It is easier to cast stones than to build foundations.
Becerra has yet to answer for his outrageous conduct as a Congressman and House Democratic Caucus Chair.
As California’s top law enforcer, Cong Becerra knew, or should have known, US House policies are codified by law.
<><> House members are not allowed to accept services from people not on their payroll
<><> House employees are not permitted to log onto servers of members for whom they do not work.
<><> No scenario exists where the Awan clan’s access was even remotely appropriate.
Many House IT set-ups were “thin clients” (computers optimized for establishing remote connections w/ servers based elsewhere).
In 2016, the Pakistani Awan clan (suspected of being spies) worked as numerous House Democrats’ ITs
and used Becerra’s Democratic Caucus computers in anomalous ways:
<><> Authorities say Becerra’s entire Democratic Caucus server physically disappeared while being monitored by L/E.
<><> The Awans were using the House Democratic Caucus as their central service warehouse.
<><> The Awan clan collectively logged onto Becerra’s Caucus system 5,735 times, some 27 times per day
<><> Falsely logging onto Becerra’s laptop as system administrators.
<><> Changing their identities.
<><> Logging onto Cong Becerra’s server using 17 different user account credentials
<><> Some credentials the Paki’s used belonged to House Democrats.
<><> The Pakis did no IT work for 9 of the 17 offices to which these user accounts belonged.
<><> Investigations found “possible storage of sensitive House information” outside the House.
<><> Dropbox was installed on two Democratic Caucus computers used by the suspects.
<><> Two user accounts had thousands of files in their Dropbox folder on each computer.
<><> Using Dropbox is against House rules because it uploads files offsite.
<><> The Wash/Po reported “Based on the file names, some of the information is likely sensitive.”
<><> House computer set-ups were found to be portals to an outside computer.
<><> Awans were using terminal servers from a computer in a different location.
<><> Virtual Private Networks can make a server’s hard drive appear to be local to a computer.
<><> Remote sessions remained active for months at a time.
<><> Data was always out of [the members’] possession
<><> Other Democrat offices were accessed in total less than 60 times.
<><> The pattern of login activity suggests steps were taken to conceal the Pakis’ suspect activity.
<><> The aggregation of multiple members’ data would mean all that data was taken when the Paki’s absconded.