-Caveat Lector-

Original article is at:

http://www.aim.org/ .


Why Was Foster's Computer Dangerous?

Crime/Corruption Opinion (Published)
Source: Accuracy in Media

Published: September 21, 2000 Author: Reed Irvine Chairman,
Accuracy in Media

Posted on 09/23/2000 07:08:09 PDT by JeanS


Why would a White House official be in fear of his life because
he had found a missing computer? Howard Sparks, an employee of
the Management and Administration Office of the White House has
signed an affidavit saying, "After Vincent Foster died, I
received a call from Jim MacDonald (his boss at the time), who
wanted me to meet with him outside and go for a ride with him.
During that ride, Mr. MacDonald informed me that he was concerned
that he would be killed because of what he had found."

James L. MacDonald, Jr. had found Vincent Foster's computer,
something that his bosses at the White House didn't want those
who were investigating Foster's death to find. White House
Counsel Bernard Nussbaum had refused to let the investigators see
what was on the computer when they were watching him examine and
describe the files in Foster's office.

Paul Sperry, reporting this story for the Internet's
WorldNewsDaily on Sept. 13, said MacDonald made this commonsense
observation, "It should have been picked up within hours of his
death. It was pretty ridiculous to me that the FBI would come
back almost a year later." He claimed that it took them that long
to ask him to find the computer for them. He said they "went away
empty-handed." because an inventory check showed that Foster's
computer was missing.

MacDonald told Sperry that several months later he came across
Foster's computer, recognizing the serial number as the one "we'd
been looking for." He said he locked it in a cabinet in the data
center and that he told all his managers what it was and that it
should "be kept there until someone asks for it." Asked why he
didn't notify the FBI, he claimed that he thought that "by then,
the investigation was over, and no one was interested in the
computer anymore."

That is an obvious falsehood. Kenneth Starr, who had been
appointed independent counsel in August, 1994, had said that he
would reopen the investigation of Foster's death. His
investigation lasted three years. MacDonald admitted to Sperry
that he was nervous about "finding something I wasn't supposed to
find," and crossing Clinton appointees trying to control
political damage from scandals.

Hiding the computer was clearly obstruction of justice. His
immediate boss was Patsy Thomasson, the top aide of Clinton's
friend, Dan Lasater. She ran Lasater's business while he served
time for illegal distribution of cocaine. Thomasson was in
Foster's office on the night of his death, searching his desk.
Earlier in the evening she had a secret meeting in her office
with a team of Secret Service experts in alarms and safes. She
was experienced in controlling damage from scandals.

Sheryl Hall, the former White House computer expert who exposed
the misplacement of thousands of White House e-mails earlier this
year, gave Sperry a significantly different account of what
happened to Foster's computer. She said that it remained in
Foster's office for about six months. She kept notes on the dates
and times it was moved, and she provided copies of those notes to
MacDonald. This suggests that it was never really lost.

Hall told Sperry that MacDonald had one of her technicians,
Dorothy Crumling, download some of Foster's files. She recalled
one that revealed that Foster and his wife had plans to go out on
the night of July 20, 1993, the day of his death. She said that
later, in 1994, MacDonald had Mike Saunders, a former White House
computer contractor, remove Foster's hard drive and that
MacDonald kept it on his desk until he left the White House in
1995. He then turned it over to Jurg Hochuli, the finance
director of the Office of Administration. When Hochuli moved to
the State Department last year, MacDonald called Hall and asked
her to take custody of the hard drive. She took it to her home.
It was recently subpoenaed by Independent Counsel Robert Ray.

MacDonald's strategy and lies kept Foster's hard drive from
falling into the hands of investigators for seven years. A lie
that he told Gary Aldrich, one of the two FBI agents assigned to
the White House, helped him pull this off. He told Aldrich that
the computer had been found but that the hard drive had been
ruined, was unreadable and was replaced. Aldrich put that in his
book, "Unlimited Access," removing any pressure to find the
computer.

We may never know what, if any, secrets on the hard drive might
explain why MacDonald feared for his life, but the effort to keep
it hidden all these years suggests that it might cast some light
on why, where and how Vincent Foster met his untimely end.


=================================================================
             Kadosh, Kadosh, Kadosh, YHVH, TZEVAOT

  FROM THE DESK OF:                    <[EMAIL PROTECTED]>
                      *Mike Spitzer*     <[EMAIL PROTECTED]>
                         ~~~~~~~~          <[EMAIL PROTECTED]>

   The Best Way To Destroy Enemies Is To Change Them To Friends
       Shalom, A Salaam Aleikum, and to all, A Good Day.
=================================================================

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to