Father of Debbie Wasserman Schultz’s IT Aide, Imran Awan, Gave Trove of Data to Pakistani Gov/Intel

A former business partner to Haji Ashraf Awan, father of Imran Awan, an IT Aide to Debbie Wasserman Schultz and who gained “unauthorized access” to Congressional servers is alleging that a treasure trove of data secured from the server and downloaded by Imran to a USB drive is now in the possession of the Pakistani government and Pakistani intel.

Imran Awan’s Access – Keys to the Kingdom

As reported, the partner, Rashid Minhas informed The Daily Caller Foundation that:

…Imran Awan’s father, Haji Ashraf Awan, was giving data to Pakistani official Rehman Malik, and that Imran bragged he had the power to “change the U.S. president.”

Asked for how he knew this, he said that on one occasion in 2008 when a “USB [was] given to Rehman Malik by Imran’s father, my brother Abdul Razzaq was with his father.”

“After Imran’s father deliver (sic) USB to Rehman Malik, four Pakistani [government intelligence] agents were with his father 24-hour on duty to protect him,” he said. Minhas did not say what was on the USB…

The House Office of Inspector General charged in Sept. 30, 2016 that data was being funneled off the House network by the Awans as recently as September 2016 — shortly before the presidential


Continue Reading

To give one an idea of how much data may have been accessed, several members of the Awan family worked for House members as IT Aides.  According to a statement by IG, Michael Ptasienski, to the House of Representatives:

Information Technology (IT)

The role of a System Administrator is one that requires a great degree of trust and is
inherently risky due to the level of system access they have within an office. System Administrators hold the ‘keys to the kingdom’ meaning they can create accounts, grant access, view, download, update, or delete almost any electronic information within an office. Because of this high-level access, a rogue System Administrator could inflict considerable damage to an office and potentially disclose sensitive information, perform unauthorized updates, or imply export or delete files. Additionally, a rogue System Administrator could take steps to cover up his/her actions and limit the possibility that their behavior being detected or otherwise traced back to them[…]

[See Ptasienski’s statement at bottom of page or in pdf format here.]

Published on Apr 17, 2018 by The Daily Caller

In the wake of the Imran Awan scandal, the House of Representatives is scrambling to plug the holes in their IT security. Here are the highlights from that hearing and an interview with Gregg Harper (R-MS), Chairman of the House Oversight and Investigations Committee, conducted by reporter Luke Rosiak.

Then, of course, there is the matter of vetting, rather lack thereof.

About Puma ByDesign 637 Articles
Unhyphenated American female, born and raised in the Empire State and who like most New Yorkers, in spite of being a registered Democrat, I voted for the candidate, not the party which meant voting often across party lines throughout the years. In 2008, coming to terms once and for all with the fact that Democrats and I had nothing in common, I left the liberal cesspool forever. Of course, I now have a grudge to settle after decades of being lied to and so I blog to right the wrongs and expose the lies.