Regardless of which side of the political divide you choose to support, it's clear that the discussions about the recent revelation of a thread of e-mail conversations offered in Parliament by Opposition Leader Dr Keith Rowley has provoked strong emotional reactions.
That's understandable when it comes to politics, but such sentiments are wholly out of place when it comes to the technologies underlying even such commonplace services as e-mail transmissions.
Technology is absolute. It deals in verifiable bits that either are or are not. A message either has a proper transmission header or it doesn't. If it doesn't, it's unverifiable and useless as evidence, regardless of who offers it. This may be a confusing matter for politicians, who trade in mood, feelings and allegiances, none of which have any impact on bits.
Information on the Web may have mood and feeling, but its existence is trackable and verifiable every step of the way (unless people take the trouble to use anonymisers and other identity obscuring tools).
E-mails can't just look right or wrong, they are either truly electronic transmissions and can be verified as such with a trackable footprint or they are not. It really is as simple as that.
As of this writing, there has been no public revelation by the Opposition Leader of digital copies of these alleged transmissions that might be scrutinised by authorities.
That this simple fact has not occupied a greater profile in the discourse is an illustration of the passions driving the situation and it may point to a widespread misunderstanding of the nature of e-mail, which can't simply be transposed to print while retaining its essential character.
Like much of modern technology, the humble e-mail has come to be dressed in appealing and readable skins of design, whether users choose to read their mail in a dedicated client or using Web based e-mail services.
An e-mail is far more than the words we are invited to read because this digital document, like its predecessor postal mail, travels through multiple collection and transfer points before reaching its destination.
Sitting next to the management in our living room, I'll often send an e-mail with a link to something interesting.
Depending on the state of the Internet at the precise moment I send the e-mail off, it may get rerouted halfway around the world before reaching its destination, someone sitting within reach of my outstretched hand.
Every routing that e-mail takes gets logged within the e-mail itself and provides a unique imprint of its specific source, transfer history and destination. General David Petraeus found out just how detailed that information can be to his considerable misfortune (http://ow.ly/lkvgA).
Detectives pursuing clues among physical objects look for identifying information, DNA evidence, fingerprints, materials that are out of place.
Digital detectives assigned to review these accusatory e-mails will search for much the same thing, but it will be found in the bits of digital transmission, not in paper facsimiles.
The second part of the scheduled review of Nokia's Lumia will appear next week. Read an expanded version of this column here (http://ow.ly/adAll).
?