Thanks for your reply.
I spent 30 years in IT much of it in Systems Programming and security. As I said I don’t see how he obtained this info unless someone gave it to him.
Color me stupid.
I guess that the problem I see may not be with systems or even their inherent security the problem may very well be who decides what documents are stored on the system with a given security set up, and/or who how or why authorizes who has access to that system.
With your background, you certainly understand that you can design a system with the highest degree of security possible, but if someone gets the password out (or actually writes it on a piece of paper and tapes it about the system console) your anchor chain that supposed to hold an aircraft carrier in place against the current cannot hold a floating leaf in place.
As another poster opined, this could be standard intelligence agency operations of compromise and blackmail. An age-old standard that probably still works just as well today as it did 500 years ago.
Of course, liberals would probably say that if we threw all of our moral values out the door, then that would be great because nobody could ever get blackmailed