I don’t know where he’s getting this from, but if what has been reported it correct, the Awans had access to the physical IT hardware - routers, servers, etc. That is the last line of security because if you have access to the actual hardware (e.g. root user) there is nothing you can’t do. Installing keyloggers, bots, remote access servers, opening ports, etc would be the first things any evil-doer would do, and if he was also their “trusted IT guy”, who would know? We already have a pretty good sense for the technical level of politicians from knowing that Podesta used the password “password”...
I always thought Michele Bachmann was run out of Congress.(Did they try to blackmail her?) She did her best to shine a light on the Muslim Brotherhood infiltration into our government....but....John McCain and others ridiculed her for her efforts.
Oldie but goody - http://shoebat.com/2014/07/03/michele-bachmann-introducing-legislation-label-muslim-brotherhood-terrorist-organization/
How do they know if the system is not still compromised?