-Caveat Lector- Original article is at: http://www.aim.org/ . Why Was Foster's Computer Dangerous? Crime/Corruption Opinion (Published) Source: Accuracy in Media Published: September 21, 2000 Author: Reed Irvine Chairman, Accuracy in Media Posted on 09/23/2000 07:08:09 PDT by JeanS Why would a White House official be in fear of his life because he had found a missing computer? Howard Sparks, an employee of the Management and Administration Office of the White House has signed an affidavit saying, "After Vincent Foster died, I received a call from Jim MacDonald (his boss at the time), who wanted me to meet with him outside and go for a ride with him. During that ride, Mr. MacDonald informed me that he was concerned that he would be killed because of what he had found." James L. MacDonald, Jr. had found Vincent Foster's computer, something that his bosses at the White House didn't want those who were investigating Foster's death to find. White House Counsel Bernard Nussbaum had refused to let the investigators see what was on the computer when they were watching him examine and describe the files in Foster's office. Paul Sperry, reporting this story for the Internet's WorldNewsDaily on Sept. 13, said MacDonald made this commonsense observation, "It should have been picked up within hours of his death. It was pretty ridiculous to me that the FBI would come back almost a year later." He claimed that it took them that long to ask him to find the computer for them. He said they "went away empty-handed." because an inventory check showed that Foster's computer was missing. MacDonald told Sperry that several months later he came across Foster's computer, recognizing the serial number as the one "we'd been looking for." He said he locked it in a cabinet in the data center and that he told all his managers what it was and that it should "be kept there until someone asks for it." Asked why he didn't notify the FBI, he claimed that he thought that "by then, the investigation was over, and no one was interested in the computer anymore." That is an obvious falsehood. Kenneth Starr, who had been appointed independent counsel in August, 1994, had said that he would reopen the investigation of Foster's death. His investigation lasted three years. MacDonald admitted to Sperry that he was nervous about "finding something I wasn't supposed to find," and crossing Clinton appointees trying to control political damage from scandals. Hiding the computer was clearly obstruction of justice. His immediate boss was Patsy Thomasson, the top aide of Clinton's friend, Dan Lasater. She ran Lasater's business while he served time for illegal distribution of cocaine. Thomasson was in Foster's office on the night of his death, searching his desk. Earlier in the evening she had a secret meeting in her office with a team of Secret Service experts in alarms and safes. She was experienced in controlling damage from scandals. Sheryl Hall, the former White House computer expert who exposed the misplacement of thousands of White House e-mails earlier this year, gave Sperry a significantly different account of what happened to Foster's computer. She said that it remained in Foster's office for about six months. She kept notes on the dates and times it was moved, and she provided copies of those notes to MacDonald. This suggests that it was never really lost. Hall told Sperry that MacDonald had one of her technicians, Dorothy Crumling, download some of Foster's files. She recalled one that revealed that Foster and his wife had plans to go out on the night of July 20, 1993, the day of his death. She said that later, in 1994, MacDonald had Mike Saunders, a former White House computer contractor, remove Foster's hard drive and that MacDonald kept it on his desk until he left the White House in 1995. He then turned it over to Jurg Hochuli, the finance director of the Office of Administration. When Hochuli moved to the State Department last year, MacDonald called Hall and asked her to take custody of the hard drive. She took it to her home. It was recently subpoenaed by Independent Counsel Robert Ray. MacDonald's strategy and lies kept Foster's hard drive from falling into the hands of investigators for seven years. A lie that he told Gary Aldrich, one of the two FBI agents assigned to the White House, helped him pull this off. He told Aldrich that the computer had been found but that the hard drive had been ruined, was unreadable and was replaced. Aldrich put that in his book, "Unlimited Access," removing any pressure to find the computer. We may never know what, if any, secrets on the hard drive might explain why MacDonald feared for his life, but the effort to keep it hidden all these years suggests that it might cast some light on why, where and how Vincent Foster met his untimely end. ================================================================= Kadosh, Kadosh, Kadosh, YHVH, TZEVAOT FROM THE DESK OF: <[EMAIL PROTECTED]> *Mike Spitzer* <[EMAIL PROTECTED]> ~~~~~~~~ <[EMAIL PROTECTED]> The Best Way To Destroy Enemies Is To Change Them To Friends Shalom, A Salaam Aleikum, and to all, A Good Day. ================================================================= <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om