Page:Dobbs public report.pdf/20

 The investigative team also provided a printer that had been issued to an employee for use at home for analysis to determine if it had any print logs resident in the printer’s internal memory. The lab attempted to examine the internal memory chip but was not able to retrieve any logs.

The investigative team received outside assistance with a fingerprint analysis of an item relevant to the investigation. That analysis found viable fingerprints but no matches to any fingerprints of interest.

The investigators also received outside assistance in reviewing the findings of our investigators pertaining to the operating system event logs.

II. General Findings and Recommendations.

At this time, based on a preponderance of the evidence standard, it is not possible to determine the identity of any individual who may have disclosed the document or how the draft opinion ended up with Politico. No one confessed to publicly disclosing the document and none of the available forensic and other evidence provided a basis for identifying any individual as the source of the document. While investigators and the Court’s IT experts cannot absolutely rule out a hack, the evidence to date reveals no suggestion of improper outside access. Investigators also cannot eliminate the possibility that the draft