Because those defending Hillary refuse to dig a bit:
"We know for a fact Clinton held classified information on her private Home Brew server. We know that that Home Brew server wasn’t equipped with the proper security protocols to process or store that classified information.
I can also tell you that an organization which submitted a FOIA request specifically for Clinton’s private emails during the time frame surrounding the Benghazi attack, just received their first reply. As you might have guessed, everything they passed over was redacted and marked as classified. All of it.
Again, this isn’t a big surprise. The Secretary of State talks about classified stuff all the time, comes with the job.
What is absolutely stunning, and what makes me question whether Clinton has been so foolish as to stray into treason, is that Clinton made absolutely no attempts to secure her communications and treat them with the level of seriousness their classifications require."
Go to the link and read about the author's background -- he is knowledgeable on the subjects of classification, classified document storage, and classified networks.
Now go to the link and read about how/why layered defense is created to ensure no breach of classified materials occurs.
Also note that it is not just about emails, it is about the communications network. Again, go to the link and read.
"Phone communications is one of the easier targets to penetrate.
This is crucially important because Clinton no doubt took many phone calls in her capacity as Secretary of State which discussed classified information, including calls from places such as Benghazi, Libya.
How did she take those calls?
I can tell you that the standard procedure for this is something called a STU or STE. This is a secure phone that encrypts the call on both ends using disposable encryption, also on both ends, that is changed on a schedule in order to avoid decryption attempts.
That’s standard procedure, but again we are dealing with Hillary Clinton. From the scuttlebutt I have heard, Clinton was using an off the shelf BlackBerry – side note: ain’t that a metaphor.
Again this was all by Clinton’s own choosing, which of course was meant to protect her from legal scrutiny, to hide her actions from not only those in Congress from both parties, but the American people themselves."
I have a friend whose husband is recently retired Army General (he was a surgeon). I shared this link on my F/B, this was her response: "Geez, STU phones were a way of life for B (her husband) and those around him. She didn't use one for Benghazi calls???????? Friggin scary."
"The attack on Benghazi, once played off as a spontaneous reaction to an offensive YouTube video, could have very well be planned from information captured from the extremely vulnerable Clinton Classified Information Cloud.
It wouldn’t take an genius to connect the dots between the cyber warfare actions of China, the cozy relations between the Ministry of State Security, Pakistan’s Inter-Services Intelligence agency, and every jihadist militant between Turkey, the Mediterranean, and the Persian Gulf."
I m a Former U.S. Government IT Professional. Hillary Clinton s Email Actions Flirt With Treason.