197303

197303 197303

User Manual: 197303

Open the PDF directly: View PDF PDF.
Page Count: 52

Download197303
Open PDF In BrowserView PDF
SCIE.N.CE & TECHNOtOO'l

bi1l33gS@

March, 1973
Vol. 22, No.3

la~H~!!!:i!!

CD

and people

+++

.. +

-

•
"VISUAL STRUCTURE NO. 98"

-

Management of Computer Technology
Social Implications of Computerized Information Systems
Computers, Automation, and Technological Change
Who Knows You: A Look at Commercial Data Banks
Engineering for Society
The Watergate Crime and the Cover-Up Strategy
U.S. Electronics Espionage: A Memoir - Part 2
Principles for Solving Problems

5106049 0 1 0 P 7401

TECHNICAL SERVICES

aiiiJ ggSZ i 2S2

1 8v W SAN CARLOS 5T
5 i ' JOSE

CA

20 17Z1

T

,,

illS
95113

I

Carl J. Weinmeister III
Robert P. Henderson
Mike Cooley
Donald S. Willis
H. Guyford Stever
Richard E. Sprague
Ramparts
Edmund C. Berkeley

IF YOU COULD PREVENT JUST

ONE IMPORTANT MISTAKE BEFORE IT HAPPENED -

- like the Democratic Party's mistake with Senator Eagleton
- like the Republican Party's mistake with the Watergate Bugging
like the West German government's mistake in not catching the Arab
guerrillas before they penetrated to the Israeli Olympic Team's building
like Southern Airways' mistake in allowing three hijackers with guns on to
one of their planes

HOW MUCH

WOULD THAT BE WORTH TO YOU - $100? - $1000?

more?

Our considered estimate is that 10 to 20% or more of the cost of operation of most businesses is the cost of
mistakes. (Just one foreseeable mistake that "Computers and Automation" made in 1970 has cost us $4000.)

WOULDN'T YOU AGREE

THAT SENSE, COMMON AND UNCOMMON,
OUGHT TO BE THE KEY TO PREVENTING MISTAKES?

J

In a number of the issues of "The Notebook on Common Sense, Elementary and Advanced", we examine
systematically the prevention of mistakes, such as:
No. 15:

Preventing Mistakes from Failure to Understand

No. 23:

Preventing Mistakes from Forgetting

No. 38:

The Concepts of Feedback and Feedback Control

No. 41:

Preventing Mistakes from Unforeseen Hazards

)

- Volume 1, first
subscription year

)

- Volume 2, second
subscription year

Among the forthcoming issues of the Notebook in Volume 2 are:
- Preventing Mistakes from Camouflage
- Preventing Mistakes from Placidity
and we are planning at least 20 more issues in Volumes 2 to 4 under this general heading.

WHY NOT TRY THE NOTEBOOK ON COMMON SENSE?
GUARANTEE: (1) You may return (in 7 days) the
first batch of issues we send you,
REFUND, if not satisfactory. (2)
may cancel at any time, and you
a refund for the unmailed portion
scription.

PAST ISSUES: As a new subscriber, you do not miss past

for FULL
Thereafter, you
will receive
of your sub-

issues. Every subscriber's subscription starts at Vol. 1,
No.1, and he eventually receives all issues. The past
issues are sent to him usually four at a time, every week
or two, until he has caught up, and thus he does not miss
important and interesting issues that never go out of date.

HOW CAN YOU LOSE?
- - - - - - - - - - - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - - - - - - - - - -

To:

COMPUTERS AND AUTOMATION AND PEOPLE
815 Washington St., R12, Newtonville, Mass. 02160
(
(

) YES, please enter my subscription to the Notebook on Common Sense at $12 a year,
24 issues (newsletter style), and extras.
) Please send me (as FREE premiums for subscribing) the first six issues:
1. Right Answers - A Short Guide to Obtaining Them
2. The Empty Column
3. The Golden Trumpets of Yap Yap

(

) I enclose $

(

) Please bill me

4. Strategy in Chess
5. The Barrels and the Elephant
6. The Argument of the Beard

( ) Please bill my organization

NAME _______________________________________________ TITLE _________________________________
ORGANIZATION ______________________________________________________________________________
ADDRESS, ___________________________________________________________________________________
SI GN ATU RE__________________________________________ Purchase Order No ._______________________

2

COMPUTERS and AUTOMATION for March, 1973

~
III
.s::

INVENTORY OF THE 36 ISSUES OF

- TITLES AND SUMMARIES

THE NOTEBOOK ON COMMON SENSE, FIRST YEAR
VOLUME 1
1. Right Answers - A Short Guide to Obtaining Them
A collection of 82 principles and maxims. Example:
"The moment you have worked out an answer, start
checking it - it probably isn't right."
2. The Empty Column
A parable about a symbol for zero, and the failure
to recognize the value of a good idea.
3. The Golden Trumpets of Yap Yap
4. Strategy in Chess
5. The Barrels and the Elephant
A discussion of truth vs. believability.
6. The Argument of the Beard
The accumulation of many small differences may
make a huge difference.
7. The Elephant and the Grassy Hillside
The concepts of the ordinary everyday world vs.
the pointer readings of exact science.
8. Ground Rules for Arguments
9. False Premises, Valid Reasoning, and True Conclusions
The fallacy of asserting that the premises must first
be correct in order that correct conclusions be
derived.
10. The Investigation of Common Sense
11. Principles of General Science and Proverbs
8 principles and 42 proverbs.
12. Common Sense - Questions for Consideration
13. Falling 1800 Feet Down a Mountain
The story of a skimobiler who fell 1/3 of a mile
down Mt. Washington, N.H., and was rescued the
next day; and how he used his common sense and
survived.
14. The Cu It of the Expert
15. Preventing Mistakes from Failure to Understand
Even though you do not understand the cause of
some trouble, you may still be able to deal with
it. The famous example of a cure for malaria.
16. The Stage of Maturity and Judgement
17. Doomsday in St. Pierre, Martinique - Common Sense
vs. Catastrophe
How 30,000 people refusing to apply their common
sense died from a volcanic eruption.
18. The History of the Doasyoulikes
19. Individuality in Human Beings
Their chemical natures are as widely varied as ,
their external features.
20. How to be Silly
71 recipes for being silly. Example: "Use twenty
words to say something when two will do."
21. The Three Earthworms
A parable about curiosity; and the importance of
making observations for oneself.
22. The Cochrans vs. Catastrophe
The history of Samuel Cochran, Jr., who ate some
vichyssoise soup. '
23. Rreventing Mistakes from Forgetting
24. What is Common Sense? An Operational Definition
A proposed definition of common sense not using
synonyms but using behavior that is observable.
25. The Subject of What is Generally True and Important Common Sense, Elementary and Advanced
26. Natural History, Patterns, and Common Sense
Some important techniques for observing.
27. Rationalizing and Common Sense
28. Opposition to New Ideas
Some of the common but foolish reasons for
opposing new ideas.
29. A Classification and Review of the Issues of Vol.
30. Index to Volume 1
COMPUTERS and AUTOMATION for March. 1973

VOLUME 2
31. Adding Years to Your Life Through Common Sense
32. The Number of Answers to a Problem
33. "Stupidity has a Knack of Getting Its Way"
34 and 35. Time, Sense, and Wisdom
36. Wisdom - An Operational Definition
.... 24 issues promised, 36 issues delivered, for good measure

Some Com mentsfrom Subscri bers

l

" believe these to be the best, if not the most important,
reading that I have had this year.
- Harold J. Coate, EDP Manager, St. Joseph, Mo.
Your concept is brilliant, and a welcome antidote to much
which is passed off as useful knowledge these days. Keep
up the good work.
- Charles E. Abbe, Data Systems Analyst, Pasadena,
Calif.
Very good articles; something all managers should read.
- William Taylor, Vice President, Calgary, Alberta
As I am involved with systems work, I can always use one
of the issues to prove a point or teach a lesson.
- Edward K. Nellis, Director of Systems Development,
Pittsford, N.Y.
Thoroughly enjoy each issue.
- David Lichard, Data Processing Manager, Chicago, III.
All are good and thought-provoking - which in itself
is worthwhile. Keep it up.
- Richard Marsh, Washington, D.C.
Especially like "Right Answers".
- Ralph E. Taylor, Manager of Research and Development, West Chester, Ohio
Your tendency to deal with practical applications is very
Irewarding.
- Jeffrey L. Rosen, Programmer, Toronto, Canada
'PAST ISSUES: As a new subscriber, you do not miss past issues. Every subscriber's subscription starts at Vol. 1, no.
1, and he eventually receives all issues. The past issues
are sent to him usually four at a time, every week or
two, until he has caught up, and thus he does not miss
important and interesting issues that never go out of date.
GUARANTEE: (1) You may return (in 7 days) the first batch
of issues we send you, for FULL REFUND, if not satisfactory. (2) Thereafter, you may cancel at any time, and
you will receive a refund for the unmailed portion of
your subscription. -

;___ ~~ ~~N_T_ ~;a~Y~~::i~d:~~:::i~~:I!fDp:~e~~~~I_B~~~.________ _
I

To: Computers and Automation and People
815 Washington St., R1, Newtonville, Mass. 02160
) YES, I would like to try the "Notebook on Common
Sense, Elementary and Advanced". Please enter my
su bscription at $12 a year, 24 issues, newsletter style,
and extras. Please send me issues 1 to 6 as FREE
PREMI UMS for subscribing.
I enclose _ _ _ _ __

) Please bill me.

) Please bill my organization.
Name

Title _ _ _ _ _ _ _ _ __

Organization _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Address _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ____
Signature _________________ Purch. Order No. _ _ ___
3

Vol. 22, No.3
March, 1973

Editor

Edmund C. Berkeley

Assistant
Editors

Barbara L. Chaffee
Linda Ladd Lovett
Neil D. Macdonald

Software
Editor

Stewart B. Nelson

Advertising
Director

Edmund C. Berkeley

Art Director

Ray W. Hass

Contributing
Editors

John Bennett
Moses M. Berlin
Andrew D. Booth
John W. Carr III
Ned Chapin
Leslie Mezei
Ted Schoeters
Richard E. Sprague

Advisory
Committee

James J. Cryan
Bernard Quint

Editorial
Offices

Berkeley Enterprises, Inc.
815 Washington St.
Newtonville, Mass. 02160
617-332-5453

Advertising
Contact

The Publisher
Berkeley Enterprises, Inc.
815 Washington St.
Newtonville, Mass. 02160
617-332-5453

"Computers and Automation" is published monthly, 12 issues per year, at 815
Washington St., Newtonville, Mass. 02160,
by Berkeley Enterprises, I nco
Printed in
U.S.A. Second Class Postage paid at Boston,
Mass., and additional mailing points.
Subscription rates: United States, $9.50
for one year, $18.00 for two years. Canada:
add 50 cents a year for postage; foreign, add
$3050 a year for postage.
NOTE: The above rates do not include
our publication "The Computer Directory
and Buyers' Guide". If you elect to receive "The Computer Directory and Buyers'
Guide", please add $9.00 per year to your
subscription rate.
Please address all mail to:
Berkeley
Enterprises, Inc., 815 Washington St., Newtonville, Mass. 02160.
Postmaster: Please send all forms 3579
to Berkeley Enterprises, Inc., 815 Washington St., Newtonville, Mass. 02160.
© Copyright 1973, by Berkeley Enterprises, Inc.
Change of address:
If your address
changes, please send us both your new
address and your old address (as it appears on the magazine address imprint). and
allow three weeks for the change to be
made.

4

cornI?,H~!!!:i!
and people

Computers and Management
8 Management of Computer Technology
[T A]
by Colonel Carl J. Weinmeister III, Lackland Air Force
Base, Texas
How a data processing manager can use modern computer
technology to do a better job, discarding principles that no
longer apply, and adopting new, more valid principles.

Computers and Society
1i

Social I mplications of Computerized I nformation Systems [T A]
by Robert P. Henderson, Vice President, Honeywell Information
Systems, Inc., Wellesley Hills, Mass.
How information systems are developing internationally, and
thereby greatly modifying and altering people's access to information and knowledge.

15 Computers, Automation, and Technological Change
[NT A]
by Mike Cooley, National President, Amalgamated Union of
Engineering Workers 1971-1972, Langley, England
How computers and other high-capital more-automated equipment are producing changes like: "1968 to 1971 - work
force, down from 260,000 to 60,000 - profits, up from £75
million to £105 million"; and what unions can do about it.

Co mputers and Privacy
18 Who Knows You: A Look at Commercial Data Banks
[NT A]
by Donald S. Willis, Fort Worth, Texas
How commercial data banks commonly operate, and how
they threaten the privacy of an individual.

Problem-Solving and Computers
6 Problem Solving
[NT E]
by Edmund C. Berkeley, Editor, Computers and Automation

and People
We must admit there are a great many important problems
that neither mathematicians nor computers have yet solved,
but which human beings have gathered some principles for
solving.
7 Principles for Solving Problems
[NT A]
by Edmund C. Berkeley, Editor, Computers and Automation

and People
Thirty principles by which human beings solve (or appear to
solve) problems- and perhaps computers may be able to
apply some of these principles.

COMPUTERS and AUTOMATION for March, 1973

The magazine of the design, applications, and implications of
information processing systems - and the pursuit of truth in
input. output, and processing, for the benefit of people.

The Profession of InforlrUltion Engineer and the Pursuit of Truth
22 Engineering for Society
[NT Al
by Dr. H. Guyford Stever, Director, National Science Foundation,
Washington, D.C.
Science and engineering have a growing responsibility to the
public, especially to emphasize work on large-scale systems;
and engineers need to make a sophisticated contribution to
achieve an "ecologically" sound society. .
[NT Al
26 The Watergate Crime and the Cover-Up Strategy
by Richard E. Sprague, Hartsdale, N.V.
A report on the trial of E. Howard Hunt, James McCord,
Bernard Barker, and four other persons for their raid on
Democratic National Committee Headquarters in June
1972 using funds of the Republican Committee for the
Re-Election of the President; and the strategies of cover-up
that have been employed.
31 U.S. Electronic Espionage: A Memoir - Part 2
[NT A]
by Ramparts, Berkeley, Calif.
How the National Security Agency intercepted and decoded
enemy messages in order to direct bombing strikes in Viet Nam,
and often failed; and how the hideousness of what the American
military forces were doing in Southeast Asia finally led this
interviewee to resigning and terminating.

Computers and Puzzles

Front Cover Picture
"Visual Structure No. 98" was
produced by Michael Thompson,
Rechov Remez 1, Kadima, Israel.
He states: "Visual structures can be
explored by developing rules capable of generating them. ... The
rules which are stored in the computer determine how to fill in each
element in the context of its neighboring cells."

Departments
Across ~he Editor's Desk Computing and Data
Processing Newsletter
Advertising Index
Calendar of Comi ng Events
Monthly Computer Census
NQw Contracts
New Installations

40

30
38
46
44
45

25 Numbles
by Neil Macdonald
30 Problem Corner
by Walter Penney, COP

Key
[A]
[C]
[El
[NT]
[T]

-

Article
Monthly Column
Editorial
Not Technical
Technical

Corrections
In the November, 1972, issue of Computers and Automation, on
page 11 at the foot of the page, the following note should appear:
"Reprinted from, and © 1972 by, the American Mathematical
Monthly, June-July, 1972." We regret this unfortunate omission.
In the February, 1973, issue of Computers and Automation and
People, on page 1 and on page 4, replace "Vol. 21" by "Vol. 22".
We regret this stupid mistake.

COMPUTERS and AUTOMATION for March, 1973

NOTICE
*0 ON YOUR ADDRESS IMPRINT
MEANS THAT YOUR SUBSCRI~
TION INCLUDES THE COMPUTER
01 RECTORY.
*N MEANS THAT
YOUR PRESENT SUBSCRIPTION
DOES NOT I NCLUDE THE COMPUTER DIRECTORY.

5

EDITORIAL

PROBLEM SOLVING

In the January 1973 issue of the American Mathematical
Monthly there is a letter by Dr. George Polya, Professor '
Emeritus, Stanford University, to an unnamed chairman of
a mathematics department in which he says:
As you may know, I am especially concerned with
problem solving ... That the role of problem solvi?~
in mathematics is not understood by nonmathematIcIans
and not duly appreciated by outsiders is not surprising
. . . [but] I heard lately that such lack of understanding
and appreciation led to denying a promotion to a member of your Department. I feel that there is serious
matter of principle involved ....
Problems play an essential role both in the progress
and in the teaching of science .... Problems play an
important role on all levels of mathematical instruction
.... Problem-solving is a perfectly acceptable and respectable professional activity for a mathematician and
can favorably influence his teaching .... If it is true
what I heard that your colleague's promotion was refused because he "only" solved problems and did not
publish, such a decision is unwise and unjust.
The basic mission of a computer is to solve problems.
With more than 2300 applications of computers (according
to a list published in the last issue of the Computer Directory and Buyers' Guide), it must be agreed that computers
- programmed computers - solve a very large number of
significant problems, or else the persons who have paid for
them would not have bought them,.
But if we consider all the kinds of problems that exist,
we must admit there are a great many important problems
that neither mathematicians nor computers have solved as
yet, arid may never solve. Such problems are likely to be
solved (or not solved) by human beings, using principles
for solving problems that have been gathered for many cen;.
turies by h-uman beings.
In spite of the vast numbers of problems, the general
methods for solving them are rather small in number, perhaps as many as 60, probably fewer than 300. On the opposite page is a list of principles for solving problems made
up some time ago, partly in fun, partly in earnest.
6

To me there are several very interesting aspects to that
list of principles for solving problems.
.
One aspect is this. For nearly everyone o.f those pn~­
ciples, there actually exist one or more situatIOns to whIch
it applies. Take for example The Principle of Fate ("Allah
wills it"). In regard to my own death, this is the principle
I adopt, except that in my version of the principle I re~
place "Allah" by the "Laws of Natur~:'? t~e only s~lut~,on
to the problem "How to live forever? IS No solutIOn .
Even the Principle of "Not Invented Here" - for which I
have a hearty dislike - applies properly in some cases: ~
man who writes in to the Patent Office and says he has Invented a perpetual motion machine is not given a hearin.g.
A second aspect is this. Suppose we could make an Inventory of say two thousand kinds of situations that occur
the most often in the real world. These situations often
present problems that human beings must. de~l with. Suppose a group of practical engineers and SCIentIsts could
make a handbook of principles for dealing with these common, real world problems. It would be like an engineering
handbook, except that it would deal with situation.s. that
occur far more often than the situations alluded to In an
engineering handbook - or even a consumers' buying. gU,~de.
I think such a "Handbook for Practical Problem SolVIng
would be useful; and it would certainly save many mistakes
and many losses.
And it might even be computerized.

Edmund C. Berkeley
Editor

COMPUTERS and AUTOMATION for March. 1973

PRINCIPLES FOR SOLVING PROBLEMS
by Edmund C. Berkeley

The Principle of Ignorance ("what you don't know won't hurt you")
The Principle of Fate ("Allah wills it")
The Principle of Waiting ("everything comes to him who waits")
The Principle of Postponement ("never do today what you can put off till tomorrow")
The Principle of Procrastination ("if you wait long enough, the problem will take care of itself')
The Principle of Mr. Micawber* ("something will turn up")
The Principle of Pure Chance ("let's flip a coin")
The Principle of Nonsense ("let's see what the horoscope indicates")
The Principle of Denial ("there is really no problem at all - you're just worrying over nothing")
The Principle of Intuition ("let your subconscious work on it while you sleep")
The Principle of Willpower ("man has free will and can choose or not choose")
The Principle of Tolerance ("de gustibus non disputandum" - "about tastes there is no sense in disputing")
The Principle of Forgiveness ("forgive them, for they know not what they do")
The Principle of Departure ("that problem is not for me, and I am leaving")
The Principle for Dealing with Mountains ("if the mountain won't come to Mahomet, Mahomet must go to the mountain")
The Principle of Faultfinding ("it's your fault it does not work")
The Principle of Poor Me ("nothing ever goes right for me")
The Principle of Excuse ("this is why it did not work - listen ... ")
The Principle of Not Invented Here ("any method or idea not invented here is n6-good")
The Principle of Action ("don't just stand there - do something, anything")
The Principle of Authority ("consult an expert, and do what he says")
The Principle of Experience ("experience is the best teacher")
The Principle of Trial and Error ("if at first you don't succeed, try and try again")
The Principle of Successive Approximation ("if at first you don't succeed, try some more - but learn from each trial")
The Principle of Theory and Practice ("theory enriches practice, and practice modifies theory")
The Principles of Calculation ("figure it out, compute it")
The Principle of Feedback Control ("every time the process strays off a little, correct it, bring it back to the desired
condition")
The Principles of Science and the Scientific Method ("experiment, draw conclusions, and test them")
The Principles of Systems Analysis and Synthesis ("take all the factors into account")
The Principle of Careful, Systematic Verification ("continually check all statements - they tend to get out of date")
* a character in David Copperfield by Charles Dickens, published 1850.
COMPUTERS and AUTOMATION for March. 1973

7

Management of Computer Technology
Colonel Carl J. Weinmeister III
111 Yount Circle
Lackland AFB, Texas 78236

"To illustrate computer operations, one way is to imagine a three dimensional
planetary system with the various parts as orbital bodies: each body has its
orbit, and the orbits intersect."

Overview

Today's computers provide unique opportunities
for management innovations.
The creativity of the data processing manager is
a key to these innovations. Top and middle management also must provide thei r imaginati ve contribution.

turers' announcements to realize the creativity of
computer manufacturers. Technical enhancements are
announced daily. They are clearly measurable in
speed of processing and new technology in manufacturing. Miniaturization, especially in the mini
computers, is opening a whole new concept of operation. Then also there are the new peripherals
that include video display devices, teletypewriters,
optical character readers, large capacity random-

This article provides a departure pOint from
which a dialogue can be developed between these various managers.

"Am I running old-fangled computer programs on
new-fangled computers?" "Did the organization purchase a faster, more expensive machine to do the
same old things - faster?" "Even with these sophisticated machines, management still wants the
same old reports - why?" These are some of the
questions that plague today's data processing manager. Technology is almost overwhelming him; yet,
can he use this technology to do a better job? To
answer this last question one must step back, take
a thorough look at the setting, evaluate the challenge and set the course that he deems will do the
best job.
The Setting

The setting consists of:
1.
2.
3.
4.
5.

Today's computers.
Non-application programs.
Data base.
Application programs.
People.
T oday's Computers

Very little need be said about the quality of the
computers on the market today. One only has to read
any of the many professional magazines or manufac8

Colonel Carl J. Wei nmei ster III is presently
the Di rector of Personnel, Lackland Mi Ii tary
Training Center, Lackland Air Force Base, Texas.
He previously served as the Data Processing Manager for the Commander-in-Chief's Pacific Auto'matic Data Processing Group. Colonel Weinmeister
holds a BBA degree from Emory Uni versi ty and an
MA degree inPersonnel Administration from George
Washi ngton Uni versi ty, where he speciali zed in
the "people problems" associ ated wi th computers.

COMPUTERS and AUTOMATION for March. 1973

access devices, and many other new innovations.
There is fast developing the concept of a distributed computer network where small satellite computers provide data for larger central computers.
The hardware daily gets better, faster, smaller,
and more efficient. It leads the pack. The hardware has always been ahead of all other parts of ADP
and it appears that it will keep out front.
There have been many attempts to illustrate the
computer operations, but the listener often gets
confused because of the subtle interrelation that
exists between the various parts. One way to imagine this abstract relationship is to think of computer operations as a three dimensional planetary
system with the various parts as orbital bodies.
Each body has its orbit and the orbits intersect.
(See Figure 1)

prestigious it should be because the executive software that the computer manufacturers deliver today
are a powerful extension to sophisticated hardware.
Some executive software treats peripherals like
core. Some can evaluate applications and see which
application should be performed first. Additionally,
if a high priority shows up in the queue, today's
executive programs get a restart point for the pro.gram that is running, clear it from core and put it
aside to be done at a later time.
Executive Programs

Today's executive programs accommodate time sharing while doing batch processing in the background.
Through the. time sharing feature they can support
cathode ray terminals, teletypewriter terminals and
other remote peripheral devices. These devices, entering the computer through the time sharing mode,
offer exci ting opportunities for future applications.
A third orbital body in our computer celestial
arrangement i~ the data management system (OMS).
This is the new name for computer programs that have
existed since the first time that two machine instructions were combined into a computer macro. The
data management system really combined all the computer languages into a common environment. It is a
hierarchy that begins with assembly language and
moves up the scale through JOVIAL, FORTRAN and COBOL
to the new higher level languages that use near English sentences and allow non-programmer people to
reach into the data base and extract the data needed
to provide information to the boss. Data management
systems also include those routines that do preprocessing, data checking and edit functions. The OMS
also includes communication computer programs that
link the center of the computer to remote users
throughout the world. It is realized that this
definition of a OMS may seem broad; but, when one
considers the items being advertised as OMS's, one
begins to realize that the new innovations are only
more sophisticated languages.

Computer Solar System

The OMS for each new computer is a powerful tool
that must be evaluated to see how far the hardware
technology has been expanded through advanced software.
The Data Base
Figure 1

In the first orbit is found the central processing unit (CPU) of the computer. This arithmetic
operation has become so commonplace that it is almost forgotten. The processor is a fundamental
part of the computer solar arrangement.
Non-application Programs

For the purpose of this discussion, non-application programs are simply all those routines that
are not specifically identified with one particular
computer program. These programs continue to grow.
They might be called the internal software subsystem that combines with the hardware subsystem to
form the operating subsystem. Notice that all of
these are "subs" because the total system is a composite of all the parts. Too often one tends to
think of one's part of the whole as a system. The
system only exists when all parts come together to
provide the products.
The second orbit in the computer solar system is
difficult to clearly delineate. It used to be called
the executive program. It now is called the operating system (OS) or some other prestigious name. And
COMPUTERS and AUTOMATION for March, 1973

A new celestial body has recently been discovered
in orbit in the computer solar system. It is the
data base.
Much emphasis in the past was placed on the computer and the computer programs; little attention,
if any, was placed on the data that provided information for management. In early applications data
was considered a part of the computer application
program. Each programming team developed its own
"systems" (computer programs) in isolation from
other programming teams. A large number of redun.dant data elements developed.
Increasini att~ntion is being given to development of common data bases. There is now a tendency for the pendulum to swing far to the other.
side. The establishment of data base administrators (DBA) are suggested. Some proponents go so
far as to suggest"data base czars just as AOP czars
were suggested several years ago.
Recognition of ' the data base as a component of
the information equation is a positive step; but
the idea of data base administration must be kept
in perspective. This administrator would be a per9

son and he would be responsible for the structure,
purity, adequacy and availability of data elements.
He would uti! ize a software package called "data
base manager" to keep up with what was in the computer data base and to perform checks on the data
as pre-processors do now. This data base manager is
an integral part of sophisticated data management
systems that are evolving.
The requestor in the new data base concept is
the person that uses information. He would ask for
a certain information product and the data base administrator would obtain it through the means that
he determined was most efficient. If the administrator through his data base manager discovered
that he needed more data, he would go to the logical
source and ask this source to provide the data. The
data base administrator would not be limited to computer data; in fact, if he is truly an information
scienti st, he will recognize that "all" management
data will never be in the computer. A key responsibility of the data base administrator will be to determine what data should be computerized and which
should not be computerized.
The concept of a data base separate from the application programs provides some unique opportunities for the creative thinker.
Application Programs

Application programs will be developed in the
following environment. The computer is a modern one
with an operating system that has the capability for
time sharing, multiprogramming, remote batch processing, and normal batch processing. The data management system includes the popular computer languages plus at least one near English language that
is operable from either a card reader or remote terminals. There is a separate data base under a data
base administrator who is required to know where all
data elements are. What is left for the application
program and what should it look like?
Application programs should retrieve data from
the data base, make calculations as required and
provide the product in the format desired. Some of
the best products from the computer will be one
line statements that answer the manager's question.
Others will continue to give results and provide the
background through which the final results were obtained. Others will, fortunately or unfortunately,
provide a thick printout that includes the whole
history of all transactions.
Priorities

With the advent of time-sharing, computer programs will be associated with the priority assigned
to the computer product. For example" a program used
in an airline reservation system that tells the passenger agent whether or not he can sell a seat has a
higher priority than the daily compilation of seats
sold that is provided to operations personnel. When
the programming team beg~ns to program an application, one of their preliminary actions will be to
establish the response time required. If an overnight response is satisfactory, a batch job will be
prog·rammed. If a faster response will be required,
then" the application may be designed to operate as
batch, remote batch, or from a remote terminal.
By use of the near English languages, one-time
queries will become more common. Some retrievals
will be eliminated and some programmed reports will
be replaced by queries. Some reports will be submitted only when something is wrong. Programs will
be developed that monitor the data base and advise
10

the requestor when data exceeds pre-established
parameters.
There will continue to be the standard batch processing of structured data bases but there will be
increased emphasis toward determining what management data should be in the computer and what management data must remain manual.
People

People are the most important ingredient of any
computer system and as such are the center of the
solar system. The creativity of man is what has
given us the advances in ADP that we have seen so
far; however, to offset this creativity is a tendency for people to resist change. When an idea is
new, it is easy to think creatively; but, as policies get established and industry momentum is built
up, the ability of people, and the industry, to accept and utilize change becomes less and less. The
computer industry has entered a level of maturity
where change comes hard.
The data processing manager is the most critical
person in the data processing organization. On his
shoulders rests the responsibility to establish
standards and stabilities while encouraging creativity. He must lead his people so that they grow with
the advancement in technology.
Some of the most successful and most senior ADP
people are now becoming obsolete because of resistance to change. Time sharing, multiprogramming,
remote job entry and other innovations have made
obsolete some of the very qualities that made ADP
people successful in the past.
Modern Programming Economics

Early programmers were taught to use all parts
of the computer because their program was the only
one that was running. If they were not ingenious
enough to use it all, part of an expensive computer
was going to waste. Today, with multiprogramming
and multiprocessing, it is desirable to use only
that part of the computer which is needed. The remainder can be used by another program. In fact it
is desirable to limit the amount of the computer
that a programmer can use so several programs can
run together. This limiting lends itself nicely
toward breaking the program into several parts or
modules. Modules can be programmed independently
and tied together. All of these concepts plus the
concept of the data base administrator require senior programmers to learn new techniques and unlearn
old habits.
The cost of computing power as compared to the
cost of people is another factor that must be considered in optimum utilization of the components in
a computer system. The cost of computing power is
going gradually down while the cost of people continues to climb. At some time in the past computer
costs went below people costs. Multiprogramming is
continually accelerating this separation. In today's
typical computer operations, people costs are often
three to four times that of the computer. The progressive data processing manager should consider
offsetting some of his high people costs with lower
computer costs.
The Challenge

With all the factors described above, let's return to the original challenge, "Can the data pro(please turn to page 24)

COMPUTERS and AUTOMATION for March, 1973

Social Implications of
Computerized Information Systems
Robert P. Henderson
Vice President and General Manager
North American Operations
Honeywell Information Systems, Inc.
60 Walnut St.
Wellesley Hills, Mass. 02181

"There are literally two directions in which computerized data banks can
take us. One leads toward a radical realignment of knowledge and power
where the controlling interests have little or no regard for human values.
The other path enlists computers in expanding knowledge for the benefit
of all ... to help cope with the complexities of modern life."

The information industry is worldwide in nature.
And the entire question of social responsibility of
computerized information systems is one which must
concern all of us.
Apart from glaring exceptions brought about mainly by political considerations, the flow of information is worldwide and is not hindered by national
boundaries. And even these political barriers to
communication are being removed. Slowly, of course,
but removed just the same.
Multinational Companies

Besides political rapprochement, one of the most
significant forces in the internationalization of
information is the multinational company. Although
many people tend to think of the multinational company, or MNC, as an American institution, they are
of course as old as trade itself. Many of the larger
and more influential of the MNCs are headquartered
outside the United States, such as Shell, Lever,
Nestle, Bayer. Even Canada has made its contributions to the list of multinationals with such companies as Massey Ferguson and Alcan.
The point is that these companies operate on a
worldwide basis and thus transmit and receive data
around the globe. Whatever else they might be, and
I think that they are generally a force for good,
the MNCs have certainly contributed to the worldwide
information flow and the worldwide need for equipment to process this information.
To put some of these thoughts in the realm of
reality, I would point out that Honeywell manufactures computers and computer-related equipment in
the United States, Canada, the U.K., France, Italy
and Germany. Our products and services are sold in
more than 50 countries.
Specific examples of internationalized information flow include our time sharing network in Europe. A customer dials up the network on his telephone and his input is transmitted by satellite to
Based on a speech delivered before the Royal Canadian Institute,
Toronto, Canada, November 25, 1972.

COMPUTERS and AUTOMATION forMarch, 1973

a computer center in Cleveland, Ohio for processing.
It is then sent back to Europe and the customer via
the same satellite. Many of our customers are multinational companies. Such well-known names as S.C.
Johnson, Ford, General Motors, American Express and
Kennicott use Honeywell computers around the world,
often communicating with each other.
Worldwide Problems

So it is clear that both information flow, and
the need and use of equipment to handle this flow,
is worldwide in scope. It is for this reason that
problems, both real and potential, arising from computerized information systems must be dealt with on
a worldwide basis.
For simplicity I would like to examine two basic
areas: (1) privacy; (2) all other social implications of computerized information systems. By this
division, I do not mean to imply that privacy is
the most important consideration. But the issue of
privacy has been given a great deal of treatment in
the general and trade media in the past few years
and because of its notoriety, I think it deserves
some special attention.
A Question of Use

Even the most vocal and vehement defenders of the
rights of privacy concede that the computer in itself is not at fault. It is a passive instrument -it can do only what it is told to do by human beings.
Therefore what is being urged, and in many quarters
demanded, is not the abolition of the computer, but
that action be taken regarding the use of computers
and their data banks.
By his very nature man is a hoarder'of information, particularly about his fellow man. In our
complex society, neith~r government nor business
could function without the ability to receive, digest, process and store vast amounts of data. The
computer makes this possible.
Each person leaves an ever-increasing trail of
statistical infQrmation about himself from birth
to death; and in this era of the credit card,
scarcely a day goes by when the average person does
11

not deposit in some computer's records a business
transaction at a store, restaurant or gas station.
Much of the material now being fed into computers and data banks has been on record for years, including data relative to birth, schooling, employment, social security, military service, marriage,
insurance, courts, hospitals, credit bureaus,
churches, clubs and taxes. Many vital decisions regarding jobs, housing, education, etc. are in part
determined by the data we have said about ourselves
and what others have said about us.
Public Concern - Growing

Despit& the obviou~ significance of this storehouse of personal information, usually held by unknown third parties, until recently there has been
little public concern about it. There were two primary reasons: First, until the advent of the computer, the data was scattered around in many different places among many different organizations. Hence
its quantity and use never seemed too threatening.
Second, most people are quite willing to tell their
life stories (or the life story of a neighbor) to
almost anyone who appears to have a quasi-legitimate
need for this information.
The past several years, however, have seen a new
concern mounted over the volume and availability of
these personal files, and the computer is the reason
for it. With the computer, and its abilities such
as time sharing and communication with other computers, the old practical limits of time, effort and
cost on the size of manual files have been eliminated. The unprecedented efficiency of the computer
in storing, processing, manipulating and disseminating information has created central, highly detailed
and easily available dossiers on millions of individuals.
"Privacy" and "Security": Two Distinct Issues

In considering the problems that arise from keeping computerized records, many people use the words
"privacy" and "security" interchangeably. In fact
there is a great deal of difference between the two
and different parties must be responsible for each.
In his widely read book, Privacy and Freedom, Prof.
Alan Westin described privacy as "the claim of individuals, groups or institutions to determine for
themselves when, how and what information about them
is communicated to others." In relation to computers, security is the means taken to insure the privacy of the information once it is contained in a
data bank. Privacy is a legal, political and philosophical concept and its guarantee properly belongs
in the domain of government. Security is a matter
of equipment and technique, which is the,province of
the computer manufacturer. The users of computers
should assume responsibility for both privacy and
security.
The computer industry today can provide a large
number of security devices and systems to guard
against the unauthorized use of private information
within data banks, and it is working on many more.
Such developments have taken place in both the hardware and software areas of electronic data processi ng • Here are some ex.ampl es :
Possible Security Devices

Encoding consists of scrambling data transmission
'so that intercepted messages will be unintelligible
unless the interceptor has the code. In principle,
data on such storage devices as magnetic tape or
discs also can be in cryptographic form.
12

A number of security devices, however, are designed to prevent unauthorized persons from getting
to the encoded information. These constitute systems requiring positive identification of anyone
seeking access to the files and the information in
question.
The security of the computer room itself is relatively easy to achieve, and yet many installations
make the mistake of maintaining a showplace atmosphere behind plate glass windows. The computer room
is not an area for casual visitors or even the mass
of employees. Aside from privacy considerations,
business and government organizations must keep in
mind the danger of destruction of vital records by
natural disaster or sabotage.
The best location for a computer room is one of
isolation from other work areas. It should be fireproof, of course, and for extra protection all files
and programs should be stored in a separate room.
Never before has it been possible to concentrate so
much vital information about an organization in one
spot, so the need for the right location and design
is imperative. Once that has been accomplished, the
usual protective measures of guards, locks, special
passes and badges should be enough to secure the
computer room.
Time-Sharing Requires Remote Security

The most serious problems result from time sharing or remote entry systems, where the user of the
computer may be working from a terminal many miles
away, and hence beyond the control which can be
maintained at the site of the computer.
The most common remote security measure today requires passwords to identify a user. Nearly all
time sharing systems use passwords for entry today
-- a vital need in many instances where two or more
competitors may be tied into the same timesharing
system and each want to protect his own files.
A password program can be as simple as an entry
code name which can be checked and verified against
the computer's files, or as complicated as a long
series of questions which only an authorized user
can answer -- about birthdays, pets' names, grandparents' names, or anything else.
We can also limit not only who has access to a
file, but also who can alter a file. The input can
also be controlled by designing a format that will
accept only certain types of information. A credit
bureau or government agency, for example, may be allowed to store information pertaining to age, marital status 'and income, but not political affiliation,
reading habits or health problems. By designing the
software to permit only specific data, extraneous
information will not be accepted. However, this
feature is a function of the user, since software
programs designed by the manufacturer can be al tered.
It is thus the user's responsibility to enforce a
restricted software format in order to limit file
input.
Nevertheless, a wide variety of ingenious safeguards against unauthorized access via remote terminal is available or under development. The simplest security device is a lock on the terminal so
that it will not operate until keys are punched in
a special sequence, or a special key or card is inserted into the terminal. More elaborate devices to
identify the user, including voice prints, fingerprint scanners and picture phones are under study.
Their feasibility and their economics have yet to be
positively determined.
COMPUTERS and AUTOMATION for March. 1973

~

"Branch" and "Ring" Security Systems

The data base of a computer's memory can be
structured like a tree, with data leaves on its various branches. The system would make security
checks on the user at each junction of a branch to
the tree trunk, User A, for example, may be authorized for access to only one certain portion of the
computer's memory or files of information. When he
arrives at that particular junction, his identity
will be checked and he will be allowed to examine
the data leaves on that branch. If he attempts to
access the computer's files at any other junction,
his identity will not match and he will be denied
entry. This system would allow a computer customer
to position his checks at various junctions as he
.desires.
To guard particular critical information, a user
might be asked for further identification at the appropriate junction.
Another system under development at the Massachusetts Institute of Technology, in conjunction with
Honeywell, employs what are called "Rings of Protection". In addition to the tree or pyramid structure
of conventional data bases, the ring structure is
built like concentric circles. Thus segments of the
system containing sensitive informationiC:an be
placed in a privileged ring together with programs
which process, update and extract this information
in a carefully prescribed and controlled fashion,
A subscriber is allowed to enter a ring only at
a carefully defined point, and once he enters a
ring the way the information is processed and handled is completely beyond his control. Further, the
user's movements are controlled, i.e, he is prevented
from moving elsewhere, even within that ring. New,
updated computer hardware has just been delivered to
MIT so development work can continue.
Another feature designed to maintain the security
of files is an audit-monitor to record the identity
of the person who requested access to information,
as well as when and for how long. The audit-monitor
system can note abnormal patterns or frequencies of
any given file being accessed, and it can record attempts to access a file which were foiled by other
security systems.
This is only a sampling of security measures
available today or being studied. There are many
other devices including signature recognition devices and typewriters which conceal the typed information so that an unauthorized individual cannrit
read a password by looking over a user's shoulder.
The problem will not have been solved even when,
or if, an absolutely 100 per cent secure system is
devised, because ultimately it is the people who
operate the system who are responsible.
Maintaining Privacy: The User's Responsibility

It was said earlier that the manufacturer of computer systems is responsible for the provision of
security devices required to maintain the privacy of
the files (or at lea st to elevate the level of security to the point where the cost of breaking the
security is greater than the value of the information being sought, or greater than the cost of more
mundane approaches such as bribery). Actually maintaining that privacy is the responsibility of the
user.
It is appropriate to speculate on what the government may demand of the computer user in relation
COMPUTERS and AUTOMATION for March. 1973

to the privacy issue, and to consider preparatory
steps that should be taken now by these users. Such
preparation is expedient for several reasons. First,
steps taken voluntarily will demonstrate to both
government and the public the good intentions of
the business community, and hence, business may be
in a more favorable position to influence legislation which is designed to control its data processing activities. Secondly, the earlier measures are
taken, the less expensive it is t~ implement them.
What the Government Must Do

The first step the government must take is to define the privacy rights of individuals in terms of
today's technology. There is no rear precedent in
our history for the situation as it exists now, and
in fact the constitution of the United States does
not mention privacy by name. Nonetheless, it is
reasonable to assume that any legislation regarding
privacy would have the effect of extending those
other rights guaranteed in the constitution.
The First Amendment in our Bill of Rights guarantees freedom of speech and association. The Fourth
Amendment states "The right of the people to be secure in their persons, houses, papers and effects,
against unreasonable searches and seizures, shall
not be violated ... " The Fifth Amendment has potential bearing on the situation. It forbids that
"Private property be taken for public use without
just compensation". The Fourteenth Amendment prohibits any state from depriving "Any person of life,
liberty or property without due process of law". It
is not unreasonable to assume that personal information is covered under "life, 1 iberty or property",
and the right to be secure in one's "person, papers
and effects" extends to personal data.
Of course the Canadian system is vastly different from that in the U.S., sinceCanada operates on
a common law basis similar to that in the U.K.
while the U.S. relies on a written and formal constitution. I briefly read the British North America
Acts and noted that privacy is not mentioned there,
although there are some references to general welfare. And in your system of common law, there is
no generally recognized right to privacy.
Blanket Law on Privacy Premature?

The Canadian Business Equipment Manufacturers
Association, known as CBEMA, recently submitted a
report to the Canadian Government Task Force on privacy and computers. 'Essentially CBEMA agreed wi th
the position of the Canadian Manufact~rers Association. This position is that it would be premature
to enact a blanket law on the right to privacy since
it would be inconsistent with the historical development of common law, whereby laws are developed by
a slow but steady process of responding to specific
issues and problems.
The country from which we both draw much of our
legal foundations is of course the U.K., and the issue of privacy has ~ained much attention there. This
past summer a Parliamentary Committee on Privacy
chaired by The Right Honorable Kenneth Younger issued its report. In relation to computers the report recommended voluntary adoption by computer·
users of high principles for handling personal information. As far as legislative actions, the committee simply recommended that the government form
a standing committee to review the growth and techniques of gathering and handling personal information. Like CBEMA. the Younger Committee fel t i t
would be premature to legislate specific controls
or licensing requirements on computer systems.
13

In the United States, a Committee of the National
Academy of Sciences recently issued its report on
_ its study enti tIed "Data Banks In A Free Society".
This committee, headed by Professor Westin, came to
essentially the same conclusions as the Younger Committee in Britain. The Westin Committee said that
the problem is not as bad as many civil libertarians
have suggested, and in any event it is not the computer that is at fault. One of the committee's
key phrases is "No technological fix can be applied
to the data bank problem".
A similar study of course has proceeded in Canada
under the auspices of Robert Stanbury, Mini ster of
Communications, wi th largely similar conclusions.
Guaranteeing an Individual's Access to His File

For the United States, I feel the single most effective measure to protect privacy would be legislation allowing each person access to his own file,
wherever it may be kept, for the knowledge that a
person could view and challenge in the courts his
file would deter the keeper of the file from irresponsible action. Such an action would mean a complicated set of procedures for business, but such
legislation appears all but inevitable. Procedures
must be worked out for notifying an individual that
a firm has a file about him, for allowing the person
to examine this file and change erroneous information, for informing him when and to whom the information in the file is being released, or for securing the persons' permission before the information
is disseminated.
Other
next few
ling the
trolling

legislation likely to be considered in the
years would have the effect of A) controlnature of the system itself and/or B) conthe people who work with the systems.
Certification of Staff and System

To consider the second case first, the staff of a
data processing department is still the weakest link
in a security chain, for it is the staff that has
the technical ability and the best opportunity to
tamper with the system or secure sensitive information. Because of this fact, some form of certification of computer operators and systems designers may
be required by the government, much like accountants,
lawyers, doctors, plumbers or electricians are certified. Such a measure is desirable from many points
of view. Because people are vulnerable no matter
how secure the system, it is imperative that they
be well qualified; and because they would be certified, easily identifiable. Secondly, certification
of computer operators places no burden on the businessman, other than to make sure those data processing people he hires are certified.
In addition to certifying the people, it is possible that some steps will be taken to insure that
the system itself is certified, and an institution
would not be allowed to operate a data bank without
certification. The computer, as mentioned, is the
focal point for. the privacy issue, and the reason
is the computer's ability to reorganize a large
quantity of information, each element of which is
separately harmless, into a more meaningful collection of information which together may reveal more
than desired. Thus, one aim of system certification
would be to set requirements on the input to a computer's data base. Often-mentioned facets would be
to include the identity of the supplier of each bit
of information which is included in a person's file
and to require dating of all entries.
14

r would now like to examine some other sociallyoriented aspects of computerized information systems. Although many of these concerns will manifest themselves with systems of the future, I think
we should begin to consider them now, while we are
still in the design stages.
Initial" Prevention of Abuses Vital

If I might be permitted an analogy, I think the
importance of early consideration will become clear.
Many experts feel that if the problem of obscene
telephone calls had been foreseen while the present
telephone networks were being designed, preventive
devices and systems could have been incorporated in
the phone system to easily eradicate the problem. If
for example, the problem was foreseen, something
like a little red button could have been attached to
each phone unit. When someone received an obscene
or annoying call, he could push the button to activate an automatic tracing system.
But adding protective mechanisms now that the
phone system is installed is nearly impossible and
enormously expensive.
Coming: The One-Copy Computer Archive

It is no longer considered just the province of
daydreamers to suggest that in the not-too-distant
future, we will see the world's knowledge recorded
electronically, rather than on the printed page,
la Gutenberg. We will see enormous archival computerized knowledge banks replacing books and libraries.

a

A problem becomes apparent when you consider that
knowledge as it is now recorded in books, newspapers,
magazines and so forth, is in part protected by duplications. There are thousands of copies of the
same book available for cross checking if you doubt
the contents of one edi tion. There are millions of
copies of newspapers and magazines readily available
for perusal if you doubt the version of an event as
reported by one newspaper. Having physical possession of a manuscript protects an author from liberties that might be taken by a publisher.
But the ultimate in electronic archives might be
that there is only one copy of anything -- that
stored in the knowledge bank. As mentioned in Orwell's 1984, itis so much easier to rewrite history
if there is only one copy of the history book.
Integrity and Accuracy Essential

It is obviously essential then that any such
archival electronic system have as close to an absolute degree of integrity as possible. A system
failure must be avoided at all costs.
We must also take great steps to insure the accuracy of information in the system. We must be
sure that the information stored in the system is
the same information th~t was entered. This is not
just a matter of possible invasions of privacy.
There are now plenty of examples of perfectly private secure bad data stored in computers.
If such knowledge banks are to be truly archival
and useful, we must carefully examine the long-term
storage characteristics of storage media. Will computer tape or disks stand up to the test of time or
will they deteriorate and hence lose the knowledge
stored on them? If so, what provisions should be
(please turn to page 21)

COMPUTERS and AUTOMATION for March, 1973

Computers, Automation and Technological Change
Mike Cooley
Past National President
Amalgamated Union of Engineering Workers
(Technical and Supervisory Section) 1971-1972
75 Talbot Ave.
Langley, Bucks..
England
"One is frequently asked if technological change is a good or a .bad thing.
It depends entirely on how technology is used, and who controls it. . ..
in fact merely an extension of man's own capabilities."

Automation: Freedom or New Bondage?

Right from earliest times a myth has persisted
that the introduction of mechanisation and automated
processes would automatically free man from soul
destroying routine tasks and free him to engage in
'creative work. This myth has persisted as consistently in the field of intellectual work as it has
in that of manual labour. As far back as 1624, when
Pascal introduced his first mechanical calculating
machine he said, and I quote:
"I submi t to the public a small machine of my own
invention, by means of which you alone may without any effort perform all the operations of
arithmetic and may be relieved of the work which
has so often fatigued your spirit when you've
worked with the counters and with the pen."
My union feels that we have a particular social
and political responsibility to make a statement on
computers, automation, and technological change.
That responsibility stems primarily from the fact
that we organise the designers and technologists
whose skill and ingenuity produce much of the equipment which in Britain makes technological change
possible. We take the view that the designer has a
profound responsibility to understand the implications of his work and to ensure that the products of
his efforts are shared by the community as a whole,
and provide the material basis for a more full, cultured and dignified existence. I want therefore to
look critically for a few moments at the problems
which flow from the introduction of computers and
automatic equipment in our profit-oriented society.
In doing so I do not want to be misunderstood.
We are not opposed to technological change as such.
We are not like some romantics who seem to believe
that before the Industrial Revolution the populace
spent its time tripping through daisies in unspoiled
meadows, or dancing around maypoles. As designers
and technologists we are fully aware of the enormous
contribution science and technology have made in
eliminating disease, ending squalor and improving
at least economically the quality of life. Our concern is the mis-use of technology which can only be
properly analysed in the broader historical context
of technological change as a whole.
Subordination of Employee to Machine

The harsh reality of our experience tends to demonstrate that in many instances the reverse can actually be the case. To understand why this should be
so it is necessary to analyse it within the economic
base from which this kind of equipment is introduced. Firstly, there is an ever-increasing rate of
Obsolescence of this kind of equipment. Early
COMPUTERS and AUTOMATION for March, 1973

It is

wheeled transport existed in that form for thousands
of years; steam engines made by Boulton and Watt two
hundred years ago were still operating about one
hundred and five years later; a hundred years ago,
when an employer purchased a piece of machinery, he
could rest assured that it would last his lifetime
and would be an asset he could pass on to his son.
In the 1930s machinery was obsolete in about 25
years, during the 1950s in 10 years, and at the moment computerised equipment is obsolete in about 3
to 5 years. Secondly, the cost of the means of production is ever-increasing. That is not to say that
the cost of individual commodities will continue to
increase. The most complicated lathe one could get
100 years ago would have cost the equivalent of ten
men's wages per annum. Today, a lathe of comparable
complexity, with its NC tape control and the total
environment necessary for the preparation of those
tapes and the operation of the machine, will cost
something in the order of one hundred men's wages

Mike Cooley is a senior des ign engineer in the
aerospace industry, and a fellow of the Bri tish
Interplanetary Society. Hewas the National President of the Amalgamated Union of Engineering Workers
(Technical and Supervisory Section) in 1971-72.
Mr. Cooley, who is 39, has studied the implications of technological change for his union in
most European Countries and lectured widely on
the subject at U.K. universities. He is the author
of "Computer Aided Design - Its Nature and
Implica tions".

15

per annum. Confronted therefore with equipment
which is getting obsolete literally by the minute,
and has involved enormous capital investment, the
employer will seek to recoup his investment by
exploiting that equipment for 24 hours per day. In
consequence of this, employers will seek to eliminate all so-called non-productive time, such as tea
breaks, will seek to subordinate the employees more
and more to the machine in order to get the maximum
performance, and will insist that the equipment is
either worked upon on three shifts to attain a 24
hour exploitation, or is used on a continuous overtime basis. This trend has long since been evident
in the manual field on the workshop floor. It is
now beginning to be a discernible pattern in a
whole range of white collar occupations.
Our analysis of this problem in British companies
demonstrates that employers will wish to ensure that
all their white collar employees who use this kind
of equipment accept the same kind of subordination
to the machine that they have already established
for manual workers on the shop floor. To say that
this is so is not to make a prediction about the far
distant future. Two years ago our union was involved in a major dispute with Rolls Royce, which
cost the union £ 1%1 million. The company sought,
amongst other things, to impose on our members at
the Bristol plant the following conditions:
"The acceptance of shift work in order to exploit
high capital equipment, the acceptance of work
measurement techniques, the division of work into
basic elements, and the setting of times for
these elements, such timA to be compared with
actual performance."
In this instance we were able, by industrial action, to prevent the company from imposing these
conditions. They are, however, the sort of conditions which employers will seek more and more to impose upon the white collar workers.
Social Consequences of Shift Work

When staff workers, whether they be technical,
administrative or clerical, work in a highly synchronised, computerised environment, the employer
will seek to ensure that each element of their work
is ready to feed into the process at the precise
time at which it is required. A mathematician, for
example, will find that he has to have his work
ready in the same way as a Ford worker has to have
the wheel ready for the car as it passes him on the
production line. In consequence of this many graduates, who in the past would never have recognised
the need to belong to a real trade union, now find
that they need the same kind of bargaining strength
that manual workers have accepted on the shop floor
for some considerable length of time. In fact, one
can generalise and say that the more technological
change and computerisation enters white collar areas
the more the workers in those areas will become
proletarianised.
The consequences of this will not be limited to
the work situation. They will spread right across
the family, social and cultural life of the white
collar worker. If we consider the consequences of
shift working you will see what I mean. In a survey carried out in West Germany it was demonstrated
that the ulcer rate amongst those working a rotating
shift was eight times higher than amongst other
workers. Other surveys have shown that the divorce
rate amongst shift workers is approximately fifty
per cent higher than normal, whilst the juvenile
delinquency rate of their children can often be
16

eighty per cent higher. We have a whole series of
examples in Britain of the manner in which the cultural and social life of our members has been disrupted by the introduction of this kind of equipment.
Sources of Technological Stress

Thus, whilst it is true that automated and computerised equipment could free man from routine,
soul destroying, backbreaking tasks, and free him
to engage in more creative work, the reality in our
profit-oriented society is that in many instances it
actually lowers "the quali ty of life".
Career Decline

Serious unemployment problems also arise from the
introduction of this kind of equipment. Basically,
the equipment changes the organic composition of
capital in that industries become capital intensive,
rather than labour intensive. The tendency is therefore to increase the work tempo of some, whilst putting others into the dole queue, with all the degredation that that implies. In many instances the
work tempo is literally frantic. This we have seen
in the past on the workshop floor. In one automobile factory in the Midlands in Britain they reckon
that they "burn a man up" on the main production
line in ten years. They recently tried to get our
union to agree that nobody would be recruited for
this type of work over the age of 30. Age limits
are also gradually being introduced in the white
collar areas. In the Sunday Times about a year ago
a list was given of the peak performance ages for
mathematicians, engineers, physicists and others.
For some of these the peak performance age was between 29 and 30. It has been suggested that in
order to utilise this high capital equipment as
effectively as possible a careers profile should be
worked out for those who have to interface with it.
When the worker reaches his peak performance age it
is suggested that this should be followed by a careers plateau for three or four years, and thereafter, unless the employee has moved into management, that he be subjected to "a careers de-escalation". The obvious extension of the careers
de-escalation is redundancy.
The Crime of Aging

Our own practical experience demonstrates, particularly during redundancy, that older men are being eliminated in this way. They are being eliminated or down-graded to lower paid work simply because they have committed the hideous crime of beginning to grow old. We are, as Samuel Beckett once
said, "all born of the gravedigger's forceps". Growing old is the most natural process inherent in man.
It is a biological process, but in the contradictory
nature of our profit-oriented society it is treated
almost as a crime. It is true that this kind of
equipment imposes very stringent demands upon those
who have to interface with it. Seen in terms of the
total man/machine system the man is slow, inconsistent, unreliable but highly creative. The machine
is the dialectical opposite, in that it is fast, reliable, consistent but totally non-creative. As the
man attempts to respond to the machine, enormous
stress is placed upon him.
We have identified areas within the design activity where by using inter-active graphic systems the
decision making rate of the designer is increased by
1900%. Again we can draw analogies from the shop
floor. In the British Steel Corporation a productivity agreement recently introduced medical checks.
COMPUTERS and AUTOMATION for March, 1973

In practice these medical checks meant the operator
was tested to ensure that his response rates were
fast enough to interface with the equipment. He was
merely tested for his response rates as a dial might
be. A series of occupational suitability tests and
character compatibility assessments are now gradually seeking to do the same sort of thing to white
collar workers who have to use high capital equipment.
Knowledge Obsolescence

Another source of great stress for white collar
workers in these high technology environments is
the problem of knowledge obsolescence. We believe
that the scale of technological development in the
last 25 years is equal to that accomplished in all
of man's total existence. The scale of scientific
effort, which is closely related to technological
change, in the present century has increased out of
all recognition. It has been asserted by Professor
J. D. Burnall that in 1896 there were perhaps in the
whole world 50,000 people who between them carried
on the whole tradition of science, not more than
15,000 of whom were responsible for the advancement
of knowledge through research. Today the total number of scientific workers in industry, government
and academic circles is in the order of 3~ million.
Over 90% of all the scientists and technologists
who ever lived are alive tOday. Mathematical mOdels
described by authorities such as Sir Frederick Warner indicated that in order to keep abreast of his
knowledge an engineer would have to spend 15% of his
time in up-dating his current knowledge. Mr. Norman
McRae, Deputy Editor of The Economist, stated in the
January 1972 issue:
"The speed of technological advance has been so
tremendous during the past decade that the useful life of knowledge of many of those trained to
use computers has been about three years".
He further stated:
"A man who is successful enough to reach a fairly
busy job at the age of 30, so busy that he cannot take sabbatical periods for study, is likely
at the age of 60 to have about one-eighth of the
scientific (including business scientific) knowledge that he ought to have for the proper functioning in his job."
It has even been suggested that if one divided
knowledge into quartiles of out-datedness those in
the age bracket over 45 would find themselves in the
same quartile as Pythagoras and Archimedes.
The stress that this places upon staff workers,
in particular older men, should not be under-estimated. It is the responsibility of the trade unions
to protect these older men. This they should do
not in any patronising, benevolent fashion, but in
recognition of the class right of these older men
to work at a civilised tempo. For these are the
men who in the past have created the real wealth
that has made the purchase of this kind of high capital equipment possible. All younger technologists
should fully understand that however energetic and
forceful they may feel now, they will inevitably
begin to grow old, and if they allow older members
to be treated in this way they are creating a
framework of oppression which will be used against
them in the future.
Protecting Man from His Machines

It will be self evident from all of this that the
introduction of high capital equipment can create
COMPUTERS and AUTOMATION for March, 1973

enormous problems for those who have got to operate
it. Even in Sweden, where the introduction of this
kind of equipment tends to be more civilised, they
have now had to establish what they call "protected
workshops". Does it not strike you as remarkable
that we have now reached a stage in which human beings have to be protected from the very machines
which we have been led to believe would free them
for more creative work? Is it really true that we
are protecting them from these machines? Is it not
the case that the machines are inanimate? Is it not
really the case that we are protecting them from the
manner in which machinery is used in our profitoriented society? By using equipment in this way,
the stress upon our members will continue to grow.
One transitional tactical means of protecting our
members is to mount a vigorous campaign for a shorter working week, longer holidays and more leisure
time. We believe that a campaign for a 35 hour
week is not only desirable, but indeed imperative.
Another problem area to be dealt with is the
fragmentation of skills. Seen historically, technological change has always meant that j~bs are
broken down into deskilled, narrow elements. This
is also happening in white collar areas. The
draughtsman of the 1930's in Britain was the centre
of design. He could design the component, stress
it, specify the materials to be used, define the
method of lubrication, and write the test specs.
With the increasing complexity of technology, each
of these have now been fragmented into narrow,
specialised areas. The designer draws, the stress
men carry out the calculations, the metallurgist
specifies the materials, the lubricator the lubrication. It has been common for some time to talk
about dedicated machines. It is now a fact that
when defining a job function employers define a
dedicated appendage to the machine, the operator.
Even our educational system is being distorted to
produce these dedicated men. It is no longer a
matter that people are being educated to think, they
are being trained to do a narrow, specific jOb.
Much of the unrest amongst students is recognition
that they are being trained as industrial fodder for
the large monopolies in order to fit man into this
narrow fragmented function, and that they will be
unable to see in an overall panoramic fashion the.
work on which they are engaged.
Employers also seek, as they introduce computerised systems to use these pseudo-scientific means,
the unequal pay and job opportunities between men
and women. They even seek to assert, by their job
evaluation schemes, that certain fragmented data
preparation functions are what they call "women's
work". There is n~ such thing as women's work, any
more than there is women's mathematics, women's science, women's literature or women's music. There is
only work, and we must continue to demand that all
our members are paid the rate for the work they are
undertaking, irrespective of sex or age. We should
not hesitate to use industrial action to assert
this, when other means fail.
"Rationalisation" or People-Stretching

Coupled with the introduction of this kind of
equipment is a re-structuring known as "rationalisation". The epitome of this in Britain is the GEC
complex, with Arnold Weinstock at its head. In 1968
this organisation employed 260,000 workers and made
a profit of £75 million. In 1971, in consequence of
quite brutal redundancies, the company's workforce
was reduced 200,000, yet profits were up to £105
million. These are the kind of people who are inJplease turn to page 25)
17

Who Knows You: A Look at Commercial Data Banks
Donald S. Willis
2513 Boyd Ave.
Fort Worth, Texas 76109

"It can be reasonably assumed that every person in the nation is listed on at least
o~e commercial data bank containing information ... which is accessible,' for the
most part legally, to any other person in. the United States."

Information systems containing data about individuals have long been a subject of civil rights
controversy. Computers, with their mass information retrieval and communication capabilities, have
greatly increased the amount and dispersion of information in data banks. Consequently the related
controversy has also increased. The dynamic nature
of data bank computerization juxtaposed with the
static nature of regulatory legislation creates a
frightening outlook for the future. While "undesirables" files, "suspects" files, credit record
files and adverse information files are typical of
the emergent pattern for data banks, legislators are
hampered in regulation of data banks by lack of
guidance from their constituents.

definitive characteristics, each subdivided into two
or three categories. These characteristics and categories are shown in Table 1.

Many articles have been written about the danger of invasion of privacy when data about an individual are di stributed wi thout restriction. 1 In particular, much has been written as to the operations
of government data banks and the dangers to the
right of privacy inherent in those systems. 2

According to this system of categorization, a number
of common data banks are shown in Table 2.

In contrast, little has been said about commercial data banks. The scope of this paper will be
confined to an investigation of some common data
banks and the threat they may pose to an individual's privacy. In order for a person to decide
whether further control of a commercial data bank
is needed, he must first determine whether the
operations of that data bank constitute an invasion
of his privacyo There are essentially eight questions which could be used to evaluate the operations
of commercial data banks:

1. Who has information about you and of what
nature?
2. How did they come to possess the information?
3. Do you have access to that information?
4. If so, by what means and what will it cost?
5. What recourse do you have if the information
is unfair or incorrect?
6. To whom is the information given and do they
pay for it?
7. How long can information about you be kept in
a data bank?
8. Are there laws governing data banks in which
you are l i sted?
What are the Problems?

A useful means of describing information systems
in general is provided by Dr. Calvin Gotlieb. 3 He
proposes to classify data banks according to three
1. The reader is referred to selected readings in
Appendix I.
2. The reader is referred to selected readings in
Appendix II.
3. Calvin C. Gotlieb. "Regulations for Information
Systems." Computers and Automation, September,
1970, pp. 14-17.
18

Table 1

Characteristic
Data Source
Distribution
Inspection

Category
P - public record
S - supplied by individual
o - other
I - internal
E - external
A - automatic
R - upon request of individual
F - forbidden

Table 2

Classification of Some Data Banks
Type
System
OEA
Bank Account
OIR
Payroll File
Who's Who
SEA
OIF
Medical Report
OIR
Investigative Reports
OEF
OIR
Credit Record
OER
PIF
Sales Prospects' File
OIF
Sales Prospects' File for Sale
PEF
OEF
In his analysis of problems arIsIng from commercial data banks, Dr. Gotlieb projects that problems
occur only when:
(1) the data were gathered from a source other
than the individual concerned;
(2) the data are distributed externally to the
data gathering organization;
(3) the individual concerned is forbidden to see
the gathered data.

It seems doubtful that these criteria exhaustively
denote all data banks for which problems of invasion of privacy and maintenance of civil rights will
arise. Detrimental information about an individual
can be harmful whether distributed at large or contained within the data gathering organization. In
fact, the latter case may be more injurious than the
former. Most oil cow~anies, for example, maintain
their own credit files, but due to the large number
of credit customers, the information in their files
is limited both in scope and accuracy. They simply
cannot afford to gather, update, or correct information as often or as thoroughly as credit bureaus
whose only business is maintaining credit records.
COMPUTERS and AUTOMATION for March. 1973

Similarly, while an individual's being forbidden
to see gathered data may have harmful consequences,
they are probably no more so than when information
is available only upon request. The individual must
first know that information about him has been collected, which he may request be made available to
him. Therefore unless an individual is automatically notified that information has been gathered,
he will probably never know of its existence or have
the chance to correct inaccuracies.
In support of Dr. Gotlieb's criteria, however,
all data banks may contain information which is potentially detrimental or undesirable to the individual concerned. Certainly if that information is
gathered from a source other than the individual
concerned, the chances of its being both inaccurate
and unjustifiably detrimental are increased.
It would seem that Dr. Gotlieb's criteria should
be amended to indicate that problems with commercial
data banks occur only when:
(1) the data were gathered from a source other
than the individual concerned;
(2) the data are distributed either externally to
the data gathering organization or retained
within it, which means that no matter what
the distribution pattern, problems are
likely to arise; and
(3) the individual is not automatically notified
that data has been gathered.
By having thus re-defined the "problem" criteria, a
more inclusive and hopefully exhaustive tool for
evaluating commercial data banks is provided.
Three Data Banks

Three types of commercial data banks commonly
found throughout the United States were examined:
Credit Records; Investigative Reports; and Sales
Prospects Files (Mailing Lists). The reader will
notice that the data banks studied are outside the
scope of Dr. Gotlieb's "problem" criteria, and yet
fulfill the revised conditions.

Most retail merchants are "members" of one or
more credit bureaus. Credit bureaus usually
"screen" potential members to insure "legal intent"
in the usage of credit reports. The retailers pay
a monthly membership fee, plus a fixed charge for
every credit report requested. Also, retailers provide credit bureaus information on customers having
credit accounts with them. The retailer may only
obtain a credit report when a person requests credit
from him. A credit bureau may obtain records from
other credit bureaus only when a member retailer has
legitimately requested a credit check.
Every person recorded by a credit bureau has the
right to inspect his record at any time. There is
usually a small charge ($1.00-$3.00) for this service. Most important, if anyone is refused credit
on the basis of a credit report, the merchant refusing credit must give that individual the name and
address of the credit bureau which made the negative
report. The person refused credit may within 90
days contact the referred credit bureau and see his
entire record free of charge. Generally speaking,
credit is refused on the basis of one or more credit
accounts which have been reported by a retailer as
delinquent, a bad debt, etc. If the person disagrees wi th the retailer's report he may file a "disputed account" report with the credit bureau. The
credit bureau is then required to relay this disputed account to any retailers to whom they have
given negative reports. The bureau is further required to include the dispute report in all subsequent credit reports.
Derogatory information, including public records,
may be retained in a credit record for a maximum of
seven years. The only exception is a court record
of bankruptcy, which may be retained for fourteen
years.
All data banks containing credit record information are federally regulated by the Fair Credit Reporting Act of April, 1971. Most credit bureaus
were following the above procedure prior to the Fair
Credit Reporting Act, but all are required to do so
now.
II. I nvestigative Reports

I. Credit Records

A credit record is compiled by a credit bureau.
Generally speaking a local credit bureau has credit
records only on persons resident in its geographic
area, although a credit bureau can obtain credit
records from any other credit bureau in the United
States.

•

Every person who has ever received credit is
listed in at least one credit bureau. Thus, anyone
having paid for a product or service by any means
other than "cash-over-the-counter" is definitely
listed by a credit bureau or the credit department
of a store. Moreover, even those few not listed for
the above reason generally are recorded by a credit
bureau as having always paid by "cash-over-thecounter".
Most credit records contain name, spouse's name,
age, current address, current employer, job description, previous address, previous employer, social
security number, approximate income, a history of
every credit account you have or have had, and public records. Public records in credit bureau reports generally consist of civil suit actions
against you and/or criminal court convictions.
(Every state has a Public Information Act which defines what information may be divulged outside government confines).
COMPUTERS and AUTOMATION for March. 1973

Investigative reports are compiled by a variety
of agencies, chief among them private investigators
and employment agencies. In the past, most investigative reports were background investigations (BI)
compiled for use in pre-employment screening, and
surveillance reports used in divorce suits. Recent
amendments to the Federal Truth in Information Act
have altered the investigator's license to conduct
background investigations. An investigator commissioned to conduct a BI is now required to inform the
individual a priori that he is to be under investigation, and the contents of the final investigative
report must be made known to that individual. The
individual may deny the investigator permission to
conduct a BI or, if dissatisfied with the final report, may prohibit its release. If released, however, the report is accessible only to the person
or firm requesting the ,investigation.
In the case of surveillance reports an investigator is neither required to inform the individual
that he is being observed nor make the final report
available to that individual. Any investigative report supposedly may contain only information about
an individual which can be obtained legally. However, the investigators interviewed for this study
indicated they had no problems obtaining such information as credit records, which is strictly forbidden under the Fair Credit Reporting Act.
19

Investigative reports almost always contain some
information detrimental to the individual concerned.
In light of this, it is surprising that investigators are required by federal law to maintaln eternal
files of investigative reports. After compilation
a report may be re-released only upon notification
of the investigated individual or by court order.
III. Sales Prospects Files

Sales prospects files are used for saturation
mailing of business solicitations and for house to
house sales campaigns. If you have ever wondered
how some company got your address to send you a
sample can of a brand new deodorant, sales prospects
files is the answer. Sales prospects files are
maintained by firms which use them in their own
sales campaigns and by firms which offer copies in
the form of specialized lists for sale, available
to anyone throughout the United States.

prevents automation of most data banks. However,
more and more operators of small data banks are
beginning cooperative computer operations. And,
while computers are becoming larger and faster, the
cost of computer usage is decreasing. Several commercial data bank operators interviewed indicated
that computer usage was the only feasible means of
handling the increasing volume of data, and that
regional data banks will replace local data banks
within the next ten to twenty years. Some operators envisioned a single gigantic national center
with terminals in every local office.
The idea of centralized credit record data banks
is not too disturbing, but the idea of centralized
data banks for investigative reports is alarming.
(The man who was most enthusiastic about a national
data bank operated a branch office of a national
private investigation agency).
What About Security?

One source of sales prospect information is published directories. Schools, professional societies, social groups, city telephone companies, to
name a few, publish directories of one sort or
another. Another frequent source is welcome services. Almost everyone moving into a city is visited by one or more representatives of local welcome services who offer free samples and gift coupons in exchange, albeit indirectly, for information. Welcome services are informed of new arrivals
by local utility companies when new accounts are
opened. Retail credit bureaus often are associated
with welcome services and begin a credit record on
the basis of the new information.
The information contained in sales prospects
files is quite extensive, often including name,
sex and ages of all family members, current address,
employer, occupation, own or rent a home or apartment, credit card accounts, make and model of automobile(s), approximate income level, church of preference, and public record information. (As in credit records, public record information is defined by
state public information laws but may include anything from birth records to criminal court convictions ).
Mailing lists are extracted from master files
containing the above listed information according
to predetermined criteria. By far the most common
criterion is geographic area. Other criteria frequently used both singularly or in combination are
sex, income, age and profession. Criteria used depend upon the product or service being advertised.

Maintaining the security of information in a computer is not simple. Computer centers handling confidential information have elaborate programmed and
physical security controls, but unfortunately, they
often prove inadequate. One such case is documented
as follows:
Pseudo Sign-On -- A couple of enterprising high
school students in Amherst wrote the following
program for their own "amusement". We have several teletypes in the computing center that are
permanently connected to the computer. Operation
over permanent leased lines is quite common and
would be equivalent. These boys wrote a program
which mimicked the normal sign-on procedure of
the system and requested (as usual) the user to
give his user number and secret code. They would
leave the terminal running with this program in
the machine and an unsuspecting user coming up to
the terminal in question would think he was talking to the system, while actually he would be
talking to their program. Once the user number
and secret code were captured, the program would
write them out onto a file so the students could
examine them later, and then it would fake a
"disaster" (system crash) so that the user would
be forced to sign-on again -- this time to the
real system, and never know that his code was no
longer secret. By the time they were caught
these students had "secret" codes of over 100
users. Fortunately, we don't keep classified information on our time-sharing system. 4
To Answer the Question

There are no laws which directly regulate the use
of sales prospect files. Although a resident purchases a mailbox and attaches it to his dwelling,
the mailbox is officially maintained by the federal
postal service and anything sent through the public
mails must reach its addressed destination. The
postal patron has no choice except to receive the
material and discard it if not desired. The only
exception is pornographic material. If a postal
patron finds that his address has been placed on a
recurring mailing list for pornographic materials he
may ask the postal department to have his address
removed from the list. The postal department then
requires the firm sending the material to remove
the postal patron's address from its mailing list.
What's in the Future?

In the evaluation of commercial data banks it is
necessary to determine the direction of future operations. The high cost of computer usage currently
20

At this point it seems almost redundant to answer
the question, "Who Knows You?" In looking at only
three of the many different types of commercial data
banks, we see that virtually anyone who has ever had
a credit account, moved to a different city, joined
a club or professional society, or worked at a job
requiring a background check is listed on one or
more data banks. This easily includes one-half of
the nation's population. It can be reasonably assumed that every person in the nation is listed on
at least one commercial data bank containing information similar to that shown above, which is accessible, for the most part legally, to any other person in the United States.
Laws regulating commercial data banks will not be
changed unless the constituency of the United States
4. Caxton C. Foster. "Data Banks -- A Position
Paper." Computers and Automation, March,
1971, p. 29.
COMPUTERS and AUTOMATION for March, 1973

clearly understand the controversy and are provided
objective evidence on which to base their opinions.
It remains for every American to determine whether
scrutiny, measurement, and documentation of his
lifestyle constitutes an invasion of his privacy,
and further, whether future computerized commercial
data banks will curtail his civil rights.
Appendix I

Chu, Albert. "The Need to Know and the Right to
Privacy." Business Automation, June I, 1971.
Foster, Caxton C. "Data Banks - A Position Paper."
Computers and Automation, March, 1971.
Gallagher, Cornelius. "Privacy, Human Values, and
Democratic Institutions." Computers and Automation, October, 1971.
Scalletta, Phillip. "The Computer as a Threat to
Individual Privacy." Data Management, January,
1971.
Weisner, Jerome B. "The Information Revolution and
the Bill of Rights." Computers and Automation,
May, 1971.
Appendix II

Hirsch, Phil. "Who Guards the Guardians?" Datamation, June 15, 1971.
Land, Steven and John Runtzel1. "Extensive Retrieval Capabili ties Aid Law Enforcement." Computer
Decisions, June, 1972.
Miller, Arthur. "Federal Data Banks and the Bill of
Rights." Computers and Automation, October,
1971.
Robinson, Stanley. "The National Crime Information
Center (NCIC) of the FBI: Do We Want It?" Computers and Automation, June, 1971.
--0

Henderson - Continued from page 14

made for recopying the data on new media? And who
will do the transferring - again keeping in mind
the ease of rewriting history when there is only
one history book?
The Problems of Access and Time Limitations

Another area of concern is actually accessing the
information once it is stored in the system. Consider this for a moment. How would you locate a
specific piece of information in a library if there
were no card catalogue? Would you simply start at
one book stack and proceed through all the thousands
of books in front of you until you found what you
were looking for? A time-consuming task to say the
least.
So in such systems, we would have to make access
to information easy and natural for those persons
seeking the information. And yet we also have to
make such access impossible for persons not authorized to obtain certain information.
There are also many instances where certain information is what we might call time-dependent.
Sealed memoirs, for example, may be entered into a
system and yet be unavailable for a period of years.
Such information must be dated upon entry so the
system will know when to remove the restrictions.
The Mul tics System at MIT, as a sidelight, has a system clock that keeps time to the nearest one millionth of a second for a period of 144 years.
Conversely, some information might be available
for a certain period of time after it is entered,
COMPUTERS and AUTOMATION for March, 1973

but not after, say, 10 years. A statute of limitations, if you will, on misdemeanor criminal records.
This leads to another question. Once the statute
of limitations has expired, and society has deemed
it no longer desirable that this information be
available, do we want to destroy it physically, or
simply make it absolutely unavailable. We may want
parts of the information, for instance some statistical data, but not a crimi nal offender's name, some
years after the records were entered. If we physically destroy the data, then it will be lost forever.
These problems do not plague us with our current
system of storing knowledge because we have physical
possession of the information and there is a great
deal of redundancy in the form of many copies of the
material. Only in the most extreme cases of national security or industrial propriety do we find
only one copy of a document.
But in spite of the potential problems, I am convinced that sooner or later we are going to be living in the age of computerized knowledge banks. They
do offer significant advantages, particularly in the
form of speech, and as costs decrease they will be
more economical than our present system, because
while redundancy may offer a degree of protection
it is also uneconomical.
Two Directions Possible

There are literally two directions in which computerized data banks can take us. One leads toward
a radical realignment of knowledge and power where
the controlling interests have little or no regard
for human values.
The other path enlists computers in expanding
knowledge for the benefit of all, using the power
of computers to help cope with the complexities of
modern life.
A great deal can be done to make progress along
the right path. Users of computers must exercise
a special sensitivity in selecting the personnel
who have access to the data banks; for no matter
how secure the system, there is always the danger
of people being compromised. Trained, dependable
people are an absolute necessity in the matter of
privacy, security and social responsibility.
The most effective step for every user is to
exercise concern over these matters at the very beginning of the system design stage. Requirements
must be established.
Building concern into the
system at the design stage is more effective and
more economical than adding devices or altering the
system after it has been installed.
Lastly, we must have increased public awareness
of both the blessings and dangers of a computerized
society, for there is the risk that a little bit of
knowledge on the part of the public and legislators
will lead to action that is not in the best interests of the country. Before laws are passed regulating computer systems, a thorough understanding of
the nature and technology of data banks is needed,
and the efforts of the computer industry and the
users of computers is vital to bringing about such
an understanding.
Computers are essential to the efficient conduct
of our complex world, but like every technological
advance, they can be used destructively. The time
is already short for business and government to join
in developing controls to insure that they aid, not
damage, our democratic freedoms.
[]
21

Engineering for Society
Dr. H. Guyford Stever
Director, National Science Foundation
1800 G St., N.W.
Washington, D. C. 20006

"The success of systems we are designing now and
will depend largely on the integrity of their parts.
we may expect will be no better than the quality
workmanship which we put into our technological

Throughout the ages engineers have made a great
contribution to society. That contribution has
created a complex technological civilization replete with many problems of a type, and on a scale,
that man has not had to face before. Engineering
can be a major factor in solving many of those problems. Furthermore, engineering is now on a course
that will see it performing an important new function in society, that of anticipating the needs of
society and creating systems that bring man, machine, and nature into a much more harmonious relationship -- that may prove essential to human
survival.
Traditional Role

If we consider the traditional role of engineering, even a cursory study of history will show that
engineers have been among the principal builders of
our civilizations. It is their accomplishments,
whether in war or peace, in the design and construction of buildings, in mining and manufacturing, in
transportation and communication, that have molded
our societies and directed much of the course of
history. Engineering predated science. And when
science came on the scene, it was engineering that
became one of its main bridges to society, that
helped transform its knowledge into action, its
theory into tangible human assets. In each age
engineering filled the need of the society of that
period, whether it was through the aqueducts that
allowed great cities to be created, the cathedrals
that acted as man's spiritual centers, or the road,
rails, ship, and aircraft that created nations and
joined continents.
It is true that each society, each civilization,
to some extent abused, overtaxed, or mismanaged the
gifts that engineers had given it, sometimes through
avarice, sometimes in ignorance, often because they
could not anticipate their long-term effects or
their relationship to other activities of society.
In most cases, engineering came to the rescue, offering new ideas, replacing technologies that became
unsuitable and helping to alleviate the problems
those technologies might have helped to create.
A New, "Ecological" Approach

But today the complexities of modern civilization demand that society and the engineer operate
Based on a talk given at the University of Rochester Symposium on
"Engineering in the Public Interest," Rochester, N.Y., Nov. 10, 1972

22

will live with in the future,
. . . The 'quality of life'
of design, materials, and
and social systems."

on a principle far more sophisticated than simply
responding to the feedback from individual problems. For while such problems must be attacked
individually -- whether they be air and water pollution, the conservation of natural resources or
the providing of human amenities -- they must also
be dealt with in terms of their broader relationship within our technological society. The new engineer is charged, therefore, not only to refine
and expand his knowledge and skills on the most
scientific principles, but to go beyond the traditional disciplines and provide both humanistic and
mechanistic systems to create and sustain a higher
quality of life. This "ecological" approach to engineering provides the engineer with unparalleled
opportunity for problem solving. It gives him the
chance to apply the methodology and techniques of
engineering to more of the physical and human
problems of the world. It also calls for a new
dimension of engineering, a new demand on engineering genius. (This is not inappropriate, as the
word "engineer" had its roots in the Latin word
"ingenium," an invention or product of genius. I
think we've come a long way since then, as the original "ingenium" was the battering ram.)
What is involved in this new challenge to engineers? What kinds of demands might be made on them?
What innovations might be expected of them? And
what might some of their educational requirements
be? Let us briefly consider these subjects.
Upgrading Present Technologies

To respond fully to the new opportunities for
engineering, engineers will have to work on several
levels and on problems of various dimensions and
complexity. There will be specific problems and
systems problems. Many of the specific problems
include the upgrading of known technologies and the
improvement of quality and design of materials, machines, structures, products, and services now in
use. We must make these safer, more durable, more
efficient, and more environmentally and aesthetically acceptable -- even while working within economic constraints. This is a tall order, but one
essential to fill. For the success of systems we
are designing now and will live with in the future
will depend largely on the integrity of their parts.
In thi s regard, the "quali ty of life" we may expect
will be no better than the quality of design, materials, and workmanship which we put into our
technological and social systems. Engineers can
COMPUTERS and AUTOMATION for March. 1973

exert an upgrading influence throughout society by
emphasizing this message -- both directly through
their work and indirectly through their role as concerned citizens.

values. These alternative solutions, some related
to major allocations of resources and the need for
changes in institutions and life styles, could call
for many large-scale changes and trade-offs in our
society.

Developing Innovations
Applications of Systems Science

b

At the same time that engineers are at work upgrading known technologies, they will be working
toward the replacement of those technologies. Innovations will have to be developed, tested, and
integrated into the new systems we are creating. A
prime example of this can be found in the field of
energy where, as we clean up our fossil fuel plants
and improve our nuclear fission power systems, we
work toward the possibility of fusion power and the
use of solar and geothermal energy. Other examples
lie in industrial processes, transportation, and
communication. With the speed and variety of communications and data processing these days, it seems
incredible that we can expect significant change in
these areas. Yet the new work in optical communications -- bringing together such fields as physical optics and electromagnetic propagation, quantum theory and quantum electronics, and communications theory and engineering -- holds many exciting possibilities.
Three Kinds of Systems

In addition to upgrading conventional technologies and devising their replacements, engineers
work on still another level which is becoming increasingly important to society. This relates to
the relatively new field of systems science and engineering. While engineers have been working with
small-scale and medium-scale systems for some time,
more attention is now being devoted to large-scale
systems -- both mechanistic and human.
Let me make the distinction between these three
types of systems by offering a few brief examples:
-,Small-scale systems typically are those such
as motors, generators, electronic circuits in
radios and TV sets, and crude macroscopic
models of parts of biological and economic
systems.
-Examples of medium-scale systems are mInI-computers, aircraft systems, major components of
manufacturing plants, and small-scale organizations such as hospitals or department stores.

o

- In large-scale systems, some examples of a
mechanistic system might be the nationwide air
traffic control system, urban transportation
or communications systems, air defense systems,
or models for weather prediction. Typical of
the humanistic system would be large-scale
organizations such as political, religious, or
social groups, or large-scale models of biological and economic systems.
Another way of distinguishing the scale of these
systems is by the size of the computer necessary to
model their mathematical relationships and solve
their problems.
Systems science and engineering, particularly
when involving the large-scale systems, brings engineers into a whole new realm of work giving them
an expanded role in society. A major part of this
role involves using the sophisticated techniques of
systems analysis to identify problems and create
alternative solutions that decision-makers can apply, based on consideration of public goals and
COMPUTERS and AUTOMATION for March. 1973

There are many problem areas in our society which
will benefit from the application of systems science
and engineering. When we learn how to understand
and deal with our cities and their surrounding suburbs as urban systems, for example, we will be better equipped to control and direct the growth of
those cities as well as plan new ones. Applying
systems analysis to our transportation problems
will enable us to plan and build transportation systems that will move more people more efficiently,
hopefully in comfort and with less environmental
impact. And systems science and engineering can
help us deal with our energy problems in a way that
more rationally considers the balance between the
need for power and the depletion of resources and
the degradation of the environment.
Other broad areas that will benefit from the analysis and planning of systems science and engineering are municipal services -- such as the allocation of police, fire, and ambulance services -health care, criminal justice, education, and economic development.
Human Values of Large Systems

As large as these systems seem, even they must
be considered in terms of their influence on each
other. Where engineers may truly shape the direction of society is in those areas where they present the public with alternatives that call for balancing the advantages of one large-scale system
against another and calling for a new value judgment
on the part of society. For example, a total telecommunications system could raise questions about
how much human mobility is necessary when most information, many services, and business and social
contacts could be made available by instant and complete electronic communications. This, of course,
raises the question of the human value of personal
mobility and contact.
Systems science and engineering, particularly on
a large scale, is a relatively new field -- and the
current state of the art can best be described as
primitive. Much experimentation will have to be
conducted in conjunction with the modeling of system
dynamics. This will include such things as the
modeling of performance criteria. And there is
bound to be much debate -- much useful debate -over the validity and usefulness of many large-scale
models. Typical of this are the disagreements over
the global forecasts in the "Limits to Growth" study
prepared by Dennis Meadows and his associates. Such
models, however, may have the beneficial effect of
stimulating increased social and technological activities to avoid some of the more dire conditions
forecast.
By way of emphasizing the importance of systems'
science and engineering and its recognition on an
international scale, it is interesting to note that
we have just signed with the U.S.S.R. and ten other
nations an agreement to establish an International
Institute of Applied Systems Analysis. This new
"think tank," as the newspapers refer to it, will be
located near Vienna in Austria and will seek solutions to many of the problems of global development,
industrialization, and the environment.
23

N':!w Directions in Engineering Education

It is obvious that these new activities and directions in engineering will place a new and different burden on engineering education. One demand
on engineering education resulting from the new directions will be to broaden its scope and outlook.
A number of programs at colleges and universities
are changing to accomplish this.

Weinmeister - Continued from page 10

cessing manager use modern computer technology to
do a better job?" The answer is an unqualified,
"Yes". But the course must be clearly set.
Setting the Course for Improvement

One that we at NSF have supported is "The Experimental Approach in Undergraduate Engineering" at
Illinois Institute of Technology. This program will
completely restructure the undergraduate engineering
curriculum, using an approach in which problems of
a broad scope will be posed to project groups of
from 4 to 15 students. With factual information
provided by modules developed to make self-instruction possible, the faculty will be able to concentrate its efforts on these aspects of teaching which
require personal interaction with the students.

The first step in setting the course is to establish the departure point. The data processing
manager should inventory his present operation. He
should see just what capabilities his computer hardware has. He should require that his top programmers completely understand the operating subsystem
and the associated data management subsystem. He
should appoint a data base administrator who determines what is in the data base and where redundant
data elements are. It is emphasized that this is a
learning process to establish a point of departure.

An experiment at Worcester Polytechnic Institute
broadens its approach even further by eliminating
traditional courses and degree requirements and substituting a flexible curriculum tailored to the
goals of individual students. In this program, students will demonstrate competence in their field by
completing two independent study projects and undergoing a comprehensive evaluation. Their projects
could be conducted on campus or at internship centers at Government agencies, industrial corporations, or private labs.

Once the manager's position has been established
he is ready to launch into the computer solar system
that has previously been described. (Figure 1) He
should begin with one selected application from the
most sophisticated requestor. He will have probably
found a timely, flexible data base module that belongs to this most sophisticated requestor's function. The data processing manager should choose his
most creative programmer and ask him to get the requestor's data in a minimum time using the most expeditious method.

Solving Man-Machine Problems

Creative Programming

One of the problems our new engineers will face
increasingly is dealing with the interface between
man and machine. At the University of Colorado, we
are supporting a project that will involve engineers
in studying the interaction of humans and computers,
seeking to make the machines more compatible with
the people who use them. The director of the project estimates that in the next five years this program will be able to supply industry with some 400
graduate engineers qualified to solve man-machine
problems. Of course, the man-machine relationship
does not always pose a problem. For example, in
evaluating their experience with the PLATO IV computer-assisted instruction in being taught Latin,
a group of first-year college students said that the
computer was a more considerate teacher than most of
the human ones they had had.

The creative programmer will probably use a remote terminal and the highest level query language
to get to the data base, manipulate and display the
information required. This programmer has set the
course for incremental growth to maximum utilization
of the people -- software -- data base -- computer
combination. After the first trip is successfully
completed, others should be made as required by the
situation.

These are only a few examples of programs that
are considering the new needs of engineering education. There are a great many more, and they will
continue to grow. Of continuing importance, however, is of course the pursuit of excellence in the
traditional engineering disciplines, so that as we
broaden our engineering activities and goals we do
so on a strong, firm foundation. For while we must
have engineers who understand the needs of society,
they must also be engineers who know and can meet
the demands of engineering. This is so often forgotten in the new rush to relevance.
In summary then, I believe we have entered a new
era of "Engineering Enlightenment" -- both from the
standpoint of what the engineer can do and what is
expected of him. His power has increased and so has
his responsibility. The demands on him will be
broader and also more stringent. And I believe that
his new responsibilities and the successful way he
carries them out will elevate his position in society and bring him many new rewards.
[]

24

This suggestion is not intended to imply that all
applications should be on-line real time. Earlier
it was stated that programs would take on the priority associated with the request. Standard products (reports, bills, bank statements, etc.) will
continue to be run on a scheduled batch basis. Establ i shment of the correct type of program and thei r
associated priorities will become increasingly important.
As the data base concept is implemented; as the
data becomes more current and correct because it is
gathered at the source; as all the power of the
operating and data management subsystems are brought
together to query the data base; as innovative ways
are developed to utilize the time sharing capabilities of the computer through remote entry terminals;
as the programmers begin to use the relatively inexpensive computer power to develop programs more
quickly while conserving people resourses; as the
data elements needed by company management are analyzed to see which can be put in the computer; as
data base administrators realize that all management
data will never be in the computer; as all of these
factors come into focus; the data processing manager
can set his own course into the computer celestial
solar system. After he has set this course he will
become more responsive to his requestors. When he
enters this computer galaxy he will discover its
name is "Management Information System".
[]

COMPUTERS and AUTOMATION for March. 1973

o

Cooley - Continued from page 17

troducing this high capital equipment, and they make
their attitude to human beings absolutely clear.
Arnold Weinstock, as head of the GEC, is the man who
said, "People are like elastic. The more work you
give them the more they stretch." We know, however,
as engineers that all materials nave elastic limit,
and when stretched beyond that limit the material
breaks, and we see more and more those in industry
who have been stretched to their limit and have broken, and the result is nervous disorders and neurosis. One of Arnold Weinstock's managers boasted
once of him, "He takes people and he squeezes them
'til their pips squeak." I think it is a pretty
sick society that will boast of behaviour of this
kind.
Since we are assembled here as an international
trade union gathering, it is important that we understand our international responsibilities one to
the other. The giant monopolies which are now introducing this kind of equipment in their own interests are also restructuring themselves on an
international basis. It is our experience in Britain, when our members or those of other trade unions stand up and demand decent working conditions,
these monopolies threaten to move to other countries. It is important that we demonstrate our international solidarity by preventing them from setting one set of workers against the other. It is
also vitally important that we understand our responsibilities as designers and technologists, our
responsibilities to society as a whole and the class
to which we belong.
So concerned are we about the problems which stem
from technological change that my union has produced
a book, "Computer Aided Design - Its Nature and
Implications," which analyses some of these problems. As a service to the community as a whole and
the trade union movement in particular we are circulating this booklet free. Any members of any
trade union in any country who wish to have copies
may obtain them from our Head Office.
Technology Good or Bad - An Extension of Man

One is frequently asked if technological change
is a good or a bad thing. This is really a nonquestion. It depends entirely on how technology is
used, and who controls it. We need not have any
fear of technological change. It is in fact merely
an extension of man's own capabilities. Historically, man sought to extend his eyes by using telescopes, ranging from the time of Galileo to today
using radar and radio telescopes. He extended muscular power through mechanisation, and his energy he
extended and increased through the harnessing of
nuclear power. Even the most sensitive faculty of
man, that of memory and his nervous system, he has
now in many ways extended by the decision-making
techniques used through computers. It was us, and
people like us, who used their great skill and ingenuity to create all this technological change.
Members of my union desire earnestly to be able
to use that skill and ingenuity to provide the basis
for a more full and dignified existence for the community as a whole. This drive for scientific knowledge "into that un travelled land whose margin fades
for ever and for ever when I move" is to be welcomed. Indeed, it is one of the guarantees of our
future prosperity. It must not, however, be a blind
unthinking drive forward. We must ensure that technology is introduced to serve the interests of the
people as a whole, and not to maximise profits for
the few.
0
COMPUTERS and AUTOMATION for March, 1973

NUMBLES
Neil Macdonald
Assistant Editor
Computers and Automation
A "numble" is an arithmetical problem in which: digits
have been replaced by capital letters; and there are two
messages, one which can be read right away and a second
one in the digit cipher. The problem is to solve for the
digits.
Each capital letter in the arithmetical problem stands for
just one digit 0 to 9. A digit may be represented by more
than one letter. The second message, which is expressed in
numerical digits, is to be translated (using the same key)
into letters so that it may be read; but the spelling uses
puns or is otherwise irregular, to discourage cryptanalytic
methods of deciphering.
We invite our readers to send us solutions, together with
human programs or computer programs which will produce
the solutions. This month's Numble was contributed by:
Andrew M. Langer
Newton High School
Newton, Mass.

NUMBLE 733

M 0 N E Y

1= Y

xiS

O=N

OTALML
NWMMLW
SOBTOI

L

69441 0328

Solution to Numble 732

In Numble 732 in the February issue, the digits 0
through 9 are represented by letters as follows:

B=O

1=5

M=1

0=6

H=2

E=7

S=3

L=8

V=4

R,C = 9

The message is: Love covers blemishes.
Our thanks to the following individuals for submitting
their solutions - to Numble 731: T. P. Finn, Indianapolis,
Ind. - to Numble 7212: Marijoe Bestgen, Lenexa, Kan.
25

The Watergate Crime and the Cover-Up Strategy
Richard E. Sprague
Hartsdale, N. Y. 10530

"Evidence of conspiracy certainly cannot be seen or discovered unless you open
your eyes and go looking for it."

Introduction

This article is another installment of a continuing report on the Watergate Crime, its ramifications,
and related espionage and "agent provocateur" activities, closely associated with President Richard M.
Nixon, and the Republican "Commi ttee to Re-Elect the
President", and leading Republicans.
The Watergate Crime

Five men, backed up by two others now called the
"Watergate 7", broke into Democratic National Headquarters in the Watergate Hotel, Washington, D.C.
on June 17, 1972. Their purpose was to remove buggi ng devi ces they had planted there a few weeks earlier. All seven were arrested, indicted, and tried
in court in Washington under Judge Sirica in January, 1973.
Five of them, Bernard Barker, Frank Sturgis, E.
Howard Hunt, Virgilio Gonzalez, and Eugenio Martinez, pleaded guilty. The other two, Gordon Liddy
and James McCord, pleaded not guilty, but were convicted on several counts.
The Segretti Affair

The Segretti Affair is related to the Watergate
Crime in that evidence points toward E. Howard Hunt
having been coordinator for both sets of espionage
activities. Donald Segretti was carrying out extensive, nation-wide spying projects, apparently at
the request of, and financing by, the Republican
"Committee for the Re-election of the President".
According to newspaper reports in the autumn of
1972, these projects were aimed at "digging up dirt"
about the leading Democratic presidential candidates and their financial contributors. Segretti
telephoned Hunt many, many times in 1972, and met
with him on a few occasions, apparently to receive
instructions. Segretti remains free because the
Justice Department, headed by the Nixon appointee
At torney General Kleindienst, "does not believe" he
committed any crimes.
Cover Ups

Any doubts about whether Richard Nixon and his
associates would seek to cover up the truth about
these affai rs, were removed when the Wa tergate tria 1
took place in Washington, D.C. The Jan. 1973 article in Computers and Automation and People, enti tled
"President Richard M. Nixon, the Bay of Pigs, and
the Watergate Incident," mentioned six separate investigations, suits and trials which Mr. Nixon and
the executive branch machinery had slowed down.
covered up, suppressed or stopped. The government
26

trial of the seven men was one of these. After delaying the trial beyond the November elections, the
Nixon strategy for cover up in the trial itself
took an interesting n~w form. It has been used once
or twice before in the past few years by the Federal Government in delicate situations like Watergate. The most notable case was the "trial" of
James Earl Ray in Memphis, Tenn., for the assassination of Dr. Martin Luther King.
The strategy consists of working out a pre-arranged "deal" between the defendants and their attorneys and the prosecution in which the defendants
plead guilty in eXChange for some form of guaranteed
or implied protection, remuneration, or pardon. The
judge mayor may not be party to the arrangement.
The important thing is that neither prosecuting attorneys nor defense attorneys will present any witnesses or ask any questions that could prove embarrassing to the President, or to the federal agencies
involved in the cover up.
James Earl Ray Trial

Harold Weisberg, in his book Frame Up2 has called
this technique the "Mini Trial," in describing how
Percy Foreman, Ray's lawyer, the district attorney
for Memphis, Pat Canale, and Judge Battle, handled
the case. No evidence about what actually happened
was ever presented. No witnesses were presented except the minimum number for the prosecution to summarize the presumed case against Ray. Ray pleaded
guilty because Foreman had convinced him that he
would be out of jail in a few years. Ray was also
convinced by Foreman that if he pleaded not guilty,
he would be sentenced to death. Ray's new appeal is
partially based on this illegal arrangement which
did involve at least the Federal Government (the
FBI), the district attorney (Canale), the defense
attorney (Foreman), and the judge.
Sirhan Sirhan Trial

Some of the same techniques may have been used in
the trial of Sirhan for the assassination of Robert
Kennedy. It is not certain that the defense attorneys, Grant Cooper and Russell Parsons, were party
to the cover up in the trial. The judge and the
district attorney, Evelle Younger, certainly did not
present the basic evidence of conspiracy in the
case, nor did the defense attorneys. The judge cut
off the testimony of Coroner Tom Noguchi on the autopsy of Senator Kennedy. If it had been made part
of the record, it would have been the most important
evidence of conspiracy.3
The evidence from the conducting of the Sirhan
trial and its aftermath, points toward a cover up
conspiracy involving at least the Federal GovernCOMPUTERS and AUTOMA liON for March, 1973

ment (the FBI and the Justice Department), the district attorney, the Los Angeles police department,
and the judge.
The Watergate Trial

The cover up technique required in the case of
the Watergate 7 was much trickier, even though the
general pre-arrangement strategy was obviously used.
First of all, there were a lot more people involved
who, unfortunately for the conspirators, surfaced.
Also, they were known publicly to be CIA men. Secondly, the news media, as well as the public and
Congress, were more aroused and suspicious, as compared to the situation when Robert Kennedy was assassinated and when Sirhan was tried. Suspicions
still exist about the King killing and James Earl
Ray, but Percy Foreman is held in such general overall esteem and Ray's guilty plea and subsequent escape attempts meant that the news media have not
pressed that case.
Third, there was another less controllable investigation scheduled by Senator Sam Ervin's Committee and possibly a second one by Senator Ted
Kennedy's subcommittee.
For these reasons, Nixon's strategy had to be
somewhat more complex and devious. Those making
the arrangements -- Charles Colson, H. R. Haldeman,
John Erlichman, Richard Kleindeinst, Patrick Gray,
John Mitchell, Maurice Stans, E. Howard Hunt, the
lawyers for the defendants, and the prosecuting
attorney, Earl J. Silbert -- had to be extremely
careful, and entirely "off the record" in planning
the trial. It appears that Judge John Sirica was .
not made party to the cover up arrangement, or if
he was, he played his role like a Hollywood actor,
to the hilt. There were four basic parts to the
strategy.
The "Line of Innocence," Part 1 of Strategy

The lawyer for G. Gordon Liddy, Peter L. Maroulis,
defined part one of the strategy when he used the
phrase "line of innocence" on the last day of the
trial, Jan. 30, 1973, in his summation. He said
that Liddy thought the other six defendants were
engaged in a legitimate intelligence operation and
he (Liddy) was, like other officials at Nixon headquarters, "on the safe side of the line of innocence".
Nixon saw the obvious last summer. It would be
necessary to draw a definite line somewhere between
himself and the first five men arrested. All those
on one side of the line would have to be considered
gUilty and be "sacrificed," with suitable secret arrangements made for their later pardons, paroles,
support, etc. Those above the line would be considered innocent and would be supplied with all the
Presidential back-up required to take the "innocent
and ignorant" stance. Lying before grand juries,
federal judges, and Congressional committees would
be necessary and sanctioned for the good of the Republican party, the President and the United States.
This troupe grew larger as the weeks and months
passed and the Washington Post, Newsweek, Time, The
New York Times and others put on the pressure and
certain trustworthy sources began leaking information. Those required to lie in court were restricted by using executive priviledge, and other means.
Nevertheless, a stream of government "witnesses"
lied through their teeth before Judge Sirica and the
jury. The lying became so blatant that Sirica blew
his top several times and took over the questioning
of witnesses only to be told more lies.
COMPUTERS and AUTOMATION for March. 1973

Place yourself in the position of Hugh Sloan,
Jr., former treasurer of the Committee to Re-Elect
the President, one of those chosen to be above the
line of innocence. Would you lie to the judge if
you knew you were doing it for your President?
Sloan told Sirica and the jury that he met G. Gordon
Liddy at the CRP headquarters only hours after the
five men were arrested. Liddy said to Sloan, "My
boys were caught last night; I made a mistake by
using somebody from here (meaning James McCord
from CRP headquarters) which I told them I would
never do. I'm afraid I'm going to lose my job."
Sirica never did ask who "them" was, nor did Silbert or anyone else. However, Sirica was bothered
enough by Sloan's testimony to send the jury out
of the court and to question Sloan directly. He
asked whether Sloan hadn't found Liddy's remark
highly suspicious at the time. Sloan obviously
lied when he said, "No".
Alfred Baldwin 3rd, a former FBI agent who
helped Hunt, Liddy, McCord, Barker and the others
monitor the telephone taps and bugs in the Democratic offices, was placed on the safe side of the
line of innocence by making him a witness for the
prosecution with "immunity" in exchange for testifying. He obviously lied to Judge Sirica when he
said he could not remember the name of a Republican
committee official to whom he had delivered a transcript of the eavesdropping information. Sirica
knew he was lying and asked when he had suffered
this lapse of memory. Baldwin replied he started to
forget the name as soon as the FBI began questioning
him about it: Baldwin then testified about a package at the trial. On Jan. 19 he said that he had
delivered a package with the name of the official at
Nixon re-election headquarters to whom it was addressed, actually written on the outside of the
package. Baldwin said he could not remember the
name he himself wrote on the package.
There were many more obvious liars. Those on the
guilty side of the line of innocence lied according
to Nixon's pre-arranged script in one direction.
Those on the other side lied according to script in
another direction. It was like watching a well-rehearsed play unfold in which the audience knew the
plot in advance. The third act is coming up with
the Ervin inquiries. The question is whether the
lies and the script will hold up during this phase.
One possibility for Nixon is to cut off the play
after the second act, by preventing the Ervin hearings altogether. More about that later. The list
of liars at the trial and the grand jury hearings
included: Bernard Barker, Howard Hunt, James McCord,
Gordon Liddy, Virgilio Gonzalez, Eugenio Martinez,
Frank Sturgis, Baldwin, Sloan, Maurice Stans, John
Mitchell, Jeb Stuart Magruder, Herbert Porter, Robert OdIe, Douglas Caddy, Erlichman, and Haldeman.
Some of these men took executive privilege or
merely submitted affidavits rather than lying outright.
The Guilty Pleas, Part 2 of Strategy

The second part of the strategy was to plan for
the CIA people involved to plead guilty in order to
avoid testifying and to avoid presenting any evidence or witnesses conc~rning their role and especially their motives and connections with Mr.
Nixon, wealthy Cubans, the Mafia and the CIA from
past history. The guilty pleas were obviously arranged for in advance of the trial and then suddenly "sprung" on the judge and the public in an
attempt to make it look like Hunt had late second
thoughts. The other four, Barker, Sturgis, Gonzalez and Martinez, waited for a day or two to make
it look like they had followed their leader.
27

The enticements for pleading guilty and staying
on that side of the line of innocence seem to have
been quite varied. Bernard Barker hinted at one
form of encouragement when he talked to The 'New York
Times last September, about patriotic acts in an
espionage environment. He said, "I don't talk,
period. When the time comes, I will face up to
whatever responsibilities I have, and I won't cry
in my beer, and that will be the end of it. If I
have to go to jail and so forth -- well, I did 16
months in a German prison camp and this sure as bell
isn't going to be as bad as that." Barker, Martinez,
and Gonzalez seem to be motivated by what they consider to be pure patriotism. On the other hand, E.
Howard Hunt told Time magazine (Jan. 29 edition)
that "his people" were prepared to put up plenty of
money for the defense of the men. He said that his
"friends" would offer each man $1000 for each month
spent in prison.
Newsweek (Feb. 5 edition) reported that, "Hunt
held out the promise of financial support and a
'Presidential pardon' to get the others to follow
suit in pleading guilty. Reliable sources said
that the four Miami men had 'no doubt' that they
had been working for Mitchell and Stans -- and that
they had been persuaded by Hunt that they could expect pardons when the publicity died down." The New
York Times added (Jan. 13) reports from "sources
close to the case" that the Miami four were still
being paid by persons unnamed right up to the trial
date. Payments were said to average $400 a month
and up. Frank Sturgis admitted this to reporters,
but said the current payments represented sharp reductions from what he had been getting for awhile
after he was arrested.
Hunt's incentives may have involved money from
Nixon supporters also. But he may be counting on
another income source. He announced on the William
Buckley television program (Jan. 23) that he has
completed a new book about the Bay of Pigs and his
role in it. Hunt looked very composed on the show,
and not much like a man who has just lost his wife
in an airplane crash or just pleaded guilty in an
espionage case. He received a compliment from an
anti-Castro lawyer from Miami who said he was a
great, patriotic American, by calmly blowing smoke
from his cigar. In fact, he looked just like a CIA
man who has the President of the United States behind him all the way.
Not Guilty Pleas, Part 3 of Strategy

Some may argue, why didn't James McCord and Gordon Liddy plead guilty, too, if the mini trial
strategy was to be successful? A little logic and a
knowledge of law supplies the answer. If all seven
men had pleaded guilty, the trial would have been
over and there would have been no appeal. All seven
could be called before a grand jury or a Congressional committee and they could not take the fifth
amendment. Since McCord and Liddy pleaded not _
guilty and were found guilty, an appeal possibility
has been set up, with the long sequence of delays
that a series of appeals all the way to the Supreme
Court implies. Liddy and McCord, at least, could
not be forced to testify before a Congressional committee while these appeals were under way. The
strategy, then, may be to block Senator Ervin's committee from any effective inquiry for perhaps a year
or two. A motion may even be filed to halt ~ inquiry or questioning until Liddy and McCords' appeals have been exhausted. If that maneuver is not
successful, at least the men who can be called are
reduced to the five who Nixon can count on to continue lying for their boss.
28

That this may be the strategy is indicated by
lawyer Gerald Alch, representing James McCord, who
stated to reporters after McCord was found guilty,
that he would file an appeal and that Senator Ervin
would not be able to subpoena McCord while the appeals case was under way.
Patriotic Motives, Part 4 of Strategy

The fourth part of Nixon's strategy is a mixture
of emotional fact and fantasy. The concept is that
all seven men were motivated by the patriotic call
to duty for President and country. Men like Barker
could well believe this with all their heart. People as cool and detached as Liddy and Hunt are more
likely to be faking it for strategic purposes. The
patriotic motives varied from Barker's stated purpose of keeping Communists like McGovern out of the
White House, to Sturgis' ideas about combatting
left-wing demonstrators on the streets in Miami during the Republican convention. James McCord and his
lawyer came up with a "beaut". They argued before
Judge Sirica, with the jury out of the room, that
McCord had acted under "duress" to protect the President. He said he had been motivated by a fear of
violence against Mr. Nixon and other Republicans,
planned by radical groups linked to the Democrats.
He said he felt justified in planting bugs at Democratic headquarters to effectuate the defense of
President Nixon. McCord was, after all, chief of
security for the Committee to Re-Elect the President. He was presumably responsible for protecting
the President during the Republican convention.
Judge Sirica showed he has a sense of humor when
he said to Alch and McCord, "All Mr. McCord had to
do if he felt Republican officials were in danger
was to call the FBI, the Secret Service or the police. The Republican National Committee is just
another political organization. They don't have all
the rights in the world; you know they don't have
the right to hire someone to go in and bug the Democratic National Commi t t,ee."
The Donald Segretti Affair

On Jan. 28 a story broke in The New York Times
that Dwight L. Chapin, President Nixon's appointments secretary, had decided to leave the White
House staff. One high ranking administration official told The New York Times that Chapin was being
forced to leave as a result of the Segretti affair.
This brought back recollections of stories making
headlines in Oct. before the election. Segretti
had travelled allover the U.S. hiring young people
to plant false information, to spy on Democrats and
to collect data for the Nixon Re-Election committee.
His old University of Southern California buddy,
Dwight Chapin, had obviously been one of his contacts in the White House. Analysis of his telephone bill showed several calls to Chapin's office
and home in the spring of 1972. A Segretti friend
from U.S.C. told the Washington Post that Chapin was
the chief Washington contact for a nation-wide espionage operation financed by a secret fund from reelection committee headquarters.
The New York Times reported that H.R. H~ldeman~
White House chief of staff and Chapin's boss, asked
him to quit right away in Nov. after the election.
Chapin protested bitterly, telling Haldeman his
prospects for getting a job would be lessened if he
became the White House scapegoat for Mr. Segretti's
espionage activities. That statement certainly
makes it sound as though someone higher up was really responsible. Chapin told Haldeman, according to
The New York Times' source, that he would "blow the
COMPUTERS and AUTOMATION for March. 1973

whistle" if he was immediately dismissed. Haldeman
then agreed to let him stay on for awhile until
things cooled down and agreed to help him find a
jOb.

The White House denounced the Segretti reports
in Oct., and denied The New York Times' story about
Chapin being forced out. Ronald Ziegler, the President's press secretary said the article was absolutely unfounded and untrue. He referred to The
New York Times as "the publication that servesthe
city located on the northeastern tip of the United
States". Ron Ziegler, Donald Segretti and Dwight
Chapin all just happen to be old student friends
from the University of Southern California, President Nixon's home ground area.
FBI Cover Up

The intent to cover up the truth about Segretti's
operation was clearly indicated by Attorney General
Richard Kleindienst on Oct. 24, when he told newsmen
that no inquiry into Mr. Segretti's activities was
planned because as of that date no evidence had come
to the Department of Justice that would indicate the
violation of a Federal law. On Jan. 29, The New
York Times published an article stating that the
FBI made no attempt to investigate fully the political espionage and sabotage activities of Donald
Segretti. Justice Department officials learned of
some of Mr. Segretti's activities within weeks after
the Watergate arrests, but decided then that his
actions were legal and therefore beyond the scope of
an extensive FBI inquiry. Although Segretti and
Hunt met at least twice and conversed by phone many
times, the FBI made no effort to determine who
placed Segretti in contact with Hunt. White House
officials have repeatedly stated they knew nothing
about either Segretti's espionage operation, or the
Hunt-Liddy operation prior to June 17, 1972.
Part of the cover up strategy with Segretti has
been a Nixon-FBI-Justice Department carefully orchestrated plan to make sure he says the right
things. Lawrence R. Young, another U.S.C. close
friend of Segretti, Ziegler and Chapin, has told
newspapers that Segretti said Nixon's aides coached
him before his grand jury appearance.
Another Justice Department official who happens
to be a Democrat, Henry E. Petersen, apparently was
asked to check Segretti for criminal violations and
since he had no affirmative recommendations from
anybody, therefore called off any further investigations. This is reminiscent of three assassination inquiries and the position of former Justice
Earl Warren, who still says he has seen no evidence
of conspiracy. It certainly cannot be seen or discovered if you don't open your eyes and go looking
for it. The real criminals are not going to call
up the FBI and tell them where and how to look for
evidence.
Political "Law of the Jungle"

Among things the FBI might have learned, and
might have been unhappy to have discovered about
Donald Segretti is a particular plan linking Hunt
and Segretti to something much worse than political
espionage. According to Lawrence Young, who was
never interviewed by the FBI, he could have told
them about a Miami meeting between Hunt and Segretti
which took place in the spring of 1972. Hunt told
Segretti about a plan to hire Cuban refugees to pose
as McGovern supporters and tear up the inside of the
Doral Hotel where George McGovern had his convention
headquarters.
COMPUTERS and AUTOMATION for March, 1973

In the article in the Oct. 1972 issue of Computers
and Automation several activities were described as
having been part of the plans of Hunt, Barker, apd
Sturgis for Miami. This new report from Young further reinforces the idea that a situation might have
been the ultimate Watergate and Segretti objective.
Apparently, this possibility has occurred to
someone on the editorial staff of The New York Times
as well. In the Jan. 18, 1973 edition, the following remarks appeared in the lead editorial, entitled
"Veil Over Watergate".
"Chief Judge John J. Sirica spoke for a host of
incredulous observers at the Watergate trial when he
told defendant Bernard Barker that he simply did not
believe his story that $144,000 had arrived in unmarked envelopes from sources unknown .... Defense
counsel Gerald Alch tried to cloak his clients' acts
of political espionage in a mantle of patriotism.
The violence which the defendants wanted to intercept. he said, would have been directed against 'Republican officials, including but not limited to,
the President' .... Guided only by hallucinations akin
to the anti-Castro fanaticism that motivated the
hirelings in the Watergate plot, any individuals or
groups could feel free to take up arms or utilize
any other repressive measures their paranoid suppositions dictated. Such a political law of the
jungle might readily lead from protective espionage
to defensive assassination."
What is There to Hide?

With all of these extensive, widespread efforts
on Nixon's part to cover up the truth about Watergate and Segretti, the curious person cannot help
wondering and asking, "What else is he trying to
hide? Isn't there more to it than just political
sabotage and espionage?"
There is more. These questions will be examined
and discussed in another article in an early issue
of this magazine.
Footnotes

1. The first four articles were published in Computers and Automation in August, October, December, 1972, and January, 1973.
2. Harold Weisberg, Frame Up, New York, 1971.
3. This evidence is discussed in detail in Richard
E. Sprague, "The Assassination of Senator
Robert F. Kennedy: Proofs of Conspiracy and of
Two Persons Firing," Computers and Automation,
September, 1972.
References

A. Books
Flammonde, Paris. The Kennedy Conspiracy. New
York: Meredith Press, 1969.
Warren Commission Hearings and Exhibits (Vol. XXVI),
pages 546-650.
Weisberg, Harold. Frame Up. New York: Outerbridge
and Dientsfrey, 1971.
B. Magazine Articles
Parade Magazine (May 14, 1961), interview by Jack
Anderson with Frank Fiorini (Sturgis).
Sprague, Richard E. Watergate articles. Computers
and Automation (Aug., Oct., Nov., Dec., 1972,
Jan. 1973),
Sprague, Richard E. "The Assassination of Senator
Robert F. Kennedy: Proofs of Conspiracy and of
Two Persons Firing." Computers and Automation
(Sept. 1972),
29

Gerth. "Nixon and the Mafia." Sundance magazine
(Nov.-Dec. 1972).
"Watergate: The Cost Shrinks." Newsweek (Jan. 22,
1973), p. 23.
"Trials: The Spy in the Cold." Time (Jan. 29, 1973),
p. 17.
"The Watergate Case." Newsweek (Feb. 5, 1973), p. 29.
,C. Newspaper Stories, Television and Other
District Attorney's files. Orleans Parish, New
Orleans, La.
"Watergate Trial Opens; Jury Screening Begins." The
New York Times (Jan. 9, 1973).
"Secret G.O.P. Fund Described at Trial." Washington
Star (Jan. II, 1973).
Anderson, Jack. "Watergate Figures May Talk."
White Plains Reporter Dispatch (Jan. II, 1973).
"Watergate Trial Hears Hunt Offer to Plead Guil ty."
The New York Times (Jan. II, 1973).
"Hunt Admits All 6 Charges as Judge Bars Partial
Plea." The New York Times (Jan. 12, 1973).
"Hunt Declares No Higher Ups in Plot." Washington
Star (Jan. 12, 1973).
"Six in jWatergate Case Implicated by Witness."
Washington Star (Jan. 12, 1973).
"More Guil ty Pleas Hinted Amid Watergate Secrecy."
The New York Times (Jan. 13, 1973).
Editorial. "Watergate, Mystery, Comedy - And Dirty
Tri cks. " The New York Times (Jan. 14, 1973).
"Watergate Defendants Reported Still Being Paid."
The New York Times (Jan. 14, 1973).
"Four More Admit Guilt as Spies in Watergate." The
New York Times (Jan. 16, 1973).
"Watergate Judge is Called Firm and Nonpartisan."
The New York Times (Jan. 16, 1973).
Reston, James (edi toriaU. "The Watergate Spies."
The New York Times (Jan. 17, 1973).
"Watergate Defendant to Plead He Acted to Forestall
Violence." The New York Times (Jan. 17, 1973).
Edi torial. "Veil Over Watergate." The New York
Times (Jan. 18, 1973).
"Watergate Trial in Closed Session." The New York
Times (Jan. 18, 1973).
"U.S. Hints Blackmail as Motive in Watergate Case."
The New York Times (Jan. 19, 1973).
"Watergate Trial is Told G.O.P. Got Wiretap Data."
The New York Times (Jan. 20, 1973).
"Judge Queries Watergate Witness Who Can't Recall
to Whom He Sent Wiretap Data." The New York
Times (Jan. 23, 1973).
Buckley, William. Television program. Jan. 23,
1973.
"Mitchell Linked to $199,000 Fund." The New York
Times (Jan. 24, 1973).
"Watergate Judge Assails Argument by Defense." The
New York Times (Jan. 25, 1973).
Anderson, Jack. "Watergate Dia·ry." Whi te Plains
Reporter DispatCh (Jan. 26, 1973).
"Nixon Aide Reported Being Forced Out." The New
York Times (Jan. 29, 1973).
"Prosecution Tested in Watergate Trial." The New
York Times (Jan. 29, 1973).
"Both Sides Rest in the Watergate Trial: Judge and
Prosecutor Differ on Scope of Case." The New
York Times (Jan. 30, 1973).
"F. B. 1. Did No Full Study of Reported G. O. P. Spy."
The New York Times (Jan. 30, 1973).
"White House Says Nixon Aide is Leaving but Denies
Pressure." The New York Times (Jan. 30, 1973).
"Liddy and McCord Are Guilty of Spying on the Democrats." The New York Times (Jan. 31, 1973).
Editorial. "Watergate Conviction." The New York
Times (Feb. I, 1973).
"Kennedy Panel Says Government Inquiry on Bugging
Was Limited." The New York Times (Feb. 2, 1973),
"Watergate Judge Wants U.S. to Revive Its Inquiry."
The New York Times (Feb. 3, 1973).
[]

30

PROBLEM CORNER
Walter Penney, COP
Problem Editor
Computers and Automation

PROBLEM 733: A RANDOM WALK

"What's that, a graph of our booming economy?" asked
Mike, looking at the chart Pete was drawing. It looked
like a series of gradually rising sawtooth peaks.
"No, it's actually a random walk problem I'm trying to
program."
"Doesn't look like the usual random walk with all those
segments sloping up and down."
"Well, this is a little different. In this version only diagonal steps up or down are permitted. That is, segments
connect grid points at opposite vertices of a unit square."
Mike studied the diagram a moment. "These steps seem
to go up or down, but they all go to the right. Are steps
to the left allowed?" he asked.
"No. This base line is supposed to represent time. It's
all part of a big simulation project."
"What are you trying to program then?"
"Well," said Pete, "one of the problems is to determine
the prob~bility of getting to the top. There are five stages
in this model and I'm trying to figure the chance of getting through all five."
"Let's see, you could succeed in as few as five time
units then, couldn't you?"
"Yes, but there's only a 1/32 chance of that since at
each point a step up or down is equally likely."
"You could just have the computer do it, say, 10,000
times, with random sequences of 1's and O's, 1 for up and
o for down - make a real random walk out of it."
"I could, but I don't think that will be necessary."
What is the value of the probability Pete is trying to
calculate?
Solution to Problem 732: Seance Seating

There were three couples. If men and women alternate
there are 3 ! 2 ! or 12 ways of arranging themselves. If
there is no restriction this number is 5 ! or 120.

ADVERTISING INDEX
Following is the index of advertisements. Each item contains: name and address of the advertiser I name of the agency, if any I page number where the advertisement appears.

THE C&A NOTEBOOK ON COMMON SENSE, ELEMENTARY AND ADVANCED, published by Computers and
Automation and People, 815 Washington St., Newtonville, Mass. 02160 / Pages 2,3
COMPUTERS AND AUTOMATION AND PEOPLE, 815
Washington St., Newtonville, Mass. 02160 / Pages 38, 51
GML CORPORATION, 594 Marrett Road, Lexington,
Mass. 02173/ Page 39
WHO'S WHO IN COMPUTERS AND DATA PROCESSING,
jointly published by Quadrangle Books (a New York
Times Company) and Berkeley Enterprises, Inc., 815
Washington St., Newtonville, Mass. 02160 / Page 52
COMPUTERS and AUTOMATION for March. 1973

U.

s.

Electronic Espionage: A Memoir

Part 2
Ramparts
2054 University A venue
Berkeley, Calif. 94704

"One of the instructors gave us a big lecture about classifying material and
he said that it was necessary because it would only confuse the American
people to be let in on this data. He used those exact words. As a matter
of fact, I used those words when I was training the people who worked
under me."

6

Ramparts' interviewee was not identified in
the original article. However, Ramparts later
introduced him to the press at a news conference
in California. He was 26-year-old anti-war acti vi st Perry Fellwock of San Diego. Perry Fellwock enli sted in the Air Force in 1966 at the
age of 20. He was subsequently recruited by
the National Security Agency for specialized
training, and was later promoted to Staff Sergeant. In November 1969, he was discharged from
military service after 3 years of overseas duty.
He has served as a communications traffic analyst for the National Security Agency in Istanbul, Turkey, West Germany and Indochina.
In a New York Times interview publi shed
July 19, 1972, Perry Fellwock stated his reason
for leaving as disillusionment with the National
Security Agency's activities. He said:
My experience with the U.S. Government
and its global mission has convinced me
that the most dangerous threat to me, my
family and to world peace itself, is the
American military.
He asserted that to bring security and peace
to the United States:
We must take steps to insure that there
are no more Vietnams. I believe I have
taken such a step. I have done it for
neither money nor glory, but to bring \0
the American people knowledge of which
they have a 'need to know'.
Introduction

Part 1 of this article appeared in last month's
issue of Computers and Automation and People. The
National Security Agency, created in 1952, employs
upWards of 15,000 civilian and military personnel
to gather, analyze and disseminate over 80 percent
of the viable intelligence received by the U.S.
government. All of this information is gathered
technologically, by deciphering electronic, radar,
and especially radio communications of other nations. The activities cover the communications of
"allies" as well as "enemies", the chief "target"
however being the Soviet Union. Peck suggested in
Reprinted with permission from Ramparts, August 1972, copyright by
Ramparts Magazine, 2054 University Ave., Berkeley, Calif. 94704.

COMPUTERS and AUTOMATION for March, 1973

Part 1 that the completeness and precision of this
intelligence operation practically destroys any
"balance of terror" in the world, since the United
States' information on Soviet military installations puts the United States much closer to a
crippling first-strike capacity than is generally
supposed. In addition, Soviet military and intelligence operations are, he noted, aimed almost entirely at defense.

Q. While you were monitoring the Soviet Union
what sort of intelligence would have been considered
very important or serious?
A. In a way you do this almost routinely. That
is, there are certain times that the activities of a
targeted entity are of such an important nature that
a special type of report has to be sent out. It is
called a CRITIC. This is sent around the world to a
communications network called CRITICOM. The people
in this network, besides NSA (National Security
Agency), are those in other intelligence or diplomatic capacities who might come across intelligence
of such importance themselves that the President of
the United States would need to be immediately notified. When a CRITIC goes out, one analyst working
alone can't do it. There is just too great a volume
of material to correlate.

Q. What would be an example of something sent
out as a CRITIC?
A. Well, one of the strangest I ever read was
sent out by our base at Crete. One of the analysts
there sent a CRITIC because he had traced a Soviet
bomber that landed in the middle of Lake Baikal. He
knew it hadn't crashed from the type of communications he monitored, and he thought they had developed a new generation of bombers able to land on
water. It turned out to be a bad mistake because he
neglected to remember that about three-fourths of
the year this lake is completely frozen over.
But actually this sort of thing is rare. Most
CRITICs are based on good reasoning and data. You
work around the clock, sometimes for 30 hours at a
stretch putting things together. These are the times
that the job stops being routine. I guess it's why
they have a saying about the work in NSA: "Hours of
boredom and seconds of terror."

Q. Did you ever issue a CRITIC?
31

A. Yes, several. During Czechoslovakia, for instance, when it became clear the Soviets were moving
their troops up. We also issued a number of CRITICs
during the Mideast War of 1967.

Q. Why?
A. Well, I was part of an analysis team that was
predicting the war at least two months before it began. I guess we issued our first CRITIC on this in
April. We did it on the basis of two sources. One,
we and the Crete station had both been picking up
data as early as early February that the Israelis
had a massive build-up of arms, a massing of men and
material, war exercises, increased level of penetration of Arab territory -- just everything a country
does to prepare for war. Two, there were indications
that the Soviets were convinced there was going to be
a war. We knew this from the traffic we had on diplomatic briefings sent down from Moscow to a commanding general of a particular region. And by April
they had sent their VTA airborne, their version of
Special Forces paratroopers, to Bulgaria. Normally,
they're based in the Trans-Caucasus, and we knew
from their contingency plans that Bulgaria was a
launching point for the Middle East. Plus some of
these forces were being given cram-courses in Israeli
and Arabic languages.

Q. All this leaves the sequence of events that immediately preceded the Six Day War -- the various
countercharges, the UN pullout, the closing of the
Straits -- still pretty obscure. Did NSA evidence
clear this up?
A. No. Not really. But one of the things that
confused us at first was the fact that until the
last days before the war the Arabs weren't doing
anything to prepare. They weren't being trained
how to scramble their air force. This is why there
was such total chaos when the Israelis struck.

Q. How did the White House react to your reports
about all thi s?
A, Well, in every message we sent out, we always
put in our comments at the end -- there's a place
for this in the report form -- and they'd say something like "Believe there is some preparation for
unexpected Israeli attack. Request your comments."
They didn't exactly ignore it. They'd send back,
"Believe this deserves further analysis", which means
something like, "We don't really believe you, but
keep sending us information". Actually, we all got
special citations when the whole thing was over.

Q. Why didn't they believe you?
A. I suppose because the Israelis were assuring
them that they were not going to attack and Johnson
was buying it.

Q. You remember about the "Liberty," the communications ship we sent in along the coast which was
torpedoed by Israeli gunboats? The official word at
the time was that the whole thing was a mistake.
Johnson calls it a "heartbreaking episode" in The
Vantage Point. How does this square with your information?
A. The whole idea of sending the "Liberty" in was
that at that point the U.S. simply didn't know what
was going on. We sent it in really close so that we
could find out hard information about what the Israelis' intentions were. What it found out, among
other things, was that Dayan's intentions were to
push on to Damascus and to Cairo. The Israelis shot
at the "Liberty", damaged it pretty badly and killed
32

some of the crew, and told it to stay away. After
this it got very tense. It became pretty clear that
the White House had gotten caught with its pants down.

Q. What were the Russians doing?
A. The VTA airborne was loaded into planes. They
took off from Bulgaria and their intention was
clearly to make a troop drop on Israel. At this
point it became pretty clear that we were approaching
a situation where World War III could get touched off
at any time. Johnson got on the hot line and told
them that we were headed for a conflict if they didn't
turn these planes around. They did.

Q. Was it just these airborne units that were on
the move?
A. No. There was all kinds of other action too.
Some of their naval forces had started to move, and
there was increased activity in their long-range
bombers.

Q. What about this idea that Dayan had decided to
push on to the cities you mentioned. What happened
there?
A. He was called back, partly because of U.S.
pressure, partly by people in the Israeli political
infrastructure. He was somewhat chastised and never
given back total control of the Army.

Q. How do you know this?
A. Like I said earlier, NSA monitors every government. This includes Tel Aviv. All the diplomatic
signals from the capital to the front and back again
were intercepted. Also at this same time we were
copying the French, who were very much involved on
both sides playing a sort of diplomatic good offices
between Cairo and Tel Aviv. As far as Dayan is concerned, the information came from informal notes from
analysts at Crete who were closer to the situation
than we were. Analysts send these informal notes
from one station to another to keep each other informed about what is happening. One of the notes I
got from Crete said Dayan had been called back from
the field and reprimanded. Obviously, by this time
the Israelis were getting heat from the U.S.

Q. What did the Russians do after the situation
cooled down a bit?
A. Immediately after the war -- well, not even
afterwards, but towards the end -- they began the
most massive airlift in the history of the world to
Cairo and Damascus. Supplies, food and some medical
equipment, but mostly arms and planes. They sent in
MIG-21s fully assembled, fueled, and ready to fly in
the bellies of their big 10-10s. At landing the
doors would open, and the MIGs would rollout, ready
to go. Also there was quite a bit of political maneuvering inside the Soviet Union right afterwards.
I don't quite remember the details, but it was
mainly in the military, not in the Politbureau.

Q. We routinely monitor the communications of
allies like Israel?
A. Of course.

Q. What other sorts of things do we learn?
A. Practically everything. For instance, we
know that the Israelis were preparing nuclear weapons at their development site at Dimona. Once the
U.S. Ambassador to Israel visited there. They had
COMPUTERS and AUTOMATION for March, 1973

been calling it a textile plant as a cover, and when
he went there they presented him with a new suit. It
was a charade, you know. They didn't have warheads
deployed then, but they were close to it. I'm sure
they must have a delivery system in operation by
now. It was said that American scientific advisors
were helping them in this development. I mean it
was said on the intelligence grapevine. I didn't
know it for a fact. But this grapevine is usually
fairly accurate.
Q. All of the material you've been discussing is
classified?
A. Almost all of it.
Q. Who classified it?
A. I did. Analysts in NSA did. In the Agency,
the lowest classification is CONFIDENTIAL. Anything
not otherwise classified is CONFIDENTIAL. But SIGINT
(Signals Intelligence) data is super-classified,
meaning that only those in the SIGINT community have
access to it, and then only on a "need-to-know"
basis. A lot of t~e stuff I'd work with was SECRET
and TOP SECRET, which is the highest classification
of all. But after a whi Ie it occurred to me that we
classified our stuff only partly because of the
enemy. It seemed like they were almost as interested in keeping things from the American public as
from the Soviets. Hell, I'd give top secret classifications to weather reports we intercepted from Soviet subs. Certainly the Soviets knew that data. I
remember when I was in school back in San Angelo one
of the instructors gave us a big lecture about
classifying material and he said that it was necessary because it would only confuse the American people to be let in on this data. He used those exact
words. As a matter of fact, I used those words
when I was training the people who worked under me.
Q. How did you relate to our allies in intelligence matters?
A. I'll have to digress for a moment to answer
that. The SIGINT community was defined by a TOP
SECRET treaty signed in 1947. It was called the
UKUSA treaty. The National Security Agency signed
for the U.S. and became what's called the First
Party to the Treaty. Great Britain's GCHQ signed
for them, the CBNRC for Canada, and DSD for Australia/New Zealand. They're all called Second Parties. In addition, several countries have signed
on -- ranging from West Germany to Japan -- over
the years as is supposed to be a general agreement
not to restrict data. Of course it doesn't work
out this way in practice. The Third Party countries receive absolutely no material from us, while
we get anything they have, although generally it's
of pretty low quality. We also worked with socalled neutrals who weren't parties to the UKUSA
treaty. They'd sell us intelligence. For instance,
the Finns were selling us everything they could collect over radar on their Russian border.
As it works out, the treaty is a one-way street.
We violate it even with our Second Party allies by
monitoring their communications constantly.

monitors all their communications, and the NSA unit
in our embassy in London monitors the lower-level
stuff from Whitehall. Again, technology is the key.
These allies can't maintain security even if they
want to. They're all working with machines we gave
them. There's no chance for them to be on par with
us technologically.
There's the illusion of cooperation, though. We
used to go to Frankfurt occasionally for briefings.
The headquarters of NSA Europe, the European Security region, and several other departments in the
SIGINT community are located there, inside the I.G.
Farben building. We'd run into people from GCHQ
there, and from the other countries. It was all
fairly cordial. As a matter of a fact, I got to
respect the English analysts very highly. They're
real professionals in GCHQ, and some are master
analysts. They'll stay on the job for twenty-five
or thirty years and learn a lot. The CGG is also
located in the I.G. Farben building. That's the
West German COMINT agency. Most of them are exNazis. We used to harass them by sieg heil-ing
them whenever we saw them.
Once I briefed Hubert Humphrey at the I.G. Farben building. It was in 1967, when he was vicepresident. The briefing concerned the Soviet tactical air force and what it was capable of doing.
It was all quite routine. He asked a couple of
pretti dumb questions that showed he didn't have
the foggiest notion of what NSA was and what it did.
Q. But you said that you often sent reports directly to the White House.
A. Yes, I did. But the material that goes there
is cleaned of any reference as to where the intelligence comes from. Every morning the President
gets a daily intelligence summary compiled by the
CIA. This information will probably contain a good
deal from the NSA in it, but it won't say where it
came from and the means used to collect it. That's
how a man like the vice-president could be totally
ignorant of the way intelligence is generated.
Q. So far we've been talking about various kinds
of sophisticated electronic intelligence gathering.
What about tapping of ground communications?
A. I'm not sure on the extent of this, but I
know that the NSA mission in the Moscow embassy has
done some tapping there. Of course all trans-Atlantic and trans-Pacific telephone calls to or from
the U.S. are tapped.
Every conversation
personal, commercial, whatever -- is automatically intercepted and recorded on
tapes. Most of these no one ever listens to and,
after being held available for a few weeks, are
erased. They'll run a random sort through all the
tapes, listening to a certain number to determine
if there is anything in them of interest to our
government worth holding on to and transcribing.
Also, certain telephone conversations are routinely
listened ~o as soon as possible. These will be the
ones that are made by people doing an inordinate
amount of calling overseas, or are otherwise flagged
for special interest.

Q. Do they know this?
A. Probably. In part, we're allowed to do it for
COMSEC purposes under NATO. COMSEC, thatis communications security. There's supposed to be a random
checking of security procedures. But I know we also
monitor their diplomatic stuff constantly. In England, for instance, our Chicksands installation
. COMPUTERS and AUTOMATION for March, 1973

Q. What about Africa?
lations there?

Does the NSA have instal-

A. Yes, one in Ethiopia on the East Coast and in
Morocco on the West Coast. These cover northern Africa, parts of the Mediterranean, and parts of the
Mideast .
33

Q. Do they ever gather intelligence on African
insurgents?
A. I went to Africa once for a vacation. I understood that there were DSUs, that's direct support units, working against Mozambique, Tanzania,
Angola, those countries. These DUSs are in naval
units off the coast. They are tasked with two
problems: first, they copy the indigenous Portuguese forces; and second, they copy the liberation
forces.
Q. Is the information used in any way against
the guerrila s?
A. I don't know for sure. But I'd be surprised
if it wasn't. There is informntion being gathered.
This intelligence is fed back to NSA-Europe, of
course. It has no strategic value to us, so it's
passed on to NATO -- one of our consumers. Portugal is part of NATO, so it gets the information. I
know that U.S. naval units were DFing the liberation
forces. That's direction finding. The way it
worked was that the ship would get a signal, people
on board would analyze it to see if it came from
guerrillas, say, in Angola. Then they'd correlate
with our installation in Ethiopia, which had also
intercepted it, and pinpoint the source.
Q. Did you ever have any doubts about what you
were doing?
A. Not really, not at this time, It was a good
job. I was just 21 years old; I had a lot of operators working under me; I got to travel a lot -- to
Frankfurt, for instance, at least twice a month for
briefings. I was considered a sort of whiz kid,
and had been since I'd been in school back in San
Angelo. I guess you could say that I had internalized all the stuff about being a member of an elite
that they had given us.· I was advancing very rapidly, partly because of a turnover in personnel
that happened to hit at the time I came to Turkey,
and partly because I liked what I was doing and
worked like crazy and always took more than other
analysts. But, like I said earlier, I had developed a different attitude toward the Soviet Union.
I didn't see them as an enemy or anything like that.
Everyone I worked with felt pretty much the same. We
were both protagonists in a big game -- that's the
view we had. We felt very superior to the CIA people we'd occasionally come in contact with. We had
a lot of friction with them, and we guarded our information from them very carefully.
Q. Was there a lot of what you'd call esprit de
corps among the NSA people there?
A. In some ways, yes; in other ways, no. Yes, in
the sense that there were a lot who were like me -eating, drinking, sleeping NSA. The very fact that
you have the highest security clearance there is,
makes you think a certain way. You're set off from
the rest of humanity. Like one of the rules was -and this was first set out when we were back at San
Angelo -- that we couldn't have drugs like sodium
pentothal used on us in medical emergencies, at
least not in the way they're used on most people.
You know, truth-type drugs. I remember once one of
our analysts cracked up his car in Turkey and banged
himself up pretty good. He was semi-conscious and
in the hospital. They had one doctor and one nurse,
both with security clearances, who tended him. And
one of us was always in the room with him to make
sure that while he was delirious he didn't talk too
loud. Let me say again that all the material you
deal with, the code words and all, becomes part of
34

you. I'd find myself dreaming in code. And to
this day when I hear certain TOP SECRET code words
something in me snaps.
But in spite of all this, there's a lot of corruption too. Quite a few people in NSA are into
illegal activities of one kind or another. It's
taken to be one of the fringe benefits of the job.
You know, enhancing your pocketbook. Practically
everybody is into some kind of smuggling. I didn't
see any heroin dealings or anything like that, like
I later saw among CIA people when I got to Nam, but
most of us, me included, did some kind of smuggling
on the side. Everything from small-time black marketeering of cigarettes or currency all the way up
to the transportation of vehicles, refrigerators,
that sort of thing. One time in Europe I knew of a
couple of people inside NSA who were stationed in
Frankfurt and got involved in the white slave trade.
Can you believe that? They were transporting women
who'd been kidnapped from Europe to Mideast sheikdoms aboard security airplanes. It was perfect for
any kind of activity of that kind. There's no customs or anything like that for NSA people. Myself,
I was involved in the transportation of money. A
lot of us would pool our cash, buy up various restricted currencies on our travels, and then exchange it at a favorable rate. I'd make a couple
of thousand dollars each time. It was a lark. My
base pay was $600 a month, and looking back I figure that I made at least double that by what you'd
call manipulating currency. It sounds pretty gross,
I know, but the feeling was, "What the hell, nobody's getting hurt". It's hard for me to relate
to the whole thing now. Looking back, it's like
that was another person doing those things and feeling those feelings.
Q. All this sounds like a pretty good deal -the job, what you call the fringe benefits, and all
that. Why did you go to Vietnam?
A. Well, I'd been in Istanbul for over two years,
that's one ,thing. And second, well, Vietnam was
the big thing that was happening. I wasn't for the
war, exactly, but I wasn't against it either. A lot
of people in Europe were going there, and I wanted
to go to see what was happening. It doesn't sound
like much of a reason now, but that was it.
Q. You volunteered?
A. Right. For Vietnam and for flying.
turned me down for both.

They

Q. Why?
A. Because of my classification. What I knew
was too delicate to have me wandering around in a
war zone. If I got captured, I'd know too much.
That sort of thing. But I pulled some strings. I'd
made what you'd call high-ranking friends, you know.
Finally I got to go. First I had a long vacation
went to Paris for awhile and that sort of thing.
Then I was sent back to the U.S. for schooling.
Q. What sort of schooling?
A. It was in Texas, near Brownsville. I learned
a little Vietnamese and a lot about ARDF -- that's
airborne radio direction finding. It was totally
different from what I'd been doing. It was totally
practical. No more strategic stuff, just practical
analysis. I had to shift my whole way of thinking
around. I was going to be in these big EC-47s -airborne platforms they were called -- locating the
enemy's ground forces.
COMPUTERS and AUTOMATION for March. 1973

After this first phase in Texas, I went to a
couple of Air Force bases here in California and
learned how to jump out of planes, and then up to
Washington state to survival school. This was three
weeks and no fun at all. It wa s cold as hell, I
guess so we could learn to survive in the jungle.
Never did figure that one out. We did things like
getting dropped up in the mountains in defense teams
and learn E&E -- that's the process of escape and
evasion. Youct'ivide the. three-man team up into certain functions ~ one guy scrounges for food, the·
other tries to learn the lay of the land, that sort
of thing. We were out for two days with half a
parachute and a knife between us. Strangely enough,
we did manage to build a snare and catch-a rabbif.
We cooked it over a fire we built with some matches
we smuggled. It was awful. We'd also smuggled
five candy bars, though, and they were pretty good.
Then we got captured by some soldiers wearing black
pajamas. They put us in cells and tried to break
us. It was a game, but they played it serious even
though we didn't. It had its ludicrous moments.
They played Joan Baez peacenik songs over the loudspeaker. This was supposed to make us think that
the people back home didn't support us anymore and
we'd better defect. We dug the music, of course.
After this, I slipped out.

Q. How long were you in Vietnam?
A. Thirteen months, from 1968 to 1969.

Q. Where were you stationed?
A.

In Pleiku most of the time.

Q. Is that where the major intelligence work
is done?
A. No, there's a unit in Da Nang that does most
of the longer-range work, and the major unit is at
Phu Bai. It's the most secure base in Vietnam. An
old French base, just below Hue and completely surrounded by a mine field. It's under attack right
now. The people based there -- a couple thousand
of them -- will probably be the last ones out of
Vietnam. I don't know if you know of this or not,
but the first American killed in Vietnam was at Phu
Bai. He was in NSA, working on short-range direction finding out of an armored personnel carrier -you know, one of those vans with an antenna on top.
It was in 1954. We were told this to build up our
esprit de corps.

Q.

So what kinds of things did you do there?

A. Like I said, radio direction finding is the
big thing, the primary mission. There are several
collection techniques used there. Almost all of
them are involved with the airborne platforms I mentioned. They are C-47s, "gooney birds," with an E
in front of the C-47 because they're involved in
electronic warfare. The missions go by different
names. Our program was Combat Cougar. We had two
or three operators on board and an analyst, which
was me. The plane was filled with electronic gear,
radios and special DF-ing equipment, about $4 million worth of it, all computerized and very sophisticated. The technology seemed to turn over about
every five months. As a sideline, I might tell you
that an earlier version of this equipment was used
in Bolivia, along with infrared detectors, to help
track down Che Guevara.

Q.

So what would be your specific mission?

A. Combat Cougar planes would take off and fly
a particular orbit in a particular part of IndoCOMPUTERS and AUTOMATION for March. 1973

china. We were primarily tasked for low-level information. That is, we'd be looking for enemy ground
units fighting or about to be fighting. This was our
A-I priority. As soon as we located one of these
units through our direction finding, we'd fix it.
This fix would be triangulated with fixes made by
other airborne platforms, a medium-range direction
finding outfit on the ground, or even from ships.
Then we'd send the ·fix to the DSUs on the ground -that's direct support units ~ at Phu Bai or Pleiku.
They'd run it through their cbmputers and call in
B-52s or artillery strikes ..

Q.

How high did you fly?

A. It was supposed to be 8000 feet, but we
couldn't get close enough, so we went down to 3000.

Q. You hear a lot about seismic and acoustic
sensors and that sort of thing being used. How did
this fit into what you were doing?
A. Not at all. They aren't that effective. A
lot of them get damaged when they land; some of them
start sending signals and get stuck; others are
picked up by the Vietnamese and tampered with. Those
that come through intact can't tell civilian frommilitary movements. Whatever data is collected from
sensors on the trail and at the DMZ is never acted
on until correlated with our data.

Q. How did the NVA and NLF troops communicate
their battle orders? They seem to take us by surprise, while from what you said earlier the Soviet
Union can't.
A. That's because there are no grand battle orders except in a few cases. Almost everything is
decided at a low level in the field. That's why
most of our intelligence was directed toward these
low-level communications I've been talking about.
NSA operations in Vietnam are entirely tactical,
supporting military operations. Even the long-range
stuff, on North Vietnamese air defense and diplomacy, on shipping in and out of Haiphong -- the data
collected at Da Nang, Clark Air Force Base in the
Philippines and somewhat in Thailand -- is used in
a t~ctical sense only. It's for our bombers going
into North Vietnam. They aren't engaged in probing
or testing the defenses of a targeted entity like
in Europe. It's all geared around the location of
enemy forces.

Q. What would be the effect if the U.S. had to
vacate ground installations like the ones you've
mentioned?
A. Well, we wouldn't have that good intelligence
about the capabilities of the North Vietnamese to
shoot our planes down. We wouldn't know what their
radar was doing or could do, where their ground-toair missile sites were, when their MIGs were going
to scramble. We'd still be able to DF their troops
in the field of course. That won't change until
our air forces, including the airborne platforms I
flew on, go out too.

Q. NVA and NLF troops must have some sort of
counter-measures to use against operations like the
one you were in. Otherwise they wouldn't be as effective as they are.
A. Basically you're right, although you shouldn't
under-estimate the kind of damage done by the
strikes we called in as a result of our direction
finding. To a certain extent, though, the Vietnamese have developed a way to counteract our technigues. Their headquarters in the North is known
35

as MRTTH -- Military Region Tri Tin Hue. It is
located on the other side of the Valley, somewhere
just into Laos. MRTTH has a vast complex of antennas strung allover the jungle. When they're transmitting orders, they play with the switchboard, and
the signal goes out over a several-mile area from
these different antennas. When you're up in one of
these airborne platforms, the effect is like this:
you get a signal and fix it. First it will be nine
miles in one direction and then, say, twelve miles
in another, and fifteen in another. We never found
MRTTH. It's one of the high priorities.

A. There are forces we'd classify as VC and others
as NVA, yes. But it was for identification, like
the call signs on Soviet planes. The VC forces
tended to merge, break apart, then regroup, often
composed differently from what they were before. As
far as the NVA is concerned, we'd use the same names
they were called back home, like the 20th regiment.
Hanoi controls infiltration, some troops. and supplies coming down the Trail. But once they get to a
certain area, MRTTH takes over. And practically
speaking, MRTTH is controlled by the NLF-PRG.

Q. How did you know that?

Q. But you'd say that the sort of data you collected through DF-ing had some effect?
A. Right, generally. At least in locating field
units. It also leads to some large actions. For
instance, the first bombing that ever occurred from
ARDF data occurred in 1968. There was an area about
19 kilometers southwest of Hue that we'd been flying
over. Some of the. communications we collected and a
pattern analysis that was performed on it indicated
that there were quite a few NVA or VC units concentrated in a small area, about a mile in diameter.
General Abrams personally ordered the largest B-52
raid ~hat had ever taken place in Vietnam at the
time. There was one sortie an hour for thirty-six
hours, thirty tons dropped by each sortie on the
area. Afterwards it was just devastated. I mean
it was wasted. It was a long time before they
could even send helicopters into the area to evaluate the strike because of the stench of burning
flesh. On the perimeter of the area there were
Vietnamese that had died just from the concussion.
The thing of it was, though, there wasn't any way
to tell which of the dead were military and which
were civilian, It was pretty notorious. Afterwards, it was called Abrams Acres. It was one of
the things that began to turn me off to the war.

Q. You've said that your A-I priority was locating enemy units on the ground. What were the other
targets?
A. Mainly supplies, We tried, not too successfully, to pinpoint their supply capabilities. All
along the Trail the Vietnamese have these gigantic
underground warehouses known as "bantrams", where
either men or supplies are housed. The idea is
that in case of an offensive like the one that's
going on now, they don't have to go north for supplies. They've got them right there in these bantrams, enough to last for a long time at a fairly
high level of military activity. They had about
11 bantrams when I was there. We knew where they
were within twenty-five or thirty miles, but no
closer. I remember the first Dewey Canyon invasion of Laos. I flew support for it. It happened
because the 9th Marines went in there to locate a
couple of bantrams. Their general was convinced
he was going to end the war. It was a real macho
trip. He got called back by the White House pretty
quick, though, when his command got Slaughtered.

Q. What about the idea of an invasion from the
north.

How does thi s equate wi th what you collected?

A. It doesn't. There's no invasion. The entire
Vietnamese operation against Saigon and the U.S. is
one unified military command throughout Indochina.
Really, it's almost one country. They don't recognize borders: that's seen in their whole way of
looking at things, their whole way of fighting.

Q. But you made a distinction between VC and NVA
forces, didn't you?
36

A. We broke their messages all the time.
knew the political infrastructure.

We

Q. You mean that your intelligence would have in
its official report that this MRTTH base, which was
on the other side of the Ashau Valley, was controlled by the NLF?
A. Of course. Hanoi didn't control that area
operationally. MRTTH controls the whole DMZ area.
Everything above Da Nang to Vinh. The people in
control are in the NLF. MRTTH makes the decisions
for its area. Put it this way: it is an autonomous
political and military entity.

Q. What you're saying is that in order to gather
intelligence and operate militarily, you go on the
assumption that there is one enemy? That the NLF
is not subordinate to the North Vietnamese Command?
A. Right. That's the way it is. This is one
thing I wish we could bring out. Intelligence
operates in a totally different way from politics.
The intelligence community generally states things
like they are. The political community interprets
this information, changes it, deletes some facts
and adds others. Take the CIA report that bombing
in Vietnam never really worked. That was common
knowledge over there. Our reports indicated it.
Infiltration always continued at a steady rate. But
of course nobody back at the military command or in
Washington ever paid any attention.

Q. What were some of the other high intelligence
priorities besides locating ground units, MRTTH,
and the bantrams?
A. One of the strange ones came from intelligence
reports we got from the field and copies from North
Vietnam. These reports indicated that the NLF had
two Americans fighting for them in the South. We did
special tasking on that. We were on the lookout for
ground messages containing any reference to these
Americans. Never found them, though.

Q. When you were there in Vietnam did you get an
idea of the scope of U.S. operations in Southeast
Asia, or were you just involved with these airborne
platforms exclusively?
A. I was pretty busy. But I took leaves, of
course, and I saw a lot of things. One thing that
never came out, for example, was that there was a
small war in Thailand in 1969. Some of the Meo
tribesmen were organized and attacked the Royal
Thai troops for control of their own area.

Q. What happened to them?
A. Well as you know, Thailand is pretty important
to us. A stable Thailand, I mean. CAS-Vientiane
and CAS-Bangkok were assigned to put down the uprisings.
COMPUTERS and AUTOMATION for March, 1973

Q. What does CAS mean?
A. That's the CIA's designation. Three of our
NSA planes were taken to Udorn, where the CIA is
based in Thailand, and flew direct support for CIA
operations against the Meos. We located where they
were through direction finding so the CIA planes
could go in and bomb them.

Q. You mean CIA advisors in Thai Air
planes?

Force

A. No. The CIA's own planes. They had their own
attack bombers, flown by their own spookies.
Q. Pilots?

A. Yes. The CIA has its own planes. Not Air
America -- those are commercial-type planes used
just for logistics support. I'm talking about CIA
military planes. They were unmarked attack bombers.

Q. What other covert CIA operations in the area
did you run into?
A. From the reports I saw, I knew there were CIA
people in Southern China, for instance, operating
as advisors and commanders of Nationalist Chinese
commando forces. It wasn't anything real big.
They'd go in and burn some villages, and generally
raise hell. The Chinese always called these "bandit
raids".

Q. What would be the objectives of these raids
besides harassment?
A. There's some intelligence probing. And quite
a bit if it is for control of the opium trade over
there. Nationalist Chinese regular officers are
occasionally called in to lead these maneuvers. For
that matter, there are also CIA-run Nationalist
Chinese forces that operate in Laos and even in
North Vietnam.
Q, Did you ever meet any of these CIA people?

A. Sure. Like I've said, I flew support for
their little war in Thailand. I remember one of
the guys there in Vientiane that we were doing communications for, said he'd been into Southern China
a couple of times.

Q. You got disillusioned with the whole Vietnam
business?
A. Yes.
Q.

Why?

A. Well, practically everybody hated it. Everybody except the lifers who were in the military before Vietnam. Even after that wasting of the area
called Abrams Acres that I told you about before,
everybody else was really sick about it, but these
lifers kept talking about all the commies we had
killed.
,For me, part of it was when we crashed in our
We'd just taken off and were at about 300
feet and it just came down. We crash-landed in a
river. We walked out of it, but I decided that
there was no easy way to get me into an airplane
after that. We got drunk that night, and afterwards I spent two weeks on leave in Bangkok. When
I got back to Saigon I got another three days vacation in Na Trang. The whole thing was getting under
my skin. I told them that I wasn't going to fly
anymore.
And mainly they left me alone. They
EC~47.

COMPUTERS and AUTOMATION for March, 1973

figured that I'd snap out of it. But finally they
asked me what my reasons for refusing to fly were.
I told them that it was crazy. I wasn't going to
crash anymore. I wasn't going to get shot at anymore, I was afraid. I told the flight operations
director that I wasn't going to do it anymore, I
don't care what was done to me. Strangely enough,
they let me alone. They decided after a few days
to make me Air Force liaison man up at Phu Bai. So
I spent the last three months up there correlating
data coming in from airborne platforms like the one
I'd flown in and sending DSU reports to the B-52s.
It happened all of a sudden, my feeling that the
whole war was rotten. I remember that up at Phu Bai
there were a couple of other analysts working with
me. We never talked about it, but we all wound up
sending the bombers to strange places -- mountain
tops, you know, where there weren't any people. We
were just biding our time till we got out. We were
ignoring priorities on our reports, that sert of
thing.
It's strange. When I first got to Nam, everybody
was still high about the war. But by the time I
left at the end of 1969, morale had broken down all
over the place. Pot had become a very big thing. We
were even smoking it on board the EC-47s when we
were supposed to be doing direction finding. And we
were the cream of the military, remember.
I loved my work at first. It was very exciting
travelling in Europe, the Middle East, Africa;
knowing all the secrets. It was my whole life, which
probably explains why I was better than others at
my job. But then I went to Nam, and it wasn't a
big game we were playing with the Soviets anymore.
It was killing people. My last three months in Nam
were very traumatic. I couldn't go on, but I wasn't
able to just quit. Not then. So I faked it. It was
all I could do. Now I wish I had just quit. If I
had stayed in Europe, I ~ight still be in NSA, I
might have re-enlisted. In a way, the war destroyed
me.

Q. What happened when you mustered

ou~?

A. Well, having the sort of credentials I had, I
had my pick of a lot of jobs. Some ex-NSA people
get jobs with private corporations. A lot of them
run their own SIGINT operations. For instance, oil
companies will have SIGINT against Middle East
sheikdoms that have pretty primitive intelligence
operations. But I didn't want to do this sort of
thing. NSA offered me a nice civilian job. The CIA
said they'd pay me a $10,000 bonus in two installments if I'd come to work with them -- $5000 on
signing up, and $5000 at the end of two years. They
said they'd give me a GS-9 rating -- that's about
$10,000 a year -- and promote me to GS-ll in a yearo
But I didn't want any of it.

Q. Why is it you wanted to tell all this?
A. It's hard for me to say. I haven't digested
it all; even though I've been out almost two years
now, I still feel as though I'm two people -- the
one who did all the things I've laid out and another,
different person who can't quite understand why. But
even being against the war, it's taken a long time
for me to want to say these things. I COUldn't have
done it nine months ago, not even three months ago.
Daniel Ellsberg's releasing the Pentagon Papers made
me want to talk. It's a burden; in a way I just
want to get rid of it. I don't want to get sentimental or corny about it, but I've made some friends
who love the Indochinese people. This is my own way
of loving them too.
[]
37

CALENDAR OF C'OMING EVENTS

Mar. 7-8, 1973: 1973 Annual Spring Conference of the Association
for Systems Management, Royal York Hotel, Toronto, Ontario /
contact: . Mr. R. H. Crawford, Comptroller's Department,
I mperial Oil Limited, 825 Don Mills Rd., Don Mills, Ontario,
Canada
Mar. 7-9, 1973: 6th Annual Simulation Symposium, Tampa, Fla. /
contact:
Annual Simulation Symposium, P.O. Box 22573,
Tampa, FL 33622
Mar. 9, 1973: 4th Annual AEDS Conference on the Development
and Evaluation of Educational Programs in Computer Science
and Data Processing, St. Louis, Mo. / contact: Ralph E. Lee,
P.O. Box 951, Rolla, MO 65401
Mar. 12-14, 1973:
A Programming language (APL), Goddard
Space Flight Center, Greenbelt, Md. / contact:
Cyrus J.
Creveling, Code 560, Goddard Space Flight Center, Greenbelt,
MD 20771
Mar. 26-28, 1973: Data Processing Institute's Conference and Trade
Show, Skyline and Holiday I nn Hotels, Ottawa, Canada / contact: Derek Hasler, Conference173, Box 2458, Ottawa, Canada
K1 P 5W6
Mar. 26-29, 1973: IEEE International Convention (lNTERCON),
Coliseum & New York Hilton Hotel, New York, N.Y. / contact:
J. H. Schumacher, IEEE, 345 E. 47th St., New York, NY 10017
Mar. 27-29, 1973: 1st Conference on Industrial Robot Technology,
University of Nottingham, England / contact: Organising Secretary, CI RT, Dept. of Production Engineering and Production
Management, University of Nottingham, Nottingham NG7 2RD,
England
Mar. 29-31, 1973: 10th Symposium on Biomathematics and Computer Science in the Life Sciences, Houston, Texas / contact:
Office of the Dean, The University of Texas Graduate School of
Biomedical Sciences at Houston, Division of Continuing Education, P.O. Box 20367, Houston, TX 77025
April 1-3, 1973: 10th Annual ASM Atlantic Systems Conference,
Ms.
Kutscher's Country Club, Monticello, N.Y. / contact:
Bertha Kitover, Group Health Inc., 227 W. 40th St., New York,
NY 10018
April 2-5, 1973: SOFTWARE ENGINEERING FOR TELECOMMUNICATION SWITCHING SYSTEMS, University of Essex,
Essex, England / contact: Mrs. Penelope Paterson, Institution
of Electrical Engineers Press Office, Savoy Place, London WC2R
OBl, England

April 30·May 2, 1973: .1st Symposium on Computer Software Reliability, Americana Hotel, New York, N.Y. / contact: David
Goldman, IEEE Hdqs., 345 E. 47th St., New York, NY 10017
May 2-3, 1973: 18th· Annual Data Processing Conference, Tuscaloosa, Ala. / contact: C. E. Adams, Director, Conference Activities, University of Alabama, Box 2987, University, A L 35486
May 2·5,1973: DECUS Spring Symposium, Holiday I nn, Penn Center, Philadelphia, Pa. / contact: DECUS, 146 Main St., Maynard,
MA 01754
May 3-4, 1973:
10th Annual National I nformation Retrieval
Colloquium, I ndependence Mall Holiday Inn, 400 Arch St.,
Philadelphia, Pa. / contact: Martin Nussbaum, Computamation,
2955 Kensington Ave., Philadelphia, PA 19134
May 13-16, 1973: 1973 International Systems Meeting, Hilton
Hotel, Denver, Colo. / contact: R. B. McCaffrey, Association
for Systems Management, 24587 Bagley Rd., Cleveland, OH
44138
May 14-16, 1973: DPSA International Meeting, Aperghi Hotel,
Athens, Greece / contact: C. A. Greathouse, DPSA, P.O. Box
1333, Stamford, CT 06904
June 4-6, 1973:
1973 8th PICA Conference, Radisson Hotel,
Minneapolis, Minn. / contact: IEEE Hdqs., Tech. SVC5., 345 E.
47th St., New York, NY 10017
June 4-8, 1973: National Computer Conference and Exposition,
Coliseum, New York, N.Y. / contact: AFIPS Hdqs., 210 Summit Ave., Montvale, NJ 07645
June 18-21, 1973: SIAM 1973 National Meet!ng, Sheraton Conference Center, Hampton, Va. / contact: SIAM, 33 S. 17th St.,
Philadelphia, PA 19103
June 20-22, 1973: Canadian Computer Conference, Hotel Macdonald, Edmonton, Alberta / contact: Mr. Jim Wilcox, P.O. Box
1881, Edmonton, Alberta, Canada T5J ZP3
June 22-23, 1973: 11 th Annual Computer Personnel Conference,
Univ. of Maryland Conference Center, College Park, Md. / contact: Prof. A. W. Stalnaker, College of I ndustrial Management,
Georgia Institute of Technology, Atlanta, GA 30332
June 26-28, 1973: Workshop of Computer Architecture, Universit~ de Grenoble, Grenoble, France / contact: Grenoble AccueiJ, 9, Boulevard Jean-Pain, 38000, Grenoble, France

April 10-12, 1973: Datafair 73, Nottingham University, Nottingham, England / contact: John Fowler & Partners Ltd., 6-8
Emeral St., London WC1 N 3QA, England

June 26-29, 1973: DPMA 1973 International Data Processing Conference & Business Exposition, Conrad Hilton Hotel, Chicago,
III. / contact: Richard H. Torp, DPMA International Hdqs., 505
Busse Highway, Park Ridge, I L 60068

April 10-13, 1973: PROLAMAT 73, Second International Conference on Programming languages for Numerically Controlled
Machine Tools, Budapest, Hungary / contact: I F I P Prolamat,
'73, Budapest 112, P.O. Box 63, Hungary

July 17-19, 1973: Summer Computer Simulation Conference,
Queen Elizabeth Hotel, Montreal, Canada / contact: Stuart
Trask, Sun Life Assurance Co. of Canada, P.O. Box 6075,
Montreal 101, P.Q., Canada

April 16-19, 1973: 11th Annual Association for Educational Data
Systems Convention, The New Orleans Marriott, New Orleans,
La. / contact: AEDS, 1201 16th St., N.W., Washington, DC
20036

July 20-22, 1973: 1973 International Conference of Computers in
the Humanities, University of Minnesota, Minneapolis, Minn. /
contact: Prof. Jay Leavitt, 114 Main Engineering Bldg., University of Minnesota, Minneapolis, MN 55455

April 24-26, 1973:
I.S.A. Joint Spring Conference, Stouffer's
Riverfront Inn, St. Louis, Mo. / contact: William P. lynes,
c/o Durkin Equipment, 2384 Centerline Ind. Dr., St. Louis, MO
63122

July 23-27, 1973: 3rd Annual International Computer Exposition
for Latin America, Maria Isabel-5heraton Hotel, Mexico City,
Mexico / contact: Seymour A. Robbins and Associates, 273
Merrison St., Box 566, Teaneck, NJ 07666

38

COMPUTERS and AUTOMATION for March, 1973

LOW COST PROFESSIONAL REVIEWS.
ONE NEW, THE OTHER IN ITS 12th
YEAR OF PUBLICATION. CONCISE AND
COMPLETE. REISSUED REGULARLY
TO KEEP YOU UP TO DATE.
COMPUTER CHARACTERISTICS
REVIEW

A time saving source which gives you the
distinguishing features of nearly 500 commercially available computers as well as
the peripherals they use.
Each computer is priced, and reviewed in
over 45 categories for easy comparison.

TERMINALS REVIEW

A guide for buyers, salesmen, engineers
and others who need to know the characteristics and prices of all keyboard remote
computer terminals marketed in the
United States.
Terminals Review covers:

The REVIEW does not editorialize but
simply presents facts for your evaluation.

Nonprinting (mostly CRT) numeric, al. phanumeric and graphic terminals.
Printing numeric, alphanumeric and
graphic terminals.
Rentals of KSR and ASR model teletypewriters from nationwide leasing companies.
Manufacturers Directory.

1 year (3 issues) $25. Foreign postage $3.

1 year (4 issues) $28. Foreign Postage $4.

Current Issue Vol. 12, No.3.

Current Issue Vol. 1, No.2

All associated peripherals are cross-referenced and reviewed as well.
Systems are categorized by size and
priced uniformly and exactly.

UNLIKE ANYTHING ON THE MARKET OR YOUR MONEY BACK

G ML

Corporation, 594 Marrett Road, Lexington, Massachusetts 02173

COMPUTERS and AUTOMATION for March. 1973

39

ACROSS THE EDITOR'S DESK

Computing and Data Processing Newsletter
Table of Contents
APPLICATIONS

Hempstead Bank's Chairman Calls "IT"
a Success
Psychiatric Interviews Conducted by Computer

MISCELLANEOUS

40
40

EDUCATION NEWS

First 12 Students Graduate from Computer
Hardware Education Center
Psychology Instructor Develops CAl Program
in Advanced Statistics

41
41

APPLICATIONS
HEMPSTEAD BANK'S CHAIRMAN
CALLS "IT" A SUCCESS

Arthur M. Farbizio
Assistant Vice President
Hempstead Bank
40 Main St.
Hempstead, N. Y. 11551

Bruce Wood Hall, Chairman of Hempstead Bank, Long
Island, New York, has labeled the bank's experiment
with the world's first checkless/cashless society
system as "very successful". The test ended on December 31, 1972. The system, known as Instant
Transaction ("IT"), was first introduced in Syosset,
Long Island on November 1, 1971. During the experiment, checking account customers of Hempstead Bank's
Syosset Office used plastic "IT" cards, instead of
checks or cash, to make purchases at thirty-two
stores. The participating merchants included local
branches of A & P, three other supermarkets, and a
variety of other neighborhood retailers.
Mr. Hall, who is the creator of the system, commented about the experiment by saying, "Our customers used the "IT" card to purchase everything from
groceries and prescriptions to clothing, appliances
and hardware. Even the local 5¢ & lOt store participated. It proves that the age of electronic
payments is attainable today. The customers and
merchants embraced this system more enthusiastically
than we ever imagined. Many of them, I'm sure, are
unhappy to see the end of the test period." Mr.
Hall added, "Our success refutes the conclusions of
some research studies which seemed to indicate that
consumers were not ready for an automated payment
system." He said, "The disparity between those assumptions and our experience is understandable since
we are the first organization to evaluate consumer
attitudes after they have had an opportunity to try
an automated payment system."
Instant Transaction involves a plastic "IT" card
and a terminal which connects the merchant's store
(via telephone lines) with the bank's central computer. Funds are instantly transferred from the
customer's bank account to the merchant's account
at the moment of purchase. No corresponding paper
documents are processed. A security code number,
known only to the customer, authorizes each sale by
entering this number on a component of the terminal.

40

lS-Year-Old Math Whiz Develops Time-Sharing
Monitor for IBM 1130
Computer X-Ray Device Wins Top Award
ADAPSO Expands Program to Fight Illegal
Marketing Practice
Taxation of Computer Programs Seen As Threat
to DP Industry

42
42

43
43

The objectives of Instant Transaction from the
banking industry's point of view are twofoldo First,
the system will eliminate fraud losses by verifying
the cardholder's identity and by the computer determining whether the customer has sufficient checking
account funds, or available credit, for the sale.
In June of 1971, the Federal Reserve Board announced that it had adopted, as "a matter of urgency," policies aimed at reforming the check system to keep the economy from strangling on its own
paper. Board member George W. Mitchell, in a
statement issued for public release, said of Hempstead Bank's Instant Transaction System, "The Hempstead "IT" service represents a final link in payment systems development ... It is transacting
funds at point of sale. It is eliminating paper
processing and is introducing immediate, convenient
consumer credit. Hempstead has in fact been faithful in setting up a paper-free system."
Hempstead Bank plans to expand Instant Transaction to other regions so that the card will have
widespread appeal. Mr. Hall commented, "We have
had conversations with bankers in several areas of
the country. Some of them are close to a decision
about implementing the system."
PSYCHIATRIC INTERVIEWS CONDUCTED BY COMPUTER

Susan Rodewald
University News and Publications Service
University of Wisconsin-Madison
Bascom Hall
Madison, Wisc. 53706

The compact high-speed digital computer in University of Wisconsin-Madison Hospitals east wing
bears little resemblance to a psychiatrist. It
wears neither white coat, beard, nor spectacles; in
looks, its closest kin is a four-track tape recorder.
Yet the LINC (Laboratory Instrument Computer) has
"talked" to over 90 psychiatric patients in University Hospitals since June. Through three console
terminals, LINC has collected case histories which
would otherwise have cost about 200 doctor hours.
"Computer interviews are superior to doctor interviews in many respects", Dr. John H. Greist said.
"The machine never forgets to ask a question, and it
stores all answers in clear, standardized form. It
matches the patient's pace. A computer is never
bored or pressured by other duties. If the patient
COMPUTERS and AUTOMATION for March, 1973

doesn't understand a question, the computer is programmed to explain its meaning."
Computer interviews have an eight-year history at
Uni versi ty Hospi tal s. The fi rst experimental model s,
developed by Dr. Warner V. Slack and Lawrence J. Van
Cura, collected allergy, gynecologic, and general
medical histories directly from patients. Favorable
reaction from patients and physicians led to design
of other interview types and in 1968, an initial
psychiatric history was developed by Dr. MaxMaultsby
and tested with 60 patients.

EDUCATION NEWS
FIRST 12 STUDENTS GRADUATE FROM
COMPUTER HARDWARE EDUCATION CENTER
James E. Talbot
Lewis & Gilman, Inc.
1700 Market St.
Philadelphia, Pa. 19103

Dr. Greist and his colleague Dr. Marjorie H.
Klein have encountered resistance to using computer
interviews in psychiatry. "Many question the intrusion of machines into human interactions," the doctors explai ned. "Certai nly, the present level of
computer interviewing does not match the potential
interviewing sophistication of a talented and highly
motivated human interviewer. However, few patients
can spend two or three hours wi th the likes of Freud,
and patients have made it quite clear they can effectively communicate about their personal problems
with a computer. Machines are clearly non-human,
but their use is not necessarily inhumane."

While software training institutes fill the newspaper classified sections, independent schools that
give detailed courses in computer hardware, especially IBM hardware, are relatively rare. One such
school, the Education Center of Computer Hardware
Maintenance Co. in Newton, Pa., recently graduated
its fi rst 12 students. They recei ved completi on certificates for a course that is the initial building
block in a training program to produce senior customer engineers (CEs) for the company's fast-growing
field maintenance force. Currently CEs are drawn
from the parent company, Computer Hardware Consultants & Services, Inc.

Drs. Klein and Greist hnve developed two types of
interviews for psychiatric patients. The first, an
interview for patient symptomatic change, isdesigned
to accompany therapy. In the initial interview, the
patient defines his major problems and describes
their effect upon his life. Selection of "target
symptoms" helps him to clarify personal goals for
therapy. The patient types his narrative response
to these questions directly into the computer. The
computer then presents a list of standardized symptoms and asks the patient to rate each in terms of
its frequency and intensity. Symptoms are grouped
into seven problem areas, such as anxiety, depression, or relationship problems. Each symptom cluster is introduced by a general screening question.
If the computer receives a positive response to the
screening question, it branches into assessment of
related symptoms. If the patient selects "Don't
Know" or "Don't Understand", the interview branches
to further definition and explanation of the problem
category. A flat "No" leads directly to the next
screening question.

The 12 students, who came from CHCS plants, received intensive, fast-paced instruction in Common
I/O and System I/O. Instructi on consi sts of four hours
of lecture and four hours of lab, fi ve days a week.
In the laborator~which typifies a clienes computer
room, the students reinforce theory learned earlier
by taking equipment apart and putting it back together again under the guidance of instructors. They
also troubleshoot bugs planted in the equipment by
instructors to simulate common equipment failures.

The symptom change interview is repeated four
times, in order to evaluate change in initial complaints and symptom levels. The computer stores
each conversation, and can prepare a cumulative summary for comparison of subsequent interviews. Both
patient and therapist can trace patterns of progress
during treatment. Dr. Greist believes that the symptom change interview has many implications for future research. The computer's capacity to collect
and store information could provide the basis for
comparative study of psychiatric case histories.
The second psychiatric interview developed by
Drs. Greist and Klein in conjunction with Prof.
David Gustafson of Industrial Engineering deals
with suicide risk and therapy. Its format resembles
the symptom change interview in problem definition
and assessment. In addition, the interview probes
factors which have proved statistically significant
in predicting risk of suicide. Given data on the
patient's social, medical, and psychiatric history,
LINC can generate an estimate of actual suicide
risk. With further adaptation, it also may be able
to furnish therapy recommendations. Both suicide
risk and symptom change interviews have been developed and tested under grants from the National Institutes of Mental Health.
COMPUTERS and AUTOMATION for March. 1973

Richard Cockley, Di rector of Education and formerly
an IBM Education Manager, says that this seven-week
course gi ves students a basic grounding in the common
peripheral equipment for IBM 360 systems, including
tie-in with Model 30~ The course exactly parallels
that gi ven by IBM to its trai nees, usi ng the same books
and materi al s. Wi th thi s background and a month's experience at a. CHCS plant, the men will be effective
field maintenace backup men, able to handle over 75%
of computer maintenance calls for clients.
Future training will not be limi ted to CHSC employees. State licensing and accredi tation procedures are
underway tomake the material available to outsiders
as well. Prospective students are expected to come
from computer companies, electronic vocational schools,
and the military service.

PSYCHOLOGY INSTRUCTOR DEVELOPS
CAl PROGRAM IN ADVANCED STATISTICS
Martha Larson
Office of University Relations
Lawrence University
P.O. Box 1847
Appleton, Wisc. 54911.

Computer-power is expanding at Lawrence University through a research and instructional project
fotmulated by Francis T. Campos, instructor in psychology. With $27,000 in funds from the National
Science Foundation (NSF) and Lawrence University,
Campos has developed a computer-assisted instructional program in advanced statistics. The money
made possible the purchase of four computer terminals and a disk storage unit which increases the memory capacity of the university's PDP-II computer by
41

1.2 million words.
terminals.

The year-old computer now has 12

The course plan which Campos has developed went
into use the second term beginning Jan. 3. It uses
the computer as a resource for basic information,
previously supplied by the course instrQctor in
class lectures, and also serves as a student's personal homework aide. The computer is available
around the clock, seven days a week.
"We know pretty much what we want everybody to
know," Campos said in regard to the statistics
course. "It doesn't change much from year to year
because it's only a tool, a solid base of information, which is necessary to interpret and design experiments." The computer program provides that
solid base of information which can be revised when
necessary.
The goal of the project is to help students
achieve at least a minimum level of competence in
statistics more efficiently. With this 'method
Campos sees no reason why students should get a
grade of 0 or below. The program is designed so
that a student can approach the material at his own
pace. With a computer doing the basic teaching, the
instructor and student are freed from the classroom
lecture to resolve individual problems on a one-toone basis. The result is more individualized instruction.
Statistics was chosen for the pilot program because it was most easily adapted to the computer
system. Two more statistics-oriented courses -elementary and multivariate statistics -- are
planned for development. It will take a few years
to organize the additional courses because there
are no devised programs of this sort. Other eventual goals for the computer-assisted instructional
program are to include more areas of mathematics
and encompass a short introductory psychology
course.

MISCELLANEOUS
18-YEAR-OLD MATH WHIZ DEVELOPS
TIME-SHARING MONITOR FOR IBM 1130
Steve Goodrich
News Office
Drew University
Madison, N.J. 07940

An electronics firm eager to convert from military to peacetime production, an 18-year-old math
whiz, and a community goodwill gesture by a private
university have sparked a breakthrough boost in the
capabilities of a modest computer used by thousands
of institutions and small businesses across the nation. The advance gives the computer, the IBM 1130,
sophisticated talents previously possessed only by
much larger and enormously more expensive equipment.
For several years, Drew University has offered
classes on a tuition-free or reduced tuition basis
to extra-bright students in 'Madison High School. In
1969, 15-year-old sophomore Steve Adamczyk took advantage of the offer that has led to a computer science "first"
0

Representing Drew at a 1971 national convention
of 1130 users, Adamczyk took up a challenge from
42

Les Burston, national sales manager for the Logicon
Corp. of Torrance, California. The firm, said Burston, had developed, as spinoff from a military contract, a device capable of converting the 1130 from
one-proj ect-at-a-time "batch mode" operation to
time-sharing use by up to 16 users working on as
many different problems. However, Logicon lacked the
software (programming) capability to make the hardware operative, he explained, and would team with
the first user to complete the package, which would
then be marketed by Logicon.
Adamczyk rose to the bait. Entering Massachusetts Institute of Technology as a second semester
freshman with almost unlimited curricular freedom,
and working on the Logicon challenge both in his
spare time and as part of a project at MIT, he developed a time-sharing "monitor" within the semester. "A monitor," explai ns Dr. Charles Lytle, director of Drew's Computer Center, "is a housekeeping program that prevents the computer from tripping over its own transistors while 'talking' simultaneously with a number of users." Dr. Lytle is
the professor of math at Drew whom Adamczyk credits
with challenging and backing his interest in computers from the beginning "even when others thought I
was too young".
Last June, together with hardware known as LI/ON
(Logical Input/Output Network), Adamczyk's timesharing monitor debuted at a computer conference at
Georgia Tech in Atlanta. Last month, Burston announced the availability of the complete package at
users conventions in Chicago and Miami.
Adamczyk is far from through with Drew's 1130.
Continuing to work at the Center on vacations and
some weekends, he is trying for yet another major
data processing coup. The batch and time-sharing
modes in Drew's computer are mutually exclusive, the
daily schedule being divided between two modes. Very
large and advanced third generation computers, however, have a capability known as "background batch,"
which allows work on batch and time-sharing problems
simultaneously. Dr. Lytle is confident Adamczyk can
give Drew's modest third generation 1130 the same
capability. If so, even with simultaneous servicing
of many time-sharing users, together with a batch
mode project, the response of the computer would
never be delayed by more than a few seconds
hardly enough time to take up knitting.
Outside of his extraordinary gifts in the areas
of math and computer science, Steve Adamczy~ looks,
sounds, and behaves very much like any other longhaired college sophomore. It's just that he continues to hang around computer centers the way some
youths his age hang around record stores or gyms or
automotive speed shops.

COMPUTER X-RAY DEVICE
WINS TOP AWARD
The Montreal Star
241 St. James St.
Montreal, Quebec, Canada

A new, computerized device reported to have revolutionized the technique of head x-rays, has won a
major award for its inventor, Godfrey Hounsfield.
The machine, called Emi-scanner, produces 100
times more information from the same amount of x-ray
photons used in conventional techniques. In many
cases it also eliminates the need to inject fluids,
COMPUTERS and AUTOMATION for March. 1973

radioactive material or air into the head to obtain
better contrast x-ray pictures of the brain. Some
of these techniques required general anaesthesia
and a stay in the hospital.
The top prize in British engineering, the $65,000
Macrobert award, was given to Mr. Hounsfield and the
Emi Electronics group for which he works, and was
presented by Prince Philip. Judges called the scanner the greatest discovery in its field since German
physicist Wilhelm Konrad Roentgen accidentally discovered x-rays in 1895.
The scanner looks like a large washing machine.
The patient's head is inserted in it while he lies
prone, and the machine rotates about his head in
180 one-degree steps. The scanner x-rays the brain
in a series of thin layers. At each of the 180
stops, 160 readings are taken of the amount of radiation absorbed by the tissue from a pencil-slim
beam of x-rays.
The information is fed to a small computer, which
calculates the 28,800 readings taken from each layer.
These are converted into cathode ray tube pictures
within about six minutes. The picture can be photographed, or a numerical absorption chart can be
printed.

ADAPSO EXPANDS PROGRAM TO FIGHT
ILLEGAL MARKETING PRACTICE
J. L. Dreyer
ADAPSO, Inc.
551 Fifth Avenue
New York, N. Y. 10017

Thomas J. O'Rourke, President of the Association
of Data Processing Service Organizations, Inc.
("ADAPSO") announced, in mid-January, an expansion
of the Association's program to deal with the problems created by unfair or illegal practices in the
sale of data processing services.
"All of t:1e responses we have received from our
Members and others," stated O'Rourke, "have indicated that this problem is one of the key economic
issues in the computer services industry. Our membership welcomes and encourages fair competition.
However, it will fight tooth and nail competition
from organizations who use monopoly positions and
power developed in other lines of commerce, to restrain free trade and competition in our industry."
O'Rourke stated that the enlarged program would
be a several pronged one. "First, ADAPSO will act
as a communications center or clearing house, accumulate evidence of unfair or illegal marketing
problems, whether furnished us by our members or.
third parties. Second, ADAPSO will do whatever It
lawfully can to assist members who are actively
fighting this problem, whether before administrative agencies, in the Congress, in the courts.or
otherwise. This would include, under approprIate
circumstances, participation by ADAPSO as a plaintiff in litigation. Third, to the extent we are
able to do so, we will also financially assist members who are under unlawful attack from incremental
marketers."
ADAPSO issued its position paper on the incremental marketing issue on October 27, 1972. The
statement of position indicated that coercion should
be presumed and an unlawful tie-in held to exist,
whenever a seller marketing a product in a separate
COMPUTERS and AUTOMAnON far March, 1973

line of commerce also markets a not insubstantial
volume of computer services, and where the following circumstances are present:
1. The first (tying) product is patented or
copyrighted, or otherwise a lawful monopoly of
the seller.
2. There exists some special relationship between the seller and the purchaser which is independent of the particular purchase-sale relationship giving rise to the questioned transaction, such as by way of dealership, franchise
or license.
3. The seller offers its computer services
only to those purchasing the tying product and
not generally.
4. The tying product is important to the
business of the computer services organizations
in the pertinent market.
5. The seller is of large size relative to
the compu~eL .services organizations in the pertinent market.
6. The seller operates in an oligopolistic
or monopolistic line of commerce.
The number of these circumstances necessary to
justify the presumption will vary, depending on the
facts of each case. Thus, where 4, 5, and 6 are
present, as in the case of communications carri~rs
and banks, 1, 2 and 3 are not required. The eXIstence of all six should never be necessary.

TAXATION OF COMPUTER PROGRAMS
SEEN AS THREAT TO DP INDUSTRY
John Heston
Bozell, Jacobs & Wallrapp, Inc.
655 Madison Ave.
New York, N. Y. 10021

The winter conference of the Association of Data
Processing Service Organizations (ADAPSO) was warned
that states may turn to taxation of computer "software" in their search for new tax bases.
Paul Rosenthal, chairman of ADAPSO's California
Software Tax Committee, said that the whole problem
hinged on the definition of software as tangible or
intangible property. Rosenthal pointed out in a
joint paper written with Joseph D. Frascella. legal
counsel for System Development Corporation, that
California had ruled that any basic operational
software program -- the program without which the
computer could not carry out its basic functions -is subject to ad valorem tax. He told the conference that the California experience could foreshadow
a~tions of the taxation authorities in other states,
and suggested that the data processing industry must
be prepared to testify in its own behalf on short.
notice at statewide taxation hearings or face serIous financial consequences.
Rosenthal noted that basic operational software
programs can be "bundled" -- that is, sold as an
integral part of the computer and peripheral equipment -- or they can be priced and delivered separately: in either case they fall under the California
ad valorem tax. The California ruling will probably
be appealed by major companies in the industry as
(please turn to page 45)

43

NEW CONTRACTS
System Development Corp.,
Santa Monica, Calif.

U.S. Air Force Systems Command, Electronic Systems Div.
(ESD), L.G. Hanscom Field,
Mass.

Fabri-Tek Inc., Minneapolis,
Minn.

Control Data Corp., Minneapolis, Minn.

Sperry Univac, Div. of Sperry
Rand Corp., Blue Bell, Pa.

University of Rome,
Italy

Teledyne Inet Div. of Teledyne
Inc., Gardena, Calif.

Litton Industries, Beverly
Hills, Calif.

Computer Sciences Corp., Los
Angeles, Calif.

U.S. Navy

Memorex Corp., Santa Clara,
Calif .

TESLA of Czechoslovakia

COMTEN, Inc., St. Paul,
Minn.

Data Processing Dept., City
and County of San Francisco,
Calif .

Ampex Corp., Marina del
Rey, Calif.

IBM Corp., White Plains,
N.Y.

National Cash Register Co.,
Dayton, Ohio

Flah's, Albany, N.Y.

Varian Data Machines, Irvine,
Calif .

New South Wales Department
of Public Works, South Wales,
Australia

Computer Products, Inc.,
Fort Lauderdale, Fla.

Data Technology, Pty. Ltd.,
Sydney, Australia

General Electric Research
and Development Center,
Schenectady, N.Y.

Transportation Systems Center,
U.S. Dept. of Transportation

International Communications
Corp., Miami, Fla.

Western Union Telegraph Co.

Jay-El Products Inc.,
Gardena, Calif.

Texas Instruments Inc.,
Dallas, Texas

Shared Medical Systems Corp.,
King of Prussia, Pa.

Medical College of Virginia
Hospitals, Virginia Commonwealth Univ., Richmond, Va.
San Gabriel Valley Tribune,
West Covina, Calif.

System Development Corp.,
Santa Monica, Calif.
System Development Corp.t
Santa Monica, Calif.
SYSTEMS Engineering Labs.,
Fort Lauderdale, Fla.

Cadence Industries Corp.,
Hackensack, N.J.
Combustion Div., Combustion
Engineering, Inc., Windsor,
Conn.

~erox Corp., El Segundo,

Philip Morris Inc.
Richmond, Va.

Cfllif.
44

Developing, installing and testing Space
Computational Center System Segment (a
satellite data processing system) of the
North American Air Defense Command's
(NORAD's) Cheyenne Mountain Complex Improvement Program (427m)
Delivery of extension memories for IBM
System 360 Models 30, 40, 50 and 65 over
a 2-year period
A UNIVAC 1110 lxl computer system for exclusive use in scientific and technical
applications in engineering, physics, chemistry and mathematics; system will be connected to remote data communications terminals in each of University's 11 faculties,
and be available on a time-sharing basis to
other scientific, research and educational
organizations in the Rome area
Solid state power conversion systems in
the U.S. Navy Spruance-class (00-963) destroyers
Upgrading computer programs used for antisubmarine warfare by the P-3C, a landbased Navy aircraft
Disc storage systems from Memorex's Santa
Clara, Calif. and Liege, Belgium facilities; also training of TESLA personnel in
Czechoslovakia. Belgium and England
A dual COMTEN 45 computer communications
message switching system, for Computer Assisted Bay Area Law Enforcement (CABLE)
System; 5-year contract covers hardware,
software and maintenance services
Modified Model ATM-l3 airborne digital
tape drives for the U.S. Air Force Airborne Warning and Control System (AWACS)
NCR 280 electronic retail data terminals
in all 13 stores; equipment includes 150
terminals and an NCR 725 "in-store" computer
An interactive graphics system calling for
2 Varian 620 computers, special systems
software under Varian's VORTEX operating
system, and a wide range of display and
peripheral equipment; system is designed
to produce complete contract documents,
specifications and plan drawings required
in large-scale building projects
RTP line of analog and digi tal input/output
equipment to be used in a large industrial
acquisition and control computer system
for the Gladstone Power Station
Building a unique multi-purpose data collection device to be used in design of a
world-wide satellite navigation and communication system for ships and aircraft
Data communication equipment, including
2,000 modems (based on ICC's new Modem 24
LSI design for delivery this year
New swi tching systems for Lockheed P3C antisubmarine aircraft replacing former toggle
switch boxes to expand capability of the
switching function without expanding size
Provide total computerized hospital financial management service

$15.8+ million

$6 million
$3 million
(approximate)

$2 million
(approximate)
$1.5 million
$1 million

$880,000
(approximate)

$600,000+
$550,000
$263,000

$170,000

$100,000

Producing and installing TEXT II, a computer based typographic composition system supporting news, classified, production
and accounting departments
Multi-year facility management; will supply personnel on a 24 hour, 7 day week basis
Supplying nuclear plant monitoring and supervisory computer systems built around
SYSTEMS 85 computer; systems are for several
electric utilities for whom Combustion Engineering designs and fabricates pressurized water reactor nuclear steam supply
systems
A Xerox Sigma 8 computer system to serve
needs of up to 30 of PM's scientific labs;
replaces a smaller Sigma 5 computer
COMPUTERS and AUTOMATION for March, 1973

NEW INSTALLATIONS
AT
Honeywell 6060 system

Imperial Iranian Air Force,
Tehran, Iran

IBM System/370 Model 135

Kable News Co., Inc.,
Mount Morris, Ill.

IBM System/370 Model 165

Chicago Bridge & Iron Co.,
Oakbrook, Ill.

NCR Century 50 system

Midwest City Memorial Hospital,
Midwest City, Okla.
Motion Picture and Television Relief Fund Hospital, Woodland Hills,
Cal if.
Oneida City Hospital, Oneida, N.Y.
Serra Memorial Hospital, Sun
Valley, Calif.

NCR Century 101 system

Burnham City Hospital, Champaign, Ill.
Clinton County Bank and Trust
Co., Frankfort, Ind.
Norwegian Caribbean Lines,
Miami, Fla.
Pioneer Hi-Bred, Inc., Tipton,
Ind.

NCR CENTURY 200 system

Grossman Paper and Bag Co.,
Irvington, N.J.
Harrisburg School District,
Harri sburg, Pa.
Lenox Candles, Inc., Oshkosh,
Wisc.
Loctite Corp., Newington, Conn.
Edward Malley Co., New Haven,
Conn.
Norwood Mills, Janesville, Wisc.

Univac 1106 system
Xerox Sigma 6 system

Sackner Products,
Mich.
Sunnyland Packing
ville, Ga.
Treasury Dept. of
of Mexico, Mexico

Grand Rapids,
Co., Thomasthe Government
City, Mexico

Advanced System Labs., New York
Institute of Technology, Westbury, L.I., N.Y.

Across the Editor's Desk - Continued from page 43

well as industry organizations, on the grounds that
unbundled basic software is intangible.
According to Rosenthal, the industry has generargued that:

al~y

a. Tangible objects are manufactured and
thereby have easily identifiable costs
and therefore value;
b. Intangible objects are created by intellectual activities and reproducible by
communication or copying;
c. Since software is so difficult to value,
it must be because it has the proportion
of intangible objects;
COMPUTERS and AUTOMATION for March, 1973

Controlling spare-parts inventory for all military aircraft
(system valued at $3.1 million)
Keeping 25 million copies of magazines and paperback books headed for right newsstands eachmonth,
some warehousing and inventory, and providing
sales analysi s data for publi shers and KNC salesmen
Helping engineers design structures ranging from
elevated water tanks to nuclear reactors and offshore drilling platforms
Payroll and in-patient accounting; system uses
punched-tape input
In-patient and out-patient billing, payroll and
accounts receivable; equipment includes punchedcard peripherals
In-patient accounting, post-discharge accounts receivable and payroll; system uses punched-tape input
In-patient and out-patient billing, payroll and
accounts receivable; equipment includes punchedcard peri phera 1 s
In-patient and post-discharge accounts receivable
and payroll; also processes City's payroll and
parking tickets for the local police department
Establishing a Central Information File (CIF)
monitor'ing all bank activities including a check
sorter and 1200-line-a-minute printer
Booking reservations and assigning personal
choice of stateroom up to nine months in advance
Payroll. order entry, sales reporting, inventory
control, accounts receivable and general ledger
accounting
Order billing, payroll preparation and receivables monitoring
Fiscal and financial accounting, personnel accounting, payroll, and earned-income tax accounting for 54 tax districts in 3 surrounding counties
Order entry and invoicing
Order entry, sales analysis and payables and receivables
Computerizing accounts receivable, and handling
accounts payable and sales ordering
Controlling a 40,000 inventory, production scheduling, accounts receivable and payable, cost and
general ledger accounting, payroll and sales
analysis
Inventory control, production scheduling and production requirements planning
Inventory control, invoicing and payroll
Preparing and controlling all payments to federal
employees
(system valued at approximately $2.4 million)
Serving two university campuses, eight high
schools and junior high schools in two Long Island school districts, and a private secondary
school
(system valued at over $1 million)

d. Since only bundled software is easy to
value, it is probably the only type of
tangible software property, and therefore the only type taxable.
In his view, Rosenthal told the meeting, "software is clearly intangible in nature and is therefore subject to sales and ad valorem taxation only
under very specific and limited conditions". He
said that the conditions would probably cover control programs which are fundamental and necessary
to any use of a computer and are an integral part
of it in commerce (Le., bundled pricing). "If this
approach is ::Jdopted," Rosenthal said, "valuation
would be a simple task since the purchase or lease
cost of the hardware system would determine taxation
valuations. However, if taxation authorities attempt to tax unbundled software, an extremely difficult problem in valuation occurs."
0
45

MONTHLY COMPUTER CENSUS
Neil Macdonald
Survey Editor
COMPUTERS AND AUTOMATION
The following is a summary made by COMPUTERS AND AUTOMATION of reports and estimates of the number of general purpose electronic digital computers manufactured and installed, or to be manufactured and on
order. These figures are mailed to individual computer manufacturers
from time to time for their information and review, and for any updating or comments they may care to provide. Please note the variation
in dates and reliability of the information. Several important manufacturers refuse to give out, confirm, or comment on any figures.
Our census seeks to include all digital computers manufactured anywhere. We invite all manufacturers located anywhere to submit information for this census. We invite all our readers to submit information that would help make these figures as accurate and complete as
possible.

The following abbreviations apply:
(A) -- authoritative figures, derived essentially from information
sent by the manufacturer directly to COMPUTERS AND
AUTOMATION
C
figure is combined in a total
(D)
acknowledgment is given to DP Focus, Marlboro, Mass., for
their help in estimating many of these figures
E
figure estimated by COMPUTERS AND AUTOMATION
(N)
manufacturer refuses to give any figures on number of installations or of orders, and refuses to comment in any
way on those numbers stated here
(R) -- figures derived all or in part from information released
indirectly by the manufacturer, or from reports by other
sources likely to be informed
(S)
sale only, and sale (not rental) price is stated
X
no longer in production
information not obtained at press time

Part I of the Monthly Computer Census contains reports for United
States manufacturers. Part II contains reports for manufacturers
outside of the United States. The two parts are published in a1 ternate months.
SUMMARY AS OF FEBRUARY 15, 1973
NAME OF
MANUFACTURER
Part 1. United States Manufacturers
Adage, Inc.
Brighton, Mass.
(A) (Jan. 1973)
Autonetics
Anaheim, Calif.
(R) (Jan. 1969)
Bailey Meter Co.
Wickliffe, Ohio
(A) (June 1972)

Bunker-Ramo Corp.
Wes t lake Village, Calif.
~A) (Jan. 1973)

Burroughs
Detroit, Mich.
(N) (R) (Feb. 1973)

Computer Automation, Inc.
Newport, Calif.
(A) (April 1971)
Consu1tronics, Inc.
Garland. Texas
(A) (Dec. 1972)
Control Data Corp.
Hinneapo1is. Minn.
(R) (Feb. 1973)

46

NAHE OF
COMPUTER
AGT 10 Series
AGT 100 Series

DATE OF
FIRST
INSTALLATION

AVERAGE OR RANGE
OF MONTHLY RENTAL
$(000)

4/68
1/72

(5)

RECOHP II
RECOMP III

11/58
6/61

X
X

Metrotype
Bailey 750
Bailey 755
Bailey 756
Bailey 855/15
Bailey 855/25
Bailey 855/50
BR-130
BR-133
BR-230
BR-300
BR-330
BR-340
BR-1018
BR-1018C
B100/500
B200
B205
B220
B300
B1700
B2500
B2700
B3500
B3700
B4700
B5500
B5700
B6500
B6700
B7500
B7700
B8500
108/208/808
116/216/816

10/57
6/60
11/61
2/65
12/72
4/68
3/72
10/61
5/64
8/63
3/59
12/60
12/63
6/71
9/72
7/65
11/61
1/54
10/58
7/65
8/72
2/67
8/72
5/67
11/72
10/71
3/63
12/70
2/68
8/72
4/69
2/72
8/67
6/68
3/69

40-200
40-250
200-600
60-400
50-400
100-1000
100-1000

5/69

0.7

7/55
4/61
12/62
9/56

X

1/61

X

5/60
8/61
1/60
5/66
5/64
5/64
9/65
11/64
8/68
6/63
2/66
8/64
8/64

X

DCT-132
G15
G20
LGP-21
LGP-30
M1000
RPC4000
636/136/046 Series
160/8090 Series
921/924-A
1604/ A/B
1700/SC
3100/3150/3170
3200
3300
3400
3500
3600
3800
6200/6400/6500
6600

NUHBER OF INSTALLATIONS
In
Outside
In
U.S.A.
U.S.A.
World

(5)
(5)
(5)

(S)
(S)
(5)
(5)

X
X
X
X
X
X

23.0

NUMBER OF
UNFILLED
ORDERS

32
10

3
4

35
14

X

30
6

0
0

30
6

x

0
15
0
12
0
0
0

8
52
7
27
0
16
0

o
o
o

37
7
15
0
16
0
160
79
15
18
19
19

2

X

2
2

o
12
X

X
X
X
X
X

(S)
1141

677

19
23

2
2

4.0

2
277

123

400

30

12-14

572

285

857

110

4
153
27

47
8
4

200
35
60
9

165
215

10
20

175
235

35

65

100

2.8-10.0
5.0
X
X

7.0

23.5
32.0
33.0
30.0
44.0
85.0
200.0
5.0
8.0

X

X
X

X

X

3.8
10-16
13.0
20-38
18.0
25.0
52.0
53.0
58.0
115.0

1818
500
21
25
600

25
X
X

22
2

60
13
4

1
(5)
(5)

295
20
165
322
75
29
610
29
59
428-478
93-120
55-60
205
17
15
40
20
117
88

110
225

X
X
X
X
X
X
X
X

o
C
C
C
C
C
C
C
C
C

COMPUTERS and AUTOMATION for March. 1973

NAME OF
MANUFACTURER
Control Data (cont'd)

NAME OF
COMPUTER
6700
7600
Cyber 70/72
Cyber 70/73

Data General Corp.
Southboro, Mass.
(A) (Dec. 1972)

Nova
Supernova
Nova 1200
Nova 800
Nova 820
Nova 1210/1220
6024/1
6024/3
6024/5
Digiac 3060
Digiac CT-10

DATE OF
FIRST
INSTALLATION
6/67
12/68

NUMBER OF INSTALLATIONS
In
Outside
In
U.S.A.
U.S.A.
World
5
12
2
6
8
1
3
4

AVERAGE OR RANGE
OF MONTHLY RENTAL
$(000)
130.9
235.0

NUMBER OF
UNFILLED
ORDERS
C
C

Total:
160 E

Datacraft Corp.
Ft. Lauderdale, Fla.
(A) (Nov. 1972)
Digiac Corp.
Plainview, N.Y.
(A) (May 1972)
Digital Computer Controls, Inc.
Fairfield, N.J.
(A) (Nov. 1972)
Digital Equipment Corp.
Maynard, Mass.
(A) (May 1972)

Electronic Associates Inc.
West Long Branch, N.J.
(A) (Feb. 1973)
EMR Computer
Minneapolis, Minn.
(A) (Nov. 1972)

General Automation, Inc.
Anaheim, Calif.
(A) (Jan. 1973)
General. Electric
West Lynn, Mass.
(Process Control Computers)
(A) (Oct. 1972)

Hewlett Packard
Cupertino, Calif.
(A) (July 1972)
Honeywell Information Systems
Wellesley Hills, Mass.
(R) (Feb. 1973)

D-112
D-l16

2/69
5/70
12/71
3/71
4/72
2/72
5/69
2/70
12/71
1/70

8/70
1/72

PDP-1
PDP-4
PDP-5
PDP-6
PDP-7
PDP-8
PDP-8/1
PDP-8/S
PDP-8/L
PDP-8/E
PDP-8/M
PDP-8/F
PDP-9
PDP-9L
DECSystem-10
PDP-ll/20
PDP-llR20
PDP-ll/05
PDP-11/45
PDP-12
PDP-15
LINC-8

11/60
8/62
9/63
10/64
11/64
4/65
3/68
9/66
11/68

640
8400
PACER 100
EMR 6020
EMR 6040
EMR 6050
EMR 6070
EMR 6130
EMR 6135
EMR 6145
EMR 6140
SPC-12
SPC-16
System 18/30
GE-PAC 3010
GE-PAC 4010
GE-PAC 4020
GE-PAC 4040
GE-PAC 4050
GE-PAC 4060
2114A, 2114B
2115A
2116A, 2116B, 2116C
2100A
G58
G105A
G105B
G105RTS
G115
G120
G130
G205
G210
G215
G225
G235
G245
G255 T/S
G265 T/S
G275 T/S
G405
G410 T/S
G415
G420 T/S
G425
G430 T/S
G435
G440 T/S
G615
G625

4/67
7/67
7/72
4/65
7/65
2/66
10/66
8/67

COMPUTERS and AUTOMATION for March. 1973

5/72
12/66
11/68
12/67

9/69
2/61
9/66

1/68
5/70
7/69
5/70
10/70
2/67
8/64
12/66
6/65
10/68
11/67
11/66
3/71
5/70
6/69
6/69
7/69
4/66
3/69
12/68
6/64
7/60
9/63
4/61
4/64
11/68
10/67
10/65
11/68
2/68
11/69
5/64
6/67
6/64
6/69
9/65
7/69
3/68
4/65

9.2
9.6
5.4
6.9
6.4
4.2;5.2
52-300
33-200
11-80
9.0
9.0
10.0
10.0

(S)
(S)
(S)
(S)
(S)
(S)
(S)
(S)
(S)
(S)

(5)

(S)

X
X
X
X
X
X
X
X
X

4.9
3.9
3.9

17
108
28
78
20

0
13
0

925
210
2430
385
140
1025
17
121
28

667
553

103
38

770
591

48
40
90

2
5
10

50
45
100
23
100
1402
3127
918
3699
3787
365
2
436
40
243
2740
14
0
0
620
545
200
Total:
18456
170
29
50
16
6
17
15
47
41

(S)
(S)
(S)

X
X

700-3000
10.8
13.8
10.8

17.0

(S)
(S)
(S)
(S)

0
0

0
0

(S)

X

1.2
12.0
1.0
5.4
6.6
9.0
15.0
5.0
2.6
7.2

2.0
6.0
6.0
X

7.0
X

0.25
0.41
0.6
0.5
1.0
1.3
1.4
1.2
2.2
2.9
4.5
X
X
X
X
X
X
X
X
X

6.8
1.0
7.3
23.0
9.6
17.0
14.0
25.0
32.0
X

109
21
20
15
6
15
7
34
36

25
30
200
45
23
18

200-400
11
35
15
145
40-60
3
15-20
45-60

61
8
30
1
0
2
8
13
5

1
4
60
20
2
2

420-680

1500
900
225
26
34
260
65
25
20
1182
333
1171
2080
4
6

11
35
16
160
57-77

15-30

60-90
10
15-45

70-100

240-400

310-500

50-100

20-30

70-130

20

23

X
X
X
X
X
X
X
X
X

X
X

X

1
0
20
0
0
0
0
0
4
8
0

35
32
32
X

1
1

620-1080

0
0
1
15
17

10-40

2
55
65
8

X
X
X
X
X
X
X
X
X

26

3

26

X

47

NAME OF
MANUFACTURER
Honeywell (cont'd)

IBM
White Plains, N.Y.
(N) (D) (Jan. 1973)

Interdata
Oceanport, N.J.
(A) (Jan. 1973)

48

NAME OF
COMPUTER
G635
H-110
H-1l5
H-120
H-125
H-200
H-400
H-BOO
H-1200
H-1250
H-1400
H-1800
H-2015
H-2040
H-2200
H-3200
H-4200
H-6030
H-6040
H-6060
H-8200
DDP-24
DDP-1l6
DDP-124
DDP-224
DDP-316
DDP-416
DDP-516
H112
H632
H1602
H1642
H1644
H1646
H1648
H1648A
305
650
1130
1401
1401-G
1401-H
1410
1440
1460
1620 I, II
1800
7010
7030
704
7040
7044
705
7020,
7074
7080
7090
7094-1
7094-II
System/3 Model 6
System/3 Model 10
System/7
360/20
360/25
360/30
360/40
360/44
360/50
360/65
360/67
360/75
360/85
360/90
360/190
360/195
370/125
370/135
370/145
370/155
370/158
370/165
370/168
370/195
Model 1
Model 3
Model 4
Model 5
Model 15
Model 16
Model 18
Model 50/55
Model 70
Model 74
Model 80

DATE OF
FIRST
INS TALLATION
5/65
8/68
6/70
1/66
12/67
3/64
12/61
12/60
2/66
7/68
1/64
1/64

AVERAGE OR RANGE
OF MONTHLY RENTAL
$(000)
47.0
2.7
3.5
4.8
7.0
7.5
10.5
30.0
9.8
12.0
14.0
50.0

1/66
2/70
8/68

18.0
24.0
32.5

12/68
5/63
4/65
3/66
3/65
6/69

50.0
2.65
X

9/66
10/69
12/68

11/68
12/57
10/67
2/66
9/60
5/64
6/67
11/61
4/63
10/63
9/60
1/66
10/63
5/61
12/55
6/63
6/63
ll/55
3/60
3/60
8/61
ll/59
9/62
4/64
3/71
1/70
ll/71
12/65
1/68
5/65
4/65
7/66
8/65
ll/65
10/65
2/66
12/69
11/67
4/71
4/73
5/72
9/71
2/71
-/73
5/71
-/73
6/73
12/70
5/67
8/68
ll/70
1/69
5/71
6/71
5/72
10/71
2/73
10/72

X

X
0.6
X
1.2

3.2

NUMBER OF INSTALLATIONS
In
Outside
In
U.S.A.
World
U.S.A.
20-40
3
23-43
180
7
187
30
160
800
960
220
150
370
800
275
1075
46
40
86
58
15
73
230
90
320
130
55
185
4
6
10
15
20
5
2
3
60
125
185
20
2
22
18
2
20
2
2
3
10
13
3
90
250
250
60
452
350
900
75
12

12.0
3.6
4.8
1.5
5.4
2.3
1.3
17.0
4.1
10.0
4.1
5.1
26.0
160.0
32.0
25.0
36.5
38.0
27.0
35.0
60.0
63.5
75.0
83.0
1.0
1.1
0.35 and up
2.7
5.1
10.3
19.3
ll.8
29.1
57.2
133.8
66.9
150.3

232.0
8.2-13.8
14.4
23.3
48.0
49.5-85.0
98.7
93.0-170.0
190.0-270.0
3,7
8.5
X
20.0
X
X

6.8
6.8
14.9

NUMBER OF
UNFILLED
ORDERS
0

X

X

X
X

X

X
X

X
X

20
40
50
2580
2210
420
180
156
1690
194
285
415
67
4
12
35
28
18
10
44
13
4
10
6
5
2
9
7161
ll12
5487
2454
109
1135
604
57
50
II
5
13

15
18
1227
1836
450
140
116
1174
63
186
148
17
1
1
27
13
3
3
26
2
2
4
4

55
68
3807
4046
870
320
272
2864
257
471
563
84
5

6075
759
2535
1524
57
445
144
6
17
1

13236
1871
8022
3978
166
1580
748
63
67
12

13
62
41
21
13
70
15
6
14
10

1780
1287
1363
39
662
562
99
12
55

15
9

48

319
200
389
90
64
7
9
25
323
2
6

32
X
X
X
X
3
75
50
15

11
1
1

3
244

75

274
70
40
1
2
22
268
2
6

ll5
20
24
6
7
3
55
0
0

X

COMPUTERS and AUTOMATION for March. 1973

-

NAME OF
MANUFACTURER
Microdata Corp.
Santa Ana, Calif.
(A) (Jan. 1973)
NCR
Dayton, Ohio
(A) (Dec. 1972)

Philco
Willow Grove, Pa.
(N) (Jan. 1969)
Raytheon Data Systems Co.
Norwood, Mass.
(A) (Jan. 1973)

Standard Computer Corp.
Los Angeles, Calif.
(A) (June 1972)
Systems Engineering Laboratories
Ft. Lauderdale, Fla.
(A) (Dec. 1972)

UNIVAC Div. of Sperry Rand
New York, N.Y.
(A) (April 1972)

UNIVAC - Series 70
Blue Bell, Pa.
(A) (Feb. 1973)

Varian Data Machines
Newport Beach, Calif.
(A) (Aug. 1972)

Xerox Data Systems
E1 Segundo, Calif.
(N) (R) (Dec. 1972)

DATE OF
AVERAGE OR RANGE
NAME OF
FIRST
OF MONTHLY RENTAL
COMPUTER
INSTALLATION
$(000)
0.1-0.5
Micro 400/10
12/70
0.2-3.0
Micro 800
12/68
0.2-3.0
Micro 1600
12/71
X
304
1/60
310
X
5/61
315
7.0
5/62
315 RMC
9/65
9.0
390
0.7
5/61
500
1.0
10/65
Century 50
2/71
1.6
Century 100
2.6
9/68
Century 101
3.7
12/72
Century 200
7.0
6/69
Century 300
21.0
2/72
1000
X
6/63
200- 210,211
X
10/58
2000-212
X
1/63
250
12/60
X
440
X
3/64
520
X
10/65
703
10/67
12.5
704
7.2
3/70
706
19.0
5/69
IC 4000
9.0
12/68
IC 6000-6000/E
16.0
5/67
17.0
IC 7000
8/70
IC-9000
400.0
5/71
SYSTEMS 810B
2.6
9/68
SYSTEMS 71
8/72
0.9
SYSTEMS 72
1.0
9/71
SYSTEMS 85
6.0
7/72
10.0
SYSTEMS 86
6/70
I & II
X
3/51 & 11/57
III
X
8/62
File Computers
X
8/56
Solid-State 80 I,ll,
90, I, II, & Step
X
8/58
418
6/63
11.0
490 Series
12/61
30.0
1004
2/63
1.9
1005
2.4
4/66
1050
8.5
9/63
1100 Series (except
1107, 1108)
X
12/50
1107
X
10/62
1108
68.0
9/65
9200
6/67
1.5
9300
9/67
3.4
9400
7.0
5/69
LARC
135.0
5/60
301
7.0
2/61
501
14.0-18.0
6/59
601
14.0-35.0
11/62
3301
17.0-35.0
7/64
Spectra 70/15, 25
4.3
9/65
Spectra 70/35
1/67
9.2
Spectra 70/45
22.5
11/65
Spectra 70/46
11/68
33.5
Spectra 70/55
34.0
11/66
Spectra 70/60
32.0
11/70
Spectra 70/61
4/70
42.0
70/2
16.0
5/71
70/3
25.0
9/71
70/6
25.0
9/71
70/7
35.0
12/71
620
X
11/65
620i
X
6/67
R-620i
4/69
520/DC, 520i
12/69;10/68
620/f
11/70
620/L
4/71
620/f-100
6/72
620/L-100
5/72
Varian 73
XDS-92
4/65
1.5
XDS-910
8/62
2.0
XDS-920
2.9
9/62
XDS-930
3.4
6/64
XDS-940
14.0
4/66
XDS-9300
11/64
8.5
Sigma 2
1.8
12/66
Sigma 3
12/69
2.0
Sigma 5
6.0
8/67
Sigma 6
6/70
12.0
Sigma 7
12.0
12/66
Sigma 8
2/72
Sigma 9
35.0

COMPUTERS and AUTOMATION for March, 1973

(S)
(S)
(S)

(S)

NUMBER OF INSTALLATIONS
In
Outside
In
U.S.A.
U.S.A.
World
129
0
129
1925
770
2695
88
295
383
2
7
5
0
8
8
200
455
255
55
35
90
325
485
160
1750
2850
1100
0
580
580
780
1175
1955
50
330
905
575
5
10
5
16
16
12
20
135
115
20
1
27
26
177
33
210
70
330
260
17
92
75
0
9
9
0
3
3
4
0
4
0
1
1
10
178
168
14
3
31
23
25
13
210
80
76
1522
617
136
9
8
103
1106
412
82
2
143
17
0
74
18
95
265
30
10
18
7
63
7
25
7

3
1
1

X
X

X
X
X

X
X
X

2
40
0
2

17
4
32
31

X
X

X
X

39
14
610
248
59

119
90
2132
865
195

0
3
129
835
62
41
0

9
11
232
1941
474
123
2

75
1300
80
350
201
474
13
22
43
170
120
159
32
25-30
163
13
29
2
30
3
2

NUMBER OF
UNFILLED
ORDERS

10
12
14
3
4
36
0
14

23 E
15
72

X
X

58 E
725
510 E
83 E

X
X

3
114
16
19
12

47
180
132
173
35
29-34
199
13
43
37

49

edi tion of the

coma.u~

COMPUTER
DIRECTORY
AND
BUYER'S GUIDE

COMPUTER
DIRECTORY AND
BUYERS' GUIDE
1972

Computers and Data Processing: Organizations and Products
4
63
51

149
168

177

Roster of Organizations in Computers and Data Processing
Buyers' Guide to Products and Services in Computers and
Data Processing
Geographic Roster of Organizations in Computers and
Data Processing
Roster of College and University Computer Facilities
Roster of Computer Associations
Roster of Computer Users Groups

The Computer Industry
92 Characteristics of Digital Computers
by GM L Corp., Lexington, Mass.
137 Over 2300 Applications of Computers and Data Processing
by Linda Ladd Lovett
3

Counting the Number of Applications of Computers
by Edmund C. Berkeley
133 World Computer Census
by Neil Macdonald
176 The Computer Directory and Buyers' Guide, 1973 - Notice
178 Entry Forms for the 1973 Computer Directory and Buyers'
Guide - Notice

Computer Programming
123 Roster of Programming Languages, 1972
by Jean E. Sammet, IBM Corp., Cambridge, Mass.

The COMPUTER DIRECTORY is:
• an annual comprehensive directory of the firms which offer products and services to
the electronic computing and
data processing industry
• the basic buyers' guide to the
products and services available
for designing, building, and
using electronic computing
and data processing systems

PRICE:
• Price for subscribers to
Computers and Automation
whose present subscription
does not include the Directory (magazine address label
is marked *N) . . . .. $12.00
• Price for non-subscribers
..... $17.50

Computers, Mathematics, and Computer Codes
179 Some Basic Arithmetical Tables
180 American Standard Code for I nformation I nterchange (ASCII)

NOTE:
The Directory is included in
the $18.50 full annual subscription (13 issues) to
Computers and Automation
(magazine address label is
marked *0)
50

Send prepaid orders to:

cDrn~!rIaE!!!:i!
815 Washington St.
Newtonville, Mass. 02160

I f not satisfactory, the Directory
is returnable in seven days for
full refund.
COMPUTERS and AUTOMATION for March. 1973

WILL YOU HELP?

Please give us their names and addresses on the
form below or add another sheet of paper. Trim out the
card with scissors and drop it in the mail. We'll gladly
pay the postage to learn of possible new friends. And many
thanks for your help! As a token of our appreciation we'll
send you our ****Reprint .

Yes, you. It may come as a surprise that you'd be asked
. . . but as a reader of Computers & Automation you are
in a unique position to help us.

P.S. If you like you may mail your list separately to:
R. A. Sykes, Circulation Mgr.
Computers & Automation & People
815 Washington Street
Newtonville, MA 02160

NAMES ... people, institutions, companies who
should be interested in 1) the computer industry and/or
2) seeking truth in information are very much needed to
join you as readers of C&A.

Will you tell us who they are? And perhaps even more, will
you let us use your name in writing to them? But with or
without your name (we'll only use it if you grant permission)
we need to know those you think might be interested in also
reading C&A.

,

r

* -if. * -if.

cut here and tuck in flap

r--------------------------,
TO: R. A. Sykes, Circulation Mgr.
,,,
Computers & Automation & People
,,, I suggest you send information on C&A to ... (attach
list if you like)
,,, (1) Name ________________________________
,,, Address _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ___

I
I

reprint from.

CDrn~~a~!1£!'

f!'
Cll,

_

__ __ _

___ _

...

M

~

<{
-I

U

I-

~

M

0
Z

__ _

__ _

en
V)

'

u:

a:

~

a

:.!

V)

Ol

I
I
I

I

Ig

Ir+

I~

la

City _______________ State _______ Z I P _____

May we use your name?

DYES

o

I
I

I
I
I
I
I

I
I

NO

I

I
I
I

I

YES,

start my subscription to
COMPUTERS AND AUTOMATION AND PEOPLE
according to the instructions checked below.

One Year (including the Computer Directory and Buyers'
Guide -

13 issues) U.S. only. 0 $18.50

One Year (excluding the Computer Directory and Buyers'
12 issues) U.S. only: 0 $9.50

Z

Name: _ _ _ _ _ _ _ __
Title: _______ .
Organ ization : _ _ _ _ _ _ _ _~_ _ __
Address: _ _ _ _ _ _ _ _ _ _ _ _ _ ___

w

l-

::l

CI)

Q)

::::I

.c:

....
c:

Q)

"tl

~

(11

'Iii
I

E

....

Ol
-I

~
~

>
-I
0.

w

a:

V)
V)

w

Z

Cii

::l

en

en
a:
a:

a..

Q)

c:

C,

W

"tl

...0
0

I

Address. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __

Guide -

U

w

.~

C.
(11

I

• c:

e:{

~

~

«I

.~

'"C

l-

I

_ _ _ _ _ _ _ _ _ _ _ Fold here - do not cut

Z-

Q)

41

_

a

l-

I
I

, Please give us your name and address on the form below so we can
: send you your ****Reprint. Just cross out the subscription request
, - unless you also want to enter your new or renewal order.

'"C

....'"(11
....
en

Gi

,,
,
,
,,,

.;

e:{
~

(J)-

.s::.

_

(2) Name __________________________________

:]

0.

v

_

,,

'"C

(J)

a:

___ ~ut~er:.... _

City _ _ _ _ _ _ _ _ State ______ Z I P _ _ __

'5,
u,

Science and the Advanced Society, by C. P. Snow, Ministry
of Technology, London, England (April 1966)
The Information Revolution and the Bill of Rights, by
Dr. Jerome B. Wiesner, M.I.T. (May 1971) .
Employment, Education, and the Industrial System, by
Prof. John Kenneth Galbraith, Harvard Univ. (Aug. 1965)
Computers and the Consumer, by Ralph Nader,
Washington, D.C. (Oct. 1970)
_ _ _ _

.J::,

\

~

:::
'"u
Q)

z

0

>-

I«

~

0

w
w
-I
w

a:
W

co

>-

co

0

;:{
a..

w
co

I-w
«a..
0 0
Zw
«a..

:::>...J

(1)0

o::Z
w«
I-

c:

a.

~

:::>

w

:a:

E

~

t:J

Q)

I-

'"
Cl
(11

....

'"0

a.

0

Z


Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37
Producer                        : Adobe Acrobat 9.1 Paper Capture Plug-in
Modify Date                     : 2009:03:25 00:27:24-07:00
Create Date                     : 2009:03:25 00:27:24-07:00
Metadata Date                   : 2009:03:25 00:27:24-07:00
Format                          : application/pdf
Document ID                     : uuid:0ae3db59-f715-4980-ae42-958590f9821f
Instance ID                     : uuid:f6c9cdb5-ced1-4156-a082-69fcf218d368
Page Layout                     : SinglePage
Page Mode                       : UseNone
Page Count                      : 52
EXIF Metadata provided by EXIF.tools

Navigation menu