Oh, and guess how much information the brothers had access to in Congress?

    Over the last six years, the individuals in question worked for some 80 members of Congress, all Democrats, including members of the homeland security, foreign affairs and intelligence committees. They worked for multiple members at once, since the offices did not require full-time IT services.

    All Democrats.

    As the IT professionals, as super users, they had access to and could read any emails and files saved on the computers of members’ offices.

    But despite the inappropriate access to the systems and the secret server, Representative Gregory Meeks (D-NY) doesn’t see a “smoking gun,” saying their backgrounds as “Muslim Americans” with ties to Pakistan could make them targets of false charges.

    While the Awan brothers were working for the House and pulling down six figure salaries, they were also running a car dealership that had massive debts and fraud accusations. They got a $100,000 loan from a man who is a U.S. fugitive and has connections to Hezbollah. Abid Awan also declared bankruptcy with a million in liabilities.

    Yet despite all that, they continued to work for Congress members until the scandal was exposed and they were barred in February. They still appear to work for Democrats now, such as Debbie Wasserman Schultz.

    This is an incredible lack of security and it’s all the fault of the Democrats.

    We can’t even begin to imagine what information may have exposed or stolen though this.