....state.gov servers must have logs of all emails...
The problem is, that Hillary’s private server was a completely separate operating system. She had her own email accounts and addresses, and she only shared them with her most trusted friends. It was a closed loop, with no connection with the State Dept .gov system.
The only way to break in for any records would be to seize the computers and phones of all her contacts and see if you can work backwards to uncover any traces. It doesn’t seem that the FBI is going after these people with a great deal of urgency, allowing them to cover their tracks.
Do you think somebody manually typed Top Secret documents into an email to send to Hillary? Not very likely. If the information was moved into the non-secure server electronically, then the trail will probably be discernible.
The important point is that evidence of somebody going to substantial trouble to hide the path is even more damning and indictates a conspiracty to violate our security laws.
I'm sure that the sixty or more people who were convicted of felonies during Watergate were convinced at some point that nothing would come of it. The money trail in Watergate was established due to one single check which was diverted from its proper channels into the conspirators' control. And this was in the early 1970s, before everything was computerized. Hiding Hillary's crimes is going to be quite a challenge.
Following Watergate years ago was intitially very frustrating due to the inaction of the proper authorities. Toward the end it became very entertaining seeing these same conspirators revealed for what they were. At the end there was no doubt that Nixon supported the creation of the groups that conspired and that he considered raising hush money which was in fact paid to the burglars.
Just looking at my own situation, I still own the computers that I have used since the 1980s. Each one still contains a disk which was copied later on to a successor system. This means that the oldest files exist on every system and only the files created since I last changed computers exist on only the latest computer.
The number of years which passed during Hillary's use of this server suggests that upgrades were probably made several times.
When Hillary arranged to move her "server" from Chappaqua to a private firm, what are the chances that the private firm intended to use the hardware she supplied rather than some standard configuration that they had chosen so that they would be able to maintain and backup the data and the server functionality?
My bet is that one of the first steps was to copy what existed in Chappaqua and install it on the private firms hardware until the system was ready to switch over. Only then would the Chappaqua hardware be turned off.