197110

197110 197110

User Manual: 197110

Open the PDF directly: View PDF PDF.
Page Count: 60

Download197110
Open PDF In BrowserView PDF
SCIENCE & TECHNoLOG

October, 1971
Vol . 20, N o. 10

la~H~~!:i~

CD

@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@
.@®@@@@@@@@@@@@@@
@@@@@@@@®®@@®®@@
@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@
@@@@@@@@®®@@@@@@
@@@@@@®®@@@@@@@@
@@@@@@@@@@@@@@@@
@@®@@®®@@@@@@@@@
@@®@@@@@@@@@@@@@
@@@@@@@@@®®@@@®®
@@@@@@@@@@@@@@@@
@@@@@@@@@®®@@@@@

Pictorial
Reasoning
Puzzle

@@@@@@@@@'@@@@@@@
Environmental Pollution

-

Peter House

The Liverpool Congestion Control Scheme

-

A. Davison and D. W. Honey

Federal Data Banks and the Bill of Rights
Pictorial Reasoning Tests, and Aptitudes of People -

Arthur R. Miller

The Life and Times of Lawrence Tate

Donald Fitzgerald

/"-

-

Neil Macdonald

~

SAN PERIl80

lP02l2l 9904 7112

PERIODICALS SEC 126 01572 *
180 W SAN CARLOS ST
•
SAN JOSE CA
95113

DO YOU WANT TO

PREVENT MISTAKES BEFORE THEY HAPPEN?
- avoid pitfalls?
- find new paths around old obstacles?
- apply in practical situations the observations and
wisdom of great scientists and wise men?
- stimulate your resourcefulness?

- see new solutions to old problems?
distinguish between sense and nonsense?
increase your accomplishments?
improve your capacities?

IF SO, TRY-

The C&A Notebook on
COMMON SENSE. ELEMENTARY AND ADVANCED
devoted to research, development, exposition, and illustration of one of the most important
of all branches of knowledge, i.e. the subject of WHAT IS GENERALLY TRUE AND IMPORTANT =

+

+

+

+

+

+

+

+

Editor: Edmund C. Berkeley,
author, businessman, actuary,
scientist, computer professional,
first secretary of the Association
for Computing Machinery 1947-53,
editor of Computers and Automation.

RETURNABLE IN 7 DAYS
FOR FULL REFUND, IF
NOT SATISFACTORY WHY NOT TAKE A LOOK?
. . . . . HOW CAN YOU LOSE?

+

THE FIRST SIX ISSUES ARE FREE - see the coupon - THE NEXT 16 ISSUES ARE:
7. The Elephant and the Grassy Hillside
8. Ground Rules for Arguments
9. False Premises, Valid Reasoning,
and True Conclusions
10. The Investigation of Common Sense,
Elementary and Advanced
11. Principles of General Science, and
Proverbs
12. Common Sense - Questions for
Consideration
13. Falling 1800 Feet Down a Mountain
14. The Cult of the Expert

15. Preventing Mistakes from Failure
to Understand
16. The Stage of Maturity and Judgment
in any Field of Knowledge and
Experience
17. Doomsday in St. Pierre, Martinique
- Common Sense vs. Catastrophe
18. The History of the Doasyoulikes
19. Individuality in Human Beings , .••
20. How to be Silly
21. The Three Earthworms
22 . The Cochrans vs. Catastrophe

_ - - - - - - - - - - - - - - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - - - - - - - - - - - To:

COMPUTERS AND AUTOMATION
815 Washington St., R4, Newtonville, Mass.

02160

YES, please enter my subscription to the C&A Notebook on Common Sense at $12 a year,
24 issues (newsletter style), and extras.
Please send me (as FREE premiums for subscribing) the first six issues:
1. Right Answers - A Short Guide to Obtaining Them
4. Strategy in Chess
2. The Empty Column
5. The Barrels and the Elephant
3. The Golden Trumpets of Yap Yap
6. The Argument of the Beard
I enclose $
( ) Please bill me
) Please bill my organization
Name__________________________________ Title,_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Organization _______________________________________________________
Address. _____________________________________________________________
Signature__________________________________ Purchase Order No. _ _ _ _ _ _ _ _ _ __

Announcement

The Most Important of All Branches of Knowledge
(Based on the editorial in the April 1971 issue of Computers and Automation)
It may be that there is a branch of knowledge which is
the most important of all.
If so, I would maintain that it is a subject which used to
have the name "wisdom" but nowadays does not have a
recognized scientific name, or in any college a recognized
department or faculty to teach it. This subject currently is a
compound of common sense, wisdom, good judgment,
maturity, the scientific method, the trained capacity to
solve problems, systems analysis, operations research, and
some more besides. Its earmark is that it is a general
subject, not a special one like chemistry or psychology or
astronautics. Useful names for this subject at this time are
"generalogy" or "science in general" or "common sense,
elementary and advanced".
Many editorials published in "Computers and Automation" have in one way or another discussed or alluded to
this subject:
Examples, Understanding, and Computers / December 1964
The Barrels and the Elephant: Crackpot vs. Pioneer /
May 1965
Some Questions of Semantics / August 1965
Perspective / April 1966
Computers and Scientific Models / May 1967
New Ideas that Organize Information / December
1967
How to Spoil One's Mind - As Well as One's
Computer / August 1968
The Catching of Errors by Inspection / September
1968
Tunnel Vision / January 1969
The Cult of the Expert / May 1969
Computers, Language, and Reality / March 1970
Computers and Truth / August 1970
The Number of Answers to a Question/March 1971
In the editorial "The Cult of the Expert" we offered a
leaflet that belongs in this subject, "Right Answers - A
Short Guide for Obtaining Them". More than 600 readers
asked for a copy; so clearly this subject is interesting to the
readers of C&A.
This subject is related to computers and the computer
field in at least two ways:
First, many of the general principles which this subject
contains can be investigated in experimental or real situations by means of a computer. In fact, far more can be
investigated by computer than can possibly be investigated
by ordinary analytical mathematics.
Second, since computer professionals are in charge of
computing machines, many people consider these professionals responsible for the worthwhileness of the results of
computers. Because of "garbage in, garbage out", computer
professionals have a responsibility to apply common sense
and wisdom in at least three ways:

Input - in the selection and acceptance of the data
with which they begin;
Processing - in the processing through a system;
Output - in the interpretation and use of the answers.
Then the computerized systems will produce stIong structures that human beings can use and rely on, and not weak
structures which will crash with false information or ridiculous results.
"Computers and Automation" for April 1971 contains an
article, "Common Sense, Wisdom, General Science, and Computers", which deals with this subject. For more t~an a dozen years I have been studying this subject - ever SInce I searched in a very large and good public library for a textbook ?n
common sense or wisdom and found none at all. There IS,
however, a great deal of information to be gathered on this
subject because a large number of great men, ancient, medieval, and modern, have made remarks and comments (usually while talking or writing about something else) that belong
in this subject.
.
The subject of wisdom is particularly importan.t In the.se
modern days. The subject has been neglected, whIle speCIal
sciences have been cultivated. Investigators have pursued
the special sciences with the enthusiasm of a child with a
new toy. Specialized science and specialized technology
have rendered our earthly world almost unrecognizable:
All major cities on the planet are only a few hours
.
apart by jet plane.
Millions upon millions of people who otherWIse
would be dead are alive because of miracle drugs,
- thus creating a population explosion;
Nuclear weapons if used can destroy mankind and
civilization in a few hours: etc.
To deal with so many diverse, vast problems we need
wisdom. To use wisdom we should study it.
The staff of "Computers and Automation" have decided
that it is desirable to make the drawers full of information
we have been ,collecting on this subject more accessible and
more widely distributed. We have decided to publish twice
a month a publication of newsletter type called "The C&A
Notebook on Common Sense, Elementary and Advanced".
For more details, see the announcement on page 2. (The first
few issues of the Notebook are free.)
We invite you, our readers, to join us in the pursuit of
this subject, as readers of the Notebook, and as participators with us in the research and study.
Wisdom is a joint enterprise - and truth is not shaped so
that it can fit into the palm of anyone person's hand.

~~~.. ~
EDITOR

}

computers
Vol. 20, No. 10
October, 1971

and automation

The magazine of the design, applications, and implications
of information processing systems.
Computers and Applications

Editor

Edmund C. Berkeley

Assistant Editors

Linda Ladd Lovett
Neil D. Macdonald

Software Editor

Stewart B. Nelson

Advertising
Director

Edmund C. Berkeley

Art Directors
Contributing
Editors

Advisory
Committee

Editorial Offices

L'ldvertis ing
Contact

Ray W. Hass
Daniel T. Langdale
John Benne"
Moses M. Berlin
Andrew D. Booth
John W. Carr III
Ned Chapin
Alston S. Householder
Leslie Mezei
Ted Schoeters
Richard E. Sprague
James J. Cryan
Alston S. Householder
Bernard Quint

ENVIRONMENTAL POLLUTION: MORE PROBLEMS
[T A]
WITHOUT SOLUTIONS?
by Peter House, President, Envirometrics, Washington, D.C.
Proposals for a sensible and sophisticated management information system for an administrator, so that he can test by simulation proposed solutions to environmental problems ahead of
time - and thus avoid bigger problems than the ones he started
with!

8

[T A]
THE LIVERPOOL CONGESTION CONTROL SCHEME
by A. Davison and D. W. Honey, the Liverpool Corporation,
Liverpool, England
A working computer system for the control of traffic in the
central area of Liverpool, containing the tunnel under the
river Mersey .

24

THE APPLICATION OF ELECTRONICS TO COMPOSITION
[T A]
AND PRINTING
by Raymond A. Hay, Exec. Vice Pres., Xerox Corp.,
Rochester, N.Y.
By the 1990's, we can expect broad use of high-speed electronic
composing machines, and facsimile newspapers produced in
homes. What consequences can we predict?

Computers and Management
28

"ESSENTIAL COMPUTER CONCEPTS FOR TOP MANAGEMENT"
- COMMENT
[T F]
1. By Eugene S. Stark, Needham, Mass.
Management must learn to rely on qualified D.P. professionals
for their D.P. judgment ....
2. By Edmund C. Berkeley, Editor, Computers and Automation
Every good member of top management knows that he must
understand a certain definite layer of special information for
which he employs specialists ....

29

COMPUTER SECURITY - SABOTAGE FEARS
DISCOUNTED
[NT F]
by Mel Mandell
The main threat to computer security is from insiders.

Berkeley Enterprises, Inc.
815 Washington St.,
Newtonville, Mass. 02160
617-332-5453

THE PUBLISHER
Berkeley Enterprises, Inc.
815 Washington St.,
Newtonville, Mass. 02160
617-332-5453

Computers and Automation is published monthly
(except two issues in June) at 815 Washington
St., Newtonville, Mass. 02160, by Berkeley Enerprises, Inc. Printed in U.S.A.
Subscription rates: United States, 11 monthly
issues and two issues in June (one of which
is a directory issue) - $18.50 for 1 year, $36.00
for 2 years; 12 monthly issues (without directory
issue in June) - $9.50 for 1 year; $18.00 for
2 years. Canada, add 50¢ a year for postage;
foreign, add $3.50 a year for postage. Address
all U.S. subscription mail to: Berkeley Enterprises,
Inc., 815 Washington St., Newtonville, Mass.
02160. Second Class Postage paid at Boston, Mass.
Postmaster: Please send all forms 3579 to
Berkeley Enterprises Inc., 815 Washington St.,
Newtonville, Mass. 02160. © Copyright 1971. by
Berkeley Enterprises, Inc.
Change of address: If your address changes,
please send us bo~h your new address and your old
address (as it appears on the magazine address
imprint), and allow three weeks for the change to
be made.

4

19

Computers and Privacy
12

FEDERAL DATA BANKS AND THE BILL OF RIGHTS
[NT A]
by Arthur R. Miller, University of Michigan, Ann Arbor, Michigan
The dangers from the spiraling pattern of government data collection; and the need for a new impartial institution for regulating the nature of the data that may be collected and stored
about citizens.

46

Privacy, Human Values, and Democratic Institutions - I
[NT F]
by Congressman Cornelius E. Gallagher, Washington, D.C.
A plea for a committee of the House of Representatives on the
subject of privacy and democratic institutions.

48

Privacy, Human Values, and Democratic Institutions - 'Ii
[NT F]
by Congressman Frank J. Horton, Washington, D.C.
An added plea - both presented before the House Committee
on Rules, which approved a Resolution for creating a Select
Committee.
COMPUTERS and AUTOMATION for October, 1971

The Selection of Personnel - for Computers and Other Purposes
38

PICTORIAL REASONING TESTS, AND APTITUDES
OF PEOPLE
[NT A]
by Neil Macdonald, Assistant Editor, "Computers and Automation"
Can we find tests not lim ited by culture or background that
would identify useful people for computer programming and
other jobs?

Computers, Common Sense, Wisdom and Science in General
6

3

2

CAN A COMPUTER APPLY COMMON SENSE?
[NT E)
by Edmund C. Berkeley, Editor, "Computers and Automation"
An operational definition of common sense; and how a computer can be programmed to apply it.
THE MOST IMPORTANT OF ALL BRANCHES OF
KNOWLEDGE
Common sense, wisdom, and science in general.

[NT F]

THE C&A NOTEBOOK ON COMMON SENSE,
ELEMENTARY AND ADVANCED
Annou ncement

[NT F]

Computers, Science, and Assassinations
41

THE ASSASSINATION OF PRESIDENT KENNEDY DECLASSIFICATION OF RELEVANT DOCUMENTS
[NT A]
FROM THE NATIONAL ARCHIVES
by Richard E. Sprague, Hartsdale, N.Y.
The titles of the documents and other evidence indicate convincingly that Lee Harvey Oswald was an informant of the
FBI; that Oswald was trained in spy work by the CIA before
his visit to Russia; etc. Like the Pentagon Papers, the documents should be declassified.

The Golden Trumpet
33

THE LIFE AND TIMES OF LAWRENCE TATE:
Computer Professional, I BM Engineer, Fired After
Losing Local Court Action, Though Case Now On Appeal
[NT A]
by Donald Fitzgerald, New York
How an I BM engineer fought a civil rights case and tyranny by
local police, and thereby lost his job.

26

[NT A]
ONE WORLD OF COMMUNICATIONS
by Robert W. Sarnoff, Chairman, RCA
No international legal framework exists today to permit full use
by the nations of the world of the benefits of modern communications technology.

30

CAMPAIGN FINANCING: MONEY AND SECRECY
[NT G]
by John Gardner, Chairman, Common Cause, Washington, D.C.

56

The Science and Technology Division of the New York Public
Library to Close Its Doors on January 1, 1972
[NT G]
by Edmund C. Berkeley, Editor, "Computers and Automation"

32

Stands for and Against the Anti-Ballistic Missile System
by Herbert R. J. Grosch, National Bureau of Standards,
Washington, D.C.

[NT G)

1

Pictorial Reasoning Puzzle, by Ed Volkstorf
[T F)
Out of 255 circles, find the single pair of two alike patterns.

7

Problem Corner, by Walter Penney, CDP

[T C)

Numbles, by Neil Macdonald

[T C)

COMPUTERS and . AUTOMATION for October, 1971

Front Cover Picture
The object of "Puzzle", by
Ed Volkstorf, Radford, Va., is to
find the two identical "ferritecore-like" figures. Each figure is
based on a binary number between
2 and 255 (base 10); the presence
or absence of a binary one determines whether or not one of the
eight possible straight line segments
in the figure is drawn. We invite
our readers to test their keenness
of pictorial observation, and tell us
how long it takes to find the two
identical "ferrite-core-like" figures.
For more information, see page 57 .

Departments
50
50
51
52
52
28
57

Across the Editor's Desk
Applications
Education News
Miscellaneous
Research Frontier
Advertising Index
Calendar of Coming
Events
Monthly Computer
Census
New Contracts
New Installations
Who's Who Entry Form

55
53
54
58

Key
[A]

Article

[C] - Monthly Column
[E) - Editorial

Compu ters and Puzz les

25

@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@
@@@)@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@
@@®@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@

[F]
[G)
[NT]
[T]

-

Forum
Golden Trumpet
Not Technical
Technical Computer
Information
5

C- a
EDITORIAL

Can A Computer Apply Common Sense?
It is often said that:
Let's take an imaginary. example. John Jonesis a college
A computer cannot apply common sense.
student engaged in a three months summer job with a
In this context, the term "computer" of course means a
magazine publisher. His supervisor says to him:
We have a rush order for 47 copies of the May
computer with a program controlling it, a programmed
issue from Samuel Smith. Please take our company
computer.
car, go to our warehouse (a mile away), get 47 copies
I would maintain that this statement is not true, and it iy--of the May issue, package them, and mail them to
possible for a computer to apply many kinds of and many
Samuel Smith with this label.
degrees of common sense. But what do we mean by
"common sense"?
Now John Jones we shall imagine does the following things:
One of the more lucid discussions of the synonyms
sense, common sense, good sense, judgment and wisdom is
to be found in the Third International Webster's Dictionary, Unabridged, published by Merriam Webster, Springfield, Mass., page 2067. The substance of this is:
Sense indicates an accustomed steady ability to
judge and decide between possible courses with intelligence and soundness. Common sense and good sense
add only slight additional suggestions to sense; common sense suggests ordinary good judgment and
prudence without sophistication and learning; good
sense implies an especial perception of circumstances
and soundness in analysis.... Judgment involves
notions of sense refined and tempered by experience,
maturity, training, or discipline, to discern coolly and
judge soundly in difficult matters. Wisdom suggests
great soundness, sagacity, and insight, the result of
blending together common sense, wit, experience,
maturity, learning, and understanding.
Unfortunately, these implied definitions of common
sense are not operational; they do not provide physical
operations or tests which we can apply to the observed
behavior of a human being (or a programmed computer),
and as a result of the observations or tests say "Yes, it
displays common sense" or "No, it does not display
common sense."
But it seems to me that an operational definition of
common sense behavior for a human being can be constructed out of four main ingredients: observation, intelligence, initiative, and common knowledge (i.e., not including special knowledge). In other words, a human being
displays common sense behavior about a problem if:
- he is observant and alert;
- he shows initiative;
- he behaves reasonably;
- he modifies the instructions he is given (or the
intentions which he started with) so as to adjust
suitably to any new or unusual factors that he
encounters;
- he draws on common knowledge or general knowledge only (not the special knowledge of any
particular branch of knowledge);
- he effectively solves the problem.
6

• Looks to see if any other requests to go to the
warehouse are on hand and can be filled on the
same trip; finds three and takes them along.
• Observes that the car is low on gas; stops at a gas
station on the way; puts in a dollar's worth of gas;
and writes a slip for the bookkeeper requesting
repayment of his $1.
• Finds that there are only 45 copies of the May
issue in the warehouse; uses 42 to fill the order;
leaves one issue in the storeroom tagged with a slip
"Last copy - To be replenished";
• Fills the other three requests to the warehouse,
pu tting them in the car to bring to the office;
• Wraps up the 42 copies securely, ties them additionally with string, affixes the label, weighs the
package, affixes proper postage from the postage
meter, and mails the package at the post office on
his way back;
• Directs the remaining two copies of the May issue
to the clerk in charge of reprinting, with a slip
reporting that the supply of the May issue is
exhausted;
• Returns the car to a nearby parking space, since
the original space has been filled by another car;
and
• Reports the completion of the task to his supervisor, informing him of other actions taken.
John Jones has been observant, alert, displayed initiative, acted reasonably, modified given instructions appropriately, drawn on his general knowledge, and has effectively solved the problem - even though only 42 copies were
shipped instead of 47. There is no doubt at 'all that Jones
has displayed a great deal of common sense - as if he were
an employee of ten years experience and had been taught
over the years all the modifications of instructions that he
needed.
With this example in front of us, we can see plainly the
answer to the question:
Can a computer apply common sense?
The answer is yes.
First we make the program cover logically, appropriately, and completely, all or almost all of the kinds of
COMPUTERS and AUTOMATION for October, 1971

situations that can arise. That takes work, but if a clerk of
ten years experience can do it, so can a good systems
analyst do it and then translate it into a computer program.
Second, we equip the program with an evaluating function such as in a computer program that plays chess. In
other words, in situations where different degrees of desirability attach to different courses of action relative to a
purpose, the computer is given a subroutine that weighs
factors and makes decisions. This also takes work, but if a
chess-playing program can do it, so also can other programs.
To modify instructions in the light of purposes is not hard,
provided we take the trouble to express the evaluating
function in a computer program.
Of course a computer cannot regularly observe or perceive all of the environment - any more than a blind man
can. But we do not expect the same kind or degree of
common sense from a blind man as we expect from a
sighted person.
We can properly expect a very high degree of many
kinds of common sense from well-worked-out computer
programs.

Edmund C. Berkeley
Editor

Touch It!
Hathaway's Low Profile
Keyboard Switches
Hathaway's Low Profile Drireed Pushbutton Switch is designed
to allow you to build more compact. smaller instruments with
greater reliability at a lower cost. Our knowledge of dry reeds
enables us to design the best.
The Hathaway Switches have other unique advantages to
offer you even more. A unique switching design totally eliminates
interference between switches with positive action and no teasing. Standard units can be screw base mounted on the standard
%" or %" centers. The switches interlock for mounting rigidity.
Operating force is 50 to 60 grams at the beginning of displacement and 80 to 90 at the end. no matter which plane the switch
is in. The switch and pushbuttons are both produced by Hathaway for total single source control from design through manufacturing.

For complete information write to:
Instruments

Note: An expanded discussion of "What is Common Sense?" and
how different organisms apply it constitutes Issue No. 24 in The
C&A Notebook on Common Sense. Elementary and Advanced. See
the announcement on page 2.

Inc.

~2~0 EAST EVANS AVENUE. DENVER COLORADO 80222

(303) 7[,6-8301 TWX 910 931·0~6a

subtracting depending on whether the number it's after is
more or less than the current number."

PROBLEM CORNER

Walter Penney, cOP
Problem Editor
Computers and Automation

"How can the machine tell when the number has been
found?"
"The machine is able to compare two numbers, deciding
whether one is less than, equal to or greater than another.
It stops when it finds the two are the same."
AI looked a little puzzled. "I'm still a little confused",
he said. "How would it go about finding the number 6, for
example?"
"It would go 1 + 2 + 4 - 2 + 4 - 2 - 1 so that seven
operations would be necessary."
"How many operations would be necessary for a number
in general?"

Problem 7110: Operation Search
Solution to Problem 719: Messages in Math?

"Here's a really far-out search procedure", said Pete.
"Don't know why they want it, but ours not to reason
why, etc."
"How does it work?" asked AI.
"Well, the program is supposed to be looking for a
certain number. It starts with 1, then adds 2, the 4, and so
on, doubling the amount added at every point as long as the
sum is less than the number it's looking for."
"Sooner or later it will reach a number bigger than the
target number. What does it do then?"
"Actually if the number is of the form 2n - 1 the
machine will reach it directly by addition", said Pete. "For
other numbers it starts subtracting half the last number
used and continues doubling and adding or halving and
COMPUTERS and AUTOMATION for October, 1971

Of the 63 possible two-digit endings of cubes, only 00,
17, 25, 41, 37, 57 and 97 yield admissible endings for
squares when 41 (the last two digits of 1971 2 ) is
subtracted. Additional restrictions on the hundred's digits
of squares and cubes allow us to reduce these possibilities
further until we find 1971 2 + 14302 = 181 3 •

Readers are invited to submit problems (and their
solutions) for publication in this column to: Problem
Editor, Computers and Automation, 815 Washington St.,
Newtonville, Mass. 02160.
r

7

THE LIVERP,OOL CONGESTION CONTR,OL SCHEME
The ever-increasing density of traffic in our city
streets, and the astronomical costs of major revisions
of street layouts, have stimulated research into
methods of traffic control to cope with congestion
efficiently and economically. One solution to this
problem would appear to be the application of
computer control. Two experimental control centres
have been established in Great Britain by the
Ministry of Transport, in West London and in
Glasgow. In Liverpool, the Corporation have gone
one step further, and in June 1968, established a
working control system.

By A. Davison and D. W. Honey

The Mersey road tunnel links the City of Liverpool, sited
on the east bank of the river Mersey, to the Wirral
Peninsular (bounded by the Mersey and the river Dee),
and was opened to road traffic by King George V in 1936.
This tunnel is currently the only practicable road link
between Liverpool and Birkenhead, although a second
two-lane tunnel is scheduled to be opened in 1971. The
existing tunnel has four 9-ft wide lanes between the main
entrances in Liverpool and Birkenhead, together with two
two-lane branches off the main tunnel, one leading to the
docks at Liverpool, and the other to Birkenhead. The
Birkenhead branch is now restricted to use by traffic
entering the tunnel only; the Liverpool branch is used for
exit traffic only.
The first major use of 'tidal flow' control in the tunnel
was made in 1950. This is' the utilisation of the main tunnel
lanes in the ratio of 3:1 in a particular direction, to assist
commuter flow during the morning and evening peak
hours. Between the hours of 08.30 and 09.15, and 17.00
and 18.30, some 3,500 vehicles per hour flow into and out
of the city through the tunnel. During these hours, congestion within the tunnel causes extensive queueing on the
city streets leading to the tunnel entrance, with subsequent
dislocation of the other traffic not requiring access to the
tunnel. In particular, traffic attempting to cross the tunnelbound traffic is delayed by nose-to-tail queues of vehicles
blocking the cross-roads.
Traffic conditions are aggravated by the radial distribution of roads leading into Liverpool, and steadily
deteriorate as the 'central area' (centralised on the Mersey
tunnel entrance) is approached. Conditions on the
Birkenhead side are not so critical, because the approach
routes are not intersected by cross-roads to the same
extent. In 1965, a traffic control scheme was recommended
to and adopted by the Liverpool Council. Design work
started immediately on a comprehensive, one-way street,
traffic signal controlled scheme in which reserved lanes
Reprinted with permission from the December 1970 issue of
The Computer Bulletin, published by The British Computer
Society, London, England.
8

for the tunnel-bound traffic were provided on the tunnel
approach routes, with physical separation and channelising
islands to cut out queue-jumping from 'local' lanes. tFils
scheme was put into operation in 1966, with the knowledge
that further controls would be required to give positive
directions to tunnel traffic during the periods of congestion,
and at other times to enable the lanes reserved for tunnel
traffic to be used. by the local traffic.
Thus the Tunnel Approaches Congestion Control
Scheme was born, and from the beginning it has been regarded as the first step towards a more complex 'area
control'. The main objectives of the scheme were
a)

b)

c)
d)
e)

f)

control of tunnel-bound traffic queues at main intersections by red signals rather than by a 'voluntary'
restriction using box junction regulations;
forward movement of tunnel-bound traffic at intersections to be made in phase with flows of local
traffic, restricted as necessary by limiting the greentime by the use of sub-controllers;
maximum queue occupancy of tunnel lanes, thus
limiting queue-jumping from local l~nes and side
routes;
overall control and display of regulatory and informatory part-time signs;
maintenance and improvement of bus schedules, with
free flow of other local traffic as far as practicable at
all times; and
the establishment of a traffic control office, with a
central processing unit to pursue and maintain these
complex and integrated objectives.

The adoption of signal controls was dictated by intense
competition for forward movement of traffic towards the
tunnel, the shapes, areas and distances to be kept clear,
the prevalence of vehicles stoppin~ in a 'box' under slowmoving queue conditions, and irrespective of a bias
linking programme, the opportunities presented by boxes
for queue-jumping and infiltration. Prior to computer
control, 'box offences' occurred at an abnormally high
level on the tunnel approaches, but not elsewhere.
Sub-controllers at key intersections on the tunnel
COMPUTERS and AUTOMATION for October, 1971

approaches were manually operated by traffic engineering
technicians between 1966 and 1968. This relieved police
from traffic duty and confirmed the decisions made, as the
public quickly became wholly reliant upon these controls.
Surveillance by closed-circuit television assists the programme development and enables action to be taken to
re-direct public transport and to deal with abnormal traffic
problems. Internally illuminated gantry signs, including
part-time signs, were erected in 1966 to direct traffic into
the correct lanes.
The objectives necessitated the inclusion of an on-line
real time computer, a general purpose digital type being
selected for its programming flexibiity, and with a
capacity for expansion and integration in future traffic
management projects. Schemes and tenders for an
automatic control system were invited from commercial
firms with specialist knowledge, and a tender accepted
from the Plessey Company Limited (Automation Group),
to supply a general purpose XL9 digital computer, together
with associated hardware and software. A closed-circuit
television contract was awarded to Pye TVT. Most of the
necessary traffic signals and cables had been installed
during the implementation of the comprehensive one-way
traffic scheme in 1965-66.
Control centre
The main facilities available to the supervisory staff are
the computer and its peripherals, including manual override of traffic signals and sign displays, control of the closedcircuit television, VHF radio, telephones, a map display,
and various tally and record panels. Two dual position
control desks have been installed, and are placed one
behind the other with the rearmost elevated on a dais.
The rearmost desk is allocated to transport personnel, due
to their predominant use of the radio telephone equipment
and the engineering personnels' greater reliance on the
map display, which faces both desks.
Two banks of eight 19-in. television monitor displays
are located on each side of the map display. Nine displays
are being used in the present closed-circuit television
system, the remainder being taken up at present by
internally illuminated maps of key intersections and signs,
an internally illuminated calendar, and a spare TV
monitor. Each desk has a camera control panel with two
8·5-in. desk monitors and two telephones. The engineer's
desk has switch panels for the control of signals, signs and
the map display, together with a radio telephone link via
the normal telephone handset. The transport desk has the
normal radio telephone speaker equipment together with
tally and record panels displaying vital information regarding availability and location of personnel and vehicles.
The map display is about 12 ft long by 8 ft in height,
and represents the road layout within the central area and
around the proposed Liverpool inner ring road, suitably
distorted to permit clear presentation of the existing and
future road pattern.
The streets are shown in white with light and dark blue
colours for areas of land and water respectively. Green
triangles with their apexes in the direction of vehicle traffic
flow indicate green signal aspects, with red bars and orange
discs showing inhibit and queue conditons on the approach
routes. At pedestrian crossings, green discs are illuminated
when the 'crQss' signal is showing.
The computer room is to the rear of the map display
and contains the computer and its peripherals, the closedcircuit television and radio telephone engineering cabinets
and an air conditioning unit. A false floor is provided over
the whole area to cater for the large amount of cabling.
The street cables terminate on a main distribution frame
which is situated in the basement below the computer
COMPUTERS and AUTOMATION for October, 1971

room. The engineering cabinets of the closed-circuit
television and radio telephone equipment are contained
in blocks separate from the main computer to allow for
further expansion of the computer system.
Computer equipment
The Plessey XL9 is a general purpose, 24-bit word digital
computer' used 'on-line', in real time. It currently has a
16K word core store (2 p,secs cycle time) of which about
12K is used in the current scheme, with only some 40 per
cenl. usage of the computer available time. An additional
32K core store has been added during 1970 to allow for
expansion of wider area control and for numerous
additional control schemes.
Two data channellers containing the interface equipment handle input and output signals, via relays in a relay
butTering rack in some cases and directly in others such as
the loop detectors. The computer scans these data channellers at ! sec. intervals and transfers up-to-date information to and from core store. The conventional peripheral
equipment includes a paper tape reader and punch capable
of processing about 500 and 110 words a second respectively, and a control typewriter, for input and output
commands and messages. An off-line Flexowriter is used
for tape preparation of the program which is written in
a pseudocode known as 'EXEC 9'.
In an annexe, located immediately off the main equipment room, are six master signal linking controllers, the
sub-master controller, engineering work benches, and
electronic test equipment.
Control philosophy
Under normal conditions tunnel-bound traffic, parallel
and cross 'local' traffic use the various intersections under
conventional biased linking of traffic signals. During
congestion, sub-controllers controlled by the computer
limit the durations of the green aspects on the tunnel lanes
by artificially inducing red aspects within the normal overall green phases.
Congestion conditions originate in the Tunnel Plaza
where three approach routes (a total of eight tunnel lanes)
merge, and where tunnel-bound traffic passes through
11 toll booths* into one, two, or three tunnel lanes
according to the prevailing lane-working in the tunnel
proper. The two' sections into which the operational
program is divided relate to the Plaza and the approach
lanes/roads respectively.

Plaza program
'Presence' loops, placed at the entrance to the Plaza and
'A' loops in the final sections of the approach lanes are
scanned by the computer to detect very slow moving or
stationary traffic. These are compared with adjustable
parameters set in the program and when necessary, trigger
the control program into 'close control'. For example,
a process in the computer establishes 'presence' conditions
after at le:lst a 7 sec. duration for each loop. Three such
conditions occurring coincidentally trigger the Plaza
control program.
Close 'control' of the Plaza approaches is then established using their own pre-set basic maximum 'green time'
allowance. Subsequently this green allowance for each
approach is reduced by 1 sec. for each second that a Plaza
entry loop shows presence, but is increased by 1 sec. each

*The toll booths were moved to the Birkenhead entrance on
1 September 1970.
9

second, towards the basic maximum as vehicles are detected
leaving the Plaza (ie entering the tunnel). When this
allowance reaches a predetermined minimum, the computer
applies an 'inhibit', turning the tunnel lane signals to red.
Removal of the inhibit occurs when the allowance reaches
the predetermined period of 12 secs.
The calculations take place independently of the normal
signal cycling, 'but minimum durations of 8 sec. for the
green and red phase are maintained, with the computer
taking account of instantaneous and impending main
phases changes. A smooth termination of the Plaza control
is effected by giving fixed long green allowances (apart
from normal phase changes) when a predetermined number
of booth 'exit' loops show a simultaneous 'absence' of
vehicles for a certain number of seconds. Switch-on of the
Plaza program also initiates control of gantry signs, etc;
switch-off of the Plaza program takes place if, for three
consecutive minutes, no 'switch-on' condition has been
detected.

Tunnel approach program
The main objective of the tunnel approach program is the
optimum loading of the tunnel approach lanes. At certain
intersections, merging of tunnel lanes takes place, using
appropriate control programs. Elsewhere, special traffic
control logic is used to assist general traffic movement,
and is provided as sub-routines of the tunnel approach and
Plaza programs.
In each tunnel lane, approximately one-third of the way
down each block from its entrance, a pair of Plessey
Mectest loops, 5 ft square and placed 7 ft apart, are set in
the road surface, to measure vehicle presence and speed.
These are known as the 'A' and 'B' loops. A threshold
speed for each block is set in the computer in the range 34,
16, 11, 8'3, 6·7, 5·7 and 5 miles per hour. Basically each
block is controlled independently of adjacent blocks, but
queue indications on the A and B loops are checked, since.
false information can be generated by isolated slowor
stopped vehicles, lane changing, etc. The criteria for each
block are the state of the downstream signals, the downstream traffic density, and the long-term flows within the
block. When the sum of the 'weighting values' given to
these conditions exceeds a pre-set total, queue conditions
are assumed within the block. The computer then continuously calculates for the block of the delay required
before the application of a red (inhibit) aspect to the tunnel
lane signals at the block entrance, ie the time necessary to
fill the block with vehicles. This delay is continuously
adjusted until the actual application of the inhibit, and
takes account of entry traffic volumes and of downstream
traffic movements, based on the state of signals at the
entrance into the next downstream block.
Near the entrance to the block, at the optimum end of
queue position as determined by the requirements of local
traffic movements, is located a single loop entrance detector
in each tunnel lane. These determine 'presence', 'absence'
and 'instantaneous' entry traffic volumes. Presence and
absence of vehicles on the entrance loops after the
application of an inhibit indicate to the computer the
adequacy of, and subsequent modifications required to,
the inhibit calculations.
After application of an inhibit the computer continuously
checks for inhibit release conditions and modifies a pre-set
release delay according to
a)
b)

c)

10

the state of downstream tunnel lane signals;
traffic flows, if any, over the A and B loops in the
blocks; and
any restriction applied to cross traffic movements,
where the computer supervises overall signal cycles
and phases.

Heavy movements of vehicles into the Victoria Street
tunnel lanes from local side streets introduced considerable
difficulties, the prohibition of turning, even at peak periods,
being impractical. The aim of keeping the main queue
moving and filling available spaces was frustrated when the
standard link scheme was being used, even with computer
control, since the off-sets frequently encouraged use of the
local streets to gain access to the approach. In fact, using
vehicle-actuated (va) working, the heavy local flows on
side roads tended to extend side road greens at the expense
of the main approaches, with their limited movements,
whilst fixed-time working was too rigid. A Plan 2 bias link,
with off-sets timed back from the Plaza, could not allow
for variations of inhibits within the overall main road
green phases, or for the substantial variations of queue
progression speeds causing wide departures from the
calculated off-sets.
Since the signal controllers could offer a 'green wave'
facility whereby the computer can make direct demands for
phase change and duration, a Plan 3 system was evolved.
In this, the computer induces isolated va working, triggered on and off by the Plaza program through a master
controller. On inhibit release, the computer commands the
controller (subject to safeguards, eg minimum green on
opposing route, etc) to select tunnel route phase green.,
This is held either for maximum phase green, or until the
block is filled, after which normal va working is restored.
This 'green wave' facility is also used for emergency
services. This system reduces and limits filtering from local
streets into tunnel approach lanes but gives maximum
(virtually indefinite) green time to the cross routes under
stationary tunnel queue conditions, thus helping to clear
local traffic.

Emergency service

A special computer program facility (the 'hurry call'
program) permits the Fire Service to select, at the press of
a button, a priority route to anyone of 18 sub-areas of the
city centre. A wave of long green phases (known as the
'green wave') is transmitted to assist overall movement of
traffic on local lanes prior to and during the scheduled
passage of the fire appliances. Certain junctions not directly
on the route are also controlled, to give traffic clearance
ahead of and away from the selected route. The sub-area
route selected is shown on the map display in the control
centre. A maximum of 12 simultaneous route demands can
be made, at present affecting up to 12 controlled intersections. On a clash of requirements at an intersection,
one phase takes priority on a pre-set basis, but even on
repeated calls, no phase may be held more than 2 min.
The computer seizes the required phases at appropriate
times based on operational experience. To cover variations,
the phase is called 20 sec. before the scheduled arrival of
the appliance, and is held for a total of 50 sec. As all safety
guards, eg minimum green on the opposing phase, intergreens, etc, are observed, the phase is in fact held for less
than 50 secs.
An average of all fire calls during a 24-hr period, shows
savings of up to 50 per cent. on trip times, this saving being
most marked during the peak hours and its associated
congestion. Expansion and improvement of control are
envisaged for a new second central area fire station, with
automatic triggering of the hurry call program by the
departure of the appliances themselves, and subsequently,
the synchronisation of the program with the actual progress
of the appliance through the selected route. The latter
facility is to ensure that the appliance and the progress of
the green wave remain in synchronism throughout.
COMPUTERS and AUTOMATION for October, 1971

Part-time signs
Part-time signs indicate traffic conditions to the involved
motorist, effect lane switching and assist in the regulation
of traffic movements. These signs are computer operated,
using 'logic' conditions based on the tunnel traffic conditions, the major determining factor being the switch-on
of the Plaza control program, and congestion states of the
various blocks. Sign changes are subject to pre-set smoothing periods (at present set to 5 min.) irrespective of the main
contr?l logic. With the Plaza program alone triggered, the
first SIgns restrict the tunnel lanes to the tunnel traffic only.
As. the approach blocks fill, advisory 'congestion' signs are
sWItched on further upstream, indicating the prime cause
of the delay.
Additional part-time signs are fitted to the traffic signals
at the entry to each block, showing 'tunnel congested'
when the inhibit starts. This aids driver co-operation and
discipline, when the tunnel signals are red, often for
prolonged periods. Part-time regulatory signs (for example,
"NO LEFT TURN'), operated according to the traffic
situations prevailing at any time, obviate unnecessary
restrictions on traffic movements, but experience shows
a need for advance advisory signs indicating the state of
these regulatory signs. Further control of high capacity
arterial routes, and more particularly the approaches to
two road tunnels, will make extensive use of part-time
signing.

Operational program
The Operational Program is made up with sub-programs
which are run at i-sec., I-sec., and I-min. intervals. These
time intervals are defined by interrupts generated by a
real time clock synchronised with the frequency of the
National Grid electricity supply; the interrupts are served
by a small but powerful supervisor program. Parameters
of interrupted programs are preserved until the interrupt
has been serviced, and a sequence of program priorities
established according to the interrupt priorities. When the
programs of a higher priority have been completed and
terminated, the interrupted program is continued from the
point at which it had been interrupted.
The i-sec. program scans all the detector information
staticised on buffer relays and transfers the information
into core store. Some minor calculations establishing
"change of presence' on each loop in the system are also
executed. The I-sec. program contains a number of subprograms. Demands for 'hurry calls' for a fire appliance
using a 'green wave' are dealt with first. Subsequent
programs are the Plaza control program, which establishes
the necessity for close control, followed by the tunnel
approach program, in which the various blocks of road on
each approach are optimised. The gantry signs are then
adjusted according to the traffic conditions, and finally all
the outgoing data is output (via wetted reed relays) to the
sub-controllers, gantry signs and secret signs. The amount
of spare time is also calculated at this point for the assessment of program efficiency, and displayed on the engineering console.
During the I-min. program, a simple test is made on the
~~j.ority of the comp~ter functions. A failure of any test
InItIates an output faIl message as a warning to the duty
controller. (Since the official hand-over on 1 July 1968,
there have been no known computer failures, although the
system h~s been in operation 24 hrs per day, seven days
a week,. SInce that date.) The I-min. program is also used
when a 'fault log' of the system is demanded by the duty
controller. On receipt of this demand, part or all of the
system (according to the demand) is scanned for defects
COMPUTERS and AUTOMATION for October, 1971

such as 'continuous presence' or 'absence' on a loop detector
without a just cause - such as a parked car - and a report
output at the end of a minute interval.
Miscellaneous facilities are available to correct the
system parameters, or to output data from the core stores
by suitable commands via the control typewriter, or to b~
input via the typewriter or the tape reader whilst the
system is on-line. Work is proceeding to extend these
facilities to enable new programs to be loaded run
suspended and terminated as in a simple mul;i-Ievei
programming system.
System evaluation
Two years of operational use, and the implementation of
software modifications (made as a result of experience and
to cater for changes in the approach routes) have made
a qualitative assessment of the system very difficult.
However, general evaluations of local traffic behaviour
have been possible during periods of severe tunnel
congestion.
The usual random appearance of accidents and serious
breakdo ...:ns in the tunnel has continued to lead to long
periods of stationary or very slow Illoving queues, but local
traffic has moved freely with little or no interference from
the tunnel queues. One unusual yardstick is the number of
buses actually present in the main bus station, reflecting
the low delays and reduced difficulties of traversing the
city centre. With computer control, significantly larger
numbers of buses are now seen at the bus station during
the peak hours.
Future developments
The experience gained so far confirms that an early
expansion of the system towards area traffic control is
essential. Future systems will be based on the existing
control centre, and will include advanced aids to drivers
in the form of advisory signs.
In the city centre linked signal system, it is proposed
that the selection of the linking program from the master
controller's 'library' of three, and the choice of fixed time
or vehicle actuated working will be made by the computer
from traffic flow and density measurements made at
selected points, coupled with a 'time of day' choice to
cater for pedestrian movements.
Data transmission ducts are being provided in all new
highway schemes and installations. Early use will be made
of these in connection with approaches to the new road
tunnel leading to Wallasey, scheduled to open in 1971, and
the first stage of the inner ring road. Further part-time signs
in the new and existing gantry signs will control and distribute traffic to the two tunnels, giving advance notice of
congestion conditions, closures, and estimated time delays.
Studies are being made of a wide range of advanced aids
such as electronic displays (for the presentation of mimic
and alpha-numeric information on TV monitors), simple
time-division-multiplex units to permit economic transmission to the control centre of data relating to more
remote installations, and new static 'detector' devices
(particularly required on multi-storey car park schemes).
With the removal of the toll booths from the Liverpool
entrance to Birkenhead during 1970, an automatic system
controlling nine lanes of merging traffic into the main
tunnel is being designed, not only to eliminate conflicts
where the traffic merges but also as a first step towards the
optimisation of the tunnel flow, in which a 5 per cent.
improvement in traffic throughput is envisaged.
On-line checking of the city's one-mill ion-pound traffic
light system is already planned, by sampling the timing
(Please turn to page 23)
11

FEDERAL DATA BANKS AND THE BILL ,OF RIGHTS

Arthur R. Miller
Professor of Law
University of Michigan
Ann Arbor, Mich. 48104

"Whether he knows it or not, each time a citizen files a tax return, applies
for life insurance or a credit card, seeks government benefits, or interviews
for a job, a dossier is opened under his name and an informational profile
on him is sketched. ... Few people seem to appreciate the fact that
modern technology is capable of monitoring, centralizing, and evaluating
these- electronic entries - no matter how numerous they may be - thereby
making credible the fear that many Americans have of a womb-to-tomb
dossier on each of us. "

(Based on a statement presented to the Subcommittee on Constitutional Rights of the Committee on the judiciary of the United
States, February 23,1971.)

Someone with limited vision might be tempted to say, as
did a federal judge recently, that army spying on the lawful
activities of civilians is "much ado about nothing." Viewed
in isolation, perhaps the judge was right in characterizing
the army's activities as an "assemblage of keystone cops" or
as a mild irritant, especially since the public mea culpas by
former intelligence agents may have helped to abort their
expansion. But military spying cannot be viewed in a
vacuum - unfortunately, it is symptomatic of growing
governmental intrusion and heightened threats to our consti tu tional freedoms.

The Surveillance Society

Consider the implications of these three propositions:
First, Americans are scrutinized, measured, watched,
counted, and interrogated by more governmental agencies,
law enforcement officials, social scientists, and poll takers
than at any time in our history. Second, probably in no
nation on earth is as much individualized information
collected, recorded, and disseminated as in the United
States. Third, the information gathering and surveillance
activities of the federal government have expanded to such
an extent that they are becoming a threat to several basic
rights of every American - privacy, speech, assembly,
association, and petition of the government.
As recently as a decade ago we could smugly treat
Huxley's Brave New World and Orwell's 1984 as exaggerated science fiction having no relevance to us or to life in
this country. But in the last few years this comforting, but
self-delusive, mantle has been stripped away. Revelations
before congressional subcommittees and in the news media
have presented a disheartening panorama of the ways in
which the intruders of our society, aided by modern
science, have destroyed many of our traditional bastions of
privacy. The widespread use of spike and parabolic microphones, the emergence of various gadgets for electronic
eavesdropping, and the ready availability of cameras
equipped with esoteric optical devices have made it clear
that we no longer enjoy physical privacy in our homes,
offices, or remote country retreats. And now, ever increasing resort to the computer, laser technology, and
microminiaturization techniques has begun to erode our
informational privacy and to threaten several of our most
fundamental rights guaranteed by the Constitution.
Spiraling Pattern of Data Collection

Arthur R. Miller is a Professor of Law at the University of
Michigan. He is the author of The Assault on Privacy (Univversity of Michigan Press, 1971), a comprehensive analysis of
the computer-privacy problem. Prof. Miller has testified before a number of Congressional Subcommittees on various aspects of the legal implications of computer technology, and
has written widely on these subjects. He is a graduate of
Harvard Law School, and will be a visiting professor there
during the academic year 1971-72.

12

The hearings on governmental questionnaires and related
matters held by this Subcommittee during April, 1970, and
the wealth of material presented in my new book, The
Assault on Privacy: Computers, Data Banks, and Dossiers
(University of Michigan Press, 1971) demonstrate the spiraling pattern of data collection in this country, and no
purpose is served by redocumenting here what now is
self-evident. Whether he knows it or not, each time a citizen
files a tax return, applies for life insurance or a credit card,
seeks government benefits, or interviews for a job, a dossier
COMPUTERS and AUTOMATION for October, 1971

is opened under his name and an informational profile on
him is sketched. It has now reached the point at which
whenever we travel on a commercial airline, reserve a room
at one of the national hotel chains, or rent a car we are
likely to leave 'distinctive electronic tracks in the memory
of a computer - tracks that can tell a great deal about our
activities, habits, and associations when collated and
analyzed Few people seem to appreciate the fact that
modern technology is capable of monitoring, centralizing,
and evaluating these electronic entries -- no matter how
numerous they may be - thereby making credible the fear
that many Americans have of a womb-to-tomb dossier on
each of us.
Data Banks

Even though the threat to our informational privacy is
growing constantly, most Americans remain unaware of the
extent to which federal agencies and private companies are
using computers and microfilm technology to collect, store,
and exchange information about the activities of private
citizens. Rarely does a day go by without the existence of
some new data bank being disclosed. In recent months we
have read of the Department of Housing and Urban Development's Adverse Information File, the National Science
Foundation's data bank on scientists, the Customs Bureau's
computerized data bank on "suspects," the Civil Service
Commission's "investigative" and "security" files, the
Secret Service's dossiers on "undesirables," and the surveillance activities of the United States Army - to name
only a few of the federal government's data banks that have
brought to light. Even now only the tip of the iceberg may
be visible.
Justification of Data Banks

The lack of concern over these data gathering activities
probably reflects the fact that by and large they are well
intended efforts to achieve socially desirable objectives. For
example, the law enforcement agencies can claim that
filebuilding is necessary to combat organized crime and
restore "Law and Order." In a similar vein, the FBI and the
Army can justify their intelligence activities in terms of
combating subversion or quelling campus disruptions and
riots in our urban centers by knowing who to watch or
seize in times of strife.
Negative Side to Data Banks

But there is a negative side to these mushrooming data
banks - particularly those that bear the imprimatur of a
governmental organization. Consider the information practices of the United States Army. Early this year it was
revealed that for some time Army intelligence systematically was keeping watch on the lawful political activity of a
number of groups and preparing "incident" reports and
dossiers on individuals engaging in a wide range of legal
protests. It must be emphasized that this monitoring not
only covered society's "crazies" but extended to such
non-violent organizations as the NAACP, the ACLU, the
Southern Christian Leadership Conference, and the Women
Strike for Peace.
The Army's intelligence system apparently came into
existence as a by-product of the military's role in ending
the civil disorders of the mid-1960's. Although there is
considerable justification for certain types of information
collection that are directly relevant to the Army's duties,
COMPUTERS and AUTOMATION for October, 1971

the development of dossiers on people pursuing lawful
social and political activities bears little relationship to the
function of the military during periods of social unrest especially when many of those being scrutinized are extremely unlikely to be involved in riotous conduct. Not
only is the Army's filebuilding difficult to justify, but it
appears to have been undertaken without sufficient
appreciation of the fact that the creation and exposure of
dossiers on people who are politically active could deter
them from exercising their First Amendment freedoms of
free speech and assembly, as well as their right to petition
the government. If a citizen's conduct and associations are
put "on file," and perhaps used to harass or injure him, he
may become more concerned about the possible content of
that file and less willing to "stick his neck out" in pursuit
of his constitutional rights. The effect may be (to
paraphrase a thought expressed by Justice Brennan in an
analogous context) to encourage Americans to keep their
mouths shut on all occasions (Lopez v. United States, 373
U.S. 427, 450 (dissenting opinion)). If we really take our
constitutional guarantees seriously, we cannot afford to
stand idly by and allow them to be debilitated any further
by this type of coercion.
A Return to McCarthyism

After a flurry of pUblicity about the Army's activities,
the institution of a lawsuit by the American Civil Liberties
Union, and a number of sharply worded letters from
members of the Congress, the Army announced that it was
abandoning the data bank. But as has been pointed out
repeatedly by the Chairman of this Subcommittee, many of
the Army's statements have been vague and leave the status
and future of its intelligence activities in doubt. Add to this
uncertain state of affairs the existence of the Secret
Service's unregulated computerized system containing
dossiers on "activists," "malcontents," and "potential
presidential assassins," as well as the recent disclosure that
the Justice Department's civil disturbance group is
maintaining an intelligence data bank, and no one should be
surprised if some suggest that these surveillance efforts
contain the seeds of the much dreaded police state or a
return to McCarthyism.
NCIC Threat to Personal Privacy

The rapid development of a number of other
information systems in the law enforcement arena also
threatens personal privacy. The Federal Bureau of
Investigation has established a National Crime Information
Center (NCIC), which provides state and city police forces
with immediate access to computerized files on stolen
property and wanted persons. In the few years since its
establishment, NCIC has become the keystone of an
elaborate crime information network that eventually will
integrate intelligence information centers throughout the
nation into a single system. By the end of 1969, the FBI's
Center was exchanging data with state and city police
computers in every state except Alaska. In a recent speech
to the Association of Computing Machinery (ACM) an FBI
representative announced that there are already
approximately 3,000 remote access terminals linked to the
FBI's computer. Apparently 1,000 of these are in police
stations that are tied directly to NCIC and 2,000 terminals
are' connected to state computer systems, which in turn
have access to NCIC.
13

Dangers May Outweigh Benefits

There is no doubt that in its present fonn NCIC, as is
true of many other law enforcement data banks, is highly
utilitarian and justifiable. No one can quarrel with the
notion that a policeman in a squad car should be able to
call his dispatcher for an NCIC check on a vehicle he stops
on the highway and its registered owner before he
personally approaches it. How else is he likely to be warned
that the driver may be armed and dangerous?
But if these data banks expand to include sensitive
information about people who have not been branded as
fugitives from justice and precautions are not taken to
insure the security and integrity of NCIC and other law
enforcement systems, the dangers may begin to outweigh
the benefits. In the speech before the ACM mentioned
earlier, the FBI spokesman also revealed that police arrest
records probably will be computerized and added to the
NCIC data base next year, assuming that Congress provides
the necessary funds. Despite the notoriously misleading
character of many arrest records (many people who are
arrested are never prosecuted, even fewer are convicted, and
many arrests are of the dragnet variety that occur during
perfectly lawful demonstrations), it was admitted that there
currently are no plans to insure the security of the NCIC
network or to upgrade the quality and accuracy of the data
that is recorded. That, it was said, is the responsibility of
the user.
Other Law Enforcement Computer Systems

State and local law enforcement computer systems also
are becoming increasingly sophisticated. New York already
has in operation the essential features of a network built
around a single computer center - the New York State
Identification and Intelligence System (NYSIIS). This unit
is designed to store information for state and local law
enforcement agencies and permit them to retrieve data
through their own terminals. In Ohio, the
Cincinnati-Hamilton County Crime Information Center
allows 38 city and state agencies to share its computerized
information. This system is tied both to NCIC and the Ohio
State Highway Patrol Computer Center in Columbus, Ohio
and plans are underway to connect the Cincinnati-Hamilton
County Center to systems in Kentucky and Indiana. Going
farther afield, Scotland Yard is developing an information
system that will be available to law enforcement agencies
throughout the British Isles and similar computer systems
are being developed in other nations and by multi-national
organizations such as INTERPOL. Satellite or cable
transmission will enable these centers to exchange data with
NCIC, which can then forward them to state and local
systems.
More Comprehensive Networks in Future

The same pressures of efficiency and expediency that are
encouraging the exchange of information among agencies
on the same and different levels of government will lead to
even more comprehensive networks in the future. Direct
federal funding already is contributing to this trend - the
Office of Education is supporting a Migrant Worker
Children Data Bank, the Department of Housing and Urban
Development is sponsoring prototype computerized
municipal information systems and building files on
housing loan applicants (with particular attention to those
14

who prove to be ineligible), and President Nixon's welfare
reform proposal (the Family Assistance Act) would give the
Department of Health, Education, and Welfare authority to
collect and exchange data on individuals with state welfare
agencies. It would be foolish to ignore the ease with which
each of these data centers could be integrated with the law
enforcement and surveillance information flow.
Other combinations are on the horizon. In light of the
polarity of today's student activism and public and
governmental reactivism, it is even conceivable that federal
surveillance systems and educational data centers will be
linked, either formally or informally. If anyone thinks that
this notion is farfetched, let him consider the implications
of President Nixon's request of September 22, 1970 for
funding and increased statutory authority to use 1,000 new
FBI agents on university campuses. Conceding the need for
reinforced investigative manpower to restore peace to our
institutions of higher learning, what controls will there be
on the massive amount of potentially damaging personal
information this type of operation is bound to generate and
what assurance do we have that the integrity of university
records will not be compromised?
The Need for Regulation

At present there are no effective restraints on the
national government's information activities and no one has
undertaken to insure that individuals are protected against
the misuse of the burgeoning data banks. Indeed, a survey
by the Senate Subcommittee on Administrative Practice
and Procedure revealed many instances of agency demands
for information that had not been authorized by Congress
and concluded that most "government forms require either
nonessential or too detailed information from the
individual citizen." Similarly, the authority for the Army's
surveillance of civilians is obscure. Neither the Executive
Orders relating to security checks for government employment nor the so-called "Delimitations Agreement" between
the military and the FBI, which allocates jurisdiction over
personnel security investigations, seems to encompass the
Army's filE: building.
What is more, muscle flexing has become a common
government technique for furthering some of its datagathering activities. Information collectors often deceive
people by intimating that the law requires a response to
questionnaires that in fact are voluntary, or use coercive
practices (such as subtle threats of a loss of government
benefits) to extract information. Even among citizens who
are offended by certain inquiries or practices, there is a
natural reluctance to "buck the system."
Banking and Credit Transactions Watched

No one seems to be immune from these activities. For
example, in an effort to trace the movement of American
funds abroad - particularly to Swiss banks, draft evaders,
and the Viet Cong - the FBI keeps watch on large numbers
of domestic banking and credit transactions. Financial
institutions rarely object to these intrusions on their files,
perhaps in part because many bank and corporate security
officers are former FBI and law enforcement agents.
Furthermore, since the FBI has jurisdiction over bank fraud
cases, the banks may find it to their advantage to "cooperate" - especially if they might want an information
favor from their government friends tomorrow. Thus, it is
not surprising that the FBI is able to examine over 25,000
credit bureau files annually without first securing
COMPUTERS and AUTOMATION for October, 1971

sUbpoenas.
Governmental Bugging

Nor is the government's hyperactivity in collecting
information offset by its exercise of restraint in using it. On
one occasion the FBI publicly released 1,200 pages of
transcripts of electronically recorded conversations among
reputed Mafia figures in which numerous prominent people
were talked about, often disparagingly. Even conceding the
desirability of informing the public of the threat organized
crime poses to our society, need it be done by encouraging
the daily press to publish unsworn conversations procured
by governmental bugging? In a similar vein, why shouldn't
citizens have doubts about the government's handling of
personal information when presidential advisors have access
to their federal tax returns and they are exchanged with
state and local taxing agencies without taking any serious
precautions to insure their confidentiality.
The data bank problem is being magnified by the
computer. The trend toward computerization of personal
information is resulting in a marked increase in the
quantity, sensitivity, and variety of data that will be found
in the electronic dossiers of the future, as well as expediting
their exchange. Moreover, gaining access to these systems
will be a desirable objective for a snooper, muckraking
newsman, or political operative since a printout of
someone's file may well contain public record information
intermingled with subjective intelligence reports, data given
by the subject or an informer with the assurance that its use
would be limited, and information transferred from other
computer systems. And it simply is unrealistic to assume
that the managers or proprietors of computer systems governmental or private - will take it upon themselves to
protect the public against misuse of the data in their
custody.
Growing Governmental Computer Power

Approximately 20 federal agencies, bureaus, and
departments already operate time-sharing computer systems
or are in the process of establishing them. Additional
systems are certain to spring up both within other governmental organizations and as a result of a number of
proposed legislative programs calling for the collection of
new bodies of personal data. Thus, the roots of a federal
information exchange network have taken hold and the
Bureau of Management and Budget has extensive authority
to promote its further development. In view of the disclosures, both before this Subcommittee and others,
relating to the insensitivity of some government information handling practices, the prospect of an omnibus, de
facto, federal data network evolving without prior
comprehensive congressional review, or the formulation of
any policy guidelines that impose an obligation to protect
privacy and the various rights guaranteed by the Constitution, is not a pleasant one. Yet in spite of the obvious
implications of this growing governmental computer power,
in critical areas involving fundamental personal rights,
federal agencies are still operating in an environment of
policy by default and inaction. Information is being gathered, recorded, and disseminated with a Let-GeorgeWorry-About-It philosophy that is putting us on the
pathway toward a dossier dictatorship.
The irony of all this is that several years ago a proposal
to establish a National Data Center was blocked by a
combination of congressional opposition and public
COMPUTERS and AUTOMATION for October, 1971

ou trage. In retrospect, that suggestion has proven
innocuous compared to the reality of some of the systems
already functioning in the Executive Branch of the
government. The phoenix that has arisen from the ashes of
the Data Center proposal is the unregulated and haphazard
proliferation of governmental data banks and machine
interconnections that already is posing a threat to some of
the pillars of our democratic society.
Suggestions for Protecting the B ill of Rights The I nadequacy of Common-Law Remedies

If some of the constitutional protections we have
enjoyed in this country are to survive in a data based,
electronic world, the law must begin to adjust to today's
realities. As I have attempted to demonstrate in my book,
the existing patchwork of common-law remedies, constitutional doctrines, statutes, and administrative regulations is
not capable of dealing with the problems raised by the
accelerating pace of federal information gathering and the
emergence of computerized information systems. Today's
legal structure is characterized by uncertain application,
lack of predictability, frequent inconsistency, unawareness
of the ramifications of the new communications media, and
an almost total disregard for the individual's right to
participate in information transactions that may have a
profound impact on his life. To take but one of many
examples of this, the existing common-law tort theories
deal almost exclusively with the public dissemination of
previously acquired data, and ignore the implications of the
unrestrained governmental collection of information. To be
effective, a regulatory scheme must reach the latter
problem and this simply may be impossible or may evolve
too slowly from the right-to-privacy tort as we know it
today.
Recognition of Citizens' Rights

But the law books are not entirely barren. The Supreme
Court has recognized the individual's right to object to
certain governmental attempts to extract information from
him. Perhaps the most clearly developed of these notions is
the citizen's right of associational privacy, which seeks to
recognize the "vital relationship between the First
Amendment freedom to associate and privacy in one's
association." (NAACP v. Alabama, 357 U.S. 449, 462;
1958) Thus, when the government attempts to gather data
concerning an individual's association with a group
dedicated to the advancement of certain beliefs in "political, economic, religious, or cultural matters" (Id. at 460), it
must "convincingly show a substantial relation between the
information sought and compelling state interest." (Gibson
v. Florida Legislative Investigation Committee, 372 U.S.
539,546; 1963) These cases certainly contain the doctrinal
seeds needed to curb the excesses of those federal surveillance activities that are likely to inhibit the exercise of First
Amendment freedoms. It must be noted, however, that the
successful assertion of a violation of one's associational
privacy appears to depend upon a showing that disclosure
will result in a restraint on an individual's ability to exercise
his freedom of association.
Closely related to the right of associational privacy is
another judicially recognized individual interest - the right
to possess ideas and beliefs free from governmental
intrusion. As the Supreme Court stated in Schneider v.
Smith, 390 U.S. 17 (1968), First Amendment guarantees
and ·the concept of associational privacy "create a preserve
15

where the views of the individual are made inviolate. This is
the philosophy of Jefferson that 'the opinions of men are
not the object of civil government, nor under its jurisdiction ... .' " (Id. at 25)
This judicial recognition of privacy in one's associations
and beliefs should not be narrowly construed; if it is, the
people will receive only limited protection against highly
inhibiting governmental intrusiveness. It seems to me that
these Supreme Court cases announce an expansive principle, one that is part of a tradition basic to the nation's
philosophical fabric - the conception of government as an
institution of limited powers that is obliged to meet a heavy
burden of justification when it undertakes a program or
course of action that will inhibit the freedom of its citizens.
It is axiomatic that the in terrorem effect of wide scale
governmental surveillance or information control can chill
the exercise of an individual's constitutional rights. Thus,
agency supplications based on claims of economy or gains
in governmental efficiency or justified in terms of the
current quest for the holy grail of "Law and Order" simply
do not justify every demand for greater power to extract,
manipulate, store, and disseminate data relating to the lives
and activities of people and groups.
Altering Citizen-Government

~alance

Unfortunately, the trends in the information surveillance
field are altering the citizen-government balance so drastically that even if the common-law privacy remedies were
refurbished and the First Amendment freedoms of association of belief were expanded, it still would be unwise to
rely exclusively on private lawsuits for damages or an
injunction against further intrusion on constitutional rights.
In addition to the difficulty and imprecision of attempting
to convert a loss of freedom into monetary terms, the right
of an injured person to seek redress is hollow indeed
because he is so completely excluded from the information
gathering-recordation-dissemination cycle that in many
instances he may never rearn how his life is being affected
by the circulation of personal data relating to him.
Possible Legislative Approaches

Direct legislative action based on the congressional
power to safeguard constitutional rights clearly is indicated.
Statutory protection might take a number of different
forms. One relatively simple statutory approach is to
prohibit governmental organizations from collecting
designated classes of sensitive personal data - an approach
that is bound to incur the ire of the agencies, all of whom
believe that their data gathering activities are imperative for
the success of some national policy.
One variation would be a statute prohibiting data
collectors from using, or threatening to use, coercion to
compel individuals to disclose data they are not legally
obliged to furnish. This would also require reappraising the
existing statutes that make disclosure of certain
information by citizens mandatory, presumably with an eye
toward reducing their coverage. Some aspects of the bill
introduced last year by the Chairman of this Subcommittee
(S. 1791) illustrate this approach. The same is true of the
proposals seeking to eliminate the criminal penalties for .
failure to answer many of the questions on the decennial
census. Although eliminating some of the harsh sanctions
for noncompliance with governmental demands for
information appears to be desirable, doing so is not a
16

panacea. Prohibitions against coercive data collection will
only remedy some of the more blatant abuses; they will be
of no assistance in assuring better data handling and
dissemination practices or limiting the government's right
to collect information from sources other than the data
subject.
A different, and in some ways more drastic, legislative
approach involves requiring computer manufacturers, users,
and data networks to employ prescribed technical and
administrative safeguards for maintaining the integrity of
personal information. This also could take the form of
imposing a general statutory duty of care on every federal
official connected with the processing of data, which would
have the effect of encouraging sensitivity to the dangers of
information abuse, or of enacting detailed requirements
that would have to be followed by all computer
manufacturers, handlers, and users of personal information.
The Complexity of Legislation

It would be very difficult at this time to employ any of
these legislative formats in a statute that was to have
general application. Personal information is used for so
many different purposes that it may be impossible to draft
a single body of statutory rules to govern all data systems
carrying individualized data. The problem is compounded
by the chameleon-like character of many types of
information - data collected in one context may carry an
entirely different meaning when transplanted to anothe.r.
Extremely complex legislation therefore would be
necessary if specific privacy safeguards are to be prescribed
for different information environments. This would be a
particularly useful way, for example, of insuring that the
sophisticated protective schemes that do exist for
safeguarding computerized data are employed. A variety of
access regulations, personnel controls, and mechanical
devices are available that can discriminate among users and
differentiate data on the basis of its sensitivity. To protect a
system adequately, a combination of these techniques will
have to be used so that a weakness in one aspect of a
system's security will not compromise the other protective
schemes. Along the same lines, any legislation that
purported to prescribe how sensitive personal data whether computerized or not - should be protected would
have to deal with every phase of information integrity and
draw distinctions in terms of the various levels of
information sensitivity.
A Potpourri of Statutory Controls

Thus, a potpourri of statutory controls might well prove
necessary; some would establish degrees of confidentiality
for different kinds of data and others might prescribe the
technical and procedural safeguards to be employed by the
sys tem. This type of refined legislative structuring
presumably would be based on an evaluation of how much
"privacy" the data in a given system deserves and a
balancing of the damage that could be caused by misuse of
the information against the importance of the information
to some legitimate government objective, as well as the cost
and loss of efficiency that might result from implementing
various safeguards. Alternatively, separate statutes could be
framed in terms of the different types of information that
is collected - e.g. health, military, internal security,
financial - or to deal with the activities of the various
groups that gather data - e.g., law enforcement agencies,
COMPUTERS and AUTOMATION for October, 1971

military organizations, administrative agencies, statistical
organiza tions.
But a detailed congressional assessment along these lines
becomes an overwhelmingly complex undertaking,
especially if it must be made against the background of
massive surveillance data banks or highly sophisticated
computer networks that carry information from numerous
sources and are used by different governmental
organizations for highly disparate purposes. Our very
limited experience with data centers and computer
networks, however, makes the job of drafting sound,
comprehensive, national legislation that will stand up under
the pressure of rapid technological change virtually
insurmountable at present.
Watchdog Group

Al though various factors make detailed federal
legislation in the near future both difficult to compose and
a potentially unsatisfactory technique, they do not
preclude the possibility that the current threat to our
privacy and constitutional freedoms may be amenable to
administrative regulation. In addition to obviating the need
to make highly sophisticated policy judgments in statutory
form, which may become obsolete shortly after going into
force, giving the problem over to administrative control
might have the effect of putting it in the hands of a
watchdog group, composed of experts in the field who can
exercise continuing supervision over governmental data
activities. Moreover, if well drawn, administrative
regulations should provide su'fficient flexibility to permit
experimentation and require less time for revision when
new problems present themselves than do statutes.
Administrative Regulation Holds Promise

Unfortunately, there is a negative side. Administrative
regulation has fallen into considerable disfavor in the
United States because it frequently takes on a highly
bureaucratic character. All too often, resort to agency
action has become synonymous with delay, red tape, and
arbitrariness, with the hoped for supervision of a field by an
informed cadre giving way to the reality of politicized
administrators who have little understanding of the
complex problems under their governance. The situation
typically is made worse by inadequate staffing and funding,
which prevents many federal agencies from acquiring the
expertise necessary for rational decision making. Despite
these deficiencies, however, I believe that administrative
regulation holds the most promise as a means of coming to
grips with the important problems confronting us in the
information arena.

jurisdiction over all of the federal government's information
activities.
It also seems axiomatic that regulatory power ought not
be given to an agency having operating responsibilities that
are dependent upon or involve the handling of a flow of
personal information. The debate over the proposed
National Data Center and revelations before congressional
subcommittees concerning the intrusive activities of the
Internal Revenue Service, the Post Office, and the
Immigration and Naturalization Service, make it abundantly clear that the rights of the individual often get short
shrift from agencies that have a vested interest in gathering
and using personal data. The result, of course, is that most
of the existing information agencies should be disqualified
from a leadership role in formulating regulatory policy for
governmental data banks.
The Creation of a New Institution

Is there any organization to which the problem can be
entrusted? I have given careful thought to the possibility
that an existing federal bureau, agency, or department, such
as the Census Bureau, the Bureau of Management and
Budget, the Federal Communications Commission, or the
Federal Trade Commission, might be given responsibility
for developing an administrative scheme for regulating the
federal government's information activities and computer
systems. But I have sadly come to the conclusion that none
of them would be an effective guardian of the rights of our
citizens, either because they are obligated to various
institu tional "clients", or because they are philosophically
committed to the paramount importance of administrative
efficiency.
If this is true, then the conclusion is inescapable:
regulatory control must be lodged outside the existing
administrative channels. As repugnant as it may sound in an
era of expanding governmental involvements, it may be
necessary to establish a completely new institution perhaps modelled after the semi-autonomous Government
Accounting Office - that can operate under a set of
legislative guidelines and establish policy for the protection
of individual privacy and the preservation of Constitutional
rights. A new agency migllt well succeed in regulating the
nature of the data about citizens that can be collected,
recorded, and stored by various governmental
organizations, enforce a congressional standard of care for
insuring the accuracy of the government's information
store, and make certain that all federal data centers employ
the latest and most appropriate technological safeguards to
protect files against breaches of security.
Characteristics of the New Administrative Body

Where Should Regulatory Power Be Placed?

It is not immediately apparent where regulatory power
should be placed or what form it should take. Certain basic
principles provide some guidance, however. Because of the
national character of the citizen-surveillance problem and
the computer-communications industries, there is no doubt
that control at the federal level is essential. Yet a regulatory
approach based on a general legislative directive to all of the
agencies, but one that leaves each of them responsible for
establishing rules governing their own information
activities, is likely to produce such significant variations in
philosophy and practice that little may be gained. Thus,
regulation must come from a single source having
COMPUTERS and AUTOMATION for October, 1971

In addition, there are several necessary characteristics
that any administrative body must possess in order to be
effective as a guardian against undue informational
surveillance, and it might be useful at this point to suggest
what some of them are. The agency should be staffed by
people who are versed in a wide range of disciplines technology, science, law, and the humanities (particularly
psychology and sociology). The agency commissioners or
directors themselves should be drawn from various fields.
The agency also must have access to all federal data banks
and maintain a close liaison with other governmental
organizations as well as the data gathering and using
communities in the private sector. This is essential in order
17

both to stay abreast of the nation's information needs and
to be in a position to recommend a revision of the
regulatory scheme when changing conditions make that
necessary.
Educating People About Society's Data Needs

One of the basic tasks of an agency of the type I am
suggesting is to attempt to educate the data worshippers,
the privacy paranoids, and the general public in the hope of
achieving some common understanding of society's data
needs and the growing public concern over the preservation
of individual privacy and the First Amendment freedoms.
At present there is considerable anxiety throughout the
nation about the specter of a fishbowl environment and a
lack of sensitivity to the problem on the part of
information managers and system designers.
To further this educative function, it might be desirable
to hold public hearings on a broad range of subjects,
undertake technical and social science research projects,
and act as a clearinghouse for information concerning
activity in each of the many fields that bear on the question
of governmental information policy. By use of these and
other methods, the proposed agency could implement a
principle analogous to that embodied in recent proposals
before the Congress to create a Technology Assessment
Board.
Preservation of Personal Privacy and Freedoms

Ano ther basic ingredient for evolving a rational
regulatory policy is that the agency must have authority to
engage in rulemaking relating to the technical features,
personnel qualifications, and administrative procedures
employed by all data centers that handle significant
quantities of personal information. If airplanes and pilots
must be certified, if automobiles are required to meet
safety standards and their drivers obliged to pass tests and
obtain licenses, why shouldn't governmental data
collectors, computer systems, and information managers be
obliged to meet and be pledged to honor requirements
relating to the preservation of personal privacy and
constitutional based freedoms?
Regulation of Non-Federal Systems

Ideally, the agency's power should be broad enough to
embrace the activities of non-federal information gatherers
that might adversely affect the rights we are trying to
protect. The regulators should be particularly attentive to
the interlocking relationships that have begun to spring up
between federal and local data handlers in the law
enforcement field and the fact that many of the nation's
major corporations maintain dossiers on millions of
Americans. Close scrutiny of the latter category of data
banks is becoming imperative because there is growing
reason to believe that these files are exchanged both within
the private sector and with law enforcement and
surveillance groups at all levels of government. In short,
once standards are established for federal systems, I believe
that it eventually will become necessary to apply them to
certain non-federal systems.
I nformation Ombudsman

To implement the controls and regulations ultimately
adopted, the federal agency I am describing will have to
18

provide a method for handling grievances brought to its
attention by members of the public. One obvious method
would be to give statutory authority to the information
agency to investigate, direct correction, and award
appropriate relief for any abuses brought to its attention by
individual citizens. Through the use of these procedures, its
ability to negotiate with the information managers, and its
status as a governmental organization, the agency could
play the role of an information ombudsman, a device that is
well known in the law of several European countries and is
beginning to be recognized in the United States.
A Citizen's Control Over Information Relating to Him

The agency also must develop and place heavy reliance
on measures that provide the citizen some degree of control
over personal information relating to him. The objective
should be to develop procedures that give the individual a
voice in the important transactions concerning his life
history - transactions that often may drastically affect his
economic and social well-being. Our society's traditional
dedication to ideals of fair play and due process indicates
that any set of rules regulating the handling of personal
information should accord the individual, or someone who
can represent his interests adequately, the right to receive
notice and an opportunity to be heard before important
decisions are made concerning his informational profile.
The federal government should be held to no lesser
standard.
The right to be heard must include the ability to rebut
damaging evaluations, or to show that a particular
information practice deters his exercise of rights protected
by the Constitution, or to demonstrate that the data does
not sufficiently further any legitimate government objective
so as to warrant its retention, or to demand that recorded
personal information conform to minimal standards of
accuracy. In order to be meaningful, an administrative
means of resolving conflicts between the citizen and the
government must be expeditious and inexpensive.
An Agency Accessible and Responsive to Everyone

The effectiveness of an agency that is intended to
protect individual citizens against information abuses
obviously depends upon its ability to avoid becoming a
captive of the governmental units and private interests that
have a stake in the data networks and systems that are to be
regulated. The tendency of the so-called independent
regulatory agencies to be captured by the industries they
supposedly stand vigil over is a disheartening, but not
totally bleak, prior history from which to proceed. With
proper staffing and well-chosen lines of authority, an
information agency may be able to achieve the degree of
independence needed to perform its vital watchdog role.
The other extreme must be avoided as well. A
governmental agency cannot be permitted to become an
island unto itself - neither responsive nor responsible to
anyone, populated by technocrats whose conduct is
shielded by their alleged expertise and the supposed
importance of the governmental functions they perform. It
must be accessible and be respo"nsive to everyone. Above
all, the agency's activities and its regulations must not be
permitted to ossify. For the foreseeable future the key to
effective regulation will be the ability to maintain sufficient
flexibility and resiliency to adjust to changes in our
0
technological and social environment.
COMPUTERS and AUTOMATION for October, 1971

ENVIR'ONMENTAL POLLUTION:
MORE PROBLEMS WITHOUT SOLUTIONS?

what really happens to a city when a clean air policy is instituted? An easy
answer might be that the people will eventually breathe more freely. The more
searching questions, however, might concern the secondary results that such a
policy would have on the economic, social and political atmosphere of the city. "

Peter House
En vira me tries
1100 17th St., N. W.
Washington, D. C. 20036

(Based on a paper presented as part of the technical program at the
1971 Spring Joint Computer Conference in Atlantic City, N.J.)

We are about to spend (so says the Federal Government)
about 10 billion dollars over the next few years on a holy
war to save the environment. The crusade, this time, is to
fight pollution initially and to preserve our environment
eternally.
We mayor may not win, but past performance indicates
that when the goal is universally agreed upon, the chances
of success are greater. We have already spent double this
amount to achieve our country's most flamboyant success
of the past decade - leaving footsteps on the moon. This
universally-acclaimed achievement, coupled with other large
and well-known crash programs, such as the Manhattan
Project and war production of airplanes and ships, gives
credence to the American formula for problem solving take research and technology, add publicity and stir, blending in large amounts of money as needed.
Research Fads

The formula seems to work well enough in the fields of
science and technology. Unfortunately, when the social
sciences try to use the same recipe, they usually come up
with half-baked schemes. Despite their good intentions,
social scientists in the past decade have been sent on
crusades to banish poverty, segregation, unemployment,
youthful alienation, mis-education, the urban dilemma, and
others. Those impressive hula-hoops of research were discarded one by one - not because problems were vanquished, but because fickle public interest, policy focus and
funding were supporting a new and better research fad.
Test Proposed Solutions

Upon us now is another cycle of extensive radio and
T.V. coverage, newspaper stories, magazine pieces, journal
articles and speeches covering every topic that can be even
loosely tied to the environment - which may well include
anything. My sincere hope has been that in this cycle, we
COMPUTERS and AUTOMATION for October, 1971

Peter House is President of Envirometrics, Inc., where he has
directed the development of three simulation models of urban
operations; he was a pioneer in the use of man-computer simulation techniques; and has also worked in the field of assessment and taxation. He is the author of several papers and has
spoken before many groups including the Association for Computing Machinery and various government and academic
groups. Dr. House received an M.A. in Economics from Clark
University, and a Ph.D. in Public Administration from Cornell
University.

decide what we want to do, plan carefully, and test our
proposed solutions before we inflict them on our land and
our people.
My ten years in social science research has led me
through the wasteland of many of the above programs with
their policy statements, their resounding high hopes and all
too few successes. This experience also suggests that my
wish for environmental policy planning before the expenditure of large amounts of money for "solutions," is naive.
Almost two years ago, a group of us, frustrated by rhetoric,
19

formed a company called Envirometrics. The name reflected our concern not so much for the physical milieu but
for the total fiber of society.
Proliferation of R&D Groups

Today the name seems a possible error as dozens of
others will attempt to become "Environmetricians" (as
many of the past decade became, or are still becoming
"Urbanologists"). The possible proliferation of so many
R&D groups, added to those already in universities, all
writing weighty treatises that define environmental problems and offer still weightier solutions suggests a pollution
of our landscape greater than almost any form of smoke or
raw sewage.
An Alternative

I would suggest a somewhat radical departure from
many of our past research techniques. Let us keep the
amount of repetitive, descriptive, paper-generating "research" to a minimum, particularly the variety which offers
instant solutions to mammoth and complex problems. More
importantly, I would suggest that we not rush into testing
our dubious schemes on our people and our land before we
test them in a laboratory. Such restraint is not only good
research policy, it is also good economics - not to mention
the humanistic benefits of minimizing the often horrendous
social and personal costs of program failure.
The physical effects of environmental research can easily
be pretested before solutions are actually tried out. The
problem is how to test these physical solutions in the
context of a total society. For example, what really
happens to a city when a clean air policy is instituted? An
easy answer might be that the people will eventually
breathe more freely. The more searching questions, however, might concern the secondary results that such a policy
would have on the economic, social and political atmosphere of the city.
Solution to Pollution Problem is Expensive

Once as I drove along the Massachusetts Turnpike from
Springfield, Massachusetts to Albany, New York and
looked at the river pollution caused by the paper mills, I
thought that it was a shame that good trout waters were
ruined because of a factory or two. The immediate solution
seemed relatively simple. The State could pass a law
requiring that the paper industry clean up its run-off before
dumping it into the river. I understand that present technology is quite capable of accomplishing the cleansing. The
problem is that the technique is so expensive that it is
doubtful it can be afforded by these small paper companies.
Strict enforcement of the law would probably close most of
them. From the point-of-view of conservation, that would
be a victory, as the rivers would eventually return to normal
with help from the State Water Commission and fishing
would be restored after restocking.
A minor flaw in the solution is that these paper mills are
usually the only industry in the surrounding town. The
closing of the mill means the closing of a whole community
effectively.
Let's not try and judge the relative merits of the choice,
one Clean River over one viable Community, since there is
no value scale (at least one on which we would all agree) to
use as a measure. Rather, this admittedly simple example
20

suggests that rushing headlong into the solution of the
environmental problems, before we examine the potential
effects of policy, may have unexpected, deleterious effects.
We may throw out the baby with the bath-water - even if
our purpose was to get rid of the dirty water.
The Environment and the Policy Maker

Probably the single most difficult task of the policy
maker is to extrapolate into the future the changes he
would like to make to the current situation. This need to
"predict" the potential results of policy decisions has led to
the birth of numerous methodologies in the social sciences,
all aimed at the same goal of being able to be "predictive."
When pursuing the goal, most social science disciplines
reduced the scope of the problem and claimed that they
were only going to note the effects of a particular decision
on one sector of the total milieu. This strategy makes the
problems more manageable for the social scientist; unfortunately, it also often makes the results useless to the
policy maker.
Others who recognized the need to look at the total
milieu, rather than each of the parts, were faced with an
equally interesting dilemma. Much of the detail used by
those who focused on a single discipline was solid and
appeared to represent reality. Unfortunately, the task of
correlating all of these detailed factors seemed beyond
normal ability. These early systems analysts solved the
dilemma by deciding on a level of generality which would
encompass most of these other disciplines compatibly, and
yet be understandable. Regrettably, the level usually chosen
was so gross that analysis of the effects of policy change
was not possible. Recently modern systems analysts have
suggested that we use the computer to help us remember
more facts and to aid us in correlating the more detailed
features of the various social science disciplines. In essence,
the computer allows us to increase the level of detail when
handling a total milieu rather than a particular part. In fact,
the level might be sufficiently fine that the policy maker
could use it to get a glimpse into the future.
The social scientist has, of course, not totally ignored the
computer. Skipping applications which use the computer
only as a number manipulator, let us concentrate on three
major areas of computer usage: information retrieval,
simulation, and gaming. In this article, I will try to explore
only the essence of each.
Information Retrieval

It seems that only recently the urban social sciences have
seriously considered basing their decision-making process
on real data. Spurred by national interest, particularly in
our decennial Census and Federally-sponsored research,
state and local areas have turned to numerous software
concerns to design information systems to store the vast
amounts of data generated by various government departments and others, and to organize the data so that it is able
to be retrieved on command by interested parties. The
concept is obvious and necessary.
On the other hand, not all state and local governments
have rushed to computerize their records. The reasons for
this reticence differ but can generally be attributed to a
lack of understanding or knowledge of the service, fear of
having others acquire a detailed knowledge of particular
sections of government, and cost.
COMPUTERS and AUTOMATION for October, 1971

The 1970 Census with its attendant pUblicity and availability of data over the next year should make the applications of information retrieval more widely known. Further,
the Department of Housing and Urban Development has
funded six cities, on a matching-grant basis,to build
information retrieval systems which can be readily exportable to other cities. The effects of this six million dollar
program will begin to show up in the next couple of years.
Finally, the Census Bureau, in making its tapes readily
available to a number of centers across the nation, should
help to attract sufficient interest from private industry to
make information retrieval or management information
better known.
Resistance to the Computer

A second stumbling block, fear, is both serious and
horrifying. This fear i~ not new nor confined to the civil
service. Throughout the vocations, job security has been
associated with the monopolization of knowledge or skills.
We seem to be encountering the same resistance to computers with which manual workers met the introduction of
mechanization. After many years, we have finally convinced most sectors of the community that the manmachine partnership has truly produced an industrial
revolution; a revolution which has led to a society of
material opulence unparallelled in man's existence. Now the
professional and white collar worker is being asked to also
accept a partnership with a machine, the computer. The
resistance shown the computer is also as severe as the
resistance to the mechanical machine of old. We can
continue to expect a great level of resistance to the
computer throughout the job community, helping to slow
down its acceptance and its use in information systems for
governmen t agencies.
And finally, changing from hand-operated record keeping to computer is initially extremely costly. The organization of data, key punching, and so forth, of all necessary
data to load such a system is often quite large. Further, the
loading takes place while governments carryon "business as
usual." The hiring of additional help, usually consultants,
does mean high start-up costs. Further, the confusion
caused by the switchover may reduce the efficiency of
many government staffs as they carry out their day-to-day
functions.
Such defects could be mitigated, however, by phasing in
the information system over longer periods of time. A plan
to computerize a state or local government, when carried
out over some time by local talent (possibly using consultants only to design the system) has a greater chance of
worker acceptability, is cheaper yearly, and interferes less
with daily routine.
To summarize, the computer will be used more and
more to aid us in keeping the large amounts of data we
need to make better policy decisions. The computer revolution, however, has not been immediate nor its acceptance
unanimous.
Simulation

Among the first uses of the computer as a decisionmaking aid were those associated with simulation in the
physical sciences. The history of such uses is extraordinarily
rich and too well documented elsewhere to be repeated
here.
COMPUTERS and AUTOMATION for October, 1971

During the past decade or two, the social scientist has
also attempted to use the computer to answer questions in
the realm of "what if." Simulating a city, in whole or in
part, is an extraordinarily useful tool for the urban researcher and policy maker. A successful replication of social
reality in a computer-simulation would allow the people
who must make decisions, both administrative and political,
to make them better and to have more confidence in the
expected effects of the policies they put forth.
At the same time such simulations can reduce the overall
cost of attempting to bring about a given social change. A
simulation can do this by pinpointing a policy which
promises to be the most successful of a number of possible
alternatives. Reducing the number of false starts would also
help to lessen the amount of human suffering and inconvenience associated with social programs which are begun
and then abandoned.
Simulation Techniques

The technique by which social scientists simulate their
world is basically the same regardless of the problem.
1. They define the situation (of which the problem
or interest area is a part). The definition usually
includes a number of necessary limiting assumptions which define the strata of the real world the
analyst is about to simulate.
2. They decide the level of abstraction to be used and
the variables, which they believe to have sufficient
bearing on the area to be stimulated.
3. They determine the method of simulating the
problem so that the significant variables are related
to one another and the relative effects on each
other can be considered.
4. They gather the necessary data to load the simulation so that the current situation (as described by
the model) can become the basis for future extrapolations.
5. They fine-tune the model so that, by some criteria
or other, the user has confidence in the predicted
results.
The process, therefore, is relatively straight forward and
not impossibly difficult to program for the computer. In
fact, the similarity among many types of simulation problems is so great that special computer languages, SIMSCRIPT and GPSS were developed to facilitate programming the simulation routines.
Success of Simulation

Unfortunately, the results of simulations have not been
uniformly good. There appears to be some success with
those that concentrate on a single problem which can be
defined with measurable parameters. Probably the m0st
successful examples in social science are transportation
simulations where expected road usage, effects of road
building on traffic load, and many other related problems
are considered. Reputedly successful are those that predict
use based on population projection and transportation
routes.
Failure of Simulation

Failures, however, far outweigh successes. Many
attempts have been made to simulate a total urban environ21

ment; most have been judged failures after running. Some
never ran. The difficulties were many; horrendous complexity as well as lack of data, of basic research, of basic
theory, and of money. Generally, though, the failures stem
from the simple inability of the simulation designers to
measure social, political and institutional parameters descriptors of the environment which are indispensable but
generally conceded to be non-quantifiable or at least very
difficult to quantify.
Obviously, these general statements do not condemn
simulations but emphasize their limitations. Unfortunately
these limitations have been sufficiently serious that no new
macro-simulations have been started which attempt to deal
with all the various facets of the social milieu.
Gaming

The third major area in which the social sciences have
employed th~ computer as a partner is in education and
training. Gaming has been using computers for almost two
decades. In many instances, builders of games have rebelled
against simulation and thus, have been damned by simulation designers for not being able to use realistic numbers in
their models.
Bluntly, regardless of whether or not a game builder uses
simulation, the principal constraint of gaming models is not
the degree of their realism nor the accuracy of their data
base. Games are built so ~hat people can play them, and
learn various things from such participation. If the game
gets too complex to play it loses its purpose and approximates reality only to the extent that there are people bright
enough to comprehend the total environment represented
in the game and to operate within its constraints.
Gaming has come a long way in the past several years.
Early models (and some of the more simple-minded present
ones) were designed to be learned rapidly, played manually,
and teach little. They resembled a parlor game more than a
serious educational tool and consequently, gave gaming an
almost ludicrous reputation and relegated it to the primary
and secondary grades. Recent models such as the GSPIA,
METRO, CITY, Northeast Corridor, and INS have advanced
the technique into a respected education-training tool for
college level and adult audiences. The principal aim of these
models is to create a more or less comprehensive decisionmaking milieu for players to operate in and on. Among the
many goals sought by their builders, is to teach participants
the interrelatedness of the social system and the hopelessness of making policy through the single focus of one
discipline.
As gaming evolves over the next several years it will be
used by many areas of social science. Its success as a
stimulating educational tool has led d~signers to begin
creating a laboratory for social scientists. This laboratory
will create a simulated environment where educators and
students can both learn about the real environment.
The Next Stage

Simulation techniques, gaming and management information systems are all useful in the search for understanding and organizing our State and local governments.
They are, however, limited at present in their usefulness to
the chief decision-maker. Rather than compound the confusion already generated by researchers in the three fields
mentioned above, I would like to suggest a synthesis of all
of them.
22

Operational Simulation

A few years ago, a group of us, then called Urban
Systems Simulations, began work on a new form of urban
gaming, operational simulation. At that time, there was
general disagreement (there still is) on whether mathematical simulation, systemic gaming, or role-playing gaming
was the "best" way to approximate and teach about urban
area. We decided not to join the fight but to take parts of
the three approaches and wed them. Today the staff, now
Envirometrics, is proceeding with the development of a
single, generalized model which can be used by any government to study all levels of the social environment national to neighborhood - regardless of the location,
cheaply and quickly.
Although we think these models represent the apex of
modeling research, they have some definite limitations.
These limitations generally are in the areas of validation and
the usefulness of operational simulation as a policy tool.
The limitations are, of course, not particular to these
models but can be found in all games.
Even if we spend a large amount of money to actually
replicate specific locations for gaming purposes, we should
be very careful to understand exactly what we will have
when we produce the final product. A game, or a more
sophisticated operational simulation, representing a specific
city, would be a desirable and useful tool in many ways. It
would provide a continuing laboratory with which to teach
local inhabitants, researchers, students, and professionals
about their city; provide a focus for continuing forums
concerning specific issues, such as a new school, road, tax
policy, etc. It would also allow the policy maker to
introduce a new concept into this laboratory and see at
least one of the possible results of his idea each time a game
was run. It is not, however, a useful tool for the administrator or policy maker who is concerned with the probabilities
of the success and consequences of his actions.
The Need for Simulation

Modern administrators can no longer afford to implement policies until they have a greater idea of their
consequences. Obviously, leaders have always had the responsibility for their actions. But today's technology makes
their failure to use modern applications almost as big a
crime as the surgeon failing to use modern techniques to
diagnose and cure a patient.
A technique must be perfected which will suit the needs
of the modern administrator. Simulation seems to fill this
demand, except that it has an almost fatal weakness in areas
of our environment which do not appear to be measurable
in readily agreed-upon terms. The introduction of gaming
techniques to simulation is a step toward solving this
problem, as human players are substituted for math
equations when decisions call for human intervention.
Unfortunately, this tool is not satisfactory for the policy
maker who wants to use simulation to ascertain the future
ramifications of his decisions. Frankly, he cannot spare the
time or the staff to run a game a sufficient number of times
to generate statistically confident results.
A Modeling Compiler

While building the general gaming model mentioned
above, the Envirometrics staff has begun the development
of a modeling compiler. A compiler of this sort resembles
COMPUTERS and AUTOMATION for October, 1971

the already available programming languages in that it will
interface with the user and the computer. The model is so
constructed that the user can specify not only the data base
but the specific equations he wants for his simulation.
Further, the model builder will be able to change individual
segments to specify more precisely a specific section of the
model.
Each model produced with the compiler would only be
one path through the very large number of possible alternative model designs. The ability to specify modules would
mean that the model could be used for gaming or sim1llation purposes. Inputs, both exogeneous and endogeneous,
could be added by human operators. The beginning points
plus these inputs could be run in a simulated model
generating a large number of possible outcomes for the
locality in the next year - based on the inputs. The'se
results should then be analyzed statistically so that the
administrator knows what the "odds" are of a particular
outcome if he pursues a specific set of policies. At that
point he is able to decide if these outcomes meet his
criteria. If not, he could readjust some of his decisions and
test again. He could take the best probable outcome as a
new beginning point and make his policy decisions on this
data. Perfect? Hardly, but better by far than any other
technique currently available.
Thus, a decision maker has at his disposal all of the
power associated with today's modern computer hardware
and software and combines it with his own experience and
judgment. The more people he uses to provide decision data
to the simulation the more certain he can be of the most
likely results of his actions.
Summary

In summary, we need the best of all three areas to
provide a tool for the policy maker:
We need the information capability of a sophisticated
management information system, not only to provide the
administrator with a high quality data base but also to serve
as a base for the simulation.
We need the techniques developed in operational simulation, not only for the sophistication of the process itself
but for the methods developed for dealing with people as
decision-makers in a contrived environment.
We need the technique of machine simulation for its
ability to generate large numbers of possible alternative
futures with given data. Thereby we explore many of the
outcomes that might happen to an administrator, given his
particular policy decisions and those of his peers.
To conclude, the technique I suggest is not one which
will provide instant results in terms of better cities, states,
counties, etc. On the other hand, it will allow the policy
maker to determine whether he really wants to pursue a
particular plan of action - given the probable results
suggested by a simulation of his area. Final testing of the
technique will be expensive and time consuming. On the
other hand, the Federal government promises to spend
some $10 billion to improve the quality of our environment. Similar amounts were promised to save our cities, our
poor, our land and so forth. Recently, we spent $20 billion
to go to the moon. If we do not use our 20th Century
technology to help solve our social and ecological problems
before the 21 st Century, the $20 billion spent for the moon
shot may turn out to be the cost of basic transportation
research - as preparation for an exodus from an uninhabitable earth.
0
COMPUTERS and AUTOMATION for October, 1971

Davison and Honey - Continued from page 11

sequences of any controller on the city streets, and displaying the timing sequences on demand in the control
centre. Software developments include a traffic simulator
to enable the system programs to be rigourously checked,
and to enable input data for detailed study of boundary
conditions to be reproduced, especially when the additional
schemes are being tested. A complete duplication of the
system has now been ordered in which an automatic takeover of one computer from a faulty one will occur, with
load shedding as necessary. As no auxiliary memory
systems such as magnetic tape or disc are being used,
system reload will be via paper tape, using automatic
wind and rewind facilities, so that the diagnostic programs,
and ultimately the system program reload, may be
attempted.
In conclusion, to cater for the large numbers of vehicles
which are required to be stored in the city centre during the
working day, computer control of multi-storey car parks
is being carefully studied. Vehicles will be monitored
en route along the city ring road, and advised on the availability of parking facilities as they are approached.
Vehicles entering the parks themselves will be advised on
the floor and aisle status on each floor to eliminate the
'random walk' so often experienced by motorists in search
of a space. Vehicles exiting the car parks will be carefully
filtered into the traffic flow on the ring road so as to avoid
congestion points and to maintain smooth, shock-free
flow.
GLOSSARY OF TERMS
Tunnel route a designated signed route leading to the tunnel upon
which movement and storage of tunnel bound traffic is catered for
Tunnel lane part of tunnel route which, under peak traffic conditions, is reserved for tunnel bound vehicles, and forms the only
acceptable approach to the tunnel
Local lanes part of tunnel route reserved, under peak traffic
conditions, for local (non-tunnel) vehicles; by the use of traffic
islands, etc access to tunnel is made impracticable from these lanes
Local route a route for use by traffic other than bound for the tunnel
Block section of controlled road between t\\lO signalled intersections
Queue-jumping the unauthorised entry into tunnel queues from
adjacent parallel local lanes
Inhibit the application by the computer system of a red signal on
the tunnel-lat'es, irrespective of state of main signals
Inhibit delay the time, as assessed by the computer, before the
application of the inhibit signal should take place; this is continuously modified by the computer, according to conditions at
any instant
Release removal by the computer of an inhibit signal, and reversion
to main phase working
Release delay the time, as assessed by the computer (during an
inhibit phase), before release of the inhibit signal should take
place; this is continuously modified by the computer, accoramg
to conditions at any instant
References
1 City centre planning group, Liverpool City Centre Plan 1965.
2 Stockley N. H. and Evans A. J. R., Tra./;;c Engineering and
Management in Central Liverpool, Traffic Engineering Control,
1967, 8 (March).
3 Foote R. S., instruments for Road Transportation, Report TBR
2-68, Tunnel and Bridge Dept., Port of New York Authority,
March 1968.
4 Gazio D. C. and Foote R. S., Surveillance and Control of Tunnel
Traffic by an on-line computer, IBM Research RC 2358, Jan. 1969.
5 Stockley N. H., Evans A. J. R. and Davison A., City of Li~'erpool:
Central Area Congestion Control System, Proc. Instn. Civ.. Engrs.
1969, 44 (Oct.).
6 Honey D. W., Computer Applications in Road Traffic Control,
Journal Instn. Measurement and Control 2 (Sept) 1969. (Paper
first read at the Symposium on 'Experiences with Software in
Computer Control Applications, July 1969).
ABOUT THE AUTHORS
A. Davison, FlEE, was technical
manager at the Liverpool factory of the Plessey Company Limited,
Automation Group. He joined the City Engineer's Department of
the Liverpool Corporation in February 1968, as chief assistant
engineer, responsible for the implementation of traffic control
schemes, including those by computer.
D.W. Honey, MEng, MIEE, MBCS, was programming manager
of the Data Processing Division, Automation Group, until joining
the City Engineer's Department in July 1968. He is directly responsible for the computer complex and the implementation of new
schemes and programs. He is at present researching into traffic
delays associated with road tunnels as part of his general duties.

23

THE APPLICATION OF ELECTRONICS
TO COMPOSITION AND PRINTING
One of the most dramatic of these new technologies - the application of electronics
to composition and printing - presages a revolution of the same magnitude as that
brought about by the invention of moveable type."


c::

~

III

lIS

£

I

.~

....'"

III

"0
~

'iii

E

-'
C

~

>-

-'
A.

III

a:

'"
'"
Z

III

iii
;:)

ID

$9.50

10/71

A.

-

m
0

<
a..
w

m
..J
..J

~
w

u

.(

tV)
0

a..

City: _ _ _ _ _ _ _ _ _ Zip Code: _ _ _ State: _ __
Country if not U.S. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __

o

i=

o

~

0

I-

:::>

0

CI)

-

en

iii

-0

~

~

Q

a..

Z

~

c::::

~'

""

~
an

8

c

c::::

III

~

III

~

I-

:::>

0

0

'"c.:: :Em
III

N

c

eo

'>c::::
0

i

CI)

Z

Payment enclosed

o
o

Bill me

Renewal
New subscription

l~Librarie$

...0
c::

...

To SPEED Ihe processin~ of your order, please check the one best
descriptor in each of the two cate~orll:s below. (ThIs IOforma!lon
will be used for statistical purposes only.)

BUSINESS TYPE
Ol-Computer Manufacturer
• - 02-Aerospace / Aircraft
Manufacturer
OJ-Other Manufacturing
- 04-Raw Materials Processing;
(chemical, primary metal,
petroleum, food, etc.)
OS-Mining and Construction
-OS-Computing & Consulting
--07-Finance, Insurance, Publ.,
and Service Organizations
OB-Transportatlon Companies
OS-Public Utilities
, O-Research
-'l-Wholesale, Retail, Sales,
and Marketing Firms
l2-Educational; (College,
University, or School)
l~Government and Military

III

-

JOB FUNCTION
l-Technical Management; (computer
installation management, program
management, or engineering mgmtJ
2-Computer Center Personnel;
(methods & procedure analysts,
and operators)
3-Programming Personnel; (systems,
application & research programmers)
4-Professional: (systems analysts,
mathematicians, operations
researchers, and professors)
S-General Management Executives;
(corporate officers, owners, and
partners)
6-Engineering Personnel; (systems
.
engineers, research & development engineers)
7-Research Personnel
8--Students
9-Library Subscription
10-SubSCription In Company Name
Only

ell

Qj

CII

..c

....'"lIS

]

I

one said Lan)' W3~
doing something' he wasn't, he'd takot
it all tht! war tel th" Supt'~nte C"llI t."
It appears that Tllte will have the
~h~nre to ~" 80.

COMPUTERS and AUTOMATION for October, 1971

Tarrytown has a population of over 12,000 and includes a large automotive assembly plant. Unlike Irvington, it has a black "ghetto" area and numerous bars, restaurants, and movie theaters. It is on the same rail commuter line to New York City, but the commuter fraction
of its population is much smaller than Irvington's. Tarrytown has a police force of 26, while Irvington's is kept at
about 21 or 22.
The First Police Raid

During the school lunch hour on March 20, 1970,
Irvington police raided an apartment near the Irvington
High School. This apartment had become a lunch-time
gathering place for a number of young people including
the owner's daughter and her friends; both parents
worked during the day and the school cafeteria had been
shut down because the school was on an austerity budget.
Among the ten young people arrested in that raid was
Lawrence Tate's daughter, Cindy - the first of several
encounters of the Tate family with police. Most of the
ten, including Cindy, were charged with "lOitering with
intent to use dangerous drugs".
The search warrant for this raid had been obtained
on an affidavit by Detective Sergeant John McSharry of
the IrVington police, based on an uncorroborated report
by one high school student that drugs could be purchased
at that apartment. The police investigation report consisted of a tabulation of the time of entry and departure
of several high school students, all during school lunch
hour, with no mention of drugs. Cindy was mentioned as
entering twice during about a month of police surveillance.
The inventory of items found during the search of the
apartment showed microscopic samples of marijuana,
and the police concluded their search by using a vacuum
cleaner.
Irvington officials met with parents of the arrested
students; the officials offered to "cancel the arrests"
and seal both the court records and police records by
court order, if the arrested students would obtain some
kind of counseling. Several of the parents were furious,
but all except two accepted cancellation of the arrests.
The police harassment of young people was, by then,
well known in Irvington, but nobody had done anything
about it. Mr. Tate started visiting the Irvington court,
watching the proceedings as the court processed an
average of 15 to 20 defendants each week, but it was
four months before he saw the first defendant over 21
years old. On June 17, 1970, Tate and another parent,
determined that their children were not going to grow up
in this "miniature police state", each filed a Notice of
Claim against Det. Sgt. McSharry and the village of
Irvington. This reserved their right to sue for false
arrest, and Cindy and the other youth entered pleas of
"not guilty".
Starting shortly after June 17, both Cindy and the
other youth were subjected to harassment by the Irvington police. But the boy moved to New York City to attend
college; so Cindy took the brunt of it. She got a speeding
ticket; her car was repeatedly followed and stopped as
many as four times in one day, ostensibly to check the
same license and registration. On one evening, an offduty Irvington policeman, dressed in civilian clothes and
driving a private car with a girl, stopped Cindy's car in
Tarrytown by trying to run it off the road. He made a
COMPUTERS and AUTOMATION for October, 1971

citizen's arrest of the boy who was driving, claiming
two traffic violations, neither of which is an arrestable
offense.
Cindy's trial for the March 20 arrest started in
December 1970 and concluded in the early morning
hours of January 8, 1971. The microscopic samples
reported on the search inventory were too minute for
chemical analysis, but some seeds were identified visually as marijuana. However, both McSharry and
Irvington Police Chief James Sansevera testified that
hashish wrapped in tinfoil was found in a "bookbank",
even though McSharry had recorded in the inventory
the contents of this "bookbank" without mentioning any
hashish or tinfoil, and nobody had been charged with
possession of any drugs. It was also brought out in the
trial that the Village Prosecutor, Chief Sansevera, and
four other policemen had intimidated a defense witness.
No drug use or intent to use drugs was shown, and the
students were due back in school within a few minutes
after the start of the raid. The jury could not agree on
a verdict and the charge against Cindy was dismissed.
Failure to reach a unanimous verdict of guilty indicates
strongly that the prosecution had failed to prove guilt
beyond a reasonable doubt.
The Second Police Raid

But even before Cindy's trial, the Tates had developed new difficulties with the police: their home was
raided on July 31, 1970, shortly after midnight. The
search warrant was again based on information from
McSharry, of the Irvington police, even though the Tate
home is in Tarrytown. He described a single period of
surveillance, on the night before the raid. Cindy and
her friends who were in the home at the time all insist
that no illegal act had been committed. At any rate,
everybody including McSharry agrees that several large
windows were left open and uncovered, with no attempt
at concealment.
Police also stated that there had been three months
of prior surveillance, all by IrVington police. This was
apparently unproductive, as nothing from this period
was mentioned in obtaining the warrant. But just three
months and one week earlier was the date of Mr. Tate's
meeting with Irvington officials, concerning their false
arrest of his daughter on March 20. Thus, Irvington
police initiated and maintained surveillance of the Tate
home, in Tarrytown, from the time they first learned
that their raid of March 20 was going to be contested.
Lawrence Tate had been away from his home for
most of the evening of July 31, the evening of the raid,
meeting a friend at La Guardia Airport and having dinner with him. He and his friend, Director of Engineering of a corporation in West Germany, returned about
45 minutes before the raid. Upon his return, Cindy
told him that four youths, strangers to her, had been
admitted as friends of a friend while she had also been
out of the home. One of these strangers turned out to
be a heroin addict, who supported his habit by selling
drugs; so drugs were found in the home.
Justice in the Courts?

The trial of Cindy and Lawrence Tate started on
June 8, 1971, in the village court of Tarrytown. Cindy
35

was charged with "possession of dangerous drugs" and
"possession of narcotic implements". No drugs or implements were found on anybody, since the police were
slow in starting the search of people in the home. No
investigation was made to determine who possessed or
knew of any drugs or implements; all were charged
against Cindy as the only young person who lived in the
home. The drugs and implements were all found downstairs, and both Cindy and Lawrence Tate were upstairs.
The charge related to implements was dismissed at the
end of the prosecution case. The heroin addict appeared
as a defense witness and testified that he alone possessed
the package containing the narcotic implements and the
heroin (3 grains), and that the Tates had no way of knowing that he had brought drugs into their home. One
marijuana cigarette was found, the source of which is
unknown. The evidence linking this to Cindy was entirely circumstantial; the prosecution failed to establish
the required chain of evidence. There were also direct
contradictions in this police testimony; and attorneys for
the Tates have stated that the evidence is legally insufficient to support a conviction.
Lawrence Tate was charged with "criminal nuisance"
(i. e., knowingly maintaining a premises where people
gathered to use or possess drugs). There was no testimony that Mr. Tate knew of any drugs in the home,
which is an essential element in the proof of "criminal
nuisance". Also, his friend from Germany had been
released after police determined that he "could not have
known what was going on", although police testimony
placed him at the kitchen table with Mr. Tate for the
entire time after they entered the home.
Tate was also charged with "obstructing governmental administration" (i. e., interfering with the search),
based on his verbal objections to certain police actions.
But the police testified that they completed the search
to their satisfaction in about 25 minutes (9 rooms plus
3 baths). Mr. Tate's attorneys have stated that his actions in protesting to the police and protecting legal
rights and property, with no physical violence, do not
under the law constitute a crime.
Although all charges related only to incidents on the
night of the raid, the court allowed the prosecutor to
delve back through several years, introducing extraneous but possibly prejudicial testimony that Cindy was
allowed to bring friends into her home, play records,
drink beer, and have parties. But the court was very
restrictive on the testimony of several defense witnesses,
even on matters directly related to the charges. However, strict prohibition of drugs was repeatedly confirmed, and it was brought out that Mr. Tate had given
evidence on drug sources to Federal Narcotics Agents,
re-affirming his strong convictions against the use of
drugs.
The defense produced an impressive array of character witnesses, including: Mr. John C. McPherson, an
IBM Vice President; Dr. Charles DeCarlo, President of
Sarah Lawrence College; Mr. Theodore B. Merrill, an
Editor of Business Week; the friend from Germany; and
several IBM employees and neighbors from Irvington.
On July 8, 1971, after hearing 36 witnesses, a sixman jury returned a verdict of "guilty" on all charges
then remaining. Decision on a defense motion, to set

36

aside the jury verdict as contrary to law and the evidence, was reserved until the date of sentencing. The
trial was concluded on August 11 when the judge denied
that motion; and Lawrence Tate was fined $1, 000
and sentenced to one year of probation, while Cindy
was sentenced to three years of probation.
The Notice of Appeal and certification of judicial
and legal errors were promptly filed.
Drugs and Politics
Lawrence Tate and other parents publicly criticized
the situation in Irvington, to the point where the Village
Board coerced the local newspaper into printing a retraction. The mayor of Irvington was criticized, during his
campaign for Congress, for: the failure of the anti-drug
program; failure to enlist the aid of parents; lack of
recreational facilities; grossly exaggerated and prejudicial use of pre-trial publicity in police press releases;
misdirecting police action against users instead of the
sources of drugs; and using the false police raid on
March 20 as publicity for the mayor's political campaign.
Local police are supposed to be non-political; but the
police chief reports to an elected member of the village
board. Tarrytown police made a series of about 30 drug
arrests within a few days before the village elections in
late March, 1971, although their newspaper release
stated that the evidence had been obtained by January.
This, plus an earlier series of arrests of heroin pushers,
had brought the subject of drugs into public attention in
Tarrytown shortly before the start of the Tate trial.
In November, 1970, Chief Sansevera and Det. Sgt.
McSharry were charged with "interfering with the
administration of justice". Mter a hearing before the
Irvington Village Board, both were reprimanded and
acquitted. Chief Sansevera was also charged with
acts of delinquency which would "seriously impair and
affect his general character and fitness for office".
He was suspended without pay for 15 days. More recently, Sansevera has again been suspended without
pay since July 1, 1971, pending a hearing on three
additional charges. None of these charges have been
related to the Tate case.
As criticism of the police became more widespread,
their harassment of young people became more subdued.
There was a third raid in August 1970, in which eyewitnesses said the police twice attempted to "plant"
a marijuana cigarette. Since then, Irvington has abolished its Detective DiviSion, and the number of cases
before the village court has declined dramatically.
Harassment and Countersuits
Mter the raid on the Tate home, harassment by
stopping Cindy's car continued, coupled with police
spreading gossip, telling a number of people that they
shouldn't visit the Tates. The other youth who had
contested the March 20 false arrest finally dropped out
of the contest after Cindy's trial had resulted in
acquittal. At that point, the police had directed their
evidence and testimony at Cindy and would have had
difficulty redirecting it, in a later trial, against
another defendant. But he and his parents abandoned
the near-certain acquittal and lawsuit because the
worry and harassment had contributed to his need for

COMPUTERS and AUTOMATION for October, 1971

psychiatric care, and he was not prepared to face a trial.
Cindy has required hospitalization for an ulcerous condition, indicating the extreme strain on these young people.
A few weeks after the second raid on July 31, Tarrytown Detective DelGrande, who was the arresting officer
in that raid, filed a petition against Cindy in Family
Court. This petition described her arrest on July 31 and
would have had the effect of trying the case twice, both
on criminal charges and as a basis for taking Cindy's
custody away from her father. The judge in Family
Court said that the grounds were insufficient for this
action, so DelGrande filed an amended petition. This
contained one legally significant claim, that Cindy had
been truant for more than 42 days in one school year;
but the school records showed no truancy. The judge
refused to consider the proposed "emergency" intervention in the Tate home and ordered the detective to
document the claims in his petition. He was unable to
do so (since his sworn petition was false); so this case
lay dormant for months. After an abortive attempt to
re-open the case during Easter vacation, when school
witnesses on truancy would have been unavailable, a
judge dismissed the amended petition for failure to prosecute, failure to document the claims as provided by
law and ordered by the court, and on the merits (i. e. ,
a summary dismissal, without taking testimony, preventing a re-opening of the case).
In addition to the Notice of Claim filed against
McSharry and Irvington for the first raid on March 20,
Lawrence Tate also filed two Notices of Claim against
DelGrande and Tarrytown - one for the second raid on
July 31 and one for the amended petition in Family Court.
These three Notices of Claim establish his right to sue
the villages of Irvington and Tarrytown and their agents
for a total of $875, 000. The harassment was finally
stopped, at least until this writing, when on June 4,
1971, Tate filed a petition for an injunction, seeking a
court order to stop the harassment and other abuses of
police power. All four of these countersuits are pending in the courts.
Justice in Corporations?

This case is exceptional both in the massive extent
of the police action and the massive legal counterattack.
But the implications of the precedents established are
much more general.
Anyone with children of high school or college age
must know the risk of drugs being brought into their
homes, either by their own children or their friends.
Anyone who has tried to fight a traffic ticket must know
something about the quality of justice in local village
courts. If the charge is more serious than a traffic
ticket, not many people could afford the costs of obtaining justice by an appeal, especially if they lose their
jobs in the process. If corporations add their sentencing
to the sentences imposed by courts of law, few people
would risk speaking out on controversial community
issues. This silencing of responsible citizens can only
encourage corrupt police to act with impunity. It would
also serve to convince the more radical elements that
nobody else will act, and that they have been left to their
own devic es.

COMPUTERS and AUTOMATION for October, 1971

Balanced against this condition is the very real
need of a corporation to maintain its desired image in
the eyes of its customers and the public. In some lines
of business, this is a necessity if the company is to be
viable. In the case in point, many IBM employees are
frequently in customers' offices in the design and maintenance of computer systems, and these people may
have access to customers' most confidential information.
But this can not justify extrapolation of criteria for one
critical job to all other employees; if all corporations
did the same, it would for example prohibit rehabilitation of convicts and any sentenCing would become a life
sentence to unemployment.
A number of people, including journalists, engineers,
and lawyers, have reviewed the legal documents and the
evidence in this case. To the writer's knowledge, all
have reached the same conclusion: that Lawrence Tate
and his daughter are the victims of police harassment
and retaliation. This conclusion also is evident in all
recent publicity. The IBM corporation had full access
to all of this information, as the case developed. Perhaps IBM does not trust its customers to reach that
same conclUSion, or to consider it reasonable for a
company to stand behind its employees in these circumstances, at leas t as far as an appeal.
Thus, the total effect on IBM's corporate image
must include several factors: the non-job-related
nature of the problem, the fact that there was no customer contact in Tate's last assignment, the decision
as to just when "innocent until proved guilty" ends, the
recruiting image in colleges as more young professionals
demand more freedom and individuality in their private
lives, and, finally, the actual reaction of IBM's customers and the public to IBM's action.
We, as members of the engineering and scientific
professions, have been criticized in recent years for
failing to consider the social consequences of our technical activities. We have been told that we should speak
out on such matters. We have been told we should even
challenge our own employer if we are, for example,
directed to design an unsafe product. But according to
the precedents set in this case, we cannot now safely
speak out against the social consequences of somebody
else's non-technical activities. We are still in the
formative stages of such an evolution in the profession,
but no measure of social responsibility can be imposed
on the individual without a corresponding burden on his
employer.
Engineers, computer programmers, and scientists
do not have a really strong professional society such as
exists in the medical field. Nor do they have any equivalent to tenure as in the teaching profession, nor is there
even any portable pension plan. Thus, these professions
are poorly equipped to enter into any new era of individual social responsibility, and anybody who ventures to
act alone is vulnerable. As existing trends continue, the
various professional societies will have to re-evaluate
their roles. No profession, whose members are not
largely self-employed, can hold its members accountable for socially or ethically responsible conduct unless,
in return, that profession gives its members a measure
of job security, by some variation or combination of
those protective mechanisms already developed in
other professions.

37

PICTORIAL REASONING TESTS 1 AND APTITUDES OF PEOPLE

"There undoubtedly is a place for non-verbal, non-mathematical testing, which
is not culture-limited, not occupation-limited, and not background-limited and which would enable finding and employing many useful people (including
computer programmers) who do not have American, middle-class backgrounds. "

Neil Macdonald
Assistant Editor
Computers and Automation
Tests at Employment Interviews

One of the subjects which we at Computers and Automation work on from time to time is aptitude tests: tests
of adaptability; tests of proofreading capacities; tests of
ability to program a computer; etc. The organization
that publishes Computers and Automation (Berkeley
Enterprises) is small (about 3 full-time people, 10 parttime people, and a DEC PDP-9 computer). Consequently,
we need to find tests that tell us significant information
about a person at the time of the employment interview.
Then we can make a good decision right then, and not
waste his time or our time employing someone who proves
not to meet the job requirements.
Some useful people are not particularly verbal, at
home with words. Other useful people are not arithmetical, not at home with figures or numerical reasoning. Many aptitude tests rely on items that are verbal
or mathematical. So such tests are likely to miss some
useful people who lack formal training in verbal or mathematical subjects. This is not desirable.
We would like to find tests that measure capacity: to
observe; to adapt; to reason; to program a computer; etc.
We desire tests that do not rely on previous formal training in verbal or mathematical subjects. Perhaps pictorial reasoning tests would meet these reqUirements.
Pictorial Reasoning Tests

One commercial supplier of aptitude tests offers a
pictorial reasoning test of 80 items. Each item consists
of a row of five pictures. The instructions are (essentially):
This is a test to see how carefully you can
observe and reason. In each row find the
four pictures that are alike in some way,
and then write (in the answer column) the
letter of the picture that is not like the
others.
I have tried this test on about ten people; and I have
observed that some undoubtedly clever people get low
scores because they can imagine many ways in which
each picture is not like the others.

38

Ambiguity

For example, consider Figure 1 (which is an altered
copy of an item in the instructions for the commercial
test). Clearly, cach square is different from all the
others in that a different number appears in that square.
However, the answer given is B, since in B "the number
is located in the center of the square, instead of in a
corner". But I would consider Figure 1 "baSically ambiguous"; for example, the square that contains 8 is
unlike each of the other squares, for they contain numbers different from 8.
For a second example, consider Figure 2. After
looking at these five squares for a couple of minutes, I
might nominate
- A because it shows the only figure with 3 sides;
B because it shows the only figure with sides at
right angles to each other;
C because it shows the only figure which has
given its name to a famous building in
Washington, D. C., where the U. S. Defense
Department is located;
D because it shows the only figure with 6 Sides;
E because it shows the only figure with a number
of sides equal to two more (instead of one
more) than the number of sides in the figure
to the left of it (this statement is logically
incomplete, but it is a statement which a
person could give).
Unambiguity

Presumably, a "well-constructed" pictorial reasoning item consisting of five pictures will be definitely unambiguous. Consider Figure 3. Each of A, B, C, and
D is alike: each holds a circle. Square E is different:
it holds a cross. Probably nobody would produce a
"wrong" answer for this item: in fact it may be too
"simple": it would not make distinctions between
people.

COMPUTERS and AUTOMATION for October, 1971

Consider Figure 4. A and E are clearly alike. B
and D are clearly alike. C is clearly different. Perhaps
nobody would produce a wrong answer for this one either;
perhaps it also is too simple.
Consider Figure 5. This item is the same as the
item in Figure 2 - except that the triangle in A has been
turned ninety degrees. Consequently, now there is exactly OIle picture that is not symmetric about a central
vertical line. So we can reasonably maintain that picture
A is clearly different from all the others. Perhaps everybody would agree about this too - and so this item also
would be too simple. (In Figure 2, there were two pictures not symmetric about a central horizontal line, the
triangle and the pentagon. )

7
A

B

r

c::::::

1

Figure 1

1610 10 1010 Ie
A

~

A

B

~

Figure 2

~

E

o

Figure 3

e.

c::..

Figure 4

1<11 0 0
1

A

8

c::.

Figure 5

t)

D

But in this case we would like to do something
different from validation, more like exploration.
We would like to ask you - you being any interested
reader of Computers and Automation - to take the test
shown in Figure 6, and send us your answers. At the
bottom of the test are a few questions to tell us something about the kind of person that you are. Since you
are reporting on yourself, there may be of course a
little bias present - but for purposes of exploration,
this is not likely to be serious. From enough answers
from enough readers, we might discover some interesting information about what sorts of traits tests of this
type may be measuring.
Note that all the figures in this article have been
drawn freehand and not too carefully. It is a myth, in
my opinion, that asserts that all figures in all publications sh~uld be drawn professionally: one can do a
great deal with an author's free hand, approximate
drawings, and the reader's eyes to interpret them; and
such drawings make the gap between the author and the
reader far less formidable.

A Game

~

10101

Exploration

Mter you have taken the test (it may be copied on
any piece of paper) we would like to ask you (if you
are interested) to try it on your friends, and send us
those results too, for study and correlation.

c:::.

IA I~ I~I~I(YI
A

The name which constructors of tests use for Step
3 is "validation". Ordinarily, validation is accomplished
by taking a group of people, finding out something about
them, giving the test to them, and seeing what results
are produc ed.

1\

I

E

Furthermore, it is possible for you to playa game
of "Testing Pictorial Reasoning" with your friends:
make up your own test; make copies of it; and try the
tests on your friends. (And, if you like, send us a copy
and the results. )
The central question we are seeking to investigate
is this: If we collect this sort of information about
people, what correlations might we discover?

The Statement of the Problem

We are now ready to express our problem as follows:

1. Construct some observing and reasoning
tests that are not biased towards word
knowledge or arithmetical knowledge.
2. Use pictorial items, making sure either (1)
that each item of five squares has a single
reasonable answer A to E, - or (2) that
"F" for "defective, basically ambiguous"
is accepted as a sixth answer.
3. Find out the relation of the answers that a
person actually gives on the test with the
kind of person that he is.

Other Verbal, Non-Mathematical Tests of
Aptitudes and Characteristics

There are, of course, many other ways in which
observations of people in testing situations and in actual
daily-life situations can be made, and deductions about
people can be drawn. In our small business the first
week of employment of a new person is usually like a
crucible (though without heat). This preliminary period
reveals a great deal about a new employee - how fast
he can learn, how well he observes, how soon he can
turn out useful work - often information not guessed
(unfortunately) from what was found out in the employment interview. In fact, we have been looking for a
personality test as useful as the commercially-supplied
adaptability test that we use; but so far we have not
found any.

4. Find out if such a test as this distinguishes,
for example, good computer programmers.

COMPUTERS and AUTOMATION for October, 1971

39

PICTORIAL REASONING TEST --- C&A No.1 --- (may be copied on any piece of paper)

1. The following Pictorial Reasoning Test (Figure 6) is a
test to see how carefully you can observe and reason.
It is not timed ...... but most peopleuse about ten minutes.
2. In each row, find the four pictures that are alike in
some way, and find the one that is not like all the

c::::.
X

><.')C ')(

)(

x.

X

2-

I'
"

e>

I

,

()

0

•• •
~

~

~

"".

I

• •

·3

/

S'

V /

,

Cf)

7

w

1,/

(U

><

)<

(QQQ)

Answers:

.@-

o )(

xo

1'2-

\3

•
•
•

••
•
~

@

.@/

@

)(. 0

. .

•

14

~

x-

0

0)<

-

X

,"

0·0

0·0
)C

•

• X

-.J

.

)(
£)

..

0

'X

~
X
0·0
l(

1J ¥

D

u tJ D

I~

LJ

~

,-- 20

5
6
7
8

~ ~

~

\~

X

;

~ IT1b

rIID

4:

x)(.x

1
2
3
4

)(

.

17

W

><

i)

Insert in each blank one
letter out of A, B, C, D,
E, or F, designating your
choice.

·0·

)(

IS

Q1

Lt-J

• 0

~

~
• X

~
X

//
LV l1
w

-@-

f

1 C

eB ~ iJ
..
. .. . ·
.
-- . ..
..
. . . ..
....
...
.
.
. ...
.. .(3

e:

I

X

X

10

--

,.

0

~,~.,,,o

)<

g

C

"

1
0-- 0

GJ 8 ro

X

q

(
'-

~

x

0

c..

><

><

X

X

I

e

A

D

x
X

others and write its letter as your answer.
3. If you become convinced that no picture is essentially
unlike the others, write F (for "defective" or "fatally
ambiguous") as your answer.

0

El GJ U
~ ~\ ~ ~~

9
9
10

13
14
15
16

11

12

17
18
19
20

Survey Data: 1. Name______________________________________________..--- 2. Title
3.0rgaruzation ________________________________________________________
4. Address
5.
6.
7.
8.

Excellent? Not your field? Other? {2lease s2ecify
Good?
Average?
In computer programming, are you:
In systems analysis, are you:
In managing, are you:
What fields (not mentioned above) are you fairly good in (or even expert in) ?_________________________

9. What other capacities do you have? (Please don't be bashful ...... but be objective),___________________
10.

Anyremarks?~,

___________________________________________________________________
(attach paper if needed)

When completed, please send to: Neil Macdonald, Survey Editor,
Computers and Automation, 815 Washington St., Newtonville, Mass.
40

02160

(Please turn to page 56)

COMPUTERS and AUTOMATION for October, 1971

The Assassination of President Kenne:dy DeclassiFication of Relevant Documents from the National Archive's

"The people of the United States have a right to know, to find out the truth
about the lies they have been told. "

Richard E. Sprague
Hartsdale, N. Y.

The precedent-setting ruling on the Pentagon Papers
by the U. S. Supreme Court produced the revelation that
"Secret" and "Top Secret" government documents prove
that the American people have been deceived and lied to
about Vietnam and U. S. involvement for many years.

evidence extant and has performed such a correlation
against the classified documents. The sources for the
evidence gathered are:

One of the immediate reactions of an American citiz€m is: "How many other lies have been told by our governing officials, which would be exposed by declassifying and publishing other classified documents?"

- Twenty-Six Volumes of Hearings and Exhibits
of the Warren Commission

Resting in a special area in our National Archives
are a group of Secret and Top Secret documents pertaining to the assassination of President John F. Kennedy in
November, 1963. Publication of these papers should
reveal a great deal about that assassination. They may
contain the facts about a conspiracy, the names of some
of the conspirators, information about the planning for,
and the backing of the conspiracy, and, most importantly,
proof that the American public have been told many lies
about the assassination by the Warren Commission and
by others.
The documents fall into two categories: (1) Warren
Commission executive session minutes; and (2) reports
submitted to the Commission by government agencies.
The former documents were classified top secret by the
Warren Commission itself, and are listed partially in
Reference 5. The latter category includes reports from
the FBI, CIA, and Secret Service, classified Secret or
Top Secret by each agency. The Commission did not
actually see most of these documents because they were
assembled in the Archives after the Commission disbanded. Reference 6 gives a list of the titles of these
documents, the agency involved, and the document number. The classifications are all Top Secret, Secret, or
Confidential.

- Warren Report

- Warren Commission Documents in Archives
(About 10 times the size of the 26 Volumes)
- Senate Investigation Files (Senator Ed Long,
Subcommittee, 1967-68)
- NCTIA Investigations
- Books and articles
The work of correlating this vast amount of information is tedious; it requires many people and man-hours.
Two computer systems are being developed to help researchers and committee members with the analysis.
Enough work has already been done to illustrate the
probable significance of the classified papers. Here are
a' few examples:
Lee Harvey Oswald's Relation to the FBI

Thesis: Oswald was a paid FBI informer and the
Warren Commission probably covered up this fact.
Many meetings of the Warren Commission are still
classified Top Secret. (See Reference 5.) The dates of
many of these sessions follow immediately after sessions
described in a boo~ by Gerald Ford, one of the Commissioners.

How do we know the documents may be revealing?
As in any complex web of information about a subject, correlation of some data with other data, provides
a value judgment of validity or significance. In the
complex case of the assassination of President Kennedy,
it is necessary to correlate the titles of the documents,
dates, and names of the classifying agencies against a
vast body of evidence about the assassination.
The National Committee to Investigate Assassinations 1 (NCTIA) has gathered together a vast amount of
COMPUTERS and AUTOMATION for October, 1971

At these sessions beginning January 21, 1964, Ford
says the Warren Commission was concerned because
Wagonner Carr, Texas Attorney General, told them that
he had information about Oswald being a paid informer
for the FBI. The classified sessions would, no doubt,
be very revealing on this subject.
The Commission wound up merely asking J. Edgar
Hoover whether Oswald was a paid informer or not.
Hoover said no; and that ended the matter as far as the
public record (including Ford's book) is concerned.
41

The NCTIA however has developed several correlated pieces of evidence, including recent statements
from one of the FBI agents Oswald reported to in his informer role. Collectively, this evidence shows that
Oswald was indeed being paid by the FBI to infiltrate
various pro-Castro and anti-Castro groups as well as
the JFK assassination team. He reported his findings to
three different FBI agents, two in New Orleans and one
in Dallas. He attended several meetings in Mexico City
where the assassination was planned. He reported to the
FBI that President Kennedy was to be assassinated in
Dallas just a few days before that happened.
On the day before the assassination and on the morning of the assassination, the special agent in Dallas that
Oswald reported to, was trying to find him in order to
obtain more information from him.
A record exists that the FBI received the information
from Oswald about the forthcoming assassination, but the
FBI did nothing about it except for the futile attempts of
the agent to find Oswald. The record is in the form of a
TWX message which appeared on November 17, 1963, on
the FBI teleprinter in New Orleans relayed from Dallas
via Washington, D. C. William S. Walters, FBI security
clerk in New Orleans, retained a copy and gave it to
District Attorney Jim Garrison of New Orleans.
With this type of correlative evidence and the relationship of the Secret Executive Session dates to
Waggoner Carr's visit, it is a fairly good bet that the
sessions were classified because the Commission discovered some of the other evidence and did not want it
known that Oswald was an FBI informer.
However, even if this is not the case, the public is
entitled to know what went on in those sessions. The
chances that declassifying them now and publishing them
will endanger our national security after nearly eight
years, are slimmer than "endangering national security"
by publishing the Pentagon Papers has been.
One of the classified sessions worried the Commision so much they went to the extreme of forcing the
stenographer to destroy his notes. (See Reference 5. )
In addition to the Commission's secret sessions,
various classified FBI documents no doubt would reveal
Oswald's informer status. Reference 6 includes document 941, "Telephone numbers on 47th page of Lee
Harvey Oswald's address book/Washington, D. C." This
document may reveal that Oswald had placed in his book
the phone numbers of the three FBI agents to whom he
reported as a paid informer.
There are a total of 40 documents classified by the
FBI concerning Oswald. Most of them are labelled
"Lee Harvey Oswald" and a city such as Chicago or
Washington. This would tend to indicate either a series
of reports about Oswald from various FBI offices, or
perhaps multiple copies of an FBI directive to various
offices. In any event, the FBI was certainly trying to
keep something about Oswald from the public's eyes.
To date the FBI has succeeded.
Oswald's Knowledge of the U2

Thesis: Oswald had access to knowledge about the
U2 high flying planes.
42

Another subject the public is entitled to know about
is document number 931, Reference 6, classified secret
by the CIA.
The title is "Oswald's access to Information About
the U2." This title takes on added significance when
correlated with evidence about Oswald's training for
espionage work while at Atsugi Air Force Base in Japan
3
and statements by Francis Gary Powers in his new book.
There is every indication from Hvailable evidence
that Oswald and Powers met in Italy prior to the U2 overflight. There is also a heavy weight of evidence showing
that Oswald was trained by the CIA for spy work before
his trip to Russia.
The secret documents whose titles refer to the relation of Oswald and Russia, and which were classified by
the CIA, undoubtedly would also be very revealing on
this subject. See Table 1.
Table 1
List of Secret Documents Relating to Oswald and Russia

Comm.
Doc.

Agency

300

CIA

321

CIA

528

CIA

631

CIA

680
691
692

CIA
CIA
CIA

698

CIA

844

CIA

871

CIA

928

CIA

990

CIA

1041

CIA

1216

CIA

1552

CIA

Subject / Place
re Recent Soviet statements of Lee
Harvey Oswald
Chronology of Lee Harvey Oswald in
the USSR / Washington, DC
re allegation Lee Harvey Oswald
intel'viewed by the CIA in the USSR
re CIA dissemination of information
on Lee Harvey Oswald / Washington
Oswald chronology in Russia
Oswald chronology in Russia
Reproduction of CIA official dossier
on Lee Harvey Oswald
Reports of travel and activities: Lee
Harvey Oswald and Marina
re Lydia Dimytruk, Russian acquaintance of Marina Oswald /
Washington, DC
Photos of Oswald in Russia /
Washington, DC
Lev Setyayev and Lee Harvey Oswald
contact with USSR citizens / Washington, DC
Khrushchev and Drew Pearson discussion re Lee Harvey Oswald /
Washington, DC
Allegations re Intelligence Training
School in Minsk, USSR / Washington, DC
Memorandum from Helms entitled
"Lee Harvey Oswald" / Washington,
DC
Soviet use of kidnapping and assassination; Soviet press reaction

(Abstracted from Reference 6)

The Warren Commission may be off the hook on this
problem, since they did not see most of those documents.
They were filed in the Archives long after the Commission disbanded. On the other hand, it seems likely that
COMPUTERS and AUTOMATION for October, 1971

Allen Dulles, former CIA Director, and John J. McCloy,
connected closely to intelligence forces in the past,
would have been informed or would have taken pains to
find out about Oswald's CIA connections.
Again, the public is certainly entitled to see those
documents and to judge for themselves.
Mark Lane

Seven of the secret documents are all FBI reports
on Mark Lane, author of the best seller, "Rush to
Judgment". See Table 2.
Table 2
List of Secret Documents Relating to Mark Lane

Comm.
Doc.

Agency

489

FBI

694
763

FBI
FBI

1380
1457

FBI
FBI

1487

FBI

1522

FBI

Subj ect / Plac e
Mark Lane, Buffalo appearance /
Buffalo
Various Mark Lane appearances
Mark Lane appearances / Los
Angeles
Mark Lane / New York
Mark Lane and his trip to Europe /
Washington, DC
Memo entitled Mark Lane, James
Delaney Garst / Washington, DC
Mark Lane

(Abstracted from Reference 6)
All these documents are classified by the FBI. It
is extremely difficult to see why any report about Mark
Lane should be classified. The usual excuse given for
classifying information about an individual is that it is
for his own protection. Mark Lane needs no protection
now, and never did with respect to anything the FBI may
have discovered. He was attacked so ferociously on every
score by every government agency and many researchers
or spokesmen for the Warren Commission (Charles W.
Roberts and Lawrence Schiller4 are two examples) that
there could have been nothing at all left to protect by the
time the Warren Commission issued its report, and certainly nothing left at this date.
There can be absolutely no reason for classifying any
document pertaining to Mark Lane. He would be the first
to agree that this is the case. Again, the public is entitled to know.

Exhibit A
Excerpt from "The Kennedy Conspiracy"
Paris Flammonde, New York,
Meredith Press, 1969, p 29

The Winnipeg Free Press reported that an FB
man, Merryl Nelson, had checked out a story told
by a local businessman whose name was withheld
for "security reasons" until November, 1967. At
that time Maclean'S, a leading Canadian magazine,
ran a more complete coverage of the fascinating
incident.
The informant, an obviously sincere and
sensible Mennonite, and father of four, named
Richard Giesbrecht, related a conversation he
overheard on Feb. 13, 1964, in the Horizon Room,
a cocktail lounge in the sweepingly modern Winnipeg International Airport. The nature of the conversation led the thirty-five year old bUSinessman,
who was at the flight terminal to meet a client, to
quickly conclude the two participants had knowledge
regarding the assassination of the President. The
more he listened, the more he became certain of
his suspicions.
He described one of the men as having "the
oddest hair and eyebrows I'd ever seen. The eyebrows were wide and sort of streaky. The hair
was very shiny and it started quite far back on
his head." Geisbrecht thought this one of the
pair resembled Stan Laurel "when he gets that
look as if he's going to cry, " and he recalls he
wore heavy rimmed glasses. Giesbrecht now
says this man was David W. Ferrie.
Ferrie indicated he was concerned over how
much Oswald had told his wife about the plot to
kill Kennedy. Additionally, they discus sed a
man named Isaacs, his relationship with Oswald,
and how curious it was that he would have gotten
himself involved with a "psycho" like Oswald.
Isaacs seemed to have allowed himself to be
caught on televiSion film near the President when
Kennedy arrived in Dallas, and, at the time the
conversation was taking place, was under the
surveillance of a man named Hoffman, or
Hochman, who was to "relieve" him and destroy
a 1958 model automobile in Isaacs' possession.

Harold R. Isaacs and Marylyn Murrett

Document 1080 is titled "Information on Harold R.
Isaacs and Marylyn D. Murrett / Boston, " classified by
the FBI. Harold R. Isaacs is a well known author, World
War II reporter in Asia for Newsweek, and for several
years now, an MIT professor working on political projects funded by the CIA.
Marylyn Murrett is Oswald's cousin. Evidence
gathered by the NCTIA indicates she was involved in
espionage activities in Russia and Asia.
In this case it is essential that no implication be
made that Isaacs was involved in the assassination plot.
COMPUTERS and AUTOMATION for October, 1971

However, in order to clear Mr. Isaacs completely, it is
desirable to prove that he was not the Isaacs referred to
by David Ferrie in a conversation with another assassination plotter at the Winnipeg airport in 1964. This conversation was overheard by Richard Giesbrecht, a
Canadian, reported at the time to Canadian newsmen, and
later to Jim Garrison. See Exhibit A.
The Winnipeg Isaacs was deeply involved in the
assassination according to Ferrie, who was also involved. Isaacs was at Love Field when JFK's airplane
landed, and furnished a car for use in the assassination
escape plan. He appeared on TV at the airport and this
worried Ferrie for fear he might have been recognized
43

by someone. The implication is that his face would be
recognizable by someone who should not know about his
presence there.
In this case, the public, as well as Harold Isaacs
are entitled to know what Document 1080 contains.
Oswald in Mexico

Table 3
List of Secret Documents Relating to Oswald and Mexico

Comm.
Doc.

Agency

78
347

FBI
CIA

384

CIA

426

CIA

442

State

721
726

FBI
CIA

751

FBI

785

FBI

872

FBI

873

FBI

874

FBI

880

FBI

910

FBI

944

CIA

1000

CIA

1007

FBI

1008

FBI

1029

FBI

The Warren Report, the Hearings and Exhibits
probably seek to cover up what these classified documents undoubtedly reveal. The Commission's official
public position is that Oswald took only one trip to
Mexico to try to obtain a Cuban visa.

1037

FBI

1038

FBI

1180

FBI

At least one member of the Commission must have
been suspicious even though he may not have known the
complete truth. Senator Richard Russell said in a threepart television interview conducted in his home state and
broadcast before his death: "I always wondered why
Oswald took all of those trips to Mexico".

1545

CIA

The NCTIA has developed evidence which indicates
that the planning of the assassination of President Kennedy
took place at a series of meetings in Mexico during the
summer and fall of 1963.
This evidence shows that Oswald attended some of
these meetings and was in Mexico, not once, but at least
three times. The evidence also indicates that the CIA
was well aware of Oswald's trips at the time they occurred. On one occasion they photographed him and his
"CIA baby sitter" (the person to be sure that Oswald was
performing promptly) entering the Cuban Embassy in
Mexico. This photograph was eventually cropped by the
CIA. Oswald was chopped out of the photo, which was
then given to the FBI, and used to see if Marina Oswald
could identify the "baby sitter." She did not actually
see the photo but the NCTIA has been able to identify and
interview the man.
Document 1287, "Re Lee Harvey Oswald and affidavit concerning cropped picture / Washington, DC",
classified secret by the CIA, undoubtedly would confirm this. The cropped picture was reproduced by the
FBI and is included as Odum Exhibit #1 in Page 691 of
Volume XX of the Warren Commission Hearings. No
mention was made in the Hearings about the identity of
the man in the photo, or its original source. The public has a right to know what document 1287 contains.
That the FBI and the CIA were well aware of what
took place in Mexico is indicated by 23 classified documents connected with Mexico and Mexico City. See
Table 3.

Russell knew there had been more than one,trip and
was very skeptical about the Cuban visa explanation.
He also said he had always believed there had been a
conspiracy, and he still believed it until he died.
Other Documents

There are many other documents in Reference 6
whose Significance can be detected from the title and
other known evidence. One or two more examples will
serve to illustrate the point.

44

Subject / Place
Lee Harvey Oswald's Mexican trip
Activity of Lee Harvey Oswald in
Mexico City
Activity of Lee Harvey Oswald in
Mexico City
Interrogations of Silvia Duran and
Husband in Mexico City
Telegrams between State Dept. and
the U. S. Embassy, Mexico City
Oswald's trip to Mexico
Actions of Silvia Duran after first
interrogation / Washington, DC
Lee Harvey Oswald: re Mexican trip
/ Washington, DC
Oswald in Mexico; 7 photos attached
/Washington, DC
Oswald's travel in Mexico / Washington, DC
Oswald's travel in Mexico / Washington, DC
Oswald's travel in Mexico / Washington, DC
re Oswald safe deposit box, in Laredo, Houston / Washington, DC
Inquiry into Oswald's Mexican trip
/ Washington, DC
Mexican control of US citizens
travel to Cuba / Mexico
Mexican interrogation of Gilberto
Alvarado / Washington, DC
Oswald's Mexican trip; entry and
departure / Washington, DC
Oswald's Mexican trip; hotel registration / Washington, DC
Oswald's Mexican trip / Washington, DC
Mexican aspects of Oswald investigation / Washington, DC
Mexican aspects of Oswald investigation / Washington, DC
Mexican aspects of the investigation
/ Washington, DC
Activity of Lee Harvey Oswald in
Mexico City / Washington, DC

(Abstracted from Reference 6)

Document 1427, FBI: "Re maintaining contact with
Albert Alexander Osborne / Washington, DC" becomes
very interesting when one digs into Mr. Osborne's identity. He was on the bus with Oswald travelling from
Texas to Mexico City. The Commission and the FBI
would have us believe it was a coincidence and that they
just struck up an acquaintance on the bus. But Osborne
turns out to be a very shady character with a long
intelligence-style past and the alias of John Howard
Bowen. Evidence gathered from the Exhibits and other
sources indicates that Osborne was involved in the
Mexican meetings.

COMPUTERS and AUTOMATION for October, 1971

Document 729, FBI: "Allegation that Oswald was in
Montreal, summer, 1963 / Washington, DC." The
reader is struck by the fact that an allegation about
Oswald if unfounded, would seem to have no reason to
be classified Confidential. This document becomes
interesting when coupled with several airline, hotel, and
other records showing that David Ferrie and Clay Shaw
took several trips to Montreal together during the summer
of 1963. Indications are that they were arranging for a
form of financial and intelligence support for the assassination.
The Basic Lie

The declassification and publication of the classified
assassination documents is essential for the American
public. The Warren Commission, the FBI, the CIA, and
the Dallas Police fabricated and expanded upon a basic
lie to the extent that it became necessary to stamp Secret
or Top Secret on over 200 documents to cover up the fact
that they were lying.
The basic lie is as follows: Lee Harvey Oswald
killed John F. Kennedy and Patrolman J. D. Tippitt on
November 22, 1963 using his own rifle to fire three shots
at the President, from a sixth floor window of the Texas
School Book Depository Building. Two of the shots struck
the President and Governor Connally and one shot missed,
striking the south curb of Main St. in Dealey Plaza.
Oswald used his own pistol to kill Tippitt in Oak Cliff,
several miles away from Dealey Plaza.
The mountain of evidence gathered to date including
photographic as well as ballistics, medical, and eyewitness testimony proves the above conclusions reached
successively by the Dallas Police, the FBI, and the
Warren Commission to be lies. Oswald can be shown
to have fired no shots that day. Photographic evidence
alone, proves that no shots were fired from the sixth
floor window on that day, and that certain members of
the police faked evidence in the window, on the sixth
floor, and elsewhere, in order to frame Oswald as the
lone killer. (See Reference 7. )
Evidence proves that Kennedy was killed by a shot
from the grassy knoll in front of him, and that other
shots were fired from the Dal Tex Building and the
grassy knoll. Evidence shows that two other men shot
Tippitt and not Oswald.
The classified documents mayor may not reveal all
of this, but it is highly likely that they will support the
evidence showing conspiracy.
These documents are not needed to prove conspiracy;
but nevertheless, the public has a right to know. If the
documents reveal nothing at all about Oswald's innocence,
his informer role, or the conspiracy, then why should
they remain classified? If they do reveal something,
then there is all the more necessity for declassification.

a

The people of the United States have right to know,
to find out the truth about the lies they have been told.

References and Notes
1. National Committee to Investigate Assassinations,

927 15th St. NW, Washington, D. C.

20005

2. Gerald R. Ford, "Portrait of the Assassin", New
York, Simon & Schuster, 1965.
3. Francis Gary Powers, "Operation Overflight", New
York, Holt Rinehart & Winston, 1970, pp. 357-8.
4. Charles W. Roberts, "The Truth About the Assassination", New York, Grosset & Dunlap, 1967; also,
Lawrence Schiller, "The Scavengers and Critics
of the Warren Report", New York, Dell Books,
1967.
5. "Original facsimile record of bills charged to the

Warren Commission to pay for the stenographic
reporting of sessions of the Commission", stamped
Top Secret, published as Exhibit 2, in "The Second
Conspiracy", by Richard E. Sprague, Computers
and Automation, July 1970, pp. 35-36.
This exhibit was photographically reproduced.
The second line-space of this record shows that
on January 22, 1964, the Warren Commission held
a meeting in "D. C. ", and then the line is crossed
through by another line and the handwritten notation appears "no write-up - reporter's steno notes
confiscated by the Commission".
6. "Confidential and Secret Documents of the Warren
Commission Deposited in the U. S. Archives", by
Neil Macdonald, Computers and Automation,
November 1970; list, pp. 45-47; introduction,
p. 44.
7. "The Assassination of President John F. Kennedy:
The Application of Computers to the Photographic
Evidence", by Richard E. Sprague, Computers
and Automation, May 1970, pp. 29-60.

Advertisement

JUST PUBLISHED!
"TWO FLiGHTPATHS - EVIDENCE OF CONSPIRACY",
by R. B. Cutler, Architect, Manchester, MA 01944, 1971,81 pp

The two flightpaths are the paths of two bullets.
The occasion was the assassination of President John
F, Kennedy in Dallas, Texas, on November 23, 1963,
while riding in a limousine with Governor John B,
Connally of Texas - now the Secretary of the Treasury
in the administration of President R. M. Nixon, One
bullet is the bullet which was alleged by the Warren
Commission to have wounded both the presjdent and
the governor (Commission ExhiiJi t 399). The other bullet
is the bullet which actually struck Governor Connally
in the back •.
"To an archi tecturally trained eye, nei ther bullet
lined up correctly with the southeasternmost sixthfloor window of the Texas School Sook Depository, the
alleged firing nest of Lee Harvey Oswald,"
Order from the author, Price, $7, Returnable in 10
days for full refund if not satisfactory (if in salable condi tion), To avoid bookkeeping problems, please
send money order or check (not cash) with order.

COMPUTERS and AUTOMATION for October, 1971

45

Privacy, Human Values, and Democratic Institutions

" ... The generalized use of the computer as a means of social control threatens
to destroy ... very probably all the present rights of the individual ... "

Congressman Cornelius E. Gallagher
U.S. Congress
Washington, D.C. 20515

(Gallagher testimony before the Committee on Rules,
on Resolution to create a Select Committee on
Privacy, Democratic Institutions, and Human Values,
Wednesday, May 4, 1971)
Mr. Chairman, and members of the Committee on
Rules, it is a great pleasure for me to be here
this morning to offer testimony on my resolution
to create a Select Committee on Privacy, Human
Values, and Democratic Institutions.
The Use of a Computer

as a Means of Social Control

Let me begin my remarks with a statement from
one of America's most perceptive social observers
and a man who is deeply aware of the lag between
technological change and society's response. Robert
Theobold has written:
"Whether increasing violence and social disorder
can fairly be laid at the door of the computer is,
however, peripheral to the possibility of the development of a police state ... "
Mr. Theobold continues: " ... the generalized use
of the computer as a means of social control threatens to destroy at least the right of privacy, and
very probably all the present rights of the individual ... "
-He then pleads for laws to be developed which
will utilize the wonders of computer technology
without the clear threat he sees to all of our
rights.
This, Mr. Chairman, is exactly what my proposed
Select Committee is ultimately designed to accomplish. Since the hearings I held with my Privacy
Inquiry of the House Committee on Government Operations into a proposed national data bank in 1966,
I have been very concerned about the inability of
the people's representatives to grapple with technological change. For the computer, with its enormous ability to collect and retrieve information,
was totally unknown when our Bill of Rights was
framed and, unfortunately, its total impact on our
system of government is the source of considerably
more noncongressional worry than it is a subject of
investigation within the Congress.
The Invasion of Privacy

When we called attention to the computer's ability
to invade privacy in 1966, it was a very new concept.
Now, we have seen Senator Ervin's hearings with his
Constitutional Rights Subcommittee disclosing exam46

pIe after example of the power of technology to
assemble mountains of information on the lawful activities of our citizens. Since my 1966 hearings,
I have frequently pointed out specific threats in
the credit reporting industry, the marriage of sophisticated photographic methods with the computer,
and the increased instances of almost lawless personal record-keeping permitted by the new technology.
All of this, however, has been concerned with
specific cases, and let me say I could speak for
several hours with example after example of the new
technology. But let me refer to one of the most recent, and one of the best books, on this subject.
Professor Arthur R. Miller writing in his splendid
The Assault on Privacy says that a broad view of the
entire problem is necessary and he endorses my request for a fully funded, fully staffed committee.
I believe the Committee will soon receive, or has
received already, letters from Professor Miller,
Dr. Alan Westin, who heads a National Academy of
Sciences' group considering computerized data banks
and civil liberties, journalists who have covered
this area, and professionals from the computer community. Indeed, it might fairly be said that everyone recognizes the threat except those who will have
their power stripped away: Members of the Congress
of the United States.
Anticipatory Democracy

Interestingly, each review of the many books on
privacy looks to the Congress to assert the human
values, and to try to measure and hopefully guide
the massive change technology is forcing upon us.
In Irving Toffler's phrase, we will all suffer
Fu tu re Shock.
Toffler also says that we must begin to practice
anticipatory democracy; that is, we must create a
government whose institutions are knowledgeable
enough about change to have some ability to direct
that change.

Computer Power in the Executive Branch

Not only do we in the Congress have no formal
mechanil!m to assure "anticipatory democracy," the
growth of computer power in the Executive Branch is
denying us the exercise of our constitutionally
mandated "participatory democracy." We in the Congress are in real danger of becoming solely a ceremonial body, of becoming a supine figurehead on a
COMPUTERS and AUTOMATION for October, 1971

ship of state, steered by the Executive Branch's
computers, which is headin~ straight for the rocks.
Rising Tide of Frustration

Not only are we not representing ourselves in the
policy making area, but we are allowing those who
have reposed their trust in us, our constituents,
to gradually be stripped of a feeling of participation. The rising tide of frustration and powerlessness we see all around us is due, to some degree, to the fact that every proposed piece of
legislation sent to us from the Executive Branch or
that we develop ourselves, calls for the gathering
of more personal information by the Federal Establishment. If we can make sure that every law we
pass contains safeguard for that information, and
perhaps more important, if every concerned legislative committee insists that the collection of
information is fully justified, we will be able to
assure our constituents that we are playing a meaningful role.
Science Fiction Surrounding the Computer

It will not undermine the potential threat of
the computer to point out that many current computer
applications just do not work. In some cases the
down time is as high as 60% and one pertinent role
of a Select Committee would be to strip away the
science fiction surrounding the computer and
to insist that the computer industry develop more
accurate systems. But in the area of genetic engineering, there simply is no science fiction.
Almost every form of life will someday yield to
the test tube and a managed environment for conception, growth, and lifelong manipulation is within
the predictable future. Coupled with the use of
chemical technology to alter life-styles, moods, and
attitudes of our citizens, we are creating a radically different sort of society from that which
you and I know. Yet, the Congress continues to be
almost indifferent.
Technocratic Elite

America is a mixture of dozens of different cultural and ethnic heritages and yet often those who
manipulate the new technologies believe that everyone must be a mirror image of themselves. We are
in the process of creating a technocratic elite who
produce programs of massive impact but who do not
consider fully the ramifications of their actions
beyond short term successes.
Common Folk Become docile Clients or Deviants

A man very different from Robert Theobold, indicating the range of philosophies concerned, has commented on this problem. One of the prime proponents of the new life style, Paul Goodman, said:
"Human beings tend to be excluded when a logistic"
(that is, a computer-oriented) "style becomes universally pervasive, so that values and data that cannot be standardized and programmed are excluded,
when function is adjusted to the technology rather
than technology to function ... when there develops
an establishment of managers and experts who license
and allot resources, and which deludes itself that
it alone knows the only right method ... then common
folk become docile clients, maintained by sufferance,
or they are treated as deviant."
And, unfortunately, it could well be said that the
Congress itself is often a docile client of an all
knowing technocratic elite.
COMPUTERS and AUTOMATION for October, 1971

Pollution of the Political Atmosphere

And this power is not only in the Executive
Branch, Mr Chairman. Academies devise psychological tests which mirror their own pre-conceptions of
what constitutes decent behavior; businessmen exchange data on social, moral, and economic life of
citizens only allowing them limited access to information which determines their ability to get credit,
insurance, or employment; medical and school personnel administer behavioral modification drugs to
grammar school children, sometimes without analyzing
the socially inspired reasons for what they term
"learning disabilities;" Federally sponsored research reports launch plans which are buried deeply
within the bureaucracy until they burst forth on an
astonished and fearful citizenry; congressional committees approve efficient and economical schemes
without being able to develop information which
allows a just consideration of the long range impact
on our shared values. The list is endless.
I might describe what is happening, Mr. Chairman,
by saying that we all now recognize that the pollution of the physical atmosphere is the result of somE
technologies, but that we are unaware of the pollution of the political atmosphere. Technology's
tools spearheaded by the computer, have so accelerated the pace of change that we are in grave danger
of losing our form of government. Certainly, in so
many areas, the House of Representatives has already
lost its relevance.
And so, Mr. Chairman, I implore this Committee
to approve the Select Committee on Privacy, Human
Values and Democratic Institutions. It would be a
major aid to our constituents, our Constitution, and
our Congress.

SELECT COMMITTEE ON PRIVACY, IN THE HOUSE OF
REPRESENTATIVES

Congressman Cornelius E. Gallagher
House of Representatives
Washington, D. C.

On May 18, the House Committee on Rules approved
my Resolution to create a Select Committee on Privacy, Human Values, and Democratic Institutions.
A vote on the Floor of the House will be forthcoming
soon.
As the attached documents disclose, Senator
Ervin, and Congressmen Anderson and Horton, clearly
see the threats which the new technology poses to
privacy. But, unfortunately, this vision is not
shared by a majority of my colleagues here in the
House.
I am, therefore, asking that you do what you can
to convince your own Congressman or others who could
be influential, of the importance of the issues in
regard to privacy. I hope you share my conviction
that privacy is as fragile as it is essential to thE
. continuation of a free America.
Since the cancellation of my Privacy Inquiry by
the Government Operations Committee, the Congress
has been denied the kind of insights and actions we
generated. A Select Committee would have a full
staff and full funding and would be fully able to
confront each threat as it emerges and could help
the Nation find coherent policy. I urgently solicit your aid.

47

Privacy, Human Values, and Democratic Institutions

II

"Individuality is an absolute necessity for the survival of democracy - without
privacy and free expression, no free nation can remain free. "

Congressman Frank J. Horton
House of Representatives
Washington, D.C.

(Text of Congressman Horton's testimony before the
Committee on Rules in support of a proposal to
establish a Select Committee on Privacy, Human Values, and Democratic Institutions)
The Computer Has Made Man not Wiser but More Clever

Mr. Chairman, I ask your indulgence for a few
minutes in order to place my discussion in its philosophical perspective. Our forebears, some hundreds
of thousands of years ago, conducted themselves
under primitive conditions and acted with a savagery
we would consider appropriate for animals. Time improved that, with fire, the wheel, steel and gunpowder, the steam engine and the industrial revolution. But let us consider for a minute what man
has wrought. The bulldozer and dynamite have made
him stronger; he can literally move mountains.
The plane and car have made him swifter. The furnace and air conditioner have changed the "weather"
he must live in. Telescopes enable him to see objects so distant, that their proximity must be
measured in light years. And the computer has made
him not wiser -- but more clever, extending memory,
evaluation and calculation to a degree almost incomprehensible.
A Public Outcry to Ban Automobiles

This technology has taken its toll. C.P. Snow,
the British philosopher, can remember the public
outcry to ban automobiles after the first fatal
accident in London. But humans became regarded as
less unique, and the auto stayed -- despite 60,000
auto deaths a year, in this country alone. Life
expectancy in smog-ridden New York City is statistically less than elsewhere in America. The cost
has been an aesthetic one also. As the writer put
it, "You may fly ... but the birds will lose their
wonder. And the clouds will reek of gasoline."
Prohibitive Costs

Fortunately, we have reached a point in which some
of the costs have been found prohibitive and corrective steps have been taken. Automobiles must
be developed which will not poison our air. Food
preservatives, an excellent concept, have been
found harmful and are closely controlled. Industries must curtail pollutant operations.
A Machine which Can Memorize More and Better
Than We Could in a Hundred Lifetimes

This revolt against the abuse of man, against
unguided and uncontrolled technolog~ has recently
turned to the computer. A machine, no larger than
this table, which can memorize more and better than
we could in a hundred lifetimes, has been found a
threat to the quality of life and society that we
hold dear. Why? Because privacy has and contin48

ues to be abused as man failed to discern the computers' effect on our lives. The horror stories are
legion, and they range from political surveillance
to the information on 'file at credit bureaus,
which -- accurate or not -- is freely available to
almost anyone.
The Job of the Government is to Identify
the Problems of Society

The job of government -- any government -- Mr.
Chairman, is to identify the problems of society and
then go about solving them. I submit that the matter of privacy and human values, and democratic
institutions is a matter of concern to most Americans, the thus, a legitimate subject of study for
America's leaders.
A Function of Assessing

The Committee envisioned in this legislation
would not have a regulatory role. It would, however, have an attentive function in assessing the
unintentional, unconscious, but nevertheless growing threat to one of our basic freedoms -- privacy.
Our nation was based on the revolutionary and unique
notion that a man's thoughts, his private affairs,
and his activity were his own business insofar as
they did not pose danger to others or to the public
welfare. But America has since approached middleage, with attendant changes in outlook.
Government Officials Demanding to See
the Private Papers of Newsmen

In toaay's age, we see government officials demanding to see the private papers and notes of newsmen. We are told that there is no inherent right
of privacy, that individuals, including any Senator
or Congressman, can -- theoretically, be placed
under surveillance without his rights infringed.
We are asked to trust in the "self-restraint" of
the government in these matters.
Erosion of Freedom

I submit, Mr. Chairman, that this erosion
of freedom is a matter of great importance, especially its deteriorating effect on our privacy, our
uniqueness as individuals. It is imperative that a
committee undertake a study of where this development
is taking us as a society. You will note, Mr. Chairman, from my previous remarks, that there will be a
great deal of disagreement on the questions alone
before we can even begin to seek answers. But the
study must be undertaken if we are to transfer to
our grandchildren and theirs the quality of life and
the heritage of personal liberty and individual uniqueness we received from our forebears. For individuality is an absolute necessity for the survival
of democracy.
COMPUTERS and AUTOMATION for October, 1971

Privacy and Free Expression

Without privacy and free expression, no free
nation can remain free. There are three specific
areas I would like to cover and then I would be
glad to try to answer any specific questions the
Committee may have. The three areas are (1) the
essentially bipartisan nature of the work of the
proposed Select Committee; (2) the particular necessity at this point in time for such work to be
mounted here in the House of Representatives; and
(3) the reason why this work would permit the House
of Representatives to remain relevant to current
national problems by what I would regard as a most
significant act of internal reform by creating
this Select Committee.
Wide Support

First, few issues with which I have been associated have drawn support from a wider spectrum
of philosophies and political views. My presence
here today as well as my words demonstrate that
one Republican strongly supports this concept and
I feel I can speak for many of my colleagues on my
side of the aisle when I say there is no partisanship involved.

to a threat to America which the distinguished
southern Senator, Sam J. Ervin, recently laid out
in truly appalling detail. The insights of the Privacy Inquiry were indisputably proven during Mr:
Ervin's hearings.
I am sure that Mr. Gallagher, in his statement,
has shown how we could remain relevant as an institution if the House were to establish this Select
Committee.
The "Threatening" of Basic Human Rights

I just want to add an additional point, and this
has to do with reforming our procedures. The Nation
is now in turmoil and many of our constituents,
rightly or wrongly, feel that their basic human
rights are being threatened.
We have in this Congress three permanent Committees which work to guard our society against crime
and disorder, worthy pursuits which can, on occasion,
step too far toward limiting the privacy rights of
our citizens. These committees are: Committee on
the Judiciary; the Select Committee on Crime; and
the House Internal Security Committee.
Insistence on Reform of this House

National Data Bank

When I was a member of Congressman Gallagher's
Privacy group in the House Government Operations
Committee, our hearings in 1965, 1966 and 1968 were
held during Democratic Administrations. The hearing into the proposed National Data Bank was especially revealing, because we learned that the top
political advisors in those Administrations had
little or no knowledge of what was being proposed in
the middle levels of the bureaucracy.
Huge Immovable Bureaucracies

As President Nixon has learned since he has assumed his position, administrations inherit both
huge problems and huge, immovable bureaucracies.
We found in our work with the privacy study that
programs which threaten privacy are advanced by
people who are largely indifferent to partisan politics, who propose to spend millions of public dollars, and who are seldom if ever identified in the
same way men in public life are held accountable for
their decisions.
Visibility for Proposals

It may well be that a major task of the Select
Committee would be to give visibility to certain
bureaucratic suggestions before they become issues
which could divide Republican from Democrat and
liberal from conservative.
A Select Committee would, I feel, bring us together to preserve the common good rather than
create any partisan arguments.
President Nixon in a recent news conference said
that this Administration would take no actions to
infringe on the right of privacy. I believe Mr.
Nixon, just as we believed Mr. Johnson, but the
Federal Government is so large that neither of the
Presidents could be sure. One task of the proposed
Select Committee would be to make independent evaluations of proposals which could threaten what any
President wants for his country.
When we held our hearing into the computer and
invasion of Privacy in 1966, we called attention
COMPUTERS and AUTOMATION for October, 1971

Let me immediately say that I do not share the
view that these Committees consciously help to
restrict individual rights in America. But one of
the central messages of those who insist we reform
this House is that we are not equipped to deal with
the rising demands of those who demand a fuller expression of their basic humanity. It seems to me
that one Select Committee looking into privacy
could balance the perspective of the House, which
must watch over both the personal safety and individual rights of Americans.
Enabling Voices to Be Heard

Naturally, a Select Committee would not undermine the work done by other Committees in the House,
but it would permit what are now only powerless
cries of frustration to be funneled into a formal
channel and it would permit other voices to be
heard as we arrive at our decisions.
The Computer May Have a More Powerful Impact
Than the Printing Press

Many observers contend that the computer will
have a more powerful impact on society than did the
printing press. I think the major thrust of the
Select Committee in conducting continuing investigations of existing and proposed computerized information systems, both those within Government and
in private hands, will allow democracy to flourish
along with this essential new means of record keeping. Neither Congressman Gallagher nor I are against
the computer, but we do share the view that it must
be used carefully, under controls, and in full consonance with the Bill of Rights. We have no present
means within the House, or indeed within the Congress to receive expert advice and to conduct knowledgeable investigations in this field. The Select
Committee would put that expertise here within the
House, rather than having it all within the Executive Branch.
In my opinion, what we are discussing is allowing the Congress to remain responsive to current
concerns. I hope that you will look with favor on
the creation of a Select Committee on Privacy, Human Values, and Democratic Institutions.
49

ACROSS THE EDITOR'S DESK
APPLICATIONS
CHECKLESS PAYROLL SAVING
HOSPITAL DOLLARS & TIME

At Sarasota's Memorial Hospital
in Florida, a computerized checkless
payroll system is reported reducing
payroll preparation and admini stration costs more than 25%. After
four and a half years and more than
100 checkless paydays, hospi tal management, employees and fi nancial institutions consider the automated
system an unqualified success. (The
hospi tal deposi ts its entire $280,000
bi-weekly payroll in 14 different
banks designa ted by its employees.)
Under the checkless system the
hospital operates virtually a "handsoff" pay sys tem from the time an
employee clocks into the hospi tal
in the morning until his pay is
money in the bank.
Participation
is mandatory for the hospi tal employees.
H. Jack Floyd, associate executive director of the hospital,
played a major role in the inaugura tion of checkless paydays in January 1967. Mr. Floyd described the
system this way:
Each employee is issued an identification card with his name,
picture and Social Security number
when j oi ni ng the ho spi tal staff. On
coming to work he simply inserts
the card into a time clock that
transfers the information to a
"slaved" card punch in the hospi tal's
computer room. The process is repeated when an employee leaves work.
After a card has five in and/or
out punches, it is fed into the
hospi tal's Honeywell 1250 computer.
At the end of a pay peri od the
compu ter prepares a payroll deposi t
roster for each of the banks participating in the program, which
is delivered to the banks with the
hospital's check.
On payday, employees receive a Payroll Notice of
Deposi t which provides them all
pertinent pay information, as well
as information on vacation time accrued and sick time. These latter
entries are the result of the hospi tal's having programmed personnel
policy regarding time in, time out,
maximum vacation time, application
of sick leave, etc., right into
the computer.
(Software has been
developed by Memorial's EDP staff
wi th the assi stance of Honeywell
software specialists from its Tampa,
(Florida) DP operation office.
Use of the computer isn't new to
the SIS-bed hospi tal, whi ch consid50

ers itself the first hospi tal in
Florida to install a computer back
in 1962.
Today Sarasota Memorial
operates on about a $200,000 annual
EDP budget and is us i ng computer
communications to attack cost problems on a wide scale. "We're fi rm
believers in getting full utilizatio!} of the capabili ties of our
computer," Mr. Floyd emphasized.
"We've used the Model 1250 for
four years now wi thout being down
for as long as 24 hours because
of problems •... "
PROPERTIES OF CHEMICAL COMPOUNDS PREDICTABLE WITHOUT
ACTUAL MEASUREMENTS
THROUGH USE OF COMPUTER

Two scientists from the University of Utah have developed a completely new technique for predicting the properties of chemical compounds wi thout the time and expense
of actual measurements. Reporting
at the national meeting of the American Chemical Society, Dr. Richard
H. Boyd, professor of chemical engineering, andDr. Shirl Breitling,
assi stant research professor of materials science and engineering,
said they have learned how to use a
computer to predict the precise
shapes and many of the properties
of molecules.
The new technique
eliminates the necessi ty for such
measurements as X-ray and electron
defraction, infrared analysis, heat
of formation and heat capacity.

sional pictures of molecules,
cluding motion pictures.

in-

"One of the most exci ting applications of the new technique is that
compounds whi ch have never before
been made can now be calculated
through the computer," said Dr.
Boyd. "We are confident the technique will enable engineers to design chemical plants to produce
compounds with predictable properties, polymers for better plastics
and hydrocarbons for better petroleums, etc."
He also pointed to
future shortcuts in developing better materials for artificial organs,
pollution-free gasolines and other
materials wi th better balanced molecules.
LINGUISTICS RESEARCHER PLANS
NAVAJO LANGUAGE TEXTBOOKS
WITH HELP OF COMPUTER

A computer will help bridge the
language and learning gaps encountered by Navaj o-speaking Indian
youngsters when they enter school
and a re faced wi th a foreign language
English.
Dr. Bernard
Spolsky, a linguistics researcher
at the University of New Mexico
(Albuquerque), is using an IBM System/360, Model 67 computer to analyze the Navajo language and catalog the knowledge Indian youngsters

The researchers fi rst devi se a
model of a molecule that makes up
the atomic structure of the compound
under study.
These are fashioned
out of plastic tubing and brass
fasteners. Then the atomic ends of
the molecule are touched by a computer-attached stylus. A button is
pressed to record the positions of
the atoms in the computer.
The
energy functions of the molecule,
including natural bond lengths,
angles, force constants, and other
known factors are also fed into the
computer, providing what Dr. Boyd
called the "converged structure" in
a numerical print-out.
Since a complex series of numbers
is difficult to interpret, the researchers went one step further and
worked out a graphic di splay program with the computer science department. Using the University of
Utah's graphic research facili ties,
the two scientists used the computer
to produce still pictures of the
molecules, as well as moving pictures of how they change shape.
One of the chief benefi ts of the
technique is that chemistry students now can observe three~dimen-

- Dr. Bernard Spolsky, shown
talking with a Navajo girl
possess on entering school.
He
believes that the young Navajos
90% of whom reach fi rs t grade knowing no English - would learn English better if they were taught to
read and wri te thei r na ti ve language first. "Before we can prepare adequate educational materials,
we must know what the Indian child
understands of his own language,"
Dr. Spolsky said.

COMPUTERS and AUTOMATION for October, 1971

Dr. Spolsky trained adul t Indians
to conduct tape-recorded interviews
with more than 150 children of the
120 ,OOO-member Navaj 0 na tion to determine what instructional approach
should be taken in the chi Idren' s
native tongue. Each interview was
transcribed onto punched cards and
analyzed by the universi ty' s computer. The system produced an alphabetical index (2,673 pages long)
of all words used in the interviews,
noting for each the sentence in which
it was used and the frequency of use.
The frequency listing, tellingwhich
Navajo words the first grader understands, is the starting point for
preparing educational materials.
The study will result in elementary school textbooks wri t ten in
Navajo.
The old Dick-Jane-Spot
texts
which have accompanied
millions of Americans through the
primary grades -- will be replaced
wi th more meaningful Indian counterparts.
The federal government has taken
an interest in Dr. Spolsky's skill
with the IBM system and funded the
study.
DEFECTIVE AUTOS ROUTED OFF
STREETS, INTO REPAIR SHOPS,
WITH AID OF COMPUTER

As the result of an IBM computer
that's helping route defective vehicles off Washington, D. C. streets
and into repair shops, the more than
100 mi lli on au tomobiles traveling
the nation's highways in the mid70s will be safer and emi t less pollution. The computer is part of an
experimental vehicle inspection station developed by the District's Department of Motor Vehicles under a
$2.4 million contract with the Department of Transportation (oor) and
a $40 ,000 contract wi th the U.S. Environmental Protection Agency (EPA) •
Information gathered by the System/360 Model 50 duri ng the five
year experiment wi 11 be used by DOT
to increase the effectiveness of
automobile manufacturers' recall
campaigns and, ul tima tely, to set
new safety standards for the industry. And EPA willusethe same data
to find ways that excessive engine
emissions can be eliminated.
In operation si nce late April,
the inspection station has spotted
defects in several hundred cars
traveling District streets.
When
anyone of the 250 ,000 cars regi stered in the District comes in for
its yearly inspection, its first
stop is at a video display terminal
connected to the computer. An attendant types in the auto's make
and registration number. Stored in
the computer are recall notices on

more than 11 million cars reported
to DOT by the manufacturers. If the
car is among the 11 million or has
been involved in an accident that
resul ted in damages of $200 or more,
the information is instantly displayed on the terminal's screen and
printed on a vehicle inspection form.
Defective autos go to a special
lane where, along wi th normal tests,
they're put on a dynamometer which
runs them a t speeds of 25, 40 and 60
miles per hour and checks engine
performance, transmission, exhaust
emissions and brakes at each speed.
Next, the suspension and steering
systems are checked. In some cases,
brake drums are removed for internal
inspections, then re-assembled and
tested again. Results of the tests
are fed back into the computer where
they're avai lable to the Department
of Motor Vehicles, DOT and EPA. If
no problems are reported by the computer, the auto goes through one of
four regular inspection lanes that
test seat bel ts, glass, tires and
other safety components.
The program has been well received by District residents who
feel that, for the fi rs t time,
they're getting an objective look
at the car they're driving, at no
additional cost to ihem.
UPI EDITORS WI LL TRADE
PENCI LS FOR COMPUTERS

Edi tors at Uni ted Press International news service are trading
their pencils for computer systems
to edi t news stories flowing in from
throughout the world. UPI is developing a system for edi ting and di stributing news that will eliminate
most manual rewri ting and resul t in
faster, more efficient news reports
to newspapers and broadcasters.
Stories filed by UPI correspondents and bureaus wi 11 be fed into an
RCA computer.
The computer wi 11
automatically produce an abstract
of each story, including an item
number, slug line, first paragraph
and length.
The abstract will be
printed out on teleprinters at the
desks of key edi tors at UPI headquarters in New York.
An editor can select a story to
edit, have it displayed on a video
data terminal, and using the terminal's keyboard, can correct the
copy, making addi tions and deletions
just as he now does with a pencil.
The story then will go back into the
computer for dissemination to UPI' s
client newspapers and broadcast
stations.
The system will begin ini tial
operation in the Spring of 1972,
when UPI' s primary na tional news

COMPUTERS and AUTOMATION for October, 1971

wire is converted to the comp'uter
operation.
The computerized wire
will operate in parallel with the
manual wire for about a month during
a testing period to insure uninterrupted service to clients. By mid1972, nearly all otherUPI wires will
be linked to the system.
In each
case, the manual wire will run in
paralle 1 for approxima te ly two weeks.

EDUCATION NEWS

ATLANTA BAPTIST COLLEGE
OFFERING DEGREE CREDITS
TO HONEYWELL GRADUATES

College credi ts for cIa ssroom
courses conducted by an industryoperated school are being offered
by Atlanta Baptist College (Georgia)
as of the 1971-72 Fall quarter. Dr.
Monroe F. Swi lley, Jr., president of
ABC, announced tha t the college completed arrangements with Honeywell
Inc. to allow 30 full college credits toward a bachelor's degree for
all graduates of the Honey~ell Institute of Information Sciences.
The agreement will make the young
four-year college the first institute of higher learning in the Southeast and one of the first in the
nation to make this type of arrangement wi th a compu ter ins ti tu te
for such credit transfers. Similar
plans in operation involve the Universi ty of Minnesota in Minneapoli s,
Southern Methodist Universi ty in
Dallas, and Pepperdine University
in Los Angeles, the latter in cooperation with Honeywell.
(see
Computers and Automation, September 1971, p. 42.)
Simultaneous with the credit
transfer announcement came word tha t
Honeywell also had been awarded a
contract to set up and manage a formal computer science program as
regular courses wi thi n the framework
of ABC's business administration
curriculum.
U.S. COLLEGE HELPS KOREA
ESTABLISH GRADUATE CENTER

Polytechnic Institute of Brooklyn
(New York), a science-engineering
college, is helping Korea overcome
one of its biggest obstacles in the
way of industrialization -- a shortage of scientists and engineers.
Last summer, Polytechnic Institute
supervised the initial development
stages of Korea's first centralized
graduate school of science and engineering, which expects its first
students in the fall of 1972. (Now,
most Korean students who want to
study science and engineering on a
gradua te level must go to the Uni ted
States or another country.)
51

KAIS grew out of a study by Prof.
KunMo Chung, a native of Korea and
an associate professor of electrophysics at Polytechnic Institute's
Long Island Graduate Center. Prof.
Chung has been named Vice-President
for Academic Affairs of the new institution, and he also is a member
of Polytechnic's KAIS Ta sk Force wi th
responsibi li ty for program development and facul ty recrui tment for the
new college.
Plans call for an initial class
of approximately 40 M.S. students
in two fields of study.
By 1975,
there will be seven fields of study
offered in programs leading to the
Master of Science degree, the Engineer degree and the Doctor of Science
degree.
Financing for KAIS comes
from the Republic of Korea and the
U.S. Agency for International Development (AID).
"INTERNSHIP IN INDUSTRY"
ALLOWS TEACHERS TO KEEP PACE

Honeywell InformationSystems is
conducting an" internship in industry" program to allow teachers to
keep pace wi th rapidly changing industrial technology.
The program
was set up to help ensure that what
students learn will be pertinent to
the solution of topical problems.
Faculty members who teach and have
curriculum development responsibili ties for technological subj ects at
vocational and technical insti tutions are invited to participate in
the sessions.
The" internship in industry" program includes lectures and laboratory work on the production and
maintenance of computer equipment,
principles of computer programming,
computer industry trends and career
opportuni ties wi thin the computer
industry.
Sessions are held at
Honeywell's field engineering training center in Newton, Mass.

RESEARCH FRONTIER

VOICE-CONTROLLED DEVICE GIVES
"COMMAND" PERFORMANCES

Engineers at Bell Laboratories
in Holmdel, N.J., are investigating
an experimental device that can dial
a telephone number when given spoken
commands. Voice control of the device is achieved through a simple
form of integrated circui try that
converts sound waves into electrical
pulses to open and close the electromechanical switches necessary
for obtaining a dial tone, executing
dialing, and terminating a call.
Previous voice-controlled devices
required the use of an elaborate
52

system of electronics in addi tion
to the aid of a computer to function
efficiently. By compari son, say its
developers, Meb Awipi, Cliff Hoffman
and Gerald Soloway, the experimental
device is simply constructed and
easy to operate.

and contaminants.)
The Product
Test Laboratory also uses the test
chamber to subject computers to high
concentrations of dust as well as
ci ga re t te smoke.
MEMORY DISCS

A small circular display of ten
lamps labeled wi th the numerals zero
through nine is used along wi th the
voice control device.
The lamps
light in numerical sequence.
Any
voice utterance spoken in coincidence wi th a lighted numeral wi 11
activate that number. Speaking the
numbers "one", "three", and" fi ve"
as the corresponding numerals light
up in thi s order wi 11 enable the
device to store in its memory all
of the digi ts in a typical telephone
number. As the numbers are spoken,
the
corresponding .lamps remain
lighted in the display for a slightly
longer interval to indicate registration in the device's memory.
When a special command is given,
the memory in the voice control device transmi ts stored digi ts as a
series of electrical pulses to telephone dialing circuitry.
A telephone number remains in the memory
even after it is dialed and can be
reused any time the dialing command
is given. It is automatically erased
when a new number is stored.
A similar voice control device
may one day provide "hands-free"
telephone service for motion handicapped persons. Also in the future,
the device could possibly be used
to operate more sophisticated electrical equipment or machinery.

MISCELLANEOUS
CIGARETTE SMOKE AIDS
COMPUTER TESTING

An unusual machine that "smokes"
cigarettes a whole pack at a time
is helping IBM engineers test and
evaluate the effects of smoke on
computers. At IBM's General Systems
Division Product Test Laboratory,
Rochester, Minn., the machine's two
cylindrical nl ungs" automatically
"puff" and "exhale" smoke into the
test chamber where a machine is
subjected to the dense smoke.
Because IBM's small computers,
such as System/3 and System/7, are
being operated in industrial facili ties and warehouses as well as
business office environments, new
methods such as the cigaret te smoking machi ne are used to insure
product reliability. (Larger computer systems are normally housed
in climate-controlled rooms, and
isolated ·from various pollutants

These discs may look like phonograph records of the future -- and
they wi 11 record more i nforma tion
than you'll find in a library of
long-play records. They are, however, computer memory discs. Each
side of the aluminum discs can hold

the equivalent of nearly three
80,000-word books. In the picture,
a quali ty control technician at
Reynolds Metals Company's McCook,
Ill., plant is shown a s he checks
surface flatness to wi thin thousandths of an inch.
Reynolds estimates that more than 6 million
pounds of aluminum will be used for
memory di scs thi s year -- enough to
make more than 8~ mi lli on di scs
containing 4~ trillion words.
IBM "SELECTRIC" II TYPEWRITER
AND THE NEW TECH III RIBBON

The IBM "Selectric" II Typewri ter
is the most recent addition to the
family of word processing equipment
offered by IBM's Office Products Division, Franklin Lakes, New Jersey.
Among the new features of the ·machine is a dual pi tch mechani sm
which enables the typist to switch
from lO-pi tch (ten characters per
inch) to 12-pi tch (twelve characters
per inch) simply by moving a lever.
Other new features include an express
backspace and a half backspace.
A new IBM Tech III Ribbon, also
fea tured wi th the typewri ter, is
enclosed ina snap-in/sriap-out cartridge.
This long-life ribbon is
manufactured under a patented process which creates a tough polymer
(plastic film) saturated wi th fluid
ink. With average use the new ribbon needs to be changed approximately five times a year, compared
wi th 64 changes needed wi th previously-exi sting carbon film ribbons
used on IBM "Selectric" Typewri ters.
COMPUTERS and AUTOMATION for October, 1971

NEW CONTRACTS
Burroughs Corporation,
Detroit, Mich.

Minister of Education,
New Zealand Government

Univac Division of Sperry
Rand, Blue Bell, Pa.

Deutsche Beamten-Versicherung,
Wiesbaden, West Germany

Logicon, Inc., San Pedro,
Calif.

Air Force Space and Missile,
Systems Organization (SAMSO)

Shintron Company, Inc.,
Cambridge, Mass.
Hazeltine Corp., Greenlawn,

Medfax Communications, Inc.,
New York, N. Y.
Philco-Ford Houston Operations, Houston, Texas

N. Y.

Incoterm Corp., Marlborough,
Mass.

Air France

Systems Engineering Lab., Inc.,
Fort Lauderdale, Fla.

National Aeronautics and Space
Admn. (NASA), Lewis Research
Center, Cleveland, Ohio
Systems Engineering Labs., Inc., City of Los Angeles, Calif.
Fort Lauderdale, Fla.
Computer Technology, Inc.
LTV Federal Credit Union,
Dallas, Tex.

Computing and Software, Inc.
(C&S) , Los Angeles, Calif.

Digital Development Corp.,
San Diego, Calif.
LMC Data, Inc., New York, N.Y.
SofTech, Inc., Waltham, Mass.
Cipher Data PrOducts', San
Diego, Calif.
Cambridge Memories, Inc.,
Newton, Mass.
Boeing Research & Engineering
Div., Seattle, Wash.
Logica Limited, London,
England

Ultronic Systems Corp., Mount
Laurel, N.J.
Honeywell Information Systems,
Wellesley Hills, Mass.
First Data Corp., Waltham,
Mass.

$3.75 million
Five B6700 systems and two DC1200 systems
for use throughout New Zealand universi ties;
systems will handle DP requirements of all
universities serving some 50,000 students;
first system scheduled for Auckland Univ.,
Oct. '72; network completion by August '73
$3.4 mi Ilion
A UNIVAC 1106 system for maintenance and
(approximate)
updating of customer policies, basis for
management information system, other actuarial and administrative tasks
$1.1 million
Engineering evaluation, validation and
software development for the Air Force
Minuteman intercontinental ballistic missile program for use by the Strategic Air
Command (SAC)
QIX 504 graphic facsimile transceivers; de- $1.1 million
livery in early 1972
$1,058,000
A large quantity of fully interactive digital displays to be used by NASA for mission operations information
$1+ million
Installation of complete computer display
network at Orly Int'l Airport (outside
Paris); calls for seven different configurations of the SPD 10/20 for applications
such as passenger check-in, baggage control, boarding pass printing and message
switching
$940,000
A SYSTEMS 86 computer system to be used
(approximate)
for jet engine testing

$672,000
Real-time command and control system for
(approximate)
the Los Angeles City Fire Department
$500,000
Development, implementation and operation,
(approximate)
by CT, for an "on-line, real-time" data
processing system for the 22,000-member
credit union (5-year contract)
$400,000
Designing and initiating processing of a
City of New York Housing and
(approximate)
Development Administration (HDA) computerized system to administer HDA's
New York, N. Y.
rental adjustments on over one-million
city apartment dwellings under current
rental control legislation
$375,000+
Control Data Corp., La Jolla
Supplying head-per-track disc memory systems for use in message swi tching applicaSystems Div., La Jolla, Calif.
tions in CDC computer systems
$120,000
A master contract under which various diE. I. DuPont DeNemours Co.,
Wilmington, Del.
visions of DuPont family may elect to lease (approximate)
DP equipment of the card handling type
$105,000
U.S. Naval Weapons Laboratory,
Implementation of the AED System on the
Control Data 6000 Series of computers
Dahlgren, Va.
$100,000
Dual cassette recorder systems for use
Word Processing, Inc.,
in Word Processing's text editor, the
Hagerstown, Md.
Editron System
$95,000
Development of a low-cost, block-oriented
U.S. Naval Electronics Command
random access memory (BORAM) for future
use on board naval ships and aircraft
$88,400
U.S. Navy
Computer software evaluation of executive
computer programs being developed to govern command-and-control programs aboard
nuclear attack submarines and surface ships
Funded by about 70 of world's
A study of new computer network to provide
leading commercial banks, infacili ties for international payment transcluding 25 major U.S. banks and fers between banks throughou t Europe and
U.S.; will develop computer programs to
banks in 10 European countries
aid network design and for cost analysis of
system; simulation model will be developed
for evaluation of characteristics of ~l­
ternative system designs
Trans World Airlines, New
Computer communications equipment which
York, N.Y.
will ini tially handle PARS messages between
TWA's real-time computer center and maj or
reservation offices throughout the country
Social Security AdministraLease of 15 central Keyplex processing systion
tems to replace existing keypunch machines
covering 587 stations at 10 locations in
eight cities throughout the United States
National Institutes of Health
Establishment, maintenance, and operation
of specialized remote-access, time-shared
system in support of NIH research acti vi ties
in Chemical/Biological Information-Handling
Program

COMPUTERS and AUTOMATION for October, 1971

53

NEW INSTALLATIONS
Burroughs B2500 system

Union National Bank of
Lowell, Mass

Burroughs B6700

Data Resources, Inc.
Lexington, Mass.
(2 systems)

'Control Data 6400 system

Jutland Telephone Co.
Aarhus, Denmark

Digital Equipment PDP-lO system

Interprovincial Pipe Line Co.
Edmonton, Alberta, Canada

Honeywell Model 58

A. J. Etkin Co., Oak Park,
Mich.

Honeywell Model 635 system

Mitsubishi Corp., Tokyo,
Japan
(2 systems)

IBM System 3 Model 10

Belmont Springs Water Company
Belmont, Mass.
Blue Channel Corporation
Port Royal, S. C.

IBM System 3 Model 10
IBM System 3 Model 10
IBM System 370 Model 135

Efco Products, Inc.,
Pou hkee sie, N. Y.
Florida Times-Union and Journal
Jacksonville, Fla.

IBM System 370 Model 145

Fifth Third Bank, Cincinnati,
Ohio

IBM System/370 Model 155

Group Hospitalization, Inc.,
Washin ton, D. C.
Spiegel, Inc., Chicago, Ill.
(2 systems)

IBM System 370 Model 155
IBM System/370 Model 155
IBM System 370 Model 165

NCR Century 100 system
NCR Century 100 system
NCR Century 100 system
NCR Century 200 system
UNIVAC 1106 system

UNIVAC 9200 system
UNIVAC 9200 system
UNIVAC 9200 system
UNIVAC 9200 system
UNIVAC 9200-11 system
UNIVAC 9400 system

54

Virginia National Bank
Norfolk, Va.
(2 s stems)
Fireman's Fund American Insurance
Companies, San Francisco, Calif.
Banco Nacional de Fomento,
Asuncion, Paraguay
Corporacion de Obras Sanitarias
(CORPOSANA)
Asuncion, Paraguay
Western Merchandisers, Amarillo,
Texas
American Bank and Trust Co.
Orangeburg, S. C.
Nippon Kangyo Kakumaru Securities Company
Tokyo, Japan
Grange Mutual Life Company
Nampa, Idaho
Jaffe Shoe Corp., Seville,
Ohio
Lester Industries, Bedford
Heights, Ohio
Louisville Title Insurance Co.,
Louisville, Ky.
Silver Eagle Trucking Co.
Portland, Ore.
Museum of Science and Industry,
Chicago, Ill.

Applications including an Item Processing System
(IPS)i installment and commercial loans; demand deposit, mortgage and trust accounting, foreign letters, general ledger, etc.
(system valued at over $1 million)
Helping financial and other business institutions
relate their corporate planning, cash flow analysis,
loan and deposi t forecasts, portfolio decisions, etc. ,
to economic development
(system valued at over $2 million)
Administrative functions and calculating scientific,
technical and engineering problems leading to development of advanced communications networks.
(system valued at $1.7 million)
Supervising and monitoring network of remote pumping
stations i replaces existing computer of another manufacturer
Payroll, programming labor and material costs, accounts payable, inventory of tools and equipment and
cost reports
Jointly operated time-sharing service, by Mitsubishi
and Mitsubishi Office Machinery (Honeywell Bull licensee in Japan), for both company use and as commercia 1 servi ce
(s stem valued at about $4 million)
Management reports, route analysis, inventory control, dail re orts and eneral led er
Aiding the independent fisherman in managing his
finances; later will determine trends in crab
catches alon the southern South Carolina coast
Uses ranging from tracking production to scheduling
truck deliveries of the baker su 1 firm
Control of ad production in newspapers i also accounting activities associated with direct billingaswell
as a wide variet of other accountin functions
Expanded computer operations including a Central File
for bank customersi includes all internal bank accounting functions, commercial/mortgage/installment
loans, savings and checking accounts, etc.
Expanding services for Blue Cross and Blue Shield
subscribers
Speeding the processing of over 4 million orders annuallYi system handles order entry, credit authorization and a large number of other applications
Processing 710,000 accounts daily from a state\\ide
network of 113 branches
Core of firm's nationwide DP operationsi implements
automated processing system for homeowners and automobile policiesi replaces two smaller computers
(system valued at $3.5 million)
Demand-deposit applications, loan processing and payroll preparation
Handling various accounting and statistical problems
for CORPOSANA which is in charge of all water and
sewage services in Paraguay
Complete inventory listing, weekly, identifying the
artist, title, manufacturer, vendor, retail price
and dealer's cost for each recording in stock
Meeting its expanded data processing requirements
Applications which include keeping records of shares
and certificate transactions, sales on credit bond
business, customer records, and investment information service and records of deposits for safekeeping
(system valued at $1.9 million)
Insurance premium billing, commissions, production
and persistency reporting, accounting
General accounting, inventory control and sales analysis
A specialized payroll program dealing with piece
rates, invoicing and an efficiency analysis program
Billing of agents for premiums, policy inventory and
general accounting
Revenue accounting, freight billing, sales statistics,
administrative data and payroll processing
Performing function for Chicago Park District, i.e.,
keeping track of equipment and services needed to
maintain 500 parks and many ball fields, swimming
pools, gymnasiums, bandstandsi also as educational
exhibi t for--v-is-itors
COMPUTERS and AUTOMATION for October, 1971

MONTHLY COMPUTER CENSUS
Neil Macdonald
Survey Editor
COMPUTERS AND AUTOMATION
The following is a summary made by COMPUTERS AND AUTOMATION of reports and estimates of the number of general purpose electronic digital computers manufactured and installed, or to be manufactured and on
order. These figures are mailed to individual computer manufacturers
from time to time for their information and review, and for any updating or comments they may care to provide. Please note the variation
in dates and reliability of the information, Several important manufacturers refuse to give out, confirm, or comment on any figures,
Our census seeks to include all digital computers manufactured anywhere. We invite all manufacturers located anywhere to submit information for this census, We invite all our readers to submit information that would help make these figures as accurate and complete as
possible.

The following abbreviations apply:
(A) -- authoritative figures, derived essentially from information
sent by the manufacturer directly to COMPUTERS AND
AUTOMATION
C
figure is combined in a total
(D)
acknowledgment is given to DP Focus, Marlboro, Mass., for
their help in estimating many of these figures
E
figure estimated by COMPUTERS AND AUTOMATION
(N)
manufacturer refuses to give any figures on number of installations or of orders, and refuses to comment in any
way on those numbers stated here
(R)
figures derived all or in part from information released
indirectly by the manufacturer, or from reports by other
sources likely to be informed
(S)
sale only, and sale (not rental) price is stated
X
no longer in production
information not obtained at press time

Part I of the Monthly Computer Census contains reports for United
States manufacturers. Part II contains reports for manufacturers
outside of the United States. The two parts are published in alternate months,
SUMMARY AS OF SEPTEMBER 15, 1971
DATE OF
NAME OF
NAME OF
FIRST
COMPUTER
MANUFACTURER
INSTALLATION
Part II. Manufacturers Outside United States
A/S Norsk Data E1ektronikk
NORD-1
8/68
Oslo, Norway
NORD-2B
8/69
(A) )Sept. 1971)
NORD-S
A/S Regnecentralen
GIER
12/60
RC 4000
Copenhagen, Denmark
6/67
(A (A r. 1971)
Elbit-10O
Elbit Computers Ltd,
10 67
Haifa, Israel
(A) Feb. 1971)
Series 90-2/10/20
GEC-AEI Automation Ltd,
25/30/40/300
1/66
New Parks, Leicester, England
3/68
(R)
S-Two
12/64
130
(Jan, 1969)
330
3/64
959
-/65
1010
12/61
1040
7/63
CON/PAC 4020
5/66
CON/PAC 4040
CON /p AC 4060
12/66
Atlas 1 & 2
1/62
International Computers, Ltd. (ICL)
Deuce
4/55
London, England
(A)
KDF 6-10
9/61
KDN 2
4/63
(July 1971)
Leo 1, 2,
-/53
Mercury
-/57
Orion 1
2
1/63
Pegasus
4/55
Sirius
-/61
503
-/64
12/60
803 A, B, C
1100/1
-/60
1200/1/2
-/55
1300/1 /2
-/62
7/62
1500
12/61
2400
1900-1909
12/64
Elliott 4120/4130
10/65
System 4-30 to 4-75
10/67
Japanese Mfrs.
(N) (Sept. 1970)
Marconi Co" Ltd,
Chelmsford. Essex, England
(A) (Jan, 1970)
N.V, Philips Electrologica
Apeldoorn. The Netherlands
(A)

(July 1971)

Redifon Limited
Crawley, Sussex, England
(A) (Sept. 1971)
Saab-Scania Aktiebo1ag
Linkoping, Sweden
(A) (June 1971)
Se1enia S.p.A.
Roma, Italy
(A) (July 1971)

2,0
4,0

p9200
P9200 t,s,
P800
ELXl
ELX2/8
DS714
PR8000
R2000
D2l
D22
D220
GP-16

COMPUTERS and AUTOMATION for October, 1971

8/68
3/68
3/70
9/70
5/58
3/65
-/67
1/66
7/70
12/62
11/68
4/69
7/69

o
o
o
o
o

(S)

2,3-7,5
3,0-20,0
4,9

56
5

o
40
16

56
5
0
40
16
225

(5)

65.0

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0

10-36
10-24
20.0

5.0
3.9
4.0
6.0
23.0
3-54
2.4-11,4
5,2-54

(Mfrs. of various models include: Nippon Electric
Hitachi. Ltd" Toshiba, Oki Electric Industry Co,.
Electric Corp,)
Myriad I
3/66
h36.0-=66,0
Myriad II
10/67
=22,0-=42,5

PlOOO

NUMBER OF INSTALLATIONS
In
Outside
In
U.S.A.
U.S,A.
World

AVERAGE OR RANGE
OF MONTHLY RENTAL
$(000)

6
7
58
1
59
13

17
30
22
16
83
22
68
196
110
4
2000
160
160

Co" Fujitsu,
and Mitsubishi
(S)
(5)

0
0

37
17

13
1
2
9
1
8
1
0
9
5
6
7
58
1
59
13
17
30
22
16
83
22
68
196
110
4
2000
160
160

Total:
4150 E
37
17
60
300

7.2-35,8

4

0

12

9
22
27
27
23
12

0
0
0
0

38
29
11
71

38
29
11
71

12,0
6-21

7.0
15.0
10.0
10.9

(S)

NUMBER OF
UNFILLED
ORDERS
31
13
1
0
3
50

X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
C
C
C
Total:
400
Total:
800 E
9
12
60
50
3
60
8

2

6

26

55

Secretary Laird has explained to the U.S. Congress
that $390 million dollars per year is being spent in
Laos for illegal, unauthorized, concealed warfare,
bombing, etc., that kills thousands and thousands of
~sians.
And yet the United States government cannot
find even one million dollars to keep this great library openl

THE SCIENCE AND TECHNOLOGY DIVISION OF THE
NEW YORK PUBLIC LIBRARY TO CLOSE ITS DOORS
ON JANUARY 1, 1972
Edmund C. Berkeley, Editor
Computers and Automation

The New York Public Library, 5th Ave. and 42 St.,
New York, N.Y., has announced that it will be forced
to suspend all public service as of January 1, 1972,
in its Science and Technology Division because of
lack of adequate financial support.
This is the division that includes computers and
data processing, and all the periodicals serving the
field of computers and data processing.
"Thi s cu tback is part of a li brary-wide program
caused by reduced government budget allocations and
increase of costs." The Library is short over
$1,000,000; the necessary expenditure cuts can only
be achieved by "curtailment of public service." "Curtailment of public service", I have learned, includes
"curtailment of private service" (there is none) and
equals "curtailment of all service" I Acquisition
and cataloging of materials is to continue as usual
so that the ST Division will be able to function
adequately again i f and when funds are again available.
The New York Public Library is one of the four
greatest libraries of the world -- the other three
being the Library of Congress in Washington, the
British Museum in London, and the Biblioteque Nationale in Paris. Inquiries directed to the New
York Public Library, and research taking place there,
arise from allover the United States and the world.
(Other great libraries such as those of universities
are essentially not open to the public.)
The suspension of public service implies that at
least 300 readers from all levels of professional
and lay life will be turned away each day; at least
100 telephone reference questions will not be answered each day; letters with reference questions
from all around the world will have to be returned
unanswered to their senders; etc.
To me, this closing is an unmitigated horror. I
have used this great library often, for over 45 years.
Currently in the 'newspaper I have read how Defense
NAME OF
MANUFACTURER
Siemens
Munich, Germany
(A)
C(Ju1y. 1971)

USSR
(N)
(May 1969)

NAME OF
COMPUTER
301
302
303
304
305
306
2002
3003
4004/15/16
4004/25/26
4004/35
4004/135
4004/45
4004/46
4004/55
4004/150
4004/151
404/3
404/6

BESM 4
BESM 6
MINSK 2
MINSK 22
MIE
NAIR 1
ONEGA 1
ONEGA 2
URAL 11/14/16
and others

DATE OF
FIRST
INSTALLATION
11/68
9/67
4/65
5/68
11/67
6/59
12/63
10/65
1/66
2/67
7/66
4/69
12/66

11/6<]

All our readers are invited to send contributions
(and also suggestions and ideas) to:
Temporary Commi t tee for the N.Y. Public Library
c/o Computers and' Auto~'ation,
815 Washington Street
Newtonville, MA 02160
In this emergency, no contribution is too small for
this most worthwhile purpose. (Please make checks
payable to the New York Public Library.)
Macdon~ld

- Continued from page 40

It may be that handwriting reveals personality (which

I believe is likely to some extent) - or that creases in
the palm of one's hand reveal one's past and future life
(which I cannot believe) - or that combinations of the
locations of the planets and the zodiacal constellations
imply specific varieties of good advice to apply in one's
life (in which implications I have no belief whatsoever).
But there undoubtedly is a place for non-verbal, nonmathematical testing, which is not culture limited, not
occupation limited, and not background limited - and
which would enable finding and employing many useful
people who do not have American, middle-class backgrounds. Perhaps the readers of C&A and their friends
and acquaintances might well be a good area to discover
and explore such tests.
Participation

If you think this is interesting, and would like to
participate in this survey, send us what you do on this
test. We will respond either in the pages of C&A by
reporting, or to you individually.

We plan to publish additional tests like this one from
time to time.
0
AVERAGE OR RANGE
OF MONTHLY RENTAL
$(000)
0.75
1.3
2.0
2.8
4.5
6.5

13.5
13.0
5.0
8.3
11.8
17.1
22.5
34.0
31.3
41.0
51.5
1.9
4.1

NUMBER OF INSTALLATIONS
Outside
In
In
U.S.A.
World
U.S.A.
82
28
70
63
93
39
32
99
54
185
248
10
22
10
22
10

C
C
C
C
C
C
C
C
C
Total:
6000 E

56

NUMBER OF
UNFILLED
ORDERS
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
C
Total:
298
C
C
C
C
C
C
C
C
C

Total:
2000 E

COMPUTERS and AUTOMATION for October, 1971

CALENDAR OF COMING .EVENTS

Oct. 4-6, 1971: International Electrical & Electronics Conference & Exhibition, Automotive Bldg., Exhibition Park, Toronto, Ontario,
Canada / contact: Conference Office, 1819 Yonge St., Toronto 7,
Ontario, Canada

Nov. 3-5, 1971: 25th IEEE Northeast Electronics Research and Engineering Meeting (NEREM), Sheraton-Boston Hotel and the John B.
Hynes Auditorium, Boston, Mass. / contact: IEEE Boston Office,
31 Channing St., Newton, Mass. 02158

Oct. 4-7, 1971: 26th Annual ISA Instrumentation-Automation Conference
& Exhibit, McCormick Place, Chicago, III. / contact: Daniel R. Stearn,
Public Relations Manager, Instrument Society of America, 400 Stanwix St., Pittsburgh, Pa. 15222

Nov. 4-5, 1971: 1971 American Production & Inventory Control Society (APICS) International Conference, Chase Park Plaza Hotel,
St. Louis, Mo. / contact: Henry F. Sander, American Production &
Inventory Control Society, Inc., Suite 504 Watergate Bldg., 2600
Virginia Ave. N.W., Washington, D.C. 20037

Oct. 6-8, 1971: Conference on "Two-Dimensional Digital Processing",
Univ. of Missouri-Columbia, Columbia, Mo. / contact: Prof. Ernest
L. Hall, Dept. of Electrical Engineering, Univ. of Missouri-Columbia,
Columbia, Mo. 65201
Oct. 10-12 1971: First Annual ASM Southwest Division Conference
(sponsored by Assoc. for Systems Management, Div. Council 18),
Jung Hotel, New Orleans, La. / contact: Albert J. Krail, 636
Baronne St., New Orleans, La. 70113

Nov. 7-11, 1971: 34th Annual Meeting of the American Society for
Information Science (ASIS), Denver Hilton Hotel, Denver, Colo. /
contact: Miss Sheryl Wormley, ASIS, 1140 Connecticut Ave., N.W.,
Suite 804, Washington, D_C. 20036
Nov_ 16-18, 1971: Fall Joint Computer Conference, Las Vegas
Convention Center, Las Vegas, Nev. / contact T. C. White, AFIPS
Headquarters, 210 Summit Ave., Montvale, N. J. 07645

Oct. 12-14, 1971: Input/Output Systems Seminar '71, The Regency
Hyatt House-O'Hare, Chicago, III. / contact: C. A. Greathouse,
Exec. Director, DPSA (Data Processing Supplies Assoc.), P.O. Box
1333, Stamford, COni!.: 06904

Nov. 30·Dec. 3, 1971: Systems '71, Munich, Germany / contact: Andre
Williams, BIC·938, Commercial Exhibitions Div., U.S. Department of
Commerce, Washington. D.e. 20230

Oct. 14-20, 1971: Interkama '71, Dusseldorf, Germany / contact: I. A.
Stader, Dusseldorfer Messegesellschaft mbH NOWEA - 4 Dusseldorf, Messegelande

Dec. 7-10, 1971: Applications of Simulation, Waldorf Astoria Hotel,
New York, N.Y. / contact: Joseph Sussman, MIT, 77 Massachu·
setts Ave., Cambridge, Mass. 02139

Oct. 18-20, 1971: 27th Annual National Electronics Conference and
Exhibition (NEC/71), Pick-Congress Hotel, McCormick Place, Chicago,
III. I contact: NEC, Oakbrook Executive Plaza #2, 1211 W. 22nd
St., Oak Brook, III. 60521

Dec. 16-18, 1971: IEEE Conference on Decision and Control (including
the 10th Symposium on Adaptive Processes), Americana of Bal Harbour, Miami Beach, Fla. / contact: Prof. J. T. Tou, Univ. of Florida,
Gainesville, Fla.

Oct. 18-20, 1971: International Computer Forum & Exposition, McCormick Place-On-The-Lake, Chicago, III. / contact: International
Computer Forum & Exposition, Oak Brook Executive Plaza #2,
1211 West 22nd St., Oak Brook, III. 60521

Feb. 2·4, 1972: 1972 San Diego Biomedical Symposium, Sheraton
Hotel, Harbor Island, San Diego, Calif. / contact: Norman R. Silver·
man, M.D., San Diego Biomedical Symposium, P.O. Box 965, San
Diego, Calif. 92112

Oct. 20-22, 1971: ACM/ IEEE Second Symposium on Problems in the
Optimization of Data Communications Systems, Palo Alto, Calif. /
contact: Dr. P. E. Jackson, Room 2B-434, Bell Laboratories, Holmdel, N.J. 07733
Oct. 21-22, 1971: ADAPSO 33rd Management Conference-Annual
Meeting; lst Software Management Conference (concurrently),
Brown Palace Hotel, Denver, Colo. / contact: Association of Data
Processing Service Organizations, Inc., 551 Fifth Ave., New York,
N.Y. 10017
Oct. 22-23, 1971: First National Computer Art Symposium, The
Florida State University, Tallahassee, Fla. 32306 / contact: Randolph B. Luttrell, Coordinator, Computer Art Symposium, The
Florida State Univ., Center for Computer Assisted Instruction,
Tallahassee, Fla. 32306
Oct. 25, 1971: Second Annual SIGCOSIM (ACM Special Interest Group
on Computer Systems Installation Management) Symposium, Washington, D.C. I contact: I. Feldman, Wiley Systems, Inc., 6400
Goldsboro Rd., Bethesda, Md. 20034
Oct. 25-29, 1971: IEEE Joint National Conference on Major Systems,
Disneyland Hotel, Anaheim, Calif. / contact: Institute of Electrical
and Electronics Engineers, Inc., 345 East 47th St., New York, N.Y.
10017
Oct. 25-29, 1971: Systems Science & Cybernetics Conference & 1971
ORSA (Operations Research Society of America) Meeting, Disneyland Hotel, Anaheim, Calif. I contact: Dr. Michael W. Lodato, Xerox
Data Systems, 701 50_ Aviation Blvd., EI Segundo, Calif. 90245
Oct. 29, 1971: Sixth Annual ACM Urban Symposium, New York Hilton
Hotel, New York, N.Y. I contact: Gerald M. Sturman, Parsons
Brinckerhoff, 111 John St., New York, N.Y. 10038
Nov. 1-2, 1971: Computer Science and Statistics: Fifth Annual Symposium on the Interface, Oklahoma State University, Stillwater,
Okla. / contact: Dr. Mitchell o. Locks, Oklahoma State Univ.,
Stillwater, Okla. 74074
COMPUTERS and AUTOMATION for October, 1971

Mar. 20·23, 1972: IEEE International Convention & Exhibition,. Coli·
seum & N. Y. Hilton Hotel, New York, N. Y. / contact: IEEE Head·
quarters, 345 E. 47th St., New York, N. Y. 10017
April 5.8, 1972: "Teaching Systems '72", International Congress,
Berlin Congress Hall, Berlin, Germany / contact: AMK Berlin,
Presse
und
Public
Ausstellungs-Messe-Kongress-GmbH,
Abt.
Relations, D 1000 Berlin 19, Messedamm 22, Germany
April 25·28, 1972: Conference on Computer Aided Design, Univ. of
Southampton, Southampton, England / contact: lEE Office, Savoy
Place, London W.e. 2, England
May 15-18, 1972: Spring Joint Computer Conference, Convention Ctr.,
Atlantic City, N.J. / contact: AFIPS Headquarters, 210 Summit Ave.,
Montvale, N.J. 07645
May 16-17, 1972: liT Research Institute Second International Symposium on Industrial Robots, Chicago, III. / contact: K. G. Johnson,
Symposium Chairman, liT Research Institute, lOWest 35 St., Chicago, III. 60616
May 22-26, 1972: Fifth Australian Computer Conference, Brisbane,
Australia / contact: K. Arter, Honorary Secretary, Australian Computer Society, Inc., P.O. Box 63, Watson, A.e.T. 2602 Australia
May 24-26, 1972: Second Annual Regulatory Information Systems Conference, Chase-Park Plaza Hotel, St. Louis, Mo. / contact: William
R. Clark, Missouri Public Service Commission, Jefferson City, Mo.
65101

MORE ABOUT THE FRONT COVER PICTURE

Pictorial Reasoning Puzzle - To produce "Puzzle" a random number generator was used to place the figures in the
order shown and to choose the particular number to be repeated. "Puzzle" was programmed in FORTRAN IV on a
CDC 3300. The plotter was a Calcomp 765 Digital Zip
Mode plotter. For more information, see page 5.
57

Who's Who in Computers and Data Processing
A CONTINUING PUBLICATION:
FI FTH EDITION AND SUPPLEMENTS ~ SIXTH EDITION

Who's Who in Computers and Data Processing is published jointly by Quadrangle Books (a New York Times Company) and
Computers and Automation.
In view of the financial depression in the computer field, the Who's Who will until further notice be published as
the FIFTH EDITION plus a number of SUPPLEMENTS.
The First Supplement (26pages, over 1,000 entries) was published in the June 1971 and July 1971 issues of Computers
and Automation. The Second Supplement will be published in the next few months. Each supplement consists of entries
that update existing information, and entries of capsule biographies for computer professionals not previously included.
Every supplement is free on request to each purchaser of the set of the Fifth Edition (3 volumes, hardcover, over
1,000 pages). This edition contains over 15,000 capsule biographies of computer professionals. Price, $75.00, including
all supplements as issued.
If you wish to be considered for inclusion in the Who's Who (or if information for you has been previously published
and requires updating), please complete the following form or provide us with the equivalent information.
WHO'S WHO ENTRY FORM
(may be copied on any piece of paper)
(Please print) _______________________________________________________________________

1.

Name?

2.

Home Address (with Zi p) ?______________________________________________________

3.

Organization?____________________________________________________________________________

4.

Its Address (wi th Zip)? _________________________________________

5.

Your Title? ______________________

6.

Your Main Interests?

7.

Logic
Management
Applications
Mathematics
Business
Progrannning
Construction
Sales
Design
Systems
Year of Bi rth ?______________ 8.

9.

Year Entered Computer Field?_________ 10.

11.

Other (please specify)

Educa ti on and Degrees ?________________________
Your Present Occupation?______________________

Publications, Honors, Memberships, and other Distinctions?_____________________________________
(attach paper if needed)

12.

Do you have access to a computer?
a.

If yes, what kind of computer?

Yes

No

Manufacturer?______________.Model ?______________________

Address?________________________________________________
Co
do
13.

Please explain,__________________
Is your access: Batch?
Time-Shared?
Other?
Any remarks?__________________________________________________________________________

In which volume or volumes of the Who's Who -Vol. 1
Vol. 2
Vol. 3

(a) Have you
been included?

(b) Do you think
you should be included?

Systems Analysts and Programmers
Data Processing Managers and Directors
Other Computer Professionals

14.

Do you subscribe to Computers and Automation?

15.

Associates or colleagues who should be sent Who's Who entry forms?

rYes

) No

-- to The New York Times?

Name and Address

(attach paper if needed)
When completed, please send promptly to: Who's Who Editor, Computers and Automation.
815 Washington St., Newtonville, Mass. 02160

) Yes

) No

As "Grass Roots"
Goals Committee
Chairman, he's
battling the blamethe-computer
syndrome.
David Wollin, B.S. Engineering
Science, is a Senior Systems Analyst
with a ticket reservations systems
service, developing application
software. He joined ACM in 1966,
fresh out of college. "After four years,
I wanted more involvement as a computer professional," says Dave. "More
than meetings, lectures .and technical
publications. ACM seemed sort of
clannish. I felt the average member
wasn't encouraged to participate.
"Last October I wrote ACM President
Walter Carlson with some specific

suggestions. Now I'm heading the
newly-formed "Grass Roots" Committee. Our job is to critique ACM's
proposed goals on membership development, special interest activities,
EDP curricula and public education.
And come up with other goals we
think are just as important.
"This effort could mean a lot in the
next few years. I've wanted to speak
up on some things that have been
bugging me. Things I see ACM taking
a stronger stand on. Like people
blaming mistakes on the computer.

The need to cut down on hard copy
to avoid waste. The privacy issue.
The whole question of the computer's
impact on society, I guess."
Dave is only one of 27,000 members
of ACM, the oldest and most
respected professional association
in the computer field. He's enriching
his career. Making a contribution
to the computer profession. And
being heard.
Look into joining ACM. Fill out and
mail the coupon today.

Association for Computing Machinery
1133 Avenue of the Americas
New York, New York 10036
I would like to consider joining ACM.
Please send more information.
Association
for Computing
Machinery

Name

Position
Address
City

State

Zip

ALL OF US WANT TO PROVIDE
FOR OUR FUTURE AND OUR CHILDREN'S FUTUREWhat future?
We, the whole earth-load of us, face appalling problems all coming to a head within a few
years:
Nuclear missiles, targeted on "the enemy" and on us;
Global pollution of air, soil, and water;
Rapid depletion of fossil fuels and other natural resources;
Runaway population growth (3.7 billion now, 6.5 billion by 2000 A.D.);
in short, age-old human attitudes threaten to destroy us.
The national governments have shown themselves so far -- year after year -- unable to
solve these new, world-wide problems, unable to provide real security for any of us.
Therefore a world government is essential for human survival,.

What ahout the UN?
The UN has made outstanding contributions to the health and well-being of people allover
the world -- but the UN is not a go~ernment. And it is not responsible to us as individuals, but only to national governments, which often use it to jockey for power.
The Emergency Committee for World Government has a new approach •... which includes a
"by-pass" principle: in the case of world-wide problems, such as war and pollution,
every person in' the world would owe his highest allegiance directly to the world government, thus by-passing his national government. (This would be, in effect, a most constructive kind 'of loyalty to one's own country.) And the world government would have
authority only over individuals, likewise by-passing the national governments.

Is a world government practicable?
What is essential for human survival had better be made practicable. Through the mass
media and all:sorts of forums, we the people must get world-wide discussion going ...•
on the urgent 'need for world government, on ,how such a government can be realistically
planned, and how it can get off the ground. To do this will take information, time, and
money. Will you help? What better way could there be to provide for your own and your
children's future?

-"By-pass ing" and other principles are explained, with diagrams, in the pamphlet, Emergency
World Government" by Dr. J. H. C. Creyghton. Send $i.oO for a copy, postpaid, on approval.
Write to the address nearest you.
EMERGENCY COMMITTEE FOR WORLD GOVERNMENT
World Headquarters
Dr. J. H. C. Creyghton, Dir.
Frederik Hendriklaan 26
The Hague, The Netherlands

New York Area
Foster Parmelee, Sec-Trease
63 E. 9th St., Apt. 4-A
New York, NY 10003

North American Division
Boston Area
William Cary, Sec-Trease
Bolton, MA 01740

Western Region
Douglas Mattern, Dir.
424 Lytton Ave.
Palo Alto, CA 94303

Advertisement



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37
Producer                        : Adobe Acrobat 9.1 Paper Capture Plug-in
Modify Date                     : 2009:03:24 22:44:03-07:00
Create Date                     : 2009:03:24 22:44:03-07:00
Metadata Date                   : 2009:03:24 22:44:03-07:00
Format                          : application/pdf
Document ID                     : uuid:fa41cd68-172e-45e0-a835-2101c23b569b
Instance ID                     : uuid:fc2d4054-54e0-4afb-94d0-caf68efda537
Page Layout                     : SinglePage
Page Mode                       : UseNone
Page Count                      : 60
EXIF Metadata provided by EXIF.tools

Navigation menu