I am no IT expert like the vast majority of our citizens, however, I do possess common sense like they do. Common sense is not goat sense, which I think the AG apparently feels we possess. If you are pursuing the conspiracy theory in the e-mails allegedly sent but where the e-mails were copied by a third party, one cannot look for carbon copies of these e-mails.
That is, word for word, capital letter for capital letter, common letter for common letter, full-stop for full-stop. To pursue that line of investigation is to deliberately have put failure as your ultimate goal, and setting free the guilty.
The alleged e-mails must be identified by key operative words and signal phrases. All e-mails which trigger such a mechanism will then be collected for investigation. Furthermore, the period of such an inquiry must cover a reasonable time span before and after the time-stamps in the alleged transcribed conspiracy.
The usage of this method forces our local authorities to accept and rely on the integrity of foreign investigators. However, the safest way is for all e-mails from those addresses over the aforementioned time span, be sent here for inspection.Since there is nothing to hide, as stated by those involved and who have already declared their innocence, other e-mail accounts held by them must also be proffered for scrutiny.
Both the police and the Integrity Commission are bound by oath of office to disregard and keep confidential e-mails not related to the specific investigation.The matter is not even in court as yet.
Hilton Charles
Via e-mail