https://docs.house.gov/meetings/JU/JU00/20230621/116122/HHRG-118-JU00-20230621-SD018.pdf
This is the excerpt where he mentions the corrupted geofence data:
The alleged perpetrator uses a cell phone. Where -- that produced nothing; it's a geofence of data cell phone records?
Mr. D'Antuono. So the -- there's a lot of phone data that came in. Yes, I've
seen the same video. I've watched the same video. We put out the same video. It
looks like a phone. Was it a real phone, a not a real phone, was it a ruse? Was it
a -- you know, I picked up my phone several times at meetings going, oh, yeah, I got to
take this call, and walk out, right. The phone's not on, right. So was the person just
sitting there trying to pretend like they're on a bench taking a phone call? We don't
know until we find the person, right, and ask them those questions.
We did a complete geofence. We have complete data. Not complete, because
there's some data that was corrupted by one of the providers, not purposely by them,
right. It just -- unusual circumstance that we have corrupt data from one of the
providers. I'm not sure -- I can't remember right now which one. But for that day,
which is awful because we don't have that information to search. So could it have been
that provider? Yeah, with our luck, you know, with this investigation it probably was,
right. So maybe if we did have that -- that data wasn't corrupted -- and it wasn't
purposely corrupted. I don't want any conspiracy theories, right. To my knowledge, it
wasn't corrupted, you know, but that could have been good information that we don't
have, right. So that is painful for us to not to have that. So we looked at everything.