If it’s “standard protocol” why did they need authorization? Authorization requires divergence from the “standard protocol”
Did they use these same Standard Protocol procedures when they found a secret server with Classified Documents in Hillary’s closet?