A petitioners’ witness, who claimed to be an ICT expert from Kenya, David Ayu Nyango Njoga has said the results of the last presidential election were stored in a server allegedly operated by the Independent National Electoral Commission (INEC).
Njoga, who said he came from Kenya to testify in the case, said without the INEC chairman’s permission, he could not access the said server and decrypt the documents obtained from it.
Njoga said he only got the report, which he later analysed, from a third party website : “www.factdontlieng.com”.
The witness, who claimed that the information was provided by an INEC official, stated that the said INEC official acted as anonymous person, whose name is not available.
When asked if the website belonged to INEC, he said no, but from a whistle-blower, whose name he did not know.
He said the website was created on March 12, 2019.
When reminded that the presidential election held on February 23 and the results released before March 12, the witness went mute.
Under cross-examination by Buhari’s lawyer, Chief Wole Olanipekun (SAN), the witness was confronted with some of the documents he claimed to have downloaded from INEC’s server.
He was specifically shown his Exhibit A3, which was his acclaimed state-by-state list of voters accredited through the use of card readers during the February 23 poll.
Asked to open to Ekiti State and mention the surname, middle name and the first name of a person on the list, the witness said, “If you give me the INEC server key, I will decrypt it.
“This data is encrypted for security purpose.
“I can decrypt it but I am not authorised to decrypt this data.”
Asked by All Progressives Congress’ lawyer, Lateef Fagbemi (SAN), Njoga said it was only the INEC Chairman that could give the authorisation to access the server.
“It is the data owner, the chairman of INEC, that give an authorisation.
“This implies that, professionally, if the owner of the server provides access, I will be able to decrypt, and to confirm the source of the document.”
Asked how he was able to trace the data he analysed in his report when he had yet to gain access to the server, he said, “I am well trained in data sourcing.”
“I use the scientific method,” he said.
He was asked again if using his “scientific method” to source documents from the server “without authorisation, could also be used to tamper with the content of the said server.
He said “yes”.
He said he was engaged to do the job, but was only paid for the logistics of the job.