Bypassing security at the top levels of government is not done by the OOPS! method. To get information from a secure system to an un-secure system requires much thought, coordination, stealth, and work to get around all the safety mechanisms put in place. Here in this article by Kurt Schlichter is a great description of the steps that must be involved to accomplish this.
How Hillary Got Classified Information Onto Her Private Email

U.S. Secretary of State Hillary Clinton checks her PDA upon her departure in a military C-17 plane from Malta bound for Tripoli, Libya October 18, 2011.
REUTERS/Kevin Lamarque (LIBYA – Tags: POLITICS)
By Kurt Schlichter
Hillary Clinton’s acolytes are racing to dismiss the latest allegations that classified material was cut and pasted into her emails, but this isn’t some mere oversight that can be hand-waved away with a shrug and a sad trombone honk. One doesn’t spill classified material into an unclassified system accidentally or through mere negligence. What these new revelations show—if they are true—is conduct that was conscious, intentional, and felonious as all get-out.
In basic and open-source terms, there is no one big computer system where innocuous, unclassified material shares space with classified material. They are kept on physically separate computer systems: there is the unclassified system, and there are several classified systems. They don’t connect, unless someone chooses to intentionally connect them.
When there is spillage of classified material into unclassified systems, all hell breaks loose. Well, at least it does when it’s not a friend of the administration doing the spilling.
Filching Information from a Secure Facility
Let’s take a look at what it would take to make this happen. Hillary Clinton refused to use a secure system. She wanted to use her own system because she could control it and unlawfully shield it from the prying eyes of the American people and their representatives. Her minions therefore had to deliberately act to circumvent the rules and procedures put in place to prevent people from doing exactly what Clinton wanted done.
First, someone would have to enter a secure facility—usually called a SCIF—to access a classified document on one of the secure systems. These terminals are behind locked doors with access controls and multiple security measures. You have to have the clearance to enter, and you leave your Android, iPad, laptop, and everything else with a chip outside.
Join the conversation!
We have no tolerance for comments containing violence, racism, vulgarity, profanity, all caps, or discourteous behavior. Thank you for partnering with us to maintain a courteous and useful public environment where we can engage in reasonable discourse.