Comey previously stated that much of the forensic reconstruction was based on recovered data fragments residing on hard drives.
How can one reconstruct server access by professional espionage agents from a hard drive full of data segments.
IT is all about logging...everything.
If one knows the password the server ain’t been hacked!