Reading intelligence reports or briefings, then summarizing it on Clinton's server.

Getting access to the classified system then typing sections verbatim into a device such as an iPad or BlackBerry.

Taking pictures of a computer screen.

Using a thumb drive or disc to remove the information from the secure system.

The FBI is investigating whether former Secretary of State Hillary Clinton's top aides shared computer passwords as part of its probe into how classified information made the jump into Clinton's private email server,Fox quoted an intelligence source familiar with the probe as saying, "if [Clinton] was allowing other people to use her passwords, that is a big problem," since sharing of passwords is prohibited by The Foreign Service Officers Manual.Four possible scenarios were presented as to how information could have moved from the government's classified system to Clinton's unclassified one — most would have reportedly required passwords:All of the scenarios listed would have gone against nondisclosure agreements Clinton and her aides would have signed, Fox reports.Fox quoted another source as saying that only about a dozen people are being looked at, with aide Jake Sullivan described as "pivotal" because he sent a large number of emails to Clinton.The report comes just after news broke that, the State Department employee who set up Clinton's server. He has previously invoked his Fifth Amendment right against self-incrimination, leading many to believe he has information that could be damaging to Clinton.But that still might not mean Clinton would eventually be facing charges,"If prosecutors confer immunity in a case, in general it means that they at least have some intention of pursuing the matter to a grand jury. Whether they ultimately decide to pull the trigger and press charges is a whole other question," Ray said."Prosecutors are in the business of making cases — you don't hand out immunity unless the hope is it gets you additional evidence that you would not be able to get, and that [the] evidence leads towards being able to perfect a charge," Ray added.Security experts think Pagliano might know quite a bit, since there was no crew working on the server other than himself."I think of him as Sammy 'The Bull' Gravano; he knows where the bodies are buried and he could bring down the whole organization," cyber-security consultant Morgan Wright told The Hill.Pagliano would what security measures were put in place and might have been involved in discussions about what the server would be used for, said former DOJ cyber crimes prosecutor Peter Toren."Was he told, 'Oh this server is going to have confidential, or top secret, or secret State Department communications on it?'" Toren told the The Hill.