Investigative Reporter John Solomon’s Laptop Stolen near White House

facts have value

Paul Sperry’s Notebook: Theft Near White House of Investigative Reporter John Solomon’s Laptop

By Paul Sperry, Real Clear Investigations

On the night before the Senate impeachment trial began, someone broke into veteran Washington investigative journalist John Solomon’s car parked near the White House and stole his laptop, according to a D.C. Metropolitan Police Department report obtained by RealClearInvestigations.

The computer contained notes on Ukraine and former Vice President Joe Biden and other sensitive information, Solomon, 52, said in an interview. He said he was preparing to launch a new podcast and news site at the time.

Pictured John Solomon/Gage Skidmore/Wikimedia

Though the laptop has since been recovered, the investigation is still open. “The case has been assigned a detective and is under investigation,” MPD spokesman Sean Hickman told RCI.

The Secret Service is also involved in the matter, which appears suspicious. Break-ins are rare in the high-security area where the crime occurred, just outside the White House perimeter, and a sophisticated device appears to have been used to get into the vehicle.

In the early evening of Jan. 20, the police report states, Solomon’s Apple MacBook laptop and computer bag, valued at around $1,800, were stolen from his 2019 Toyota SUV parked at 1776 F St. NW, across from the White House’s Eisenhower Executive Office Building. No windows were broken, and there were no other signs of forced entry. Authorities suspect the thief or thieves used an electronic jamming device to open the car door lock.

Solomon said that, other than the bag, nothing else was stolen from his car, including cash he used for the Metro.

The computer and bag, which also contained his U.S. Capitol press security badge, were discovered the next day nearly a block away from where his car had been parked. The contents of the bag had been dumped out on a picnic bench near the FDIC building. The location had no security cameras, so there is no known video surveillance footage that can be reviewed. Authorities described it as one of the few “dark spots” in the area.

Solomon, who noted an iPod was missing from his bag, says he is working with computer forensics experts to determine if any of his laptop information was exploited or if his hard drive was scanned within the period the laptop went missing.

“It’s a pretty professional job,” he said of the break-in, “but it’s probably just a coincidence.”

“It was probably just a street criminal searching for pass codes,” he added. “Or it could be someone searching for my Ukraine stuff, we don’t know at this point.

An award-winning investigative reporter, Solomon has been a political target in recent months.

In December, House impeachment manager Adam Schiff released a report that published Solomon’s phone records. The Democratic leader cited Solomon no fewer than 35 times in his impeachment report. He added Solomon’s phone call history in a spreadsheet he compiled in the footnotes section of his report, which claimed Solomon reported “conspiracy theories” in The Hill newspaper to help President Trump “push false narratives” about Ukrainian interference in the 2016 election in favor of Hillary Clinton, as well as Biden’s attempts as Vice President that year to fire a Ukrainian prosecutor investigating a gas industry oligarch whose company paid his son millions of dollars.

Solomon, who previously worked for the Associated Press and Washington Post, suspects Schiff was singling him out as part of a political smear campaign.

“I’m the only [reporter] who ends up having his records released,” Solomon said in a recent interview with Fox Business News anchor Lou Dobbs. (Pictured)

“It makes me wonder whether it’s a political payback, because a few months ago, I wrote a story exposing the fact that Chairman Schiff had met with Glenn Simpson at the sidelines of the Aspen Institute at a time when he shouldn’t have been having contact with Glenn Simpson,” he added. “It feels like a political payback.”

Congress had been investigating Simpson, whose opposition research firm Fusion GPS was hired by the Clinton campaign to dig up dirt on Trump in 2016. Simpson hired former British intelligence officer and FBI informant Christopher Steele to compile the discredited Trump-Russia “dossier” the Obama administration used to spy on a Trump campaign adviser. Some of the spy warrants were declared invalid earlier this month because the government made “material misstatements” in obtaining them, according to a new court order.

Image result for Ukraine Marie Yovanovitch

In early 2019, moreover, Solomon reportedly was put on a list of U.S. journalists whom then-U.S. Ambassador to Ukraine Marie Yovanovitch (Pictured here) sought to have “monitored.”

An Obama holdover, Yovanovitch was ousted as ambassador last May after Solomon reported that she tried to block investigations into Ukrainian meddling and corruption tied to the previous administration. She subsequently testified before Schiff’s impeachment committee. On Friday it was reported that she had retired from the State Department.

*********

(TLB) published this article by Paul Sperry, Real Clear Investigations  with permission and our appreciation for the coverage.

Pictorial content added by (TLB)

This and all other original articles created by RealClearInvestigations may be republished for free with attribution. (These terms do not apply to outside articles linked on the site.)

We provide our stories for free but they are expensive to produce. Help us continue to publish distinctive journalism by making a contribution today to RealClearInvestigations

••••

••••

Stay tuned to …

••••

The Liberty Beacon Project is now expanding at a near exponential rate, and for this we are grateful and excited! But we must also be practical. For 7 years we have not asked for any donations, and have built this project with our own funds as we grew. We are now experiencing ever increasing growing pains due to the large number of websites and projects we represent. So we have just installed donation buttons on our websites and ask that you consider this when you visit them. Nothing is too small. We thank you for all your support and your considerations … (TLB)

••••

Comment Policy: As a privately owned web site, we reserve the right to remove comments that contain spam, advertising, vulgarity, threats of violence, racism, or personal/abusive attacks on other users. This also applies to trolling, the use of more than one alias, or just intentional mischief. Enforcement of this policy is at the discretion of this websites administrators. Repeat offenders may be blocked or permanently banned without prior warning.

••••

Disclaimer: TLB websites contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to our readers under the provisions of “fair use” in an effort to advance a better understanding of political, health, economic and social issues. The material on this site is distributed without profit to those who have expressed a prior interest in receiving it for research and educational purposes. If you wish to use copyrighted material for purposes other than “fair use” you must request permission from the copyright owner.

••••

Disclaimer: The information and opinions shared are for informational purposes only including, but not limited to, text, graphics, images and other material are not intended as medical advice or instruction. Nothing mentioned is intended to be a substitute for professional medical advice, diagnosis or treatment.

1 Comment on Investigative Reporter John Solomon’s Laptop Stolen near White House

  1. Any journalist working on stories that involve reporting of wrongdoing by a government, most especially the US Govt, should be using very special cyber security procedures. When governments are sufficiently motivated, the risks of reporters losing information confidentiality, integrity, or availability are very high. The US Govt is, by far, the most potent threat actor in the world.

Leave a Reply

Your email address will not be published.


*