197311
197311 197311
User Manual: 197311
Open the PDF directly: View PDF .
Page Count: 52
Download | |
Open PDF In Browser | View PDF |
SCIENCE & TECHNOL09YJ November, 1973 Vol. 22, No. 11 UNTIL DECEMBER 31, 1973 CD STARTING JANUARY 1, 1974 computers and people WORKING TOGETHER Cooperative Facilities to Obtain the Advantages of Computers Control in Time-Sharing Systems Computer Art: The Search Beyond Manipulation Computers in Science Fiction Strategy and Action on World Trade Virtue, in Spite of Erroneous Conceptions Nixon and the Mafia - Conclusion - M. J. Cerullo F. C. Castillo G. C. Hertlein M. Ascher J. H. Binger J. P. Frankel J. Gerth ~ 2. 1721 16 511.3 Here is the start of the most famous article that we ever published - excerpted from the May, 1970, issue of Computers and Automation. If you would like to read this article, and look at the eleven photographs it contains, send us $2 (prepayment is necessary). This issue is RETURNABLE IN 7 DAYS FOR FULL REFUND (IF IN SALABLE CONDITION), How can you lose? Computers and Automation, 815 Washington St., Newtonville, Mass. 02160 THE ASSASSINATION OF PRESIDENT JOHN F. KENNEDY: THE APPLICATION OF COMPUTERS TO THE PHOTOGRAPHIC EVIDENCE Part 1. Introduction Who Assassinated President Kennedy? On November 22, 1963, in Dallas, Texas, President John F. Kennedy, while riding in an open limousine through Dealey Plaza and waving to the surrounding crowds, was shot to death. Lee Harvey Oswald, an ex-Marine, and former visitor to the Soviet Union, was arrested that afternoon in a movie theatre in another section of Dallas; that night he was charged with shooting President Kennedy from the sixth floor easternmost window of the Texas School Book Depository Building overlooking Dealey Plaza. This act Oswald denied steadily through two days of questioning (no record of questions and answers was ever preserved). Two days later while Oswald was being transferred from one jail to another, he was shot by Jack Ruby, a Dallas night-club owner, in the basement of the Dallas police station, while millions of Americans watched on television. The commission of investigation, appointed by President Lyndon B. Johnson, and headed by Chief Justice Earl Warren of the U. S. Supreme Court, published its report in September 1964, and concluded that Oswald was the sole assassin and that there was no conspiracy. In view of the authority of the Warren Commission, that conclusion was accepted by many Americans for a long time. But the conclusion cannot be considered true by any person who carefully considers the crucial evidence - such as ,the physics of the shooting, the timing of a number of events, and other important and undeniable facts. In other words, Oswald was not the sole assassin, and there was a conspiracy. This article will develop that thesis, prove it to be true on the basis of substantial, conclusive evidence, and in particular some analysis of the photographic evidence. There was in fact a conspiracy. Oswald played a role in the conspiracy, although there is conclusive evidence that on November 22, 1963, he did no shooting at President Kennedy, and that, just as he claimed when he was in the Dallas jail, he was a "patsy." At least three gunmen (and probably four) - none of whom were in the sixth floor easternmost window of the Texas School Book Depository building where the Warren Commission placed Oswald - fired a total of six shots at President Kennedy. One of these shots missed entirely; one hit Governor John B. Connally, Jr. of Texas, riding with Kennedy; and four hit President Kennedy, one in his throat, one in his back, and two in his 2 by Richard E. Sprague Hartsdale, New York head. (The bulk of the undeniable evidence for these statements about the shots consists of: (a) the physics of the motions of Kennedy and Connally shown in some 60 frames of the famous film by Abraham Zapruder; (b) the locations of the injuries in Kennedy and in Connally; and (c) more than 100 pictures, consisting of more than 30 still photographs and more than 70 frames of movies.) More than 50 persons were involved in the conspiracy at the time of firing the shots. These persons included members of the Dallas police force (but not all of the Dallas police - and that ac{continued in the May 1970 issue of Computers and Automation} Contents Page Parts 1 2 3 4 Introduction The Photographic Evidence The Application of Computers to the Photographic Evidence Appendices: Acknowledgements and Notices Epilogue Bibliography 11 Figures Helicopter View of Dealey Plaza Policemen and "Tramps" "Tramps" Policemen and "Tramps" Policemen and "Tramps" 6th Floor Easternmost Window of the Texas School Book Depository Building Kennedy About the Time of the First Shot Kennedy After the First Three Shots and Before the Fatal Shot The Radio Communicator 1 2 Charts Spatial Chart Schematic Timing Chart 1 2 3 4 5 6, 7 8, 9 10 1 2 3 4 5 Tables Index to Spatial Chart Photographs Acquired by FBI and Unavailable Main List of Photographs Preliminary List of Computer Codes Preliminary Coding Sheet for Computer-Assisted Analysis 2.0 34 56 58 59 60 37 38 39 40 41 42 43 44, 45 33 48, 49 51 46 50 52 57 58 COMPUTERS and AUTOMATION for November. 1973 THE PURSUIT OF IMPORTANT TRUTH The magazine Computers and Automation has for more than three years followed an unusual publication policy: - The pursuit of truth in input, output, and processing, for the benefit of people, and an unusual belief: - That computers are too important to be left to computer experts and must be integrated into a socially responsible profession of information engineering. Where this policy has operated most is in publishing information, articles, and reports on subjects which a great many liberal and progressive newspapers and periodicals have left unexplored or unmentioned: - The political conspiracies which have led to the assassination of President John F. Kennedy, Senator Robert Kennedy, Martin Luther King, and others - and their coverups - The conspiracies, coverups, and lies in connection with the pursuit. of war in Indochina and dictatorship by the Saigon regime - The connections of President Richard M. Nixon with organized crime and the Mafia - The Watergate crimes If you believe in the value of truthful, frank reporting on the most important topics for the welfare of the people of the United States today, we urge you to subscribe to our magazine, and buy our back copies (almost everyone is in print). Please help us pursue the important truth and report on it, by buying our products. Unsettling, Disturbing, Critical ... Computers and Automation, established 1951 and therefore the oldest magazine inthe field of computers and data processing, believes that the profession of information engineer includes not only competence in handling information using computers and other means, but also a broad responsibility, in a professional and engineering sense, for: --- The reliability and social significance of pertinent input data; -- The social value and truth of the output results. In the same way, a bridge engi neer takes a professional responsibility for the reliability and significance of the data he uses, and the safety and efficiency of the bridge he builds, for human beings to risk their lives on. Accordingly, Computers and Automation publishes from time to time articles and other information related to socially useful input and output of data systems in a broad sense. To this end we seek to publish what is unsettling, disturbing, critical --- but productive of thought and an improved and safer "house" for all humanity, an earth in which our children and later generations may have a future, instead of facing extinction. The professional information engineer needs to relate his engineering to the most important and most serious problems in the world today: war, nuclear weapons, pollution, the population explosion, and many more. Edmund C. Berkeley, Editor - - - - - - - - - - - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - - - - - - - TO: Computers and Automation (Computers and People, starting January 1, 1974) 815 Washington St., Newtonville, Mass. 02160, U.S.A. YES, please start my subscription to your magazine ) Without the "Computer Directory": I enclose ( ) U.S.A., $11.50 ) With the "·Computer Directory": I enclose ( ) U.S.A., $23.50 ( ) Canada, $12.50 ) Canada, $24.50 ( ) Foreign, $17.50 ) Forei~n, $32.50 ) Please bill my organization. ) Please send me information about the important articles in back copies (usual cost, $2 each) Name: _______________________________________________________ Title ________________________________ Organization: _______________________________________________________________________________________ Address: ________________________________________________________________________________________ Signature: ___________________________________________ Purchase Order No. _____________________________ COMPUTERS and AUTOMATION for November, 1973 3 UNTIL DECEMBER 31, 1973 computers and automation Vol. 22, No. 11 November, 1973 Editor Edmund C. Berkeley Assistant Editors Barbara L. Chaffee Linda Ladd Lovett Neil D. Macdonald Software Editor Stewart B. Nelson Advertising Director Edmund C. Berkeley Contributing Editors John Bennett Moses M. Berlin Andrew D. Booth John W. Carr III Ned Chapin Leslie Mezei Bernhard W. Romberg Ted Schoeters Richard E. Sprague Advisory Committee Ed Burnett James J. Cryan Bernard Quint Editorial Offices Berkeley Enterprises, Inc. 815 Washington St. Newtonville, Mass. 02160 617-332-5453 Advertising Contact The Publisher Berkeley Enterprises, Inc. 815 Washington St. Newtonville, Mass. 02160 617-332-5453 "Computers and Automation" is published monthly, 12 issues per year, at 815 Washington St•• Newtonville, Mass. 02160, by Berkeley Enterprises, Inc. Printed in U.S.A. Second Class Postage paid at Boston, Mass., and additional mailing points, • Subscription rates: United States, $11.50 for one year, $22.00 for two years. Canada: add $1 a year; foreign, add $6 a year. NOTE: The above rates do not include our publication "The Computer Directory and Buyer,s' Guide". If you elect to receive "The Computer Directory and Buyers' Guide", please add $12.00 per year to your subscription rate in U.S. and Canada, and $15.00 per year elsewhere. Please address all mail to: Berkeley Enterprises, Inc., 815 Washington St., Newtonville, Mass. 02160. Postmaster: Please send all forms 3579 to Berkeley Enterprises, Inc., 815 Washington St., Newtonville, Mass. 02160. © Copyright 1973, by Berkeley Enterprises, Inc. Change of address: If your address changes, please send us both your new address and your old address (as it appears on the magazine address imprint), and allow three weeks for the change to be made. 4 STARTING JANUARY 1, 1974 computers and people The Computer Industry [T A] 8 Cooperative Facilities to Obtain the Advantages of Computers by Michael J. Cerullo, State University of New York, Albany, N.Y. How to plan, before operations begin, a cooperative service bureau that will provide its sponsors with all the advantages of electronic data processing, plus the advantages of greatly reduced expenses. 10 Control in Time-Sharing Systems [T A] by Fermin Caro del Castillo, Fort Worth, Texas How time-shared computer systems should be controlled, made secure, and protected against incursions and hazards. 14 Alienation and the Systems Analyst [T A] by Alan E. Brill, The Chase Manhattan Bank, New York, N.Y. How systems analysts are often looked upon as in a "computer department" and outside of the firm - and what might be done to correct this practice. Computers and Art 18 Computer Art: The Search Beyond Manipulation [T A] by Grace C. Hertlein, California State University-Chico, Chico, Calif. How computer art is ranging through variation in patterns, variations in design, and varying philosophies of art - and where it may go. Computers and the Future 20 Computers in Science Fiction - II [NT A] by Marcia Ascher, Professor of Mathematics, Ithaca College, Ithaca, N.Y. A survey of some two dozen themes of importance in the real world that are reflected in science fiction when astute writers explore the significance of computers to human beings. [NT E) 6 The Understanding of Natural Language by Computers by Edmund C. Berkeley, Editor, Computers and Automation Some rather convincing evidence suggests that before long some large areas of ordinary natural language will be understood by computers. World Affairs and Social Policy 15 Strategy and Action on World Trade [NT A] by James H. Binger, Chairman, Honeywell Inc., Minneapolis, Minn. Why it is important for the well-being of the people of the United States to a.id the international division of labor and production: - a discussion by the head of a multinational company which is a computer company. COMPUTERS and AUTOMATION for November, 1973 The magazine of the design, applications, and implications of information processing systems - and the pursuit of truth in input, output, and processing, for the benefit of people. World Affairs and Social Policy (continued) 33 Virtue, in Spite of Erroneous Conceptions [NT A] by J. P. Frankel, Dean of the Faculty, Harvey Mudd College, Claremont, Calif. Which projects and problems should scientists work on? and which projects and problems should receive support by the government and which from other sources? The Profession of Information Engineer and the Pursuit of Truth 3 Unsettling, Disturbing, Critical Statement of policy by Computers and Automation [NT F] [NT F] 3 The Pursuit of I mportant Truth by Edmund C. Berkeley, Editor Four kinds of truth that are regularly unexplored and unmentioned . 36 Nixon and the Mafia - Conclusion [NT A] by Jeff Gerth, SunDance Magazine, San Francisco, Calif. The many connections of President Richard M. Nixon with organized crime, scandal, etc. 26 Burying Facts and Rewriting History - II [NT A] by Edmund C. Berkeley, Editor, Computers and Automation Taken together the information published May 1970 to November 1973 in Computers and Automation effectively destroys a large segment of the beliefs, the rewritten history, that the establishment in the United States has arranged for the people in the United States to believe. [NT R] 28 Political Assassinations in the United States Inventory of 41 articles published in Computers and Automation May 1970 to October 1973 on the assassinations of President John F. Kennedy, Senator Robert Kennedy, Reverend Martin Luther King, and other politically important persons in the United States: titles, authors, and summaries. 27 The Watergate Crimes [NT R] Inventory of 12 articles published in Computers and Automation August 1972 to September 1973 on the burglarizing of the Democratic National Committee offices in the Watergate Building, Washington, D.C., June 17, 1972, and the ramifications: titles, authors, and summaries. Computers, Puzzles, and Games 35 Numbles by Neil Macqonald [T C] Front Cover Picture Three eighth graders - each from a different continent - are working together to solve complex mathematics problems. They are at the new United Nations International School, and are Laurence Ling May, a Chinese-Thai American; Catharina Nilson of Stockholm, Sweden; and Arun Alagappan of India. The minicomputer system is a gift from Digital Equipment Corp. For more information, see page 43 of the July 1973 issue. Departments 42 50 50 32 48 46 47 23 Across the Editor's Desk Computing and Data Processing Newsletter Advertising Index Calendar of Coming Events Classified Advertisement Monthly Computer Census New Contracts New Installations Statement of Ownership Key [A] [C] [E] [F] [NT] [R] [T] - Article Monthly Column Editorial Forum Not Technical Reference - Technical Corrections For changes in liThe Path to Championship Chess by Computer" by ProfeSsor Donald Michie published in the January 1973 issue of Computers and Automation, see page 23 of this issue, or page 24 of the July issue. For changes in the reprinting and the indexing of "Communication Three Way: Chimpanzee, Man, Computer",published in the July issue, see page 32 of this issue. COMPUTERS and AUTOMATION for November, 1973 NOTICE *0 ON YOUR ADDRESS IMPRINT MEANS THAT YOUR SUBSCRIPTION INCLUDES THE COMPUTER DIRECTORY. *N MEANS THAT YOUR PRESENT SUBSCRIPTION DOES NOT INCLUDE THE COMPUTER DIRECTORY. 5 EDITORIAL The Understanding of Natural Language by Computers Proposition: Computers are making long strides towards understanding natural language as used by human beings, and will eventually understand such language as well as many human beings do. What do we mean by: computers? understanding language? natural language? And what is the evidence for this proposition? The word "computers" here refers to powerful computers that have appropriate programs written by human beings plus the programmed capacity to improve their programs by using experience. An example of such improvement is Dr. A. L. Samuels' famous checker-playing program, which can learn from experience, and which plays far better checkers than Dr. Samuels himself can play. The experience may consist of the following at least: Answers from human beings to questions posed by the computer; Differences between computed results and a priori specified results; Signals from the environment, such as instrument readings; Information obtained by "looks" at the environment, as for example recognition of the character A, as in optical character recognition; The interpretation of words, as with FORTRAN expressions. Probably there are even more categories of experience which a powerful computer program can use to modify itself to become even a better program. In regard to "understanding language", there are over 500 languages which computers have been programmed to understand, when written precisely according to stated rules: among them, BASIC, FORTRAN, COBOL, many kinds of machine language, etc. "Natural language" is the ordinary language used by human beings, subject to the requirement that for a computer implicit understandings must be stated. For example, when a speaker exclaims "Ouch!", a great deal of the meaning comes from the listener's observations of the speaker. But a computer, like a blind man, cannot "see" the situation, and must be told more than the ordinary listener. With some definitions taken care of, let us consider evidence for the main proposition stated above. This evidence includes the information published in several recent articles in Computers and Automation. The article '''Do What I Mean' - The Programmer's Assistant", by Warren Teitelman, in the Apri11972 issue, described a "programmer's assistant", called "DWIM"; this was a "front end" or preprocessor to an interactive program for operating with LISP expressions. The front end was tolerant of the programmer's mistakes in typing, in lowlevel logic, etc.; it would catch misspellings, failures to have a balancing number of left and right parentheses, etc. If a 6 mistake occurred, it would inquire of the human programmer what he meant, suggesting the correctly spelled alternative, and so on. In this way the human programmer was relieved of much of the burden of expressing himself exactly and correctly the first time, and his efficiency in using the LISP interactive program greatly increased. The three articles "Computer Programming Using Natural Language" by Edmund C. Berkeley, Andy Langer, and Casper Otten, in the June, July, and August 1973 issues, demonstrated the understanding by a computer program called GENIE of at least some sets of instructions in ordinary natural language. The vocabulary though small was free, and there was unlimited freedom in putting the words together, with about a 90% chance of complete understanding. The computer program that did this could be called 15% GENIE, because, as the authors emphasized, it was still in an early stage of development. The article "Latest Computers See, Hear, Speak, and Sing - and May Outthink Man" by David Brand, in the October 1973 issue, enumerated many instances of computers (and robots equipped with computers) which could deal with concepts expressed in natural language. One of the programs mentioned could for example decipher naturallanguage commands dealing with the stacking of blocks of various shapes, sizes, and colors. The main tasks for understanding natural language appear to be the following: Recognition of the framework of a sentence; Recognition of the common meaning of groups of synonyms, the collection of words that "say the same thing"; Knowledge of context: the context is regularly specified to the computer, so that it does not have to deduce the context from "what is being said"; Knowledge of a limited vocabulary consisting of perhaps 300 to 500 words - knowledge in the sense that the computer program can attach meaning to the words either by themselves or in phrases, as for example it may attach the meaning of doing something three times to the numeral 3; Capacity to accept variation in the way something is stated by a human programmer. The three articles referred to above show instances of the achievement of all of these tasks separately. Combining all the achievements should not be too hard, especially since children as young as four years old show complete capacities to listen to many kinds of natural language, understand, and respond. C=~tAC.~ Edmund C. Berkeley Editor COMPUTERS and AUTOMAliON for November. 1973 The Notebook on COMMON SENSEI ELEMENTARY AND ADVANCED is devoted to development, exposition, and illustration of what may be the most important of all fields of knowledge: WHAT IS GENERAllY TRUE AND IMPORTANT TECHNIQUES FOR AVOIDING MISTAKES + + + + JUDGEMENT AND MATURITY help you avoid pitfalls prevent mistakes before they happen display new paths around old obstacles point out new solutions to old problems stimulate your resourcefulness increase your accomplishments improve your capacities help you solve problems give you more tools to think with COMPUTERS and AUTOMATION for November. 1973 + Topic: SYSTEMATIC EXAMINATION OF GENERAL CONCEPTS Already Published Already Published Preventing Mistakes from: Failure to Understand Forgetting Unforeseen Hazards Placidity To Come Preventing Mistakes from: Bias Camouflage Interpretation Distraction Gullibility Failure to Observe Failure to Inspect Prejudice COMMON SENSE, WISDOM, AND GENERAL SCIENCE This field includes what is common to all the sciences, what is generally true and important in the sciences. MISTAKES are costly and to be AVOIDED This field includes the systematic study of the prevention of mistakes. MONEY is important The systematic prevention of mistakes in your organization might save 10 to 20% of its expenses per year. OPPORTUNITY is important If you enter or renew your subscription to both Computers and Automation and the Notebook on Common Sense at the same time, direct to us, - you may take off $2.00 per year from the total cost. + Topic: TH E SYST EMATI C PREVENTION OF MISTAKES 8REASONS TO BE INTERESTED IN THE FIELD OF COMPUTERS are important But the computer field is over 25 years old. Here is a new field where you can get in on the ground floor to make your mark. MATHEMATICS is important But this field is more important than mathematics, because common sense, wisdom, and general science have more applications. WISDOM is important This field can be reasonably called tIthe engineering of wisdom". COMMON SENSE is important _ This field includes the systematic study and development of common sense. SCI ENCE is important _ TECHNIQUES FOR SOLVING PROBLEMS + + PURPOSES: to to to to to to to to to + SCIENCE IN GENERAL The Concept of: Expert Rationalizing Feedback Model Black Box Evolution Niche To Come Strategy Understanding Teachable Moment Indeterminacy System Operational Definition .. - - - - - - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - - - .. - - - - •• - - , To: Computers and Automation 815 Washington St., Newtonville, Mass. 02160 ' ( ' ) Yes, please enter my subscription to The Notebook on Common Sense, Elementary and Advanced at $12 a year (24 issues), plus extras. I understand that you always begin at the beginning and so I shall not miss any issues. : ' , ' ) Please send me as free premiums for subscribing: ( 1. Right Answers - A Short Guide to Obtaining Them 2. The Empty Column 3. The Golden Trumpets of Yap Yap ( ) I enclose $ 4. Strategy in Chess 5. The Barrels and the Elephant 6. The Argument of the Beard ) Please bill my organization RETURNABLE IN 7 DAYS FOR FULL REFUND IF NOT SATISFACTORY HOW CAN YOU LOSE? Name _ _ _ _ _ _ _ _~_ _ _ _ _ Title _ _ _ _ _ _ __ Organization--'---_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ Address (including zip) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ Signature _ _ _ _ _ _ _ _ _ __ Purchase Order No. _ _ __ 7 Cooperative Facilities to Obtain the Advantages of Computers Michael J. Cerullo Asst. Professor of Accounting State Univ. of New York at Albany 1400 Washington Ave. Albany, N. Y. 12222 "Because of general dissatisfaction, 30% of the surveyed service bureau clients planned to discontinue using service bureaus." Computer Use A recent study of 2,500 companies conducted by the Research Institute of America, revealed that 55% of the firms regularly use computers in conducting their business. Further breakdown of the study shows that an average of 32% own or lease their own computers, and 23% use an outside service bureau for processing data. l While a majority of the companies surveyed do use computers in some form, a significant 45%.of the respondents do not use any type of computerized data processing service. Those companies cited the following reasons for not using computers: 2 'Operation too small Too costly Looked into and tabled for the present Present methods satisfactory plan to install a computer within a year Plan to begin using a service bureau within a year .Other Total (multiple answers) Per Cent 50 35 Cooperative Service Bureaus Both non-users and dissatisfied service bureau clients, therefore, offer a ready market for a newer approach to obtaining the advantages of EDP - the formation of a cooperative service bureau. A cooperative service bureau consists of several sponsoring firms who jointly own a computer and share in its operating costs at a much lower expense than individual ownership of a computer. If carefully planned before operations begin, a cooperative ser~ vice bureau will provide its sponsors with all the advantages of EDP plus many other advantages unique to jointly-shared facilities and personnel. 31 21 8 8 166% Service Bureau Use In addition to the non-users, another recent study revealed that most service bureau clients are not effectively using their service bureau and, as a result, are receiving few, if any, of the advantages q! electronic data processing (EDP). Most of th~surveyed service bureau clients were: 3 1. Receiving routine services which do not save them money. 2. Not planning to expand into more sophi sticated, higher-payoff applications. 3. Not receiving indirect benefits and savings, such as improved information for decision making. 4. Not satisfied with current service&. 8 The study also disclosed that because of the general dissatisfaction, 30% of the surveyed service bureau clients planned to discontinue using service bureaus and purchase in-house computers. 4 Among these additional advantages are: 1. The sponsors would purchase a computer tailored to their specific needs. 2. They would have exclusive use of the computer. 3. Their computer would be available for use at any time. 4. They could share the costs of any computer programs developed. 5. They could share the costs of any package or canned computer programs purchased. 6. They would have available for their exclusive use a staff of data processing experts and a computer - at a fraction of the cost of individual ownership. Factors Insuring the Success of the Cooperative The first step in forming a successful cooperative service bureau is to enroll an appropriate number of comapnies. Ideally the cooperative should be limited to five or six sponsoring firms. A larger number may create unmanageable problems involving operations, communications. control, scheduling of computer time, and so forth. A smaller number may make the venture economically unfeasible. COMPUTERS and AUTOMATION for November. 1973 Lack of· Interest At the present time, widespread lack of interest in joining a cooperative is more of a problem to potential organizers than too much demand. The author contacted a number of public accounting firms about the feasibility of forming cooperatives and found that three firms who had already made such an attempt could not interest enough firms to join. Their comments were: We tried to organize one several years ago; the firms contacted were not interested. We would like to explore this possibility but we can't get anyone else interested. At present there appears to be a tragic lack of interest locally by other CPA firms. Unquestionably, one reason for the lack of interest is a misunderstanding of the true nature of a cooperative. Interested companies must therefore be prepared to sell the idea to others. As more published material becomes available in the field, this problem should be alleviated. Confidential Information disinterested third party, such as a firm of independent public accountants. Sharing of Expenses: Startup Costs With an adequate number of sponsoring firms lined up and a sound security system worked out, the third necessity in establishing a successful cooperative is to determine methods of sharing the expenses. There are two categories of costs to consider: 1. Startup ~osts. These include all costs incurred prior to the time that the cooperative commences operations. Startup costs are either directly traceable to a particular firm or are joint or common to all firms. An example of a direct cost would be that of analyzing, modifying, and redesigning of systems prior to conversion to the computer. An example of a joint or common cost would be the cost of computer housing, including air conditioning, engineering supervision, false floors, ducts and pipes, tranformers or motor generators, cabling and wiring, and overhead racks and supports. Each sponsoring firm should pay for its own direct costs. Joint costs should be shared equally or apportioned among the firms according to some equitable formula. Operating Costs A second major reason for lack of interest is that companies fear for the control and security of their confidential or sensitive information. Such a concern is certainly legitimate and underscores the need for a cooperative that is to be successful, to devise an adequate system for quality control and security. A committee responsible for such a system should ·be established at the outset by the sponsoring firms. Protection One of its duties should be to adequately safeguard the sponsors' records and documents against fire, theft, water, and other hazards and disasters. Statistics compiled by the Safe Manufacturers National Association show that about one-half of companies whose important records and documents were destroyed through some catastrophe never resumed business or were permanently closed down within six months; an additional 13% suffered serious economic impairment and were able to remain in business only under severe operating handicaps.5 For this reason the quality control and security committee must see that the cooperative service bureau maintains: protective devices fireproof vaults a method of reconstructing any destroyed records adequate insurance to cover loss of important client records or documents The committee must also take measures to prevent one client's records from becoming commingled with another client's records - a not-unlikely occurrence in such an environment. Preventing Disclosure Finally, the committee should determine how to prevent disclosure of confidential information. For example, no member of any sponsoring company should be allowed in certain strategic parts of the computer center. Likewise, each company's records should be coded and the code number known only to key computer center personnel. In cases requiring utmost security, the actual processing of data should be monitored by a key employee of the computer center or possibly by a representative of a COMPUTERS and AUTOMATION for November, 1973 2. Operating costs. These include the monthly hardware and software costs to operate the cooperative. Hardware costs refer to the periodic rental or purchase charge for the computer equipment. As a minimum the computer equipment consists of an input unit, a central processing unit, and an output unit. Software costs include personnel costs, programming costs, testing and debugging costs, magnetic tapes, disc packs, punched cards, paper, paper tapes, repair parts, power, telecommunication lines, and so on. Operating costs that are directly traceable should be paid by the' using firm. joint or common costs can be shared equally or can be allocated to each firm based on the number of transactions processed or the actual computer processing time used during the period. In addition, if so desired, a sponsor could be required to pay a minimum or maximum monthly charge. Management <'. Fourthly, the sponsoring companies should decide how to manage the venture. It is advisable to form a committee to oversee the management and operation of the cooperative. A decision must be made whether each member regardless of size should have one vote or whether another basis of voting should be used. This decision should assure participants that no one firm will dominate or control the cooperative. Common Line of Business A factor not to be overlooked when forming a cooperative, one which will avoid frustrations, complications, and extra expenses, is to see that each member is in the same industry or business category. Thus all sponsoring firms will have similar operating problems that can be simultaneously solved by the computer personnel, resulting in the allocation of smaller costs to each firm for each problem solved. Also computer programs developed or packaged programs purchased can be shared by all sponsors with minimum modifications, thus resulting in considerable programming cost savings. (please turn to page 13) 9 Control in Time-Sharing Systems Fermin Caro del Castillo 6043 Westridge Lane Fort Worth, Texas 76116 '~ time-sharing installation (/ike every computer environment) is exposed to the seven major dangers: fire, water, theft, fraud, sabotage, equipment malfunctions, and human errors." Introduction This article has as its main objective to furnish and define some methods and provisions for control and security in a computer time-sharing environment. It is evident that computer time-sharing has become very popular during recent years. More and more confidential information is being handled by these systems, creating an urgent need for strong measures of control and security. Description of the System The service provided by a single computer to many telecommunications terminals has been called "computer time-sharing". With this type of service each user shares simultaneously in the processing capabilities of the central processor. This new computer facility makes this service available to small companies and/or other users who have little need for their own computer. Computing services that may go under the heading of time-sharing include: Commercial computing; text editing; databank information retrieval services; application services such as colleges' records, inventory control, payrolls of small companies, and account receivables; administrative messages; switching and collection services; and more. Among the great number of time-sharing users are hospitals (Welch Hospital, one of the biggest in Europe, has acquired the large ICL 1904S computer with 7020 terminals), banks (Gosbank, the national bank of the USSR, has ordered two large-scale Honeywell series 600 with 100 terminals), schools and colleges (British schools and colleges have started using terminals), airlines (Continental Airlines uses the Sonic 360 reservation system with 550 online terminals). Trends The growth in computer time-sharing has been phenomenal in recent years in spite of a short business recession between 1970 and 1972. Time sharing was a broker's dream in the '60s; many companies realized its potential, entered the market, and failed because of: one, strong competitive pressure, and two, because of the countless thefts and violations suffered. The highly competitive situation benefited the user in regard to pricing, but the offsetting consequence of lower profits caused a high casualty rate among these companies. As a result, the number of time-sharing firms dropped from 150 to 50 between 1969 and 1972. 10 A few of the companies which survived and which account for most of today's time-sharing business are Rapidata Corporation, Teletype Corporation (a subsidiary of AT&T), Tymeshare Incorporated (the largest independent firm and second only in size to IBM and Honeywell time-sharing operations), and IBM, Jerry Dreyer, executive president of ADAPSO, an association of data processing service organization~ estimates that one time-sharing company out of three was profitable in 1971, two out of five in 1972, and probably three out of six in 1973. Nowadays, this computer facility is coming back to its original trend, and it is expected that the number of computers with terminals will grow from 32% at the end of 1971 to 45% at the end of 1975, with the average central processing unit driving 15 to 20 terminals. One consultant, Creative Strategies of Palo Alto, California, predicts that time-sharing sales by 1976 will increase to 2 billion from 331 million last year. By 1975, says ADAPSO's Dreyer, time-sharing will account for 1/3 of the $4.5 billion computer services industry. Technological Advances Most important technological advances have been achieved recently on on-line terminals linked to central processors. Some of the improvements made include solid state keyboards, which have greater reliability and lower cost; visual display methods, which incorporate more capacity, economy, and aesthetic appeal; non-impact printing techniques, which provide faster, quieter and more reliable operations; improved lower cost memories; more powerful logic capability; and faster and more accurate modern techniques and improvements in central processor software. This is only the beginning. It is foreseen that in the future the equipment itself will change in nature and will probably not be recognizable as terminals per se. Rather, terminals wiil be modular systems consisting of the required input/output functions for specific jobs, built around basic controller and communication interfaces; in many instances, terminals will become special purpose devices. Hazards A time-sharing installation, like every computer environment, is exposed to the seven major dangers of fire, water, theft, fraud, sabotage, EDP equipment malfunctions, and human errors. Fire is considered to be the greatest· threat to magnetic tapes. Water does not constitute an important hazard to magnetic tapes; but it does to computer installaCOMPUTERS and AUTOMATION for November. 1973 tions. Theft, fraud, sabotage, EDP equipment malfunctions, and human errors are considered the most common dangers. elude each of the following segments: physical·securitYi personnel security; procedural security; audit control; insurancei and any needed interfacing. On-line terminals connected to central processors from remote points are more exposed to violations and thefts. The increasing popularity of timesharing systems among large corporations and service bureaus has given rise to even more potential security breaches. Data transmitted over a communication line could be subject to wire tapping and a number of other hazards such as piggyback entry, whereby the intruder intercepts and compromises communication between a terminal and the processor while a legitimate user is inactive but still holding the line open. The intruder can even cancel the user's sign-off signal and continue operating in his name. A knowledgeable person could enter program changes from a terminal and play havoc with the system. The quality and level of protection required depends on the sensitivity of the data handled. Nevertheless, control and security in a time-sharing environment should encompass the whole system, since it is well known that even the strongest control measures can be violated at the weakest point. These measures should be taken in the central processing unit, software, personnel, communication lines, the terminal, and its users. Need for Protection Due to the increasing popularity of computing services. the issue of control and security protection has become more important. It is evident that time-sharing systems present few obstacles to unauthorized parties. The security problem has been made much more critical by the growing number of people trained in computers and by the fading of the computer mystique. In addition, communication by means of time-sharing systems has no more protection than telephone conversations or Morse-coded methods, since the technological skills necessary to interpret computerized data are widespread. More and more companies are appointing security monitors from their EDP staffs to centralize security matters. Trade organizations such as the American Management Association and the Bank Administration Institute, computer firms, and research firms such as Advancement Management Research, Inc. find their seminars on computer security overcrowded by data processing managers and security officers from business and government. Target of Attacks Computers have become an important source of information and. as a result, the target of many attacks. Some of the general information targets for industrial espionage are sales and service information, market analysis strategies, bid prices, corporate finance, stockholder information, legal negotiations. planned policy changes, expansion plans, product developments, personnel changes, payroll data. general administrative matters; and the list could be expanded even more. Threats -The case of an 18 year-old Cincinnati youth who used long distance telephone to tap the lines of a time-sharing system firm in Louisville, Kentucky, and extra::;UE monthly . . . "" ...... lu" 0 Mt: MO;: UBLI::.H R~(r.otprinte'J) Berkeley Enterprises, Inc •• same address . NAMES AND ADDRESSES OF PUBLISHER, EDITOR, AND MANAGING EDITOR Page 7, second column, third paragraph; lines 1 and 2: replace "the Rand Corporation mathematician" by "the professional philosopher". O".'n<~~'~:";;~:"~;;rkeley. same 7. OWNER (If owned by Page 8, the chess position for Figure IB should be: 815 Washington St.. Newtonville. Mass. 02160 der former .ectlon 4359 01 this title ~~~~i:i~~ ~c~e;~:%e::t~ec~~:!.~~ollided under this .ub.ection unle.. he file. ennulIlIV with the Postel Service e written request for !:t::~~:~:~~I~ ;~:ot~:e~r~;i~~n~.~. ~.I;:~"~~t., I hereby request permission to mal/the publication named In Item 1 et the ...duclld postage 1;:;lvnature.nd titleofedltor,pubtl.her,bullne"menager, or Own er 1 . t"uA ",OM LeiluN 8 NuN'l1u.-l uRl:iANIZA luNS AUTHOH1ZI:u 0 MAIL AT SPECIAL RATES (Section 1]2.122, PonalManual (Check one) !~g:~~:I~~' !~~c~~;, :;:;:tn~;~~: ,~::u'F:~:~!~ 0 ~::I~;:!:c~~~:d Incometallpurpo_ (lfchanged,publi.rhermUJt submft exp/anation of change 12 month. MiththiJnaterrwnt.) AVERAGE NO. COPIES EACH ISSUE DURING PRECEDING 12 MONTHS A. TOTAL NO. COPIES PRINTED (Ner Page 9, the graph in Figure 2 should be as follows (containing one more connecting link): Pw" Rult) D. FREE DISTRI8UTlON BY MAIL, CARRIER OR OTHER MEANS 1. SAMPLES, COMPLIMENTARY, AND OTHER FREE COPIES ACTUAL NUMBER OF COPIES OF SINGLE ISSUE PUBLISHED NEAREST TO FILING DATE 9008 8300 7611 7175 7611 7175 100 100 2. COPIES DISTRI8UTEO TO NEWS AGENTS, BUT NOT SOLD E. TOTAL DISTRteUTION (Sum ofCCInd D) G. TOTAL (Sum olE 4 F-Ihould equal PSForm COMPUTERS and AUTOMATION for November. 1973 3526 nerpr~.~n showrr In A) 7711 7275 1297 1025 9008 8300 July 1971 23 A fabulous gift for Christmas: "RIDE THE EAST WIND: Parables of Yesterday and Today" by Edmund C. Berkeley, Author and Anthologist Over fifty parables (including anecdotes, allegories, and fables) by Berkeley and many other authors, modern and ancient, dealing with famous problems, modern, classic, or ageless. Many parables are decorated by a bouquet of proverbs and quotations - for readers who like to choose which variety of lesson appeals to them. A short guide to some patches of common sense and wisdom. An ideal gift. Illustrated. Hard cover. 224 pages. Do you remember the story of the fox and the grapes? illustrating a principle of such timeless value that the phrase "sour grapes" has been used and understood by millions of people for 2000 years? Well, why not make a collection of ideas and principles of common sense and wisdom - and why not illustrate them with fables, allegories, and anecdotes of enormous impact? That was the plan of this book. It comes right out of our work on the "Notebook on Common Sense and Wisdom, Elementary and Advanced" - which we have been tal ki ng about for two years to anyone who would listen. Some of the issues of the Notebook roused the interest of the president of Quadrangle Books - and this book. is one of the results. You can't lose by taking a look at this book: • • • You might enjoy it. You might find much of it humorous and imaginative as did Aesop's listeners. You might find it instructive, philosophical, worth thinking about, and more besides. You can see it, read it, keep it for 7 days, return it, and back comes the full price of the book. How can you lose? We want only satisfied customers. The eagle in the great forest flew swiftly, but the Eastwind flew more swiftly still 24 COMPUTERS and AUTOMATION for November, 1973 "RIDE THE EAST WIND: The Fox of Mt. Etna and the Grapes Parables or Yesterday and Today" Table of Contents Part 1. The Condition of Man Pandora and the Mysterious Box / H. A. Guerber The Garden of Paradise* / Hans Christian Andersen *to which the King's son was transported by the East Wind 4I The History of the Doasyoulikes / Charles Kingsley The Locksmith and the Stranger / Edmund C. Berkeley (B) The Elephant and the Donkey / James Reston Where that Superhighway Runs, There Used to be a Cornfield / Robert Redfield The Fire Squirrels / B The Fox decided that what he needed was Engineering Technology. So he went to a retired Engineer who lived on the slopes of Mt. Etna, because he liked· the balmy climate and the view of the· Mediterranean Sea and the excitement of watching his instruments that measured the degree of sleeping or waking of Mt. Etna. The Fox put his problem before the Engineer. Part 2. On Flattery and Persuasion The Crow and the Fox / Jean de La Fontaine The Visitor who Got a Lot for Three Dollars / George Ade The Cuckoo and the Eagle / Ivan A. Kriloff The Wind and the Sun / Aesop The Lion in Love / Aesop The Crow and the Mussel/Aesop, B The Two Raccoons and the Button / B Missile Alarm from Grunelandt / B The National Security of Adularia / B Doomsday in St. Pierre, Martinique / B Part 7. Problem Solving The Wolf and the Dog of Sherwood / Aesop, B The Three Earthworms / B The Hippopotamus and the Bricks / B The Cricket that Made Music / Jean de La Fontaine, B The Fox of Mt. Etna and the Grapes / B The Mice of Cambridge in Council/Aesop, B Brer Badger's Old Motor Car that Wouldn't Go / B The First Climbing of the Highest Mountain in the World /Sir John Hunt, B The Evening Star and the Princess / B I Part 3. On Perseverance and Resourcefulness The Crow and the Pitcher / Aesop Robert Bruce and the Spider / Sir Walter Scott Hannibal Mouse and the Other End of the World / B The Fly, the Spider, and the Hornet / B '. ? Once there was a Fox who lived on the lower slopes of Mt. Etna, the great vplcano in Sicily. These slo-pes are extremely fertile; the grapes that grow there may well be the most delicious in the world; and of all the farmers there, Farmer Mario was probably the best. And this Fox longed and longed for some of Farmer Mario's grapes. But they gr~ very high on arbors, and all the arbors were inside a vineyard with high walls, and the Fox had a problem. Of course, the Fox of Mt Etna had utterly no use for his famous ancestor, who leaping for grapes that he could not reach, called them sour, and went away. Part 4. Behavior - Moral and Otherwise A Small Wharf of Stones / Benjamin Franklin The Three Bricklayers / B The Good Samaritan / St. Luke. Much Obliged, Dear Lord / Fulton Oursler The Fisherman, the Farmer, and the Peddler /8 Notes Some Collections of Parables and Fables To be published in' November 1973 by Quadrangle / 'The New York Times Book Co., hard cover, $6.95 Part 5. The Problem of Truth o On Being a Reasonable Creature / Benjamin Franklin The Monkey and the Spectacles / Ivan A. Kriloff The Golden Trumpets of Yap Yap / Mike Quin The Barrels and the Pittsburgh Manufacturer / B The Empty Column / William J. Wiswesser The Differences in Two Strains of Corn / Edgar Anderson The Six Blind Men of Nepal / B The Sighting of a Whale / B The Stars and the Young Rabbit / B The Ocean of Truth / Sir Isaac Newton Part 6. On Common Sense The The The The The The The Lark and her Young Ones / Aesop Bear and the Young Dog / B Bear and the Young Calf / B Bear and the Young Beaver / B Wasps and the Honey Pot / Sir Roger l'Estrange Six-Day War and the Gulf of Dong / B Deceived Eagle / James Northcote RETURNABLE IN 7 DAYS IF NOT SATISFACTORY (You can read it all in 7 days - and keep it only if you think it is worth keeping.) - - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - - - - To: I ( Computers and Automation 815 Washington St., Dept. CA 11, Newtonville, Mass. 02160 Please send me wh~n published (November publication expected) ___ copy(ies) of Ride the East Wind: Parables of Yesterday and Today by Edmund C. Berkeley, Author and Anthologist. I enclose $7.25 (Publication price + Postage and Handling) per copy. Total enclosed ---- (Prepayment is necessary) RETURNABLE IN 7 DAYS FOR FULL REFUND IF NOT SATISFACTORY My name and address are attached. (., COMPUTERS and AUTOMATION· for November, 1973 25 EDITORIAL (an updated version of an editorial first printed May 1973) Burying Facts and Rewriting History - II One of the efforts of this magazine is to pursue truth. One of the ways in which truth is pursued is not to let statements of the utmost importance be buried and forgotten in the pages of daily newspapers, nor unreported and lost because they are no longer well covered in national news magazines. Among those statements are two of permanent interest in connection with the Watergate Caper (this phrase is establishmentese for "the Watergate Crime"). - The statement by Bernard L. Barker, one of the convicted operatives, which explains his motivation and background (see November 1972, Computers and Automation). - The statement by Alfred Baldwin, 3rd, ex-FBI agent, an employee of the Republican Committee to Reelect the President, telling what he did and saw while five men burglarized the Watergate offices of the Democratic National Committee on June 17,1972, about 2:30 a.m. (see December 1972, C&A). In addition, we have published seven installments of reports on the Watergate Crime by our contributing editor, Richard E. Sprague (a computer professional of 25 years standing) who as an avocation has studied for many years dirty political operations in the United States, including the assassinations by conspiracies (not "lone assassins") of President John F. Kennedy, Senator Robert Kennedy, and Reverend Martin Luther King. Three years ago in May 1970, when we began to publish this type of article, we could not have spoken confidently of "the assassination by conspiracies" of two Kennedys and one King. But the articles we have published - which are listed and characterized on the following pages - have together a remarkable impact. Taken together, the information published May 1970 to October 1973 in Computers and Automation effectively destroys a large segment of the beliefs, the rewritten history, that the establishment in the United States has arranged for people in the United States to believe. I do not assert that the establishment is a conscious organism or organization; perhaps the best description is this: a loose confederation of overt conspiracies, silent conspiracies, and biased wealthy persons, with very intelligent orchestration stemming from the Pentagon, the Central Intelligence Agency and the Presidency, and with assists from organized crime and the Mafia. We challenge any fair minded person to read this collection of articles (back copies of Computers and Automation should be available in many large public libraries and 26 may be ordered from us), and after reading them, to still believe that the assassinations are actually the actions of "lone psychopaths," instead of fitting together into a plan to install a certain kind of autocracy in the United States. This kind of autocracy claims to be democratic, to stand up for "national security," "executive privilege,"· "separation of Constitutional powers," etc. It offers appearances of democracy, but it seizes the realities of money and power. It cuts programs of social benefit; but it allocates $80 billion a year to be paid to the militaryindustrial-Pentagon complex. In the 1940's there was a name for this kind of autocracy. Its name was "fascism," effectively a dictatorship in the interests of big business. What is now appearing in the U.S. is "fascism" in the form of a dictatorship by the military-industrial complex. Here in a nutshell is an example of the present uneven contest: it takes the form of two sentences in a report by E. Drake Lundell, Jr., in Computerworld for April 22, 1973: • The Antitrust Division of the Justice Department is "outmanned and outgunned" when it comes to prosecuting cases like the current action against IBM, Senate investigators were told last week. • In addition, witnesses before the Senate Antitrust and Monopoly Subcommittee stated that often the division cannot do its job properly because of political pressure from the White House .... These two statements contain a world of implications. Essentially, the Department of the United States Government which is charged with enforcing certain U.S. laws against monopoly, can no longer properly function because of (1) the enormous power of just one business, IBM, and (2) political pressure from the White House (this phrase is establishmentese for "President Richard M. Nixon"). We must dig up facts, remember them, and write history the way it is. We must take action to compel the persons who deceive us and lie to us to leave the government of the United States, such as Spiro Agnew, former Vice President. Edmund C. Berkeley Editor COMPUTERS and AUTOMATION for November. 1973 o The Watergate Crime Articles Published in Computers and Automation August 1972 to September 1973 Inventory of Titles, Authors, and Summaries August 1972 33 r V The June 1972 Raid on Democratic Party Headquarters - Part 1 by Richard E. Sprague, Hartsdale, N.Y. A report on five men who have numerous connections with the Republican Party, the White House, the Central Intelligence Agency, anti-Castro Cubans, and plans for the assassination of President John F. Kennedy, and who were arrested seeking to bug Democratic National Headquarters at 2 :30 a.m., June 17, 1972. communicado and a prisoner - reported on by Mrs. Mitchell and the editor of Parade magazine. 27 The Watergate Cri me: An Eye-Witness Account by Alfred Baldwin, 3rd A round-by-round account by an ex-FB I agent, an employee of the Republican Committee to Reelect the President, of what went on while five men burglarized the Watergate offices, June 17, 2:30 a.m. Baldwin's main assignment was listening to bugged calls to the Democratic National Committee. 33 President Richard M. Nixon, the Bay of Pigs, and the Watergate Incident - Part 4 by Richard E. Sprague, Hartsdale, N.Y. How President Nixon lied in 1960 about the plans for the Bay of Pigs I nvasion, and is su ppressing in 1972 the investigations of the Watergate Incident. 26 The Watergate Crime and the Cover-Up Strategy - October 1972 18 The Raid on Democratic Party Headquarters (The Watergate Incident) - Part 2 by Richard E. Sprague, Hartsdale, N.Y. A report on further developments in the June 1972 raid by James McCord, Bernard Barker, and others, on National Democratic Party Headquarters, and implications affecting a number of Republican leaders and President Richard M. Nixon. November 1972 26 January 1973 March 1973 Part 5 \ by Richard E. Sprague, Hartsdale, N.Y. A report on the trial of E. Howard Hunt, 'Ja~s McCord, Bernard Barker, and four other persons for their raid on Democratic National Committee Headquarters in June 1972 using funds of the Republican Committee for the Re-Election of the President; and the strategies of cover-up that have been employed. Bernard L. Barker: Portrait of a Watergate Burglar by Edmund C. Berkeley, Editor, Computers and Automation How a cloak and dagger operative and right-wing activist, who was caught as a burglar in the Watergate Hotel offices of the Democratic National Headquarters, looks at himself and his line of work. 29 .~J J 0 Walter Sheridan - Democrats' Investigator? or Republicans' Countermeasure? by Richard E. Sprague, Hartsdale, N.Y. Walter Sheridan, recently employed by the Democratic National Committee to investigate the Watergate I ncident, may actually be a " countermeasure" by the Republicans to defeat the Democratic investigation. June 1973 26 December 1972 24 26 The Raid on Democratic Party Headquarters (The Watergate Incident) - Part 3 by Richard E. Sprague, Hartsdale, N.Y. A report on further developments in the June 1972 raid by James McCord, Bernard Barker, and others, on National Democratic Party Headquarters, and implications affecting a number of Republican leaders and President Richard M. Nixon. Martha Mitchell and the Watergate Incident by Martha Mitchell, the magazine Parade, and Richard E. Sprague How Martha Mitchell (wife of former Attorney General John Mitchell) was molested and kept in- COMPUTERS and AUTOMATION for November. 1973 Watergate: What More is There to Hide? - Part 6 by Richard E. Sprague, Hartsdale, N.Y. How investigation into the Watergate Crime is leading to ramifications and implications, and what are some more of the now hidden connections that may be revealed. August 1973 36 Lessons of Watergate - Part 7 by Richard E. Sprague, Hartsdale, N.Y. The collection of Watergate Crimes; the anatomy of a "Really Big American Cover-Up"; other cases of "Really Big American Cover-Ups"; and the implications and ramifications. September 1973 37 Six Parallels of 25 Years Ago by Alger Hiss How an establishment attacked Alger Hiss another parallel to the Watergate cover-up. 27 " Political Assassinations in the United States Articles Published in Computers and Automation May 1970 to October 1973 Inventory of Titles, Authors, and Summaries May 1970 30 The Assassination of President John F. Kennedy: The Application of Computers to the Photographic Evidence by Richard E. Sprague A reexamination of some of the evidence relating to the assassination of John F. Kennedy - with emphasis on the possibilities and problems of computerized analysis of the photographic evidence. July 1970 29 The May Article, "The Assassination of President John F. Kennedy: The Application of Computers to the Photographic Evidence" - Report No.2: 32 More About Jim Hicks 32 Confirmation of FBI Knowledge 12 Days Before Dallas of a Plot to Kill President Kennedy The Second Conspiracy About the Assassination 35 of President Kennedy Progress Report by Richard E. Sprague October 1970 52 The Conspiracy to Assassinate Senator Robert F. Kennedy and the Second Conspiracy to Cover It Up by Richard E. Sprague A sumr:nary of what researchers are uncovering in their investigation of what appears to be not one but two conspiracies relating to the assassination of Senator Robert F. Kennedy. 56 Index to "Special Unit Senator: The Investigation of the Assassination of Senator Robert F. Kennedy" An index is supplied for the Random House book written by Robert A. Houghton, of the Los Angeles Police Department, about the investigation of the assassination of Senator Robert F. Kennedy. The Assassination of Senator Robert F. Kennedy: Preface, by Edmund C. Berkeley Two Men With Guns Drawn at Senator Kennedy's 50 Assassir:tation: Statement to the Press, by Theodore Charach 50 Map of the Scene of the Assassination of Senator Robert Kennedy 51 The Pantry Where Senator Robert Kennedy was Assassi nated 52 Bullet Hole in the Frame of a Door Two Bullet Holes in the Center Divider of the 53 Pantry Door 44 Confidential and Secret Documents of the Warren Commission Deposited in the U.S. Archives by Neil Macdonald, Assistant Editor A list of the subjects of over 200 documents of the Warren Commission which were classified confidential, secret, and top secret. 39 The Assassination of Reverend Martin Luther King, Jr., The Role of James Earl Ray, and the Question of Conspiracy by Richard E. Sprague James Earl Ray says he was coerced into entering a plea of guilty to killing Martin Luther King ... and contrary evidence (plus other evidence) have led to filing of legal petitions for relief. 48 December 1970 September 1970 39 Patterns of Political Assassination: How Many Coincidences Make a Plot? by Edmund C. Berkeley, Editor, Computers and January 1971 45 Automation How the science of probability and statistics can be used as an instrument of decision to determine if a rare event is: (I) within a reasonable range; (2) unusual or strange or suspicious; or (3) the resuit of correlation or cause or conspiracy. 48 28 Computer-Assisted Analysis of Evidence Regarding the Assassination of President John F. Kennedy - ~ November 1970 August 1970 48 0I The Death of Walter Reuther: Accidental or Planned? by Edmund C. Berkeley and Leonard Walden Some significant questions about the plane crash in May 1970 in which Walter Reuther was killed. February 1971 48 The Report of the National Committee to Investigate Assassinations by Bernard Fensterwald, James Le~ar, and Robert Smith COMPUTERS and AUTOMATION for November, 1973 I) What the National Committee in Washington, D.C. is doing about computerizing files of evidence, initiating lawsuits to obtain information, etc.; and comments on two new books by District Attorney Jim Garrison and Robert Blair Kaiser. blocked his investigation in more than a dozen ways. September 1971 26 March 1971 35 45 "The Assassination of President Kennedy: The Application of Computers to the Photographic Evidence" - Comment 35 I. Another View, by Benjamin L. Schwartz, Ph.D. A polemical attack on "The Assassination of President Kennedy: the Application of Computers to the Photographic Evidence" by Richard E. Sprague published May 1970. 40 II. Response, by Edmund C. Berkeley, Editor October 1971 41 The Assassination of President Kennedy - Declassification of Relevant Documents from the National Archives by Richard E. Sprague The titles of the documents and other evidence indicate convincingly that Lee Harvey Oswald was trained in spy work by the CIA before his visit to Russia; etc. Like the Pentagon Papers, these documents should be declassified. 24 The Assassination of President Kennedy: The Pattern of Coup d'Etat and Public Deception by Edmund C. Berkeley, Editor, Computers and Automation Five significant, eye-opening events from May 1970 to October 1971, showing patterns of coup d'etat, assassination, and concealment; and some predictions. District Attorney Jim Garrison on the Assassination of President Kennedy: A Review of Heritage of Stone by Neil Macdonald, Assistant Editor April 1971 32 The Right of Equal Access to Government Information by the National Committee to Investigate Assassinations, Washington, D.C. November 1971 May 1971 27 The Assassination of President Kennedy: The Spatial Chart of Events in Dealey Plaza by Robert B. Cutler, Architect The chart, first published in May 1970, is revised and brought up to date. June 1971 41 The Case of Secret Service Agent Abraham W. Bolden by Bernard Fensterwald, Attorney, Executive Director, National Committee to Investigate Assassinations Bolden wanted to tell the Warren Commission about a Chicago plot to kill President Kennedy, and was jailed six years on a framed-up charge for trying to do so. 51 The Central Intelligence Agency and The New York Times by Samuel F. Thurston, Newton, Mass. The issue of systematic suppression of questions about the assassination of President John F. Kennedy, and a hypothesis. Il December 1971 32 July 1971 August 1971 37 Jim Garrison, District Attorney, Orleans Parish, vs. the Federal Government by Bernard Fensterwald, Attorney, Executive Director, National Committee to Investigate Assassinations How District Attorney Jim Garrison of New Orleans became interested in the New Orleans phase of the assassination of President Kennedy; and how the Federal government frustrated and COMPUTERS and AUTOMATION for November. 1973 The Federal Bureau of I nvestigation and the Assassination of President Kennedy by Bernard Fensterwald, Attorney How J. Edgar Hoover and the FB I withheld much pertinent information from the Warren Commission, flooded them with irrelevant information, and altered some important evidence, thus concealing Oswald's connections with the FBI. 6 The Assassination of President John F. Kennedy: A Model for Explanation by Vincent J. Salandria, Attorney, Philadelphia, Pa. A study of the reasons why a great deal of the Federal government's own evidence in the assassination of President John F. Kennedy declared "conspiracy" - and a hypothesis, supported by considerable evidence, about why the President was assassinated and how the implications of that action were to be signaled to those who could read the signals. The Strategy of Truth-Telling by Edmund C. Berkeley Editorial January 1972 57 Spotlight on McGeorge Bundy and the White House Situation Room by Robert B. Cutler, Manchester, Mass. An argument that the "lone assassin - no conspiracy" announcement from the White House Situation Room could have resulted from information available in Dallas and Washington prior to the announcement - and thus does not actually demonstrate that someone there had a guilty foreknowledge of the shooting. 29 January 1973 February 1972 43 Who Shot President Kennedy? - Or Fact and Fable in History by Gareth Jenkins, Weston, Mass. How the physical evidence actually published by the Warren Commission relating to the assassination of President John F. Kennedy shows conelusively that more than one man was responsible for the shooting - contrary to the Commission's own report. 37 40 March, April, May, June 1972 28 Dallas: Who, How, Why? (in four parts) by Mikhail Sagatelyan, Moscow, USSR A long report published in Leningrad, USSR, by an ace Soviet reporter about the circumstances of the assassination of President John F. Kennedy, and their significance from a Soviet point of view. February 1973 26 July 1972 32 10 The Shooting of Presidential Candidate George ,C. Wallace: A Systems-Analysis Discussion by Thomas Stamm, Bronx, N.Y., and Edmund C. Berkeley, Editor An analysis of the shooting of Governor Wallace of Alabama; and a discussion of systematic methods for protecting American leaders from violent attacks. 30 The Shooting of Governor George C. Wallace, Candidate for President by Edmund C. Berkeley, Editor Editorial September 1972 24 31 34 The Central Intelligence Agency: A Short History to Mid-1963 - Part 2 38 Le Francais Qui Devait Tuer Kennedy (The Frenchman Who Was To Kill Kennedy) by Philippe Bernert and Camille Gilles, Paris, France December 1972 30 U.S. Electronic Espionage: A Memoir - Part 1 by Ramparts, Berkeley, Calif. How the U.S. National Security Agency intercepts, decodes, and understands almost all secret and top secret electronic, communications and signals of all nations all over the world. U. S. Electronic Espionage: A Memoir - Part 2 by Ramparts, Berkeley, Calif. How the National Security Agency intercepted and decoded enemy messages in order to direct bombing strikes in Viet Nam, and often failed; and how the hideousness of what the American military forces were doing in Southeast Asia finally led this interviewee to resigning and terminating. April, May 1973 November 1972 The Central I ntelligence Agency: A Short History to Mid-1963 - Part 1 by James Hepburn, author of Farewell America The unverified, but probably largely true, secret history of the Central Intelligence Agency of the U.S. - as a preliminary to its involvement in the assassination of President John F. Kennedy. Analysis of the Autopsy on President John F. Kennedy, and the Impossibility of the Warren Commission's "Lone Assassin" Conclusion by Cyril H. Wecht, M.D., Institute of Forensic Sciences, Pittsburgh, Pa. The coroner of Allegheny County, Pa., reports on his examination of the evidence that still remains (some of it is missing) locked up in the National Archives of the United States, not accessible to ordinary investigators. March 1973 The Assassination of Senator Robert F. Kennedy: Proofs of Conspiracy and of Two Persons Firing by Richard E. Sprague, Hartsdale, N.Y. A review and summary of the evidence showing conclusively the fact of conspiracy and the presence of two guns firing, at the time of the assassination of Senator Robert F. Kennedy. 32 The Frenchman Who Was To Kill Kennedy by Philippe Bernert and Camille Gilles, L 'Aurore, Paris, France; translated by Ann K. Bradley English translation of the French newspaper report on Jose Luis Romero, which was reprinted in French in the December issue. Why I Distrust the Romero Story by Robert P. Smith, Director of Research, Committee to Investigate Assassinations, Washington, D.C. The Romero report reprinted from L 'Aurore has many earmarks indicating that it is very difficult to believe. 34 The New Orleans Portion of the Conspiracy to Assassi nate President John F. Kennedy - Four Articles: (1) by Edmund C. Berkeley, in the April issue; (2) by Jim Garrison, in the April issue; (3) by F. Irving Dymond, in the May issue; (4). by Jim Garrison, in the May issue On November 20, 1972, the Supreme Court of the United States refused to permit Jim Garrison, District Attorney, New O~leans, to prosecute Clay Shaw for perjury. On November 21, Jim Garrison issued a statement commenting on this refusal, which is Article 4 of this set; Article 1 is an introduction; Articles 2 and 3 are opening statements to the trial jury, by Jim Garrison, Prosecutor, and COMPUTERS and AUTOMATION for November, 1973 ~ f F. Irving Dymond, attorney for the defendant, in the February 1969 trial of Clay Shaw in New Orleans; Clay Shaw was charged by the grand jury with "having conspired with David W. Ferrie and Lee Harvey Oswald to murder President John F. Kennedy" - in regard to which the trial jury found Clay Shaw "not guilty". May 1973 6 Burying Facts and Rewriting History by Edmund C. Berkeley, Editor, Computers and Automation Taken together, the information published May 1970 to May 1973 in Computers andAutomation effectively destroys a large segment of the beliefs, the rewritten history, that the establishment in the United States has arranged for the people in the United States to believe. June, July 1973 36 The American News Media and the Assassination of President John F. Kennedy: Accessories After the Fact (in two parts) by Richard E. Sprague, Hartsdale, N.Y. An examination of what happened in many important American news organizations, to cover up and hide the facts about how President John F. Kennedy was actually·assassinated in Dallas. September 1973 6 Establishments and Truth by Edmund C. Berkeley, Editor, Computers and Automation 38 The nature of an establishment as a system A Parallel of 1963 by Marguerite C. Oswald, Ft. Worth, Texas The ignoring of evidence of conspiracy regarding Lee Harvey Oswald - a parallel to the Watergate cover-up. October 1973 21 The Framing of Lee Harvey Oswald by Richard E. Sprague, Hartsdale, N.Y. When Lee Harvey Oswald was arrested, Nov. 22, 1963, for the assassination of President John F. Kennedy, he said to his captors in the Dallas jail cell, "I'm a patsy". A review of the evidence (including 18 photographs) proves that Oswald was a patsy, and that he was "framed" for the murder of President Kennedy - although "establishmentese" American history denies it. Hertlein - Continued from page 19 human failing. Even the most broad-minded practitioner is bound by his or her capacities and philosophy. and it requires a deliberate and concerted effort to remain open-minded, and to appreciate varied approaches that are not in accord with one's own temporary aesthetic parameters. One discerns computer artists who prefer natural or man-made patterns and sounds, vs. those who desire only mathematics, electronic and computer sounds, sans the human touch. There are those who exploit two or three-dimensional static images, vs. the creators who prefer moving permutations in flux, declaiming that the computer is a perceptual medium, and therefore should not be imprisoned in static form, i.e., cybernetic art is "pure idea," ad infinitum. Ironically, even the newest of the arts appears destined to hardening within specific schools of thought, with separatist camps warring in "vs." expression and debate. Summary It is obvious that the concept of manipulation and processing via the computer is merely the first stage of cybernetic creation~ Even now, far beyond the statements of the artistic problem and aesthetic, personal variation, is a vast, open territory that is being explored by questioning, hardy intellectual pioneers, as they seek to perceive the inner anatomy of art and philosophy: Wha tis style? What constitutes the aesthetic? How may this be accomplished? What is art? Music? Sculpture? Dance? Poetry? What is science? Mathematics? Is art purely the man-made: The sound of the human voice, or playing music upon man-made instruments? The painting and sculpting of man with hand-held tools? Is art a part of life, embracing: The ordinary, the animal and natural sounds? The patterns carved by the winds, sands. and the water? Is art perceptual, a mere fleeting moment or experience in time, or is it permanent, enduring? What is the optimum role of man in a cybernetic society? What is the role of art in a technology-oriented world? What is the symbiosis of man-and-the-machine? What is thinking? What is creativity? Is man the measure of all things? When man uses the computer as an aid in creation, or when he attempts to create heuristic art, his mind finds new questions to explore and to answer. It appears highly possible that a renewed perception of life and the arts awaits present and future generations of man, and that this may be partially accomplished by eliminating the boundaries of compartmentalized disciplines, and by walking freely between art and science, by combining interdisciplinary practices and materials. to hopefully bring forth the ideal of an open, growing, and dimensional perception of art/life for the human race. [J Editor's Note: This paper is published in accordance with a new editorial policy of allowing writers freer expression, with no editing by the editors, in the hope that greater variety of expression and ideas will result for the benefit of readers. COMPUTERS and AUTOMATION for November. 1973 31 Classified Advertisement CORRECTION THE COLLEGE OF In the July 1973 issue of Computers and Automation, a single article entitled "Communication -- ThreeWay: Chimpanzee, Man, Computer" was published. Part 1 was authored by Larry B. Dendy of the Public Relations Office of the University of Georgia and Part 2 was authored by Ernst von Glasersfeld et al of the University of Georgia and the Yerkes Regional Primate Research Center of Emory University. PETROLEUM & MIN'EiRALS Dhahran, Saudi Arabi'a This major technical university, serving the petroleum and minerals industry, is seeking candidates for instructional faculty in a new College of Industrial Management, Department of DATA PROCESSING and INFORMATION SCIENCES. In compliance with the authors' wishes, the two parts of that article have been reprinted as two separate articles. The first article is authored solely by Larry B. Dendy and is titled, "Communication -- Three Way: Chimpanzee, Man, Computer." The second article is authored by Ernst von Glasersfeld and his colleagues from the Yerkes Primate Research Center and Georgia State University and is titled, "A Computer Mediates Communication wi th a Chimpanzee." Also, and in compliance with the authors' wishes, all figures and tables of the article as published in the July 1973 issue have been included in the second of these articles. Program will closely follow ACM curriculum committee recommendations on Computer EducationforManagement. Sophisticated configuration IBM 370/155 available. All instruction in English. Appointments will be at appropriate Academic Ranks for which candidates qualify, and be effective 1 September 1974. Personal interviews will be arranged after submission of documentation. PROFESSOR (all Ranks) Ph.D. in Information Science, Engineering or related fields; 3 to 5 years teaching experience; extensive experience with commercial systems and management information systems;, broad knowledge of data processing/information system education; detailed knowledge of languages, methods, hardware and software evaluation used in commercial data processing application. In the 1973 annual index Computers and Automation will enter the two articles in this manner, which serves to separate a regular article from a formal scientific and technical report. LECTURER/INSTRUCTOR PROGRAMMING and COMPUTER SYSTEMS (all Ranks) M.B.A. or M.Sc. in Business Administration or similar academic qualifications; two to three years experience in government, business or industry in area of computer systems, programming, and systems analysis; previous teaching experience highly desirable but not essential; specific instructional capability: Programming (COBOL); Information Structures; Storage and Management; Sorting and Searching; Hardware/ Software C)nfiguration and Evaluation; File Systems; Data Management Systems; Communication System Organization; Data Base Development. DID YOU ENJOY THIS ISSUE OF COMPUTERS AND AUTOMA T/ON Would you like to send it at no cost to some friends of yours, with a message? We'll join you half-way - you send us his name and address (with zip) and the message, and we will send the issue and your message to him TOGETHER WITH a gentle "soft-sell" invitation to subscribe to Computers and Automation. We have set aside a hundred copies of this issue for this purpose. So long as they last, we can carry out your request. Just fill in the following and send it to us: ____ - - - - - - - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - - - - - - - - - - - - LECTURER/INSTRUCTOR INFORMATION SYSTEMS (all Ranks) M.B.A. or M.Sc. in Business Administratiorr or Management; two to three years experience in Business Systems and Management Information with work in both systems analysis and design; previous teaching experience highly desirable but not essential. Specific instructional capabilities: Systems Organization or Management; Basic Analysis tools; Systems Implementation; Management Systems; Systems Life Cycle; Long-Range Planning; Systems Development; Scheduling and Allocation; Queuing Models; Inventory Models; Simulation Models. . To: ( Computers and Automation and People 815 Washington St., Newtonville, MA 02160 ) I request that you send a copy of the _ _ _ _ issue of Computers and Automation and People to 1. Name ___________________ Address 2. Name ____________________ My message _ _ _ _ _ __ Address ------------------ 3. Name ___________________ Please send detailed professional resume and address all inquiries to: College of Petroleum & Minerals c/o Saudi Arabian Educational Mission 880 Third Avenue -- 17th Floor New York, N.Y. 10022 32 My message _ _ _ _ _ _ __ Address My message _ _ _ _ _ _ __ ----------------- My name and address (and zip) are attached. I am a subscriber to Computers and Automation and People. COMPUTERS and AUTOMAliON for November, 1973 : !». Virtue, in Spite of Erroneous Conceptions J. P. Frankel Dean of the Faculty Harvey Mudd College Claremont, Calif. 91711 UWe think of knowledge as knowing how-to-do-it, wisdom as knowing whether-to-do-it, and virtue (if the answer is yes) as doing-it" In this article, I mean virtue in a much narrower sense than the theologians, and I mean erroneous conceptions in a much broader sense than planners of parenthood. Let me first speak of virtue. We think of knowledge as knowing how-to-do-it, wisdom as knowing whether-to-do-it, and virtue as doing it. In this sense, at least in the universities, we think of scientists as knowing, the humanists as wise, and the engineers and other technicians (doctors, nurses, social workers and the like) as virtuous, that is, the do-ers. The World is Full of Problems Now the world is full of problems where we need to know how to do it, whether to do it, and (if the answer is yes) to do it. Each of us can make his own list of pressing social problems: pollution, arms limitation, or population growth. Fortunately we are reasonably well supplied with scientists, humanists, and technicians. To understand why we still have these urgent problems, let us turn to erroneous conceptions. The erroneous conceptions I wish to deal with here are: That it is within the power of scientists and engineers to choose to work only on projects "in the public interest," and That the market place is where one discovers the public interest. Choice of Projects to Work on Critics seem to assume that scientists and engineers are free to choose their projects, and complain that they fail to consider the real public interest. S~ientists may be free to choose their work, but they Based on remarks delivered on Joseph C. Wilson Day, November 10, 1972, at the University of ROchester, Rochester, N.Y. COMPUTERS and AUTOMATION for November. 1973 have no more to say about how their discoveries are used than Christopher Columbus did. As for the engineers, they have more to say about the uses of science, since they are the ones who choose which of science's ideas will be applied, but they in turn have almost no way, at present, of identifying the public interest, and even less in determining which products or processes should be produced to serve it. A Moratorium on Science? We will return to this matter of choice, but first let's eliminate from the list of reasonable alternatives facing society, the silly and dangerous notion of a moratorium on science. The key notion in the moratorium idea is that if you can't control it, you shouldn't do it. Therefore, we are urged, don't do any more science until (presumably) the humanists devise suitable controls. The trouble with this kind of conceptual contraception is two-fold. In the first place, as Paul Saltman has pointed out eloquently, you can't forbid knowing any more than you can forbid writing poetry. Science can be slowed down, of course, by driving it underground, but even if we slowed it way down, there is no evidence that we have either knowledge or wisdom enough to control its application, unless we change some of our habits. Ignorance and Fear Lead to Irrationality One habit that needs correction has to do with the thinking and feeling processes of the humanists -the philosophers, if you will -- who presumably are to show us how to behave. Too often they are ignorant or fearful of science and engineering. What one is ignorant or fearful of, he cannot deal with in a rational way. There is no possibility that we can learn to control what we do by some non-rational process, such as satori, using mystically-fashioned playing cards, etc. Control over what we do will 33 have to be done rationally. I also believe that it will have to be done by humanists, and that before they can do it, we have somehow to lower, or at least make more permeable, the barrier that separates the Two Cultures. We will come back to this point later. Before that, let us return t~ the notion that engineers choose what they will work on. The Choices of Engineers Most engineers do not make cosmic choices. They do not decide that this product will be built and that one won't be. Practically all engineers, I suspect, work for other engineers, who work for others, who work in companies where the products are determined not by science or philosophy, but by market analysis. Now market analysis has come a long way since the days of the Edsel, and it often guesses accurately, although not always so, what the public is interested in buying. But what the public buys is not necessarily what it needs. The Market-Place Guessing Game We buy those things that are offered for sale that are better (in some vague way) than the alternatives available to us. Except for advertising or other ways of influencing public opinion, the basic mechanism of the market-place is a guessing game. Try this product, see if it sells. If it does, figure out what it was about it that sold, and push a little harder. If this one does not sell, retrench a little, or gamble on another change -- and so on. Advertising and public opinion do play important roles -- how else explain so many different labels on the same bar of soap, the same automobile? -but the decision as to how the engineers' skills will be used has, in the past, been largely determined by the instantaneous outcome of the market game. Major Civil Problems Now please do not misunderstand me. The marketplace mechanisms are important for determining soap or automobile styles. I believe that criteria of risk-and-return of investment are elements of our decision-making processes that we could discard only at great peril to our society. What I am saying is that the major civil problems: pollution, poverty, and population density, for examples, are not likely to be defined by market analysis. These problems, for which acceptable solutions are needed, share these characteristics: First, they cross product classification lines, and involve more than one sector of the economy. They are not just problems of the auto industry, or the mining companies, or manufacturing-but-notservice-industries -- they involve all of these. All the skills that all these sectors employ may have to be applied to these problems. The cement plants in the country and the transport companies in the city have pollution problems that differ only in detail. To expect them to do the necessary research and development separately, each with his eye on his own segment of the market, is to postpone until much too late, if not forever, solving even the smaller parts of our problems. The problems, so to speak, are too big. pollution caused by internal combustion engines by using electric autos, for example. If so, we may replace polluted air in the cities with polluted streams out in the country where the new massive power plants are. Or we can replace with solar energy the fissionable materials or fossil fuels we now use for powerj however, at least in the near future, we would then have either much less energy or much more costly energy, and fewer jobs and more poverty. (Some among us tend to paint even blacker pictures. They point out that our society gave up slavery only when our technology developed to the point where machines were cheaper than slaves. Is it possible that we could deliberately reverse this process and end up with clean air, but with slaves?) This characteristic of tight linkage, or inseparability of the big problems, also suggests that we cannot rely upon the ordinary market-place mechanisms to determine how we employ our technology to solve our problems. Very Difficult Problems The third characteristic of our problems that forces us to reconsider the mechanisms of choice, is that our problems are so very difficult. The technical solutions do not exist outside of social considerations. The social costs outweigh such usual factor costs as materials, labor, and capital. Our cities present much tougher problems than putting man on the moon. As someone smarter than but unknown to me, has said, "We couldn't have put a man on the moon if the moon had been inhabited". World-wide and Nation-wide Problems All these characteristics, and others that I've left out, such as geographical diversity -- some problems are not local, nor even regional or national, but world-wide -- suggest that the organizations needed for these new problem-solving teams differ considerably from those of even our biggest, most diversified companies, or else that we need some super-industrial team of coordinators, who are to be responsive not to the elements of the market-place, but rather to the public interest. Whether that public is regional, or national or world-wide, someone who has thought this problem further through must tell. My own thoughts, tempered by a certain sourly pragmatic view of the interactions of various national governments, suggests that the approach most likely to succeed in the near future is the national one. The National Science Policy and Priorities Act These Problems are Hardly Separable The essentials of a first step in a national plan are contained in the National Science Policy and Priorities Act, which, among other things, sets up procedures for contracting out to universities, companies and other organizations, the research and development necessary for solution of the major civil problems, including the design of civil science systems. Whether an agency like NASA should be set up, as the Act says, or whether an existing agency should supervise new programs, is a matter of debate. The importance to our discussion is that some federal funding agency, not the various product market-places, should establish the priorities and fund the solutions to our civil problems. In the same way, the major civil problems are not readily separable. One can reduce the amount of air As you see, this bill or Act or plan makes a first approach to nationalizing the solution to national problems. At the same time it utilizes local 34 COMPUTERS and AUTOMATION for November. 1973 • NUMBLES collections of scientific, humanistic and engineering talent, that either already exist in the aerospace companies, universities and think tanks, or can be collected there. In essence, this bill solves one aspect of the problem. It replaces small or local or single-commodity market-places with a national market-place based on national needs. I suspect that the new agency will find that big aerospace companies usually do not have the necessary mix of talents, although they probably do have the necessary organization. The universities, on the other hand, probably do have the necessary mix of talents, but probably do not have the proper organization. It seems, however, to be a logical first step, and the sooner the bill becomes law, the sooner we can begin to solve our problems. International Institute of Applied Systems Analysis An example of the international approach is the recently established International Institute of Applied Systems Analysis in Vienna as a joint venture of our National Academy of Sciences and the Soviet Academy, among others. Since they will operate on about three-and-a-half million dollars a year (the Civil Science part of the National Science Policy and Priorities Act allots an average of 270 million per year for three years) it is unreasonable to expect anything more than papers for publication to come out of Vienna. The international effort will result in more knowledge and wisdom; on the proposed national budget we could become virtuous as well. Neil Macdonald Assistant Editor Computers and Automation A "numble" is an arithmetical problem in which: digits have been replaced by capital letters; and there are two messages, one which can be read right away and a second one in the digit cipher. The problem is to solve for the digits. Each capital letter in the arithmetical problem stands for just one digit 0 to 9. A digit may be represented by more than one letter. The second message, which is expressed in. numerical digits, is to be translated (using the same key) into letters so that it may be read; but the spelling uses puns or is otherwise irregular, to discourage cryptanalytic methods of deciphering. We invite our readers to send us solutions, together with human programs or computer programs which will produce the solutions. NUMBLE 7311 In Order to be Virtuous One Must be Wise and Knowing One final caution. I hope you have not heard me suggest that only scientists and engineers are capable of leading us out of the thicket of difficulties we are in. I am not advocating technocracy, that totalitarian philosophy which says that only engineers can lead us. I do not believe that for one moment, nor does anyone who knows enough engineers and scientists. There is no reason to believe that they, as a class, are any more capable of leading our people than, say, the lawyers. F YOU x Y L U Y I T YOTRUO We will need new kinds of agencies and organizations to define "the public interest" and to find ways of organizing the talents that may solve some of our problems. But organizations -- universities and corporations and public agencies -- are built by people, led by other people. So our leaders must be part scientist, part humanist, and part engineer, and they must use what they have, not in response to some particular market-place: but in the true public interest. Not nearly enough people will be born with these characteristics. They will have to be educated. If this sounds like a very tall order to put to an education system -- it is. y But we should be encouraged to redesign our education systems to help produce such people, not only because we have to (God knows we do) if mankind is too survive -- but also because we know it is possible. 0 COMPUTERS and AUTOMATION for November, 1973 GV = CU E U E U U E TYCUOR C T U IOU 0 V T I would rather that you heard me say that no longer is it virtue merely to do it, but rather that in order to be virtuous one must also be wise and also knowing. Our Leaders Must Be Part Scientist, Part Humanist, and Part Engineer G I V E 327897972 Solution to Numble 7310 In Numble 7310 in the October issue, the digits 0 through 9 are represented by letters as follows: 0=0 W= 5 =1 P = 6 E=2 T=7 S=3 R=8 H=4 A=9 I The message is: Eat what is ripe. Our thanks to the following individuals for submitting their solutions - to Numble 7310: Edward A. Bruno, N. Bergen, N.J. - to Numble 739: Edward A. Bruno, N. Bergen, NJ.; T. P. Finn, Indianapolis, Ind . .....: to N ... mble 738: Nihan Lloyd-Thurston, S. Nutfield, Surrey, England. 35 Nixon and the Mafia - Conclusion Jeff Gerth Contributing Editor SunDance Magazine 1913 Fillmore St. San Francisco, Calif. 94115 "Organized crime will put a man in the White House someday, and he won't even know it until they hand him the bill." - Ralph Salerno Part 1 of "Nixon and the Mafia" was publi shed in the September issue of "Computers and Automation" ; Part 2, in the October issue. Part 3 begins here wi th further information about the relation of President-to-be Richard M. Nixon wi th shady transactions in the Bahamas. Shakeup in the Bahamas By the middle Sixties there was a storm brewing. Internal friction had forced out a few people like Lou Chesler, while a wave of public investigations were blaring the role of underworld figures like Meyer Lansky. The 1967 Royal Commission of Inquiry also dredged up another familiar name -- Richard Nixon. Testimony before the Royal Commission by Max Courteney, a Lansky lieutenant, detailed a long bookmaking career and brought out the names of a large clientele, including the then ex-Vice President Richard Nixon. Mary Carter Paint The Royal Commission also bared a deal which implicated Richard Nixon far more deeply than passing mention by an underground bookie. In 1967 Lyndon Pindling became the first black premier ever to serve the almost one hundred percent black citizenry of the island. Pindling was hardly a revolutionary, however, for among the people instrumental in putting him in office was a gambler close to Lansky named Mike McLaney. The Royal Commission branded McLaney a "thoroughly dangerous person" and accused him of maneuvering Pindling into at least one deal involving a questionable gambling concession. Part of the post-election controversy was a company based in Tampa which bore the innocuous name of "Mary Carter Paint Company". In 1965 Lansky's front-man (and former Key Biscayne landowner) Wallace Groves, filed a joint application with the Mary Carter Company to open a Reprinted with permission from SunDance Magazine, November-December, 1972, Volume 1, Number 3, published by and copyright by Running Dog, Inc., 1913 F-illmore St., San Francisco, Calif. 94115 36 casino on Paradise Island in the Bahamas. The ubiquitous Sir Stafford Sands handled the legalities. Knowledgeable observers looked for the mystery man, and a Justice Department memo, dated January 18, 1966, predicted that "the atmosphere seems ripe for a Lansky skim". After Pindling's election, Groves was forced out and the Mary Carter Paint Company had itself two new casinos. At the 1967 opening of one of them -- the Nassau Bay Club -- the honored guest was Richard Nixon. The following year -- 1968 -- the other Mary Carter Club, the Paradise Island Casino, opened for business. The owners felt close enough to Nixon to offer him use of their facilities during the 1968 Republican Convention. Nixon felt more comfortable at Key Biscayne, but some of his staff took up the offer. Mary Carter Becomes Resorts International In 1969 Mary Carter -- now called Resorts International -- reluctantly "released" one Dino Cellini claiming that while he "had a relatively unsavory background, he had no criminal record, no criminal associates". Cellini hopped across the water to Miami, where, according to Dade County Sheriff Intelligence Reports, he continued to work in conjunction with Paradise Island Casino. The reports allege that Cellini was an almost daily visitor to Resorts International's Miami office, where he checked credits and worked with a company booking junkets to the Paradise Island Casino. There are those who maintain that Cellini's connections with Resorts International symbolize the influence of Lansky. In a 1971 editorial, the Las Vegas Sun concluded an eleven part series on organized crime -- some of which centered on Resorts International -- by charging that "however cloaked and cleverly concealed by the guardians, gambling in the Bahamas is controlled by Meyer Lansky and it has been established in police intelligence reports that the fee is fifteen percent of the gross income". The now defunct Toronto Telegram reported in 1970 that "observers believe that the resourceful Lansky is still managing to get his cut from the Bahamas". Resorts International, through its'ninety-one percent owned subsidiary, Intertel, has denied all allegations of involvement with organized crime. It COMPUTERS and AUTOMATION for November, 1973 was Intertel that ITT hired in 1972 to snoop on columnist Jack Anderson. The latest and possibly most damaging charge in the Resorts International battle came in June 1972 in an IRS inspired indictment of Meyer Lansky and Dino Cellini. The indictment reads in part: On or about May 17, 1968, unindicted co-conspirator Vincent Teresa met with defendants Meyer Lansky and Dino Cellini in Miami and had a discussion wherein defendants Lansky and Cellini gave Teresa permission to conduct gambling junkets to the Paradise Island Casino. Thus government agents allege that in 1968 Lansky maintained at least some control in running junkets to Resorts International's Paradise Island Casino. The junket racket is an integral part of the casino operation, and as recently as 1971 Lansky's cohort Eddie Cellini was reportedly still arranging junkets for the Paradise Island Casino. Enter Nixon and Rebozo It was in 1967 --- with Lansky still okaying junkets and Cellini still running the Paradise Island Casino --- that Richard Nixon and Bebe Rebozo became friends with the head of Resorts International. It should be no surprise that James Golden, the recently (1969) hired "deputy director of security" for Resorts International is a good friend of Nixon's. As a Secret Service guard for Nixon when he was Vice President, Golden made a good enough impression to be appointed staff security chief for Nixon in 1968. Golden was also security director of Nixon's convention headquarters in Miami that year, and was security director for his subsequent inauguration. Later that year he moved to Resorts International. Golden is just one of a long string of interesting Nixon security appointees, among them Watergate indictees James McCord, Gordon Liddy, and Howard Hunt. There are rumors, some of which have been aired in the press, that Richard Nixon owns stock in Resorts International. Former Republican Presidential candidate Thomas E. Dewey does own stock in the company, and, according to organized crime investigator Hank Messick among others, there are reports of Lansky buying stock as well. Nobody has proved anything one way or another about the stock connections, but that Nixon is connected to Resorts International, at least through Golden, is indisputable. Perhaps more disquieting than rumors of Nixon stock ownership in an underworld holding company for Bahamian casinos are the reports of his meddling in Bahamian affairs. In 1969 a proposed tax increase on gambling profits to provide money for Bahamian schools was slashed in half by the Minister of Finance. The Minister refused to explain the cut, and told opposition members to "use your imagination" for an explanation. The advice was taken literally by some Bahamian papers who speculated that pressure came from "outside sources connected with casinos". One Bahamian paper asked openly i f "a telephone call from the White House was not responsible?" Whereas our investigation into Cuban politics brought evidence to light possible violations of the Neutrality Act, we now have the possibility of an American Piesident who has spent a significant amount of his vacation time in the Bahamas also meddling in the affairs of that country. COMPUTERS and AUTOMATION for November, 1973 Richard Nixon, a man with both visible and invisible links to the underworld'and politics of preCastro Cuba, turns up in the Bahamas with very SImIlar links, bringing some big names along with him. Enter WiII,iam Rogers Two men with histories both in Bahamian politics and in the finances of organized crime have made frequent use of the legal services of a firm whose most prominent partner is Richard Nixon's old friend William P. Rogers, one-time Secretary of State. The two men are Mike McLaney, charged by the Royal Commission in 1967, and a business cohort of his named William Colusardo. McLaney and Colusardo were investigated in 1967 by the Securities and Exchange Commission in connection with a blueberry plantation that McLaney sold to a company controlled by Colusardo. The subsequent corporate jugglings implicated (among others) newly elected Bahamian Premier Lyndon Pindling. Among Colusardo's "favors" for Pindling were the use of his airplane during the election campaign, and a $127,000 contribution in the form of an "interest payment". The law firm that defended McLaney and Colusardo against the SEC was that of William P. Rogers. Rogers had been a close friend and political associate of Nixon's for twenty-five years. He accompanied Nixon on many of his Bahamian jaunts and also made frequent stops with him at the Key Biscayne Inn and Villas. In addition to being an "R & R" sidekick, Rogers was the man Nixon turned to for counsel amidst his personal crises in the Checkers affair and Eisenhowe~'s ~eri ous heart attack. Rogers served the Eisenhower/Nixon team for eight years in the Department of Justice, first as Deputy Attorney General, and then, by 1957, as Attorney General. The Justice Department's record against organized crime in the years following the Kefauver Commission was lackluster, to say the least. It was Rogers who personally rejected the recommendations of the specially constituted Wessell Committee on organized crime set up in the wake of the infamous Appalachian raid in upstate New York that revealed a Mafia summit conference. The Committee's proposals for a concentrated and coordinated war on organized crime were only implemented some years later by Attorney General Robert Kennedy. A footnote in the Justice Department files was a report by IRS Special Agent Josph Delfine, dated October 19, 1953. The IRS recommended to the Justice Department that "criminal proceedings be instituted against Meyer Lansky in the Southern JUdicial District of New York for the willful attempt to defeat and evade a large portion of his income taxes for the years 1945 and 1947 under section l45b ~f the Internal Revenue Code". The Justice Department with William Rogers second in command at the time --respectfully declined to prosecute. Lums Hot Dogs Upon leaving his post as Attorney General in 1960, Rogers became a member of the New York firm of Royal, Koegel and Wells. In 1969, with its leading partner about to become Secretary of State, Royal, etc. moved with its clients wholeheartedly into the world of gambling casinos and organized crime. A year later Royal took on the account of the Miami-based hot dog chain, Lums Inc. What did a hot dog chain have'to offer a prestigious New York law firm? The answer may lie in where the firm took its client;. 37 In 1969 Lums purchased the Ceasar's Palace Hotel and Casino in Las Vegas for $60,000,000. A month later the Nevada state gambling authorities were looking into the hotels' "catering to twelve underworld figures from Kansas City". A few months after the purchase the SEC filed suit charging Lums and Ceasar's Palace with "false and misleading" statements. The SEC wondered how Ceasar's managed to lose $1,000,000 in five months when the previous year (before Lums bought in) there was a $2,200,000 profit for a comparable time period. The SEC also questioned Lums concerning the $3,500,000 Lums paid one Jerome Zarowitz, a convicted professional sports fixer who wasn't even listed as an owner of the casino. Top officials in both Ceasar's and Lums have been under investigation by IRS intelligence in Miami and by Nevada gaming authorities in cases involving organized crime ever since Rogers' firm took on the Lums account. There is also the question of the 1971 Lums acquisition of a North Miami housing resort development called Sky Lakes. Both Sky Lakes and Ceasar's Palace have received large sums of money from the Teamsters -- $12,000,000 for the Miami project and more than $16,000,000 for Ceasar's Palace. With things going slowly, Lums announced plans for a new $22,000,000 casino next door to Ceasar's Palace. In December of 1971 the company decided that the whole restaurant idea was no longer worth the trouble. In a classic climax to a classic American success they changed their name to Ceasar's World Inc. and sold their hot dog stands. Meanwhile the Secretary of State's old law firm reaped a bundle with their new-found involvement in the Las Vegas underworld. With such stunning successes at home, one wonders what a firm with a link to the Secretary of State could do abroad, in places like the Bahamas or Vietnam, for example. Some of the dealings of the Smith/Alessio combine were brought to national prominence by a recent LIFE magazine article which accused Attorney General - Richard Kleindienst of "tampering with justice" in a case involving Alessio. According to the Wall Street Journal, Smith raised $1,000,000 for Nixon's 1968 campaign. He and his wife took the first position on the receiving line behind the President at the White House inauguration. More of the Same in California Nixon's other favorite resting place besides Key Biscayne is the area near his birthplace in southern California. Here the underworld pattern of his Florida involvements repeats itself -- in a strikingly similar pattern. One story there involves Nixon's multi-millionaire backer, C. Arnholdt Smith, and the Del Charro Hotel in La Jolla, just north of San Diego. The Del Charro was a favorite stopover for Nixon in the Fifties. Owned by the Murchison brothers, who also owned the nearby Del Mar race track, the hotel played host to numerous Detroit and Las Vegas gangsters. Alan Witwer, a former. manager of the hotel, has alleged in statements to this reporter and others that the hotel served as a secret meeting place for politicians and assorted business interests, some of them from the underworld. Witwer specifically cited a 1954 meeting attended by Nixon and chaired by a leading member of ITT. He also claimed that there was a bookmaking operation at the hotel, but has offered no documented proof. Mrs. C. Arnholdt Smith is a permanent resident of the Del Charro, and the hotel's visitors have included John Connally, Barry Goldwater, and J. Edgar Hoover. Hoover's $15,000-a-year bills were picked up by the stockholders of the Murchison interests. The fact that certain of Hoover's good friends rubbed elbows, rather warmly, with Meyer Lansky, and the fact that the nation's leading crime fighting agency -- the FBI -- has come up almost blank in its fight against organized crime may not prove anything about Hoover. On the other hand, these facts don't make it any easier to dismiss questions which might arise about the influence of organized crime at the highest levels of government. Nor do the underworld implications of big names surrounding Nixon end with the Secretary of State. Murray Chotiner, a long-time Nixon aide and architect of his early smear campaigns, has past links to the underworld. In 1962 Drew Pearson and Jack Anderson wrote that "Chotiner ... besides representing the top gangster of Philadelphia, Marco Reginelli, represented a long and amazing list of hoods, concession peddlers, income tax violators and others needing influence in high places ... " It was Chotiner who brought Frank Vitale, "once involved in the biggest bootlegging conspiracy on the West Coast," onto Nixon's special plane to Moscow in 1959. North of the Del Charro and thirty miles south of the San Clemente White House, lies the mammoth La Costa land resort development. The development is tied to both Smith (his daughter is a director) and to the Teamsters. Nixon's recent appointment of Walter Annenberg as Ambassador to England also echoes the themes of underworld involvement. Annenberg and his father were indicted in 1939 for "aiding and abetting" in connection with their wire service operation inChicago, an operation run with the protection of Al Capone, for which the Annenbergs paid $1,000,000. The Annenberg family was also a major contributor to Nixon's 1968 election campaign. LaCosta was originally developed by Cleveland syndicate reliables Allard Roen and Moe Dalitz. The development was reorganized in 1968 to bring Teamster control more in line with their investments, which already exceeded $18,000,000. Like Sky Lakes, its Florida counterpart, La Costa attracts a whole range of figures from organized crime. La Costa visitors have included Willie "Ice Pick" Alderman, a St. Louis mob cohort Morris Shenker, and Wallace Groves and Lou Chesler of Bahamas fame. Further back in the Nixon saga, and closer to his southern California birthplace, lies San Diego financier, C. Arnholdt Smith and his bookmaker partner John Alessio. In 1946 Alessio and Smith introduced Nixon to another bookmaker named Lew Lipinsky. Lipinsky, who was convicted for bookmaking in 1938, served for three decades as a go-between for the Smith/Alessio interests to their syndicate connections. 38 According to eyewitnesses, when Groves' helicopter sets down, the red carpet is rolled out. It may be because Groves bought a home in La Costa, but more likely it's because, as government agents put it, '~here Groves appears, Meyer Lansky will not be far behind". Another mob frequenter of the La Costa development is Jake Arvey, an organizer of the Republic COMPUTERS and AUTOMATION for November. 1973 • National Bank in Miami, the bank through which Bernard Barker channeled funds for the Watergate crime. The Teamsters Again A recent visitor to La Costa was Frank Fitzsimmons, a key to Nixon's new-found support in organized labor. Fitzsimmons is president of the Teamsters Union. This summer he stopped in La Costa on his way to see Nixon at San Clemente. Fitzsimmons had just come from dinner in Detroit with a local Mafia figure and soon after his Detroit-La Costa-San Clemente excursion, Fitzsimmons announced his support for Nixon. One wonders whether the Teamster decision to stay on the Pay Board and to support Nixon is somehow related to what the Detroit Free Press has been hinting strongly as of late: that the administration has stopped prosecution of Frank's son Richard Fitzsimmons -- the business partner of a Detroi t mobster -- on charges of mi ssing union funds, in exchange for Teamster support of the Republican President. Whatever deals Nixon and Fitzsimmons did make, the Teamsters have a long working relationship with organized crime. Their marriage goes back over twenty years, where Jimmy Hoffa was introduced to the Detroit underworld by Paul Dorfman, in exchange for some multi-million dollar insurance business. Dorfman's son, Paul, has residences at both Sky Lakes and La Costa and was recently convicted of taking kickbacks on a Teamster "loan. The Teamster tradition of labor racketeering and corruption made for a ready alliance with the mob. Early government investigations of the Teamsters, such as the Bobby Kennedy-led McClellan Permanent Committee on Investigations, centered on labor racketeering. As Attorney General, Kennedy continued his pursuit of the Teamsters and their boss, Jimmy Hoffa. At one point Kennedy had twenty-nine grand juries simultaneously investigating Hoffa's activity -- one of which led to a conviction for mail fraud and jury tampering. In 1969, two Oakland Tribune reporters concluded a six-month investigation with the charge that "the" $628,000,000 Teamsters Central States, Southeast and Southwest Pension Fund headquartered in Chicago, has become a bankroll for some of America's most sinister underground figure". -. Nowhere does the relationship between this fund and the mob surface more dramatically than in Las Vegas, where Teamster trustees have approved loans between $50 and $70,000,000, some shakily secured by second mortgages and subordinated notes. A highranking Federal official has commented that "the Teamster fund is a sort of open bank to people wellconnected in Las Vegas and well-connected to organized crime". It was Hoffa's desire "to have [his] own bank in every city" that brought on the Teamster takeover of the Miami National Bank. The Bank in turn is just one of a long list of ventures, suchas Ceasar's Palace, Sky Lakes, La Costa, Worldwide Realty, International Airport Hotel Systems, Truesdale Estates, in which Teamster money amounting to over $60,000,000 figures prominently alongside the social and business partners of Richard M. Nixon -- a line of investments that leads from Nixon's three White Houses to a federal clemency for Jimmy Hoffa and back to organized crime. The current head of the Justice Department's Criminal Division saw enough evidence in 1967 to say COMPUTERS and AUTOMATION for November, 1973 that he "knew for a moral certainty [that] in the upper echelons there is an amalgamation between the Cosa Nostra and the Teamsters Union". In 1971, when a Federal Grand Jury probing the activities of Meyer Lansky questioned Jimmy Hoffa, many wondered whether the links between the two giants were more direct than the numerous transactions between mutual friends. A few months after his testimony, Hoffa was granted clemency after serving less than five years of his thirteen-year sentence. The freeing of Hoffa and three co-defendents of the 1963 wire fraud pension case is the latest and most crucial event in Nixon's longstanding friendship, a friendship with some clear public benefits for both. Jack Anderson documents, for example, that as early as 1960, then Vice-President Nixon and Attorney General Rogers intervened to halt an indictment against Hoffa in exchange for Hoffa's support in the 1960 election. ANICO - More of the Same in Texas In recent years the Teamster fund has been superseded by a gjant Texas insurance company as a major source of finance for Las Vegas casinos tied to the mob. The company is the American National Insurance Company (ANICO) of Galveston, Texas. ANICO is close to the heart and pocketbook of the two ranking Texans in the Nixon administration -- former Treasury Secretary John Connally and former Assistant Attorney General Will Wilson. As well as floating more than $40,000,000 to Las Vegas casinos and $13,000,000 to premier mob attorney Morris Shanker, ANICO has made loans to two Florida companies close to Richard Nixon -$1,750,000 in 1966 to the Mary Carter Paint Company, and $3,000,000 in 1970 to a subsidiary of Worldwide Realty. That year a group of disenchanted stockholders filed a multi-million-dollar suit, charging ANICO officials with having taken control of the company and using it as a private preserve as well as a source of funds for the mob. The defendants in the suit hired Nixon's New York firm to handle the case. Connally's Houston law firm has also been used by ANICO. The First National Bank of Houston, of which Connally was a director and in which some of his law partners were officers, has provided an interest-free account of more than $1,000,000 for ANICO. Connally was also a director of a savings association which was purchased recently by ANICO. Will Wilson was "general" of the Justice Department's "war" on crime from 1969-1971. He was head of the Criminal Division until October 1971, when his resignation was forced by disclosures tying him to the scandal-rocked financial empire of Texas wheeler-dealer Frank Sharp. Wilson has been charged by dissident ANICO stockholders of helping to drag ANICO into the twilight zones of finance with such deals as the 1963 absorption of a defaulted $450,000 mortgage held by Sharp. Sharp's attorney and "financial advisor" on the deal was Will Wilson. While Attorney General of Texas, Wilson sued the foundation which controlled ANICO to bring three new trustees onto the foundation's board of directors. Wilson has no visible ties to the new trustees, whose votes were instrumental in shaping the company's new financial course. But dissident stockholders have charged that the "negotiations" that 39 brought on the shift of control in the foundations were handled by a Galveston law firm linked to the mob. The stockholders also claim that John Connally played a role in these negotiations, albeit a "backstage" role. The ANICO case is part of a long hi story of Wilson's involvement with the Galveston underworld. Indeed, while the Nixon-Agnew-Mitchell team has used the spectre of "CRIME" to keep the fear level high and to guarantee large budgets and expanded powers for their Justice Department, the actual "attempts" of the Nixon administration to cope with organized crime have resembled a somewhat sinister update of the Keystone Cops. When he came to the Justice Department in Washington, Wilson discovered the organized crime division looking into the affairs of ANICO. Since then there have been no indictments in the case and there are reports that Wilson had the ANICO files locked safely in his personal office. One source of those reports is Stewart Hopps, a former Justice Department investigator. For example, up to 1,000 of Kleindienst's vaunted 1600 indictees in gambling and organized crime may have their cases thrown out for somewhat dubious "improper procedures" technicalities. A Miami attorney named James Hogan has "discovered" irregularities on signatures required for electronic surveillance authorizations. Court-approved wiretaps require written authorization by the Attorney General of a designated representative, in this case Will Wilson. Instead of being signed by John Mitchell or by Wilson, the authorizations in question were signed by aides, thus rendering thousands of wiretap authorizations -- and the indictments based on them useless. Some serious conflict-of-interest charges concerning ANICO remain: • The officers of ANICO who were later represented by Nixon's law firm, made a loan to a company whose top officers are long-time friends of Nixon. • The criminal division of the Justice Department has been headed by a man with direct links in a company the division is supposedly investigating. • The company also has clear ties to Nixon's former Treasury Secretary, a man mentioned for the VicePresidency, the national chairman of Democrats for Nixon, and a key figure in the President's re-election scheme. Whose Justice Department? The ANICO case takes us to a fitting endpoint to the story of Richard Nixon's involvement with the underworld -- the Department of Justice. It is an old saw that criminal and criminal-chaser eventually become involved in the same business, but in Richard Nixon that old saw has become more of a reality than perhaps ever before in American history. For Richard Nixon is a man whose name has been synonymous with "law and order" in America for three decades. Yet the four-year "war" on organized crime by the Nixon administration bears more resemblance to the "peace" in Vietnam than a sincere effort to get at the mob. In a recent interview in U.S. News and World Report (September 11, 1972), Attorney General Richard Kleindienst hailed "about 1600" indictments of underworld figures brought by the Nixon administration in the past three and half years. The Justice Department claims that many of these indictments involve top mobsters. Those outside the Nixon administration, however, have charged that the government's prosecution has been both partisan and selective, aimed exclusively at mobsters linked to big-city Democrats such as in Newark, and at the "little fish" who are always in abundance and who make little difference in conducting mob business. Time has reported that quotas have been established (i.e. one hundred hoodlums a month for New York City) and that arrests are "being delayed so that future quotas can be filled". The New York Times has editorialized about the ease-wfth which petty gamblers can and have been rounded up, and wondered aloud if the Justice Department isn't conducting more a publicity war than one on organized crime. A Times report this year found the government was building up a backlog of gambling indictments, saving them for a crucial time during the election campaign. 40 Hogan himself is a long-time syndicate attorney and a partner of Ben Cohen, a former political boss of Miami Beach who figures prominently in the Forties' takeover of Miami by organized crime. The case in which Hogan made his discovery involved the busting of the largest heroin/cocaine ring in Miami, many of whose members were Cuban refugees. Inspection of various court papers, including wiretap authorizations, confirmed "irregularities" in the signature -- Will Wilson's signature. While resembling his actual handwriting, the signatures appeared as "Wil" instead of "Will". While it may seem strange for an aide to misspell his boss' name, it seems even stranger that Hogan took the case. His normal fees start in five figures but he has been working on behalf of his courtdeclared indigent client for more than two years with minimal compensation. While Hogan is known as a "very thorough" attorney, it would be interesting to find out more abo~~ the circumstances in which he discovered the "irregularities". Even more interesting, perhaps, are the circumstances under which Richard Kleindienst was offered a bribe of $100,000 to qu~sh several mob indictments In sworn testimony in November 1971, Kleindienst admitted to being offered the $100,000 bribe (which would be paid in the form of a contribution to Nixon's 1972 campaign) in exchange for stopping prosecution against several underworld figures caught in a stock fraud case. The bribe was offered by an aide of Senator Hiram Fong, a Republican from Hawaii. The aide had worked previously with Kelindienst through Fong's position on the Senate Judiciary Committee. Kleindienst said he refused the offer but he also said he did not realize it was a bribe for an entire week I In cross examination, the prosecutor asked Kleindienst, "If you had regarded the conversation as something regarding a bribe offer you would have immediately report it, would you not?" "Yes sir," replied Kleindienst, "I would have." Kleindienst admitted he reported the bribe a full week later, upon learning from J. Edgar Hoover that Federal agents were investigating the case. One would expect the Attorney General of the United States to be more alert. But what is more troubling are reports aired in the Washington Post COMPUTERS and AUTOMATION for November, 1973 shortly after the indictments in the stock fraud case in question (and ten months before Kleindienst's testimony on the bribe); Those reports quoted "sources at the UoS. Attorney's office in New York" and indicated that after the meeting between Kleindienst and Fong's aide, "Kleindienst immediately contacted Justice's Criminal Division [then headed by Will Wilson] and ... an FBI agent was assigned to infiltrate the group of alleged conspirators" . Do we now believe Kleindienst's story that he "didn't realize" he had been offered a bribe, or do we believe the U.S. Attorney's office in New York? Did Will Wilson and the Justice Department hold off a week while Kleindienst '~ade up his mind" that he had been offered a bribe, or was the decision whether or not to take it? And did Hoover and the FBI somehow interfere? Perhaps the answer comes in the final outcome of the actual prosecution involved. The defendants in the stock-fraud case included Meyer LanSky's son-inlaw, a former director of the Bank of Miami Beach and Johnny Dio, a notorious racketeer long associated with Jimmy Hoffao They were acquitted, while the messengers who offered the bribe were convicted. One wonders if that $100,000 did not find its way into the Republican secret treasury after all. The Tip of the Iceberg '~he organized criminal relies on physical terror and psychological intimidation, on economic retaliation and political bribery, on citizen's indifference and government acquiescence. He corrupts our governing institutions and subverts our democratic processes." -- Richard Nixon, April 24, 1969 Someone should tell President Nixon that resisting the power of organized crime demands, above all, a President with a clean slate. Nixon's life is like a complex jigsaw puzzle, the pieces of which have been shuffled so as to defy complete reconstructiono Some of the crucial pieces have been removed, so a full picture cannot be achieved. It is no accident that no other politician has been so much written about, yet so little understood. Indeed, much has been made of the "enigma" of Richard Nixon, his tight-lipped bearing in relation to his personal life, his unwillingness to divulge What's really on his mind. But maybe the answer to the enigma lies in his old poker-playing instincts, in the unfailing ability to keep quiet when he's sitting on cards best hidden from the table. For there is one indisputable fact about Richard Nixon's career -- his ascendancy to the pinnacle of American power has required twenty-five years of care and feeding by some very wealthy and very reactionary men, and an extraordinary number of them have maintained connections with the world of organized crime. During Nixon's years in office the underworld empire in the United States has prospered almost unrestricted by the Federal government. From its base in the gigantic resources of heroin traffic, gambling, prostitution, "protection," and a host of other enterprises of violence against society, organized crime has moved like a bulldozer into the world of legal, "respectable" business. COMPUTERS and AUTOMATION for November. 1973 Every link between Richard Nixon and organized crime, however marginal, is of significance, if for no other reason because he is President. And there are people allover America, from government intelligence agents to hotel waiters, who have Nixon stories to tell. He covers his tracks well, but not well enough. The full extent of Nixon's involvement with organized crime is just beginning to surface. The evidence in this article is merely the top of a dirty iceberg that will slowly become visible over the coming years. The milieu in which he has traveled for three decades, and in which so many of his friends, associates, and appointees have been related to the mob, throw a long and permanent shadow over everything Richard Nixon the "public servant" has ever said, and over everything his political life has ever meant. For in light of his career, both past and present, Richard M. Nixon seems to be the factual embodiment of Ralph Salerno's prediction that organized crime would someday put its own man in the White House. [] The information in this article was gathered during a six-month investigation carried out in many cities, primarily Miami, New York, Washington, D.C., Los Angeles, San Diego, Las Vegas, Dallas, Austin, Galveston, Tallahassee, and San Francisco. Sources included interviews with over a hundred people; court documents (including deeds, mortgages, etc.); research in the National Archives, WaShington, DoC.; organized crime intelligence files (both private and government); and newspaper clippings. Unsettling, Disturbing, Critical Computers and Automation, established 1951 and therefore the oldest magazine in the field of computers and data processing, believes that the profession of information engineer includes not only competence in handling information using computers and other means, but also a broad responsibility, in a professional and engineering sense, for: The reliability and social significance of pertinent input data; The social value and truth of the output results. In the same way, a bridge engineer takes a professional responsibi li ty for the reliabi li ty anel significance of the data he uses. and the safety and efficiency of the bridge he builds, for human beings to risk their lives on. Accordingly, Computers and Automation publishes from time to time articles and other information related to socially useful input and output of data systems in a broad sense. To this end we seek to publish what is unsettling, disturbing, critical -- but productive of thought and an improved and safer "house" for all humani ty, an earth in which our children and later generations may have a future, instead of facing extinction. The professional information engineer needs to relate his engineering to the most important and most serious problems in the world today: war, nuclear weapons, pollution, the population explosion, and many'more. 41 ACROSS THE EDITOR'S DESK Computing and Data Processing Ne·wsletter Table of Contents APPLICATIONS National American Bank Installs ComputerBased Security System Nova Computer Checks Strength of Roof in Coal Mine Phone Books by Computer 42 42 Ballpoint Pen Under Development 45 MISCELLANEOUS 43 APPLICATIONS NATIONAL AMERICAN BANK INSTALLS COMPUTER-BASED SECUR ITY SYSTEM Tom Burbank National American Bank 200 Carondelet New Orleans, La. 70130 A computer-based system designed to prevent unauthorized access to high security areas has gone into operation at National American Bank here --one of the first U.S. banks to install such a system. The IBM Controlled Access System (CAS) at National American is based on the use of magnetically ericoded, wallet-sized identification cards similar to bank credit cards. Each person authorized to enter a security area is assigned a card coded with his own security number. Employees seeking entry to an area covered by the system simply insert their cards into .compact reading devices on entrance doors, and. the information is transmitted to an IBM System/7 computer for identification. Stored in the computer's memory is a list of employee numbers and building areas these numbers are designated for. If the number of the card entitles the bearer access to that area, the computer signals the door to unlock. If the person is unauthorized to enter, the door remains closed and a security guard is notified. The elapsed time is approximately one second. If a card is lost or stolen, a new card (with a new number) is issued and the system is alerted to deny entry to the original card. If the old card is used, the guard is alerted. As an additional safeguard, the system can automatically log all entrance activity by individual security code, door number, date and time of day. This helps track who is where and for how long. National American can now analyze the number of 42 44 44 RESEARCH "Talkin~(' EDUCATION NEWS Digjtal,Equipment Corp. Computer Aids M.I.T. Music Project Composing by Computer at ISU Student Programs Computer for Remedial Instruction ICCP Names Directors and Officers IFIP Congress' 74 Travel Grants 45 47 ., times ?n individual enters and at what time of day or night this activity occurs. The system also has built-in failsafe mechanisms which insure security in the event of a power failure. "Unfortunately. we are doing business in a time when public and private institutions are increasingly vulnerable to lawless elements," said National American President Louie J. Roussel III. "By adding the IBM Controlled Access System to our current security procedures, we are taking a major step to insure that our customers and employees are protected. And, by controlling access to the collateral instrument storage areas, we can make it very difficult for unauthorized people to gain access to valuable assets stored in the bank." NOVA COMPUTER CHECKS STRENGTH OF ROOF IN COAL MINE Edgar E. Geithner Data General Corp. Southboro, Mass. 01772 Data General's minicomputers track hurricanes from airplanes for the U.S. Air Force; the Army has mounted them in helicopters; Scripps Oceanographic Insti tute has one ;on a ship; a scienti st bounces over Canadian glaciers with one mounted in his tracked vehicle; and an oil company uses one of the computers to control an oilfield in the Libyan desert. Now engineers at the University of Texas (Austin) have a minicomputer in the bottom of a mine. Dr. A. L. Podio, an assistant ,professor in the university's Department of Petroleum Engineering, and a team of researchers from the Center for Earth Sciences and Engineering, use a Nova'82~ computer to detect possible weak spots in the roofs of mines. The computer system, developed for the U.S. Bureau of Mines, has been on the job on thel floor of Kaiser Corporation's York Canyon coal mine in New Mexico. "One of the most frequent causes of mine accidents is roof. collapse," Dr. Podio said. "This system was de~igned to use the principles of seismic explorations to identify failure planes and fracture zones in the rocks overlaying the mine roof. If tests COMPUTERS and AUTOMATION for November, 1973 ( show the area around a roof is weakening, it can be supported by beams or roof bolts." new listings and monthly reprints f~r the telephone companies' directory assistance operators. In seismic exploration, a high energy explosion is set off, and sensitive instruments determine the structure and makeup of surrounding land by recording how fast the shock waves travel through the ground. The.waveforms can be int~rpreted to pinpoint probable deposits of oil, and to describe rock formations. "Using a large energy souce like an explosion in a mine is out of the question," Dr. Podio said, "so a manually controlled impact device was designed to generate the shock waves." The impact device, which works like a BB gun, uses air pressure to shoot a round projectile at a striker plate mounted at the end of the barrel. Although customers may see no obvious differences in the computer-produced directory, listings are easier to read and pages cleaner looking. The directories also have uniform abbreviations. The system has built-in cross-checks for consistent spelling of street names and for obvious errors in street and telephone numbers. There also is provision for massive directory listing changes, caused by renaming of streets and buildings. When the striker plate is pressed against the wall or roof of the mine and the device is triggered, shock waves are ~ent through the surrou~ding rock. The shock waves are picked up by wideband transducers, digitized by a fast transient recorder, and processed through the Nova 820 for waveform enhancement. The waveform is then displayed on an oscilloscope, with the results of velocity and depth calculations. Permanent records of the waveform can be made on paper tape, or by transmitting the data to a large scale remote computer. "A mine could make daily checks with the system to detect changes in rock strata as the working face of the mine advances," Dr. Podio said, "or the system could be transported throughout the mine to make daily checks on the condition of roofs at predetermined key locations." Dr. Podio noted that similar systems could be used to predict the quality of rock in rapid excavation projects or could be used in nondestructive tests of large concrete structures. PHONE BOOKS BY COMPUTER Peter A. Cassels Bell Telephone Laboratories Mountain Ave. Murray Hill, N.J. 07974 The Bell System is using computer technology to modernize production of the White Pages telephone books. A system designed to improve customer service, control costs and streamline massive recordkeeping operations is now being implemented. The system -- called DIR/ECT (for DIRectory projECT) -was developed by Bell Laboratories, the research and development unit of the Bell System. Michigan Bell Telephone Company recently issued its first directory containing listings produced by the system. Michigan Bell also is using the system to produce some of its directory assistance records. DIR/ECT is a more sophisticated outgrowth of its prototype, PHOTAC, a similar process developed by the New York Telephone Company under sponsorship of the nationwide Bell System. The first directory produced by the PHOTAC system was distributed in 1966. Since then, New York Telephone has converted some 4.5 million listings to the process. Currently the 12 major downstate White Pages directories are produced by PHOTAC. The DIR/ECT system stores in a computer memory directory information such as the customer's name, address, telephone number -- even telephone book delivery instructions. The information in the computer memory then is fed into a device called a photocomposer, which provides ready-to-print listings for White Pages. Besides the annual White Pages directories, DIR/ECT produces daily updates of COMPUTERS and AUTOMATION for November, 1973 Today, listings for phone directories are generally set line-by-line in metal type. Changes in listings must be reset and inserted by hand. With the new system, changes can be made quickly (because information is stored on magnetic computer tape and not metal type), the need to store tons of lead type will end, and the growing cost of publishing directories will be lessened. EDUCATION NEWS M.I.T. MUSIC PROJECT USES DEC COMPUTER News Office Massachusetts Institute of Technology Cambridge, Mass. 02139 The Massachusetts Institute of Technology has begun work on a project aimed at making the Institute a major center for the study and composition of electronic music. Barry Vercoe, assistant professor of music, working with a computer given to the Department of Humanities' music section by Digital Equipment Corp. of Maynard, is in the early stages of developing a major electronic music production facility at the Institute. Professor Vercoe said the computer facili ty "will be a tool both in the hands of the teacher and the composer that will greatly aid the development of creativity. The facility also will provide an excellent tool in the teaching of musical composition for conventional instruments. "This is definitely not a scientific project. I'm not interested in merely getting a computer to sound exactly like a trumpet. The technological application, however, will interest some students who might not approach music otherwise and some of these will be drawn into its aesthetic considerations, through the back door as it were," Professor Vercoe said. Why compose music for a machine at all? "I suppose someone asked that very question when man first composed music for what are now tradi tional instruments, instead of for the human voice alone," Professor Vercoe said. "Electronic music merely expands the forces available to the practicing composer." The PDP-ll/45 computer -- coupled with music input -- also will lend itself to other forms of music research, such as syntactic analysis of music structures. Professor Vercoe is the author of the widely used Music 360 language for digital sound synthesis. He has taught at M.I.T. for two years and is director of the Experimental Music Studio. His work, "Metamorphoses for OrChestra," was given its Boston premier early this year by the M.I.T. Symphony and was performed by the orchestra on its subsequent nation- 43 wide tour. Working with Professor Vercoe on the project are Richard J. Steiger, a graduate student, and Stephen Haflich, a recent M.I.T. graduate. tric and a National Science Foundation institutional grant of $8,698. The prototype employs a mini-computer that is owned by Iowa State. COMPOSING BY COMPUTER AT ISU The studio will be used as a teaching tool for the ISU music program. Computer software, the programs (sequences of operations to be performed by the computer) written for the system, will be developed so a composer can use the studio equipment without having prior knowledge of computer programming. Students will be able to learn basic acoustical concepts and principles of electronic music synthesis and to develop sensitivity to timbre with the ISMUS. Also contributing to introductory computer science courses, ':the system wi 11 be a novel example of computer application in a non-scientific field. Information Service Iowa State University of Science and Technology Ames, Iowa 50010 Music composers at Iowa State University may turn from their piano keyboards and hand-written scores to a more efficient instrument for composing musjc -- a computer. ISU faculty members are b~ilding a computerized electronic music studio -- a system that will technologically simplify composing electronic music. The studio is being designed and built by an interdisciplinary group from Iowa State's music, computer science, and electrical engineering departments, under the direction of ~tefan Silverston, assistant professor of computer SCIence, Terry Smay, professor of electrical engineering, and Gary White, associate professor of music. Electronic music is produced by purely electronic means and the Iowa State Computerized Music System (ISMUS) will be doing just that -- generating music with computer equipment. A composer will sit at the computer and write a musical composition using an electronic keyboard. The new system, which was expected to be operable this fall, should be an easier method of modifying and editing a musical piece. The normal hand operations of changing notations on a printed score or splicing tapes of recorded music are "more timeconsuming and inaccurate" processes for correcting a composition, according to Gary White. The computer composing process begins when the composer inserts introductory instructions into a teletype machine. On an electronic keyboard he then begins to compose his piece. The computer records all musical instructions which are transformed through a digital-to-analog sound converter and loudspeaker into sound. This immediate feedback system enables the composer to hear what he is composing simul taneously. The computer also allows· the composer to automatically play back and edit what he has written simply by striking another key. The musician has now completed one" layer" of music. If he wants to add further musical instructions to the composition, he repeats the entire process again. All layers merge together to obtain the product -- a completed electronic composition. The music instructions which the composer inserts into the system are a special electronic music notation -- a "computer language." The English words it uses can ,be compared to musical notation found on a conventional score -- treble and bass clefs, notes, rests, and the like. Electronic music has been used in commercial recordings, and as background music for television, radio and film. The rowa State system will be sophisticated enough for use in serious compositional study, the production of background music for various media, and for the demonstration of sound properties. The ISMUS presently being built is a protytype of a full-scale model. If the "test-system" proves satisfactory. "we will look for funding to build a full-scale model," says White. The project is presently supported by a $1,170 grant from Western Elec44 STUDENT PROGRAMS COMPUTER FOR REMEDIAL INSTRUCTION Edward J. Canty Digital Equipment Corp. Maynard, Mass. 01754 Using programs developed by a local high school student, School District 91 in Idaho Falls, has put its newly-acquired computer to work as a "super tutor" in remedial studies for disadvantaged children in this southeastern Idaho community. Designed to improve the arithmetic and language arts skills of children in grades 2 through 6, the project was introduced by director of curriculum Dr. Wallace Manning with federal Title I aid during the district's 1973 summer session for children largely from rural farm families. According to John A. Christensen, computer sciences coordinator, the project proved so successful in its initial application that it has been continued in the fall seniester. The student programmer is Robert Huntsman, 18, a June graduate of Idaho Falls' Skyline High School. Using the district's PDP-ll/20 timesharing computer system installed last December by Digital Equipment Corporation, Huntsman developed programs for arithmetic and language drill to serve between 40 and 50 pupils on each of two teletypewriter terminals situated in local elementary schools. In a typical arithmetic routine, the computer types a problem and waits for the pupil's response -- ten seconds if the problem is a memory exerci se ,. longer if it involves several columns for addition or several digits for multiplication. If the student's answer is correct, Huntsman's program directs the terminal to ring a bell in congratulation; if incorrect, the computer supplies a hint on where the mistake occurred and encourages him to try again. Answers to English and social studies workbook questions have been entered in the computer memory, allowing students to do their homework at a terminal and receive immediate response. The computer keeps score of right and wrong ~nswers to produce reports for teacher guidance. Spelling-recognition exercises are also in use and Huntsman has undertaken development of an arithmetic program involving fractions "One of the computer's major advantages is its ability to pay attention to individual children," Chri stensen said. "Every child enrolled in the regular summer session was able to get experience at a terminal and benefit from these interactive programs." He said high school laboratory assistants will continue to write instructional programs for elementary and junior high levels, expanding the library begun by Huntsman. For future summer sesCOMPUTERS and AUTOMATION for November. 1973 sions, he added, the district hopes to make such computer assistance available at a nearby rural elementary school attended by children of migrant farm workers. RESEARCH FRONTIER ''TALKING'' BALLPOINT PEN UNDER DEVELOPMENT Ronald I. Deutsch Stanford Research Institute Menlo Park, Calif. 94025 A prototype model of a simple, inexpensive "talking" ballpoint pen, under development at Stanford Research Institute (SRI), could reduce massive paperwork and delay in routine business transactions. The pen is similar to an ordinary pen in size and shape except that it is wired to a computer system. The computer is programmed to receive signals generated instantaneously as a person hand-prints characters with the pen to record information. "Such instantaneous and remote processing of data might be invaluable to large businesses engaged in daily consumer-oriented services, such as banks, insurance companies and uti Ii ties," says staff scientist Dr. Hewitt D. Crane, the inventor. For example, the pen could be used by a bank teller crediting a savings or checking account. In this case, according to Dr. Crane, the data would not have to be retranscribed from a piece of paper by another employee, or the paper itself put through expensive automatic reading equipment. Thus, costs·and delays could be reduced in crediting accounts or establishing cash requirements. In another case, a meter reader making his rounds for a utility could use the pen in combination with a cassette recorder. When he returned to his office, the cassette tape would be programmed into the system, thus eliminating the need for manual retranscription of a day's worth of data. In the present laboratory version, the pen is hooked to an audio unit as well as a teleprinter, so that as a person writes, the characters appear on the teleprinter and are spoken by the audio unit. SRI holds a patent on the pen and is currently seeking financial support for further development, Dr. Crane says. He estimates that the pen itself might cost about $25 to $50. A central computer unit would be extra but could serve many pens. MISCELLANEOUS ICCP NAMES DIRECTORS AND OFFICERS Paul M. Pair, Secretary & Chairman Institute for Certification of Computer Professionals P. O. Box 1442 Chicago, III. 60690 At a meeting in late September, the incorporators of the Institute for Certification of Computer Professionals, Chicago, Ill., adopted bylaw& for the newly-formed organization and named a board of directors which, in turn, held its first meeting and elected officers. The ICCP is the outgrowth of over two years of intensive preparation and study by representatives of major computing societies. Its primary focus is the enhancement of certification acCOMPUTERS and AUTOMAnON for November. 1973 tivities in the computing industry. porated August 13, 1973. It was incor- Elected as officers by the board of directors were: President -- John K. Swearingen, Computer Sciences Corp., Las Vegas, Nev., representing Data Processing Management Association CDPMA). Vice President -- Fred H. Harris, University of Chicago, Association for Computing Machinery. Treasurer -- William S. Eick, Alexander Grant & Co., Chicago, Associatfon of Computer Programmers and Analysts. Secretary -- Paul M. Pair, Control Data Institute, Chicago, Association for Educational Data Systems. Ten professional societies participated in the organization of ICCP and are eligible for charter membership. Of these, seven have exercised their right to such membership, and are entitled to two members on the ICCP board. The seven charter members are: Association of Computer Programmers and Analysts; Society of Certified Data Processors; Association for Computing Machinery; Association for Educational Data Systems; Society of Professional Data Processors; Data Processing Management Association; and Automation 1 Association. The other three associations eligible for charter membership are: Canadian Information Processing Society', the Computer Society of the Insti tute of Electri~al and Electronics Engineers and the Society of Data Educators. 1hey are expected to act before the end of 1973. (please turn to page 47) 45 NEW CONTRACTS Sanders Associates, Inc., Nashua, N.H. CAE Electronics, Montreal, Canada ITT Creed Limited, Great Britain British Post Office Univac Div., Sperry Rand Corp., Blue Bell, Pa. Auto Tell Services, Inc., Vi 11 anova, Pa. Computer Sciences Corp., El Segundo, Calif. National Aeronautics and Space Administration (NASA) Honeywell, Inc., Wellesley Hills, Mass. State of Arizona, Phoenix, Ariz. Computer Sciences Corp., El Segundo, Calif. Philco-Ford Corp. Willow Grove, Pa. National Aeronautics and Soace Administration (NASA) . U.S. Army Electronics Command, Fort Monmouth, N.J. Raytheon Data Systems, Norwood, Mass. Eastern Air Lines, Miami, Fla. National Cash Register Co., Dayton, Ohio Publix Super Markets, Inc., Lakeland, Fla. Computer Sciences Corp., El Segundo, Calif. Interdata, Inc., Oceanport, N.J. National Aeronautics and Space Administration (NASA) DATRAN (Data Transmission Co.), Vienna, Va. McDonnell Douglas Automation Co. (MCAUTO), St. Louis, Mo. Buffums' Southern California Informatics Inc., Western Div., Canoga Park, Calif. Logicon, Inc., Torrance, Calif . Illinois Bell Telephone Co., Chi cago, Ill. U.S. Air Force TRW Inc., Redondo Beach, Calif. Los Angeles County Road Department (LACRD), Calif. Systems Engineering Laboratories, Inc., Ft. Lauderdale, Fla. Boeing Commercial Airplane Co., Renton, Wash. Singer Simulation Products, Div. of Singer Co. Manufacturing Technology Div., A.F. Materials Labs., Wright Patterson AFB, Ohio Arkansas State Educational Television Commission Di splay system segment of Canadian Joint En- 18.6 million route Terminal System (JETS) Program; first phase consists of seven Enroute and two Terminal Systems for air traffic control $11 mi Ilion 6000 machines -- teleprinters and associated equipment -- to be used mainly for Telex customer-to-customer teleprinter system $7 mi Ilion 1100 Uni vac DCT-515 Data Communications Terminals to be used by automobile dealers who subscribe to ATS services on-line computerized services $6.7 million Computer services support toSimulator Computer System Branch at Ames Research Center, Mountain View, Calif. $5+ mi Ilion A Honeywell Multics (Multiplexed Information and Computing Service) system, for use by 13 state agencies Engineering and related services to NASA's $5 million (approximate) Wallops Station, Wallops Island, Va. $4.6 mi Ilion Improving computerized communications network, identified as '73 AEP for AUTODIN Enhancement Program, at. 10 overseas AUTODIN sites, Ft. Monmouth, N.J., and Fort Detrick, Md. $2+ million Data display terminals and associated equipment as part of expansion of EAL' s Automated Passenger Processing and Reservation System $2 million 30 NCR 255 supermarket checkout systems in(approximate) voiving a total of 357 NCR 255 terminals and 30 NCR 726 in-store minicomputers plus 120 NCR 250 free-standing electronic cash registers $1. 2 mi Ilion Analysis and programming services to Langley Research Center, Hampton, Va. Dual processor Model 55 data communications $1+ mi Ilion concentrators, with software and technical support, for an information network DATRAN is designed and installing on a turnkey basis for International Brotherhood of Teamsters $725,000 Computer processing of all company data; (approximate) includes accounts payable, receivables, sales analyses, payroll, inventory control and statistics $500,000+ Design and applications programming support for a new payroll/personnel system Verifying and validating (V&V) cri tical mis$365,000 sile flight safety (MFS) software used on western test range of Space and Missile Test Center (SAMTEC), Vandenberg AFB, Calif. $365,000 . Designing Integrated Information Management (IIMS); 10 subsystems cover accounting; billing; budgets; management of contracts, and projects, inventory control, production and performance, and road inventory information $330,000 Central control and simulation element of a Nuclear Plant Simulator for Carolina Power & Light Co., Raleigh, N.C. $251,000 Developing Air Force Computer Aided Manufacturing (AFCAM) master plan Bunker Ramo Corp., Trumbull, Conn. Reliance Federal Savings & Loan Asso. of New York, Jamaica, N.Y. Collins Radio Co., Dallas, Texas U.S. Air Force Diablo Systems, Inc., Subsidiary of Xerox Corp. Hayward, Calif. MRI Systems Corp., Austin, Texas Wang Laboratories, Tewksbury, Mass. $37,000 Engineering studies and detailed plans for four new ETC (Educational Television) stations, and an interconnecting microwave network 31 BR 2001 Universal Teller Terminals for equipping teller stations in all nine Reliance offices; terminals will be tied by highspeed communications circuits to a Univac 9480 computer Continuing development of systems and equipment for the U.S. Air Force Satellite Communication System (AFSATCOM); eventual production awards, depending upon Air Force requirements, could total more than $125million Series 40 disk drives to be incorporated into Wang's new line of mini computer systems U.S. Dept. of Agriculture, Washington, D.C. and New Orleans, La. Lease of SYSTEM 2000 for Farm management applications; at least nine SYSTEM 2000 data bases are planned for implementation thi s year Atlantic Research Corp., Alexandria, Va. 46 COMPUTERS and AUTOMATION for November. 1973 ( NEW INSTALLATIONS Uurroughs B 4700 system Computer Management Group (CMG) Ltd., North-west London, England Walter E. Heller & Co., Chicago, Ill. (2 systems) Control Data CYBER 70 Model 74 system Century Research Center Corp. (CRC) , Tokyo, Japan Control Data CYBER 70 Model 76 system Atmospheric Environment Service of Canada, Montreal, Canada Control Data 3150 system Ingalls Iron Works Co., Birmingham, Ala. IBM System 370 Model 155 system Educational Information Services (EIS), Princeton University, Princeton, N.J. Datacrown Limited, Willowdale, Ontario, Canada IBM System/370 Model 168 system Interdata Model 70 systems NCR Century 101 system NCR Century 200 system NCR Century 251 system Univac 1106 system U.S. Army Electronics Command, Fort Monmouth, N.J. (2 systems) Radyne Limi ted, Great Bri tafn Green Shield Trading Stamp Company of Edgware, Colindale, England Columbia EDP Centers, Inc., Columbia, Mo. British Gas Corp., Hinckley, England University of Connecticut Medical Center, Farmington, Conn. Univac 1110 system Pacific International Computing Corp., Gaithersburg, Md. pnivac 9480 system Reliance Federal Savings & Loan Asso. of New York, Jamaica, N.Y. Across the Editor's Desk - Continued from page 45 IFIP CONGRESS '74 TRAVEL GRANTS P. E. Welch U.S. Committee for IFIP Congress 74 Box 426 New Canaan, Conn. 06840 The National Science Foundation will support a travel grant program for attendance at IFIP Congress 74 to be held August 5-10, 1974, in Stockholm. The triennial IFIP (International Federation for Information Processing) Congresses have become the major international media for exchange of information among developers and users of information processing techniques and technology. COMPUTERS and AUTOMATION for November, 1973 The first of two B4700 systems (which are included in a five-system order) to be installed at CMG's North-west London, England center (entire 5 computer system order valued at $4.3 million) Providing internal processing speed to keep pace with continued growth of data processing operations; system will allow expansion without reprogramming or recompiling; replaces two Burroughs B3500 systems Increasing CRC's processing capabilities toinclude remote batch data processing services via high speed communication line control devices, and offer a wide range of services to various types of users; system will be connected to a previously installed CDC, 6600 computer (system valued ai~$3 million) Upgrading weather forecasting facilities throughout the country; system installed at Canadian Meteorological Center in Montreal, Canada (system valued at $6.3 million) Expanding automated design activities; system will operate in conjunction with a previously installed CDC 3150 to support CONSTRUCTS, an automated enineerin desi n software acka e Linking with university's IBM System 360 Model 91 to significantly expand a variety of data processing services The first of two systems that will more than double current batch processing capacity and increase its capability to provide for transaction-oriented tetminals; replaces Model 165 currently in use (systems valued at $12 million) Use in experiments involving automated tactical surveillance and target acquisition An advanced inventory management and control system (system valued at $6.3 million) Expansion of automated stock control system for its gift houses and new Argos chain of catalog showrooms General data processing services to a variety of customers including several banks Assistance in controlling National Grid pipeline by performing forward simulations on a real-time, round-the~clock-basis; in addition~ system will act as a service bureau to scientific and engineering departments within the Corporation All aspects of Medical Center's work including patient admissions, monitoring patient care, scheduling outpatient appointments, support of library information and research statistical programs, and general accounting and payroll processing chores (system valued at $1.3 million) The first of two systems whose primary applications include project management, engineering and business data processing; the system will also include time-sharing capability as well as remote job entry from terminals in the field Faster customer service at any bank branch The DivisiDn of Mathematical Sciences of the National Research Council will administer the program and award grants to qualified people from the United States whose accomplishments in and potential contributions to the field of information processing are most noteworthy, regardless of the formal labels for their specialties. Younger members of the information science community are urged to apply. William F. Atchison of the University of Maryland, Financial Support Chairman of the U.S. Committee for IFIP, said that special efforts will be made to support their attendance. Applications may be obtained through the Math Division, National Research Council, Washington, D.C. 20418. Applications must be received on or before December 31, 1973. 47 MONTHLY COMPUTER CENSUS Neil Macdonald Survey Editor COMPUTERS AND AUTOMATION The following is a summary made by COMPUTERS AND AUTOMATION of reports and estimates of the number of general purpose digital computers manufactured and installed, or to be manufactured and on order. These figures are mailed to individual computer manufacturers quarterly for their information and review, and for any updating or comments they may care to provide. Please note the variation in dates and reliability of the information. A few manufacturers refuse to give out, confirm, or comment on any figures. Part 1 of the Monthly Computer Census contains reports for United States manufacturers, A to H, and is published in January, April, July, and October. Part 2 contains reports for United States manufacturers, I to Z, and is published in February, May, August, and November. Part 3 contains reports for manufacturers outside of the United States and is published in March, June, September, and D"ecember. Our census seeks to include all digital computers manufactured anywhere. We invite all manufacturers located anywhere to submit inforthat would help make these figures as accurate and complete as possible. The following abbreviations apply: (A) -- authoritative figures, derived essentially from information sent by the manufacturer directly to COMPUTERS AND AUTOMATION C figure is combined in a total (D) acknowledgment is given to DP Focus, Marlboro, Mass., for their help in estimating many of these figures E figure estimated by COMPUTERS AND AUTOMATION (N) manufacturer refuses to give any figures on number of installations or of orders, and refuses to comment in any way on those numbers stated here (R) figures derived all or in part from information released indirectly by the manufacturer, or from reports by other sources likely to be informed (S) sale only, and sale (not rental) price is stated X no longer in production information not obtained at press time and/or not released by manufacturer SUMMARY AS OF OCTOBER 15, 1973 NAME OF NAME OF MANUFACTURER COMPUTER Part 2. United States Manufacturers I-Z IBM 305 White Plains, N.Y. 650 (N) (D) (Oct. 1973) 1130 1401 l40l-G l40l-H 1410 1440 1460 1620 I, II 1800 7010 7030 704 7040 7044 705 7020, 7074 7080 7090 7094-1 7094-II System/3 Model 6 Sys tem/ 3 Model 10 System/3 Model 15 System/7 360/20 360/25 360/30 360/40 360/44 360/50 360/65 360/67 360/75 360/85 360/90 360/91 360/190 360/195 370/115 370/125 370/135 370/145 370/155 370/158 370/165 370/168 370/195 Interdata Model 1 Oceanport, N.J. Model 3 (A) (Oct. 1973) Model 4 Model 5 Model 7/16 Model 7/32 Model 15 Model 16 Model 18 Model 50/55 Model 70 Model 74 Model 80 Model 85 48 DATE OF FIRST INSTALLATION AVERAGE OR RANGE OF MONTHLY RENTAL $(000) NUMBER OF INSTALLATIONS Outside In In World U.S.A. U.S.A. 12/57 10/67 2/66 9/60 5/64 6/67 11/61 4/63 10/63 9/60 1/66 10/63 5/61 12/55 6/63 6/63 11/55 3/60 3/60 8/61 11/59 9/62 4/64 3/71 1/70 3.6 4.8 1.5 5.4 2.3 1.3 17.0 4.1 10.0 4.1 5.1 26.0 160.0 32.0 25.0 36.5 38.0 27.0 35.0 60.0 63.5 75.0 83.0 1.0 1.1 40 50 2580 2210 420 180 156 1690 194 285 416 67 4 12 35 28 18 10 44 13 4 10 6 8 5 11/71 12/65 1/68 5/65 4/65 7/66 8/65 11/65 10/65 2/66 12/69 11/67, 0.35 and up 2.7 5.1 10.3 19.3 11.8 29.1 57.2 133.8 66.9 150.3 15 7161 1112 5487 2454 109 1135 604 65 50 11 5 1 13 4/71 4/73 5/72 9/71 2/71 -/73 5/71 -/73 6/73 12/70 5/67 8/68 11/70 -/74 -/74 1/69 5/71 6/71 5/72 10/71 2/73 10/72 6/73 15 18 1227 1836 450 140 116 1174 63 186 148 17 1 1 27 13 3 3 26 2 2 4 4 55 68 3807 4046 870 320 272 2864 257 471 564 84 5 13 62 41 21 13 70 15 6 14 10 6075 759 2535 1524 57 445 144 6 17 1 13236 1871 8022 3978 166 1580 748 71 67 12 15 9 232.0 8.2-13.8 14.4 23.3 48.0 49.5-85.0 98.7 93.0-170.0 190.0-270.0 3.7 13.1 8.5 X 20.0 X X NUMBER OF UNFILLED ORDERS 1780 1287 1363 39 662 562 99 12 55 48 1 13 2 2 1 3 1 244 75 274 70 115 20 319 200 389 90 40 1 2 75 466 41 15 1 24 6 7 10 116 8 3 64 7 9 85 582 49 18 X 32 X X X X 115 107 126 20 COMPUTERS and AUTOMATION for November, 1973 NAME OF MANUFACTURER Microdata Corp. Irvine, Calif. ~A2 ~Se12t. 1973) NCR Dayton, Ohio (N) (R) (Oct. 1973) Philco Willow Grove, Pa. ~N2 pan. 1969) Raytheon Data Systems Co. Norwood, Mass. (A) (July 1973) Standard Computer Corp. Los Angeles, Calif. (A) (June 1972) Systems Engineering Laboratories Ft. Lauderdale, Fla. (A) (Se12t. 19732 Texas Ins truments Inc. Houston, Tex. (A) (June 1973) UNIVAC Div. of Sperry Rand Blue Bell, Pa. (A) (Aug. 1973) UNIVAC - Series 70 Blue Bell, Pa. (A) (Feb. 1973) Varian Data Machines Newport Beach, Calif. (A) (Mar. 1973) Xerox Data Systems E1 Segundo, Calif. (N) (R) (Oct. 1973) DATE OF AVERAGE OR RANGE NAME OF FIRST OF MONTHLY RENTAL COMPUTER INSTALLATION $(000) 0.1-0.5 Micro 400/10 12/70 0.2-3.0 Micro 800 12/68 0.2-3.0 12/71 Micro 1600 X 304 1/60 X 310 5/61 7.0 315 5/62 9.0 315 RMC 9/65 0.7 390 5/61 1.0 500 10/65 251 Century 50 1.6 2/71 Century 100 2.6 9/68 3.7 Century 101 12/72 7.0 Century 200 6/69 Centu;y 300 21.0 2/72 X 1000 6/63 200-210,211 X 10/58 2000-212 X 1/63 X 250 12/60 X 440 3/64 X 520 10/65 703 12.5 10/67 7.2 704 3/70 706 5/69 19.0 IC 4000 9.0 12/68 IC 6000-6000/E 16.0 5/67 IC 7000 17.0 8/70 IC-9000 400.0 5/71 SYSTEMS 810A/810B 6-66/9-68 1.8/2.6 SYSTEMS 71/72 8-72/9-71 0.9/1.0 SYSTEMS 85/86 7-72/6-70 6.0/10.0 960 X 6/70 960A 0.2-2.7 11/71 X 980 5/68 980A 0.3-2.7 8/72 9200 1.5 6/67 9300/9380 3.4 9/67 9400/9480 7.0 5/69 9700 418 III 6/63 11.0 494 1106 1108 68.0 9/65 1110 X I & II 3/51 & 11/57 File Computers X 8/56 LARC 135.0 5/60 1107, UIII, 490/1/2, 418II, 1004/5, 1050, SS80/90 X 301 2/61 7.0 501 14.0-18.0 6/59 601 14.0-35.0 11/62 3301 17.0-35.0 7/64 Spectra 70/15. 25 4.3 9/65 Spectra 70/35 1/67 9.2 Spectra 70/45 22.5 11/65 Spectra 70/46 11/68 33.5 Spectra 70/55 34.0 11/66 Spectra 70/60 32.0 11/70 Spectra 70/61 4/70 42.0 70/2 16.0 5/71 70/3 25.0 9/71 70/6 25.0 9/71 70/7 12/71 35.0 EMR 6020 4/65 5.4 EMR 6040 6.6 7/65 EMR 6050 2/66 9.0 EMR 6070 10/66 15.0 EMR 6130 8/67 5.0 EMR 6135 2.6 EMR 6145 7.2 EMR 6140 620 X 11/65 620i X 6/67 R-620i 4/69 520/DC, 520i 12/69;10/68 620/f X 11/70 620/L, 620/L-00C 4/71;9/72 620/f-100 6/72 620/L-100 5/72 Varian 73 11/72 XDS-92 4/65 1.5 XDS-910 8/62 2.0 XDS-920 9/62 2.9 XDS-930 6/64 3.4 XDS-940 4/66 14.0 XDS-9300 11/64 8.5 XDS-530 7.6 8/73 Sigma 2 12/66 1.8 Sigma 3 12/69 2.0 Sigma 5 8/67 6.0 Sigma 6 6/70 12.0 Sigma 7 12/66 12.0 Sigma 8 2/72 Sigma 9 35.0 COMPUTERS and AUTOMATION for November, 1973 (S) (s) (S) (S) NUMBER OF INSTALLATIONS In Outside In U.S.A. World U.S.A. 0 139 139 810 3737 2927 1009 914 95 2 7 5 0 8 8 200 455 255 90 55 35 325 485 160 2850 1100 1750 1 580 0 580 1958 1175 783 51 1 50 335 910 575 5 5 10 16 16 12 20 135 115 20 1 26 27 179 33 212 100 400 300 92 17 75 0 9 9 0 3 3 0 4 4 0 1 1 412 382 30 24 19 5 50 3 47 NUMBER OF UNFILLED ORDERS X X X X X X X X 0 40 1 2 1 X X 1360 795 212 3 40 62 61 163 11 23 13 2 616 675 228 11 77 46 143 92 17 1976 1470 440 14 117 108 204 255 28 2063 143 17 0 74 18 95 265 30 10 18 7 63 7 24 7 15 6 15 7 34 36 1442 3505 X 1 0 2 8 13 5 16 6 17 15 47 41 0 0 0 0 0 4 8 0 X X 43 170 120 159 33 25-30 4 10 12 14 3 4 75 1300 80 500 207 740 100 200 40 47 180 132 173 36 29-34 163 21 32 3 31 5 7 36 1 14 199 22 46 X X 0 150 X 101 43 235 39 38 49 CAL.ENDAR 'OF C'OMING EVENTS Nov. 28-30, 1973: 1st Annual Systems Engineering Conference, Statler-Hilton Hotel, New York, N.Y. / contact: Technical Services, All E, 25 Technology Park/Atlanta, Norcross, GA 30071 Dec. 4-5, 1973: 1973 Vehicular Technology Conference, SheratonCleveland, Cleveland, Ohio / contact: Robert Wylie, Motorola Communications, Inc., 12955 Snow Rd., Cleveland, OH 44130 Dec. 6-8, 1973: National Symposium on Computer Applications in the Juvenile Justice System, Marriott Motor Hotel, Atlanta, Ga. / contact: Lawrence A. Boxerman, Project Dir., National Council of Juvenile Court Judges, Univ. of Nevada, Box 8000, Reno, NV 89507 Deco 9-11, 1973: Computer Architecture, Flagler Inn & Reitz Union, Gainesville, Fla. / contact: G. Jack Lipovski, 229 Larsen Hall, Univ. of Florida, Gainesville, FL 32601 Jan ..16-18, 1974: 3rd Annual All E-MHI Seminar, Marriott Motor Hotel, Philadelphia, Pa. / contact: Technical Services, AilE, 25 Technology Park/Atlanta, Norcross, GA 30071 Jan. 16-19, 1974: Internepcon/Japan '74, Harumi Convention Center, Tokyo, Japan / contact: Industrial & Scientific Conf. Mgmt., Inc., 222 W. Adams St., Chicago, I L 60606 Feb. 12-14, 1974: Computer Science Conference, Detroit Hilton, Detroit, Mich. / contact: Seymour J. Wolfson, Computer Science Section, Wayne State Univ., Detroit, MI 48202 Feb. 13-15, 1974: International Solid State Circuits Conference, Univ. of Penna., Marriott Hotel, Philadelphia, Pa. / contact: Virgil Johannes, Bell Labs., Room 3E331, Holmdel, NJ 07733 Feb. 19-22, 1974: 3rd Annual National Communications Week Convention, Chase-Park Plaza Hotel, St. Louis, Mo. I contact: David C. Brotemarkle, Communications Systems Management Assoc., 1102 West St., Suite 1003, Wilmington, DE 19801 Feb. 26-28, 1974: Computer Conference (COMPCON), Jack Tar Hotel, San Francisco, Calif. / contact: Jack Kuehler, IBM Corp., P 35, Bldg. 025, Monterey & Cottle Rds., San Jose, CA 95114 Mar. 25-29, 1974: IEEE International Convention (lNTERCON), Coliseum & Statler Hilton Hotel, New York, N.Y. / contact: J. H. Schumacher, IEEE, 345 E. 47th St., New York, NY 10017 April 3, 1974: Minicomputers - Trends and Applications, Nat'l Bureau of Standards, Gaithersburg, Md. I contact: Harry Hayman, 738 Whitaker Ter., Silver Spring, MD 20901 April 8-11, 1974: Computer Aided Design, Int'l Conference & Exhibition, Univ. of Southampton, Southampton, England / contact: Inst. of Civil Engrs., Great George St., Westminster, London SW1, England April 9-11, 1974: Optical Computing Symposium, Zurich, Switzerland / contact: Samuel Horvitz, Box 274, Waterford, CT 06385 April 21-24, 1974: International Circuits & Systems Symposium, Sir Francis Drake Hotel, San Francisco, Calif. / contact: L. O. Chua, Dept. of EE, Univ. of Calif., Berkeley, CA 94720 April 21-24, 1974: 1974 Annual Assoc. for Systems Management Conf., Dallas Convention Center, Dallas, Tex. / contact: R. B. McCaffrey, ASM, 24587 Bagley Rd., Cleveland, OH 44138 May 5-8, 1974: Offshore Technology Conference, Astrohall, Houston, Tex. / contact: Offshore Tech. Conf., 6200 N. Central Expressway, Dallas, TX 75206 May 6-10, 1974: 1974 National Computer Conference & Exposition, McCormick Place, Chicago, III. / contact: Dr. Stephen S. Yau, Computer Sciences Dept., Northwestern University, Evanston, I L 60201 50 May 13-17, 1974: European Computing Congress (EUROCOMP), Brunei Univ., Uxbridge, Middlesex, England / contact: Online, Brunei Univ., Uxbridge, Middlesex, England May 13-17, 1974: International Instruments, Electronic and Automation Exhibition, Olympia, London, England / contact: Industrial Exhibitions Ltd., Commonwealth House, New Oxford St., London, WC1 A 1 PB, England June 24-26, 1974: Design Automation Workshop, Brown Palace Hotel, Denver, Colo. / contact: ACM, 1133 Ave. of the Americas, New York, NY 10036 June 25-28, 1974: 1974 Annual International Conference & Business Exposition, Minneapolis, Minn. / contact: Data Processing Management Assoc., 505 Busse Highway, Park Ridge, IL 60068 July 15-19, 1974: 1974 Conference on Frontiers in Education, City University, London, England / contact: Conf. Dept., Institution of Electrical Engineers, Savoy Place, London, England WC2R OBL July 23-26, 1974: Circuit Theory & Design, I EE, London, En~land / contact: lEE, Savoy PI., London WC2R OBL, England Aug. 5-10, 1974: I FIP Congress 74, St. Erik's Fairgrounds, Stockholm, Sweden / contact: U.S. Committee for IFIP Congress 74, Box 426, New Canaan, CT 06840 Aug. 5-10, 1974: Medinfo 74, St. Erik's Fairgrounds, Stockholm, Sweden / contact: Frank E. Heart, Bolt Beranek and Newman, Inc., 50 Moulton St., Cambridge, MA 02138 Aug. 21-23, 1974: Engineering in the Ocean Environment International Conf., Nova Scotian Hotel, Halifax, Nova Scotia / contact: O. K. Gashus, EE Dept., Nova Scotia Tech. Coli., POB 100, Halifax, N.S., Canada ADVERTISING INDEX Following is the index of advertisements. Each item contains: product / name and address of the advertiser / name of the agency, if any / page number where the advertisement appears. COMPUTERS AND AUTOMAT/ON / Computers and Automation, 815 Washington St., Newtonville, MA 02160 / page 52 ELECTRONIC RESEARCH CORP., 7618 Wedd, Overland Park, KS 66204 / ERC Advertising / page 45 INSTRUCTIONAL FACULTY OPENINGS / College of Petroleum & Minerals, c/o Saudi Arabian Educational Mission, 880 Third Ave.-17th Floor, New York, NY 10022 / page 32 THE NOTEBOOK ON COMMON SENSE, ELEMENTARY AND ADVANCED / published by Computers and Automation, 815 Washington St., Newtonville, MA 02160/ page 7 R/DE THE EAST W/ND: Parables of Yesterday and Today, published by Quadrangle/New York Times Book Co. / Computers and Automation, 815 Washington St., Newtonville, MA 02160 / pages 24, 25 WHO'S WHO /N COMPUTERS AND DA TA PROCESSING / jointly published by Quadrangle/New York Times Book Co., and Berkeley Enterprises, Inc., 815 Washington St., Newtonville, MA 02160 / page 51 COMPUTERS and AUTOMATION for November, 1973 ~~WHO'S WHO IN COMPUTERS AND DATA PROCESSING" EDITION 5.2 = 5th EDITION + 2 SUPPLEMENTS ALREADY ISSUED THE MOST ESSENTIAL COMPONENTS IN COMPUTERS AND DATA PROCESSING ARE PEOPLE Who are they? Consult What do they do? Where do they do it? "WHO'S WHO IN COMPUTERS AND DATA PROCESSING" jointly published by Computers and Automation (Berkeley Enterprises, Inc.) and Quadrangle / New York Times Book Co. We are confident that you will find the subscription will repay you many times over. In fact, one day when this wealth of material gives you the inside track with someone important to you, you'll find the information PRICELESS: the most essential component in EDP is CAPABLE PEOPLE. "Who's Who in Computers and Data Processing" has been changed 'to a periodic subscription basis as follows: 1. The latest Cumulative Edition (the 5th edition pu blished 197 1, con taining over 15,000 capsllle biographies, over 1,000 pages long, 3 volumes, hardbound) PLUS 2. Three Updating Supplements per period totaling over 3.,000 entries Both for $34.50 in any period when a cumulative edition is supplied ... and $15.00 per period when a cumulative edition is not supplied. RETURNABLE IN 10 DAYS FOR FULL REFUND (if not satisfactory) r- - - - - - I I BASED ON continual data gathering from computer professionals carried out by Computers and Automation YES, please enroll me as a subscriber to WHO'S WHO IN COMPUTERS AND DATA PROCESSING at the following rate: $34.50 including the last cumulative edition This reference is particularly useful for: Personnel managers Libraries Conference planners Directors of computer installations Suppliers to the computer industry Execut ive search organizations Prospective authors Prospective speakers ... anyone who needs to keep up with the important people in the field. (may be copied on any piece of paper)- - - - - - - - - WHO'S WHO IN COMPUTERS AND DATA PROCESSING 815 Washington St., Newtonville, Mass. 02160 OR $15.00 since I already have access to the last cumulative edition I understand that for each period of subscription I shall receive three updating supplements, totaling over 3,000 entries. ) Please bill me. ) Payment enclosed ( ) Please bill my organization RETURNABLE IN 10 DAYS FOR FULL REFUND (if not satisfactory) Each computer professional has a capsule biography detailing: last name; first name and middle initial (if any); occupation; year of birth; university education and degrees; year entered the computer field; main interests; job title; organization and its address; publications, honors and memberships; home address. COMPUTERS and AUTOMATION for November, 1973 Name Title Organization Address City State & Zip Your Signature P.O. No. (if company order) 51 i I I I WILL YOU HELP? Please give us their names and addresses on the form below or add anothe'r sheet of paper. Trim out the card with scissors and drop it in the mail. We'll gladly pay the postage to learn of possible new friends. And many thanks for your help! As a token of our appreciation we'll send you our ****Reprint . Yes, you. It may come as a surprise that you'd be asked . . . but as a reader of Computers & Automation you are in a unique position to help us. P.S. If you like you may mail your list separately to: R. A. Sykes, Circulation Mgr. Computers & Automation & People 815 Washington Street Newtonville, MA 02160 NAMES ... people, institutions, companies who should be interested in 1) the computer industry and/or 2) seeking truth in information are very much needed to join you as readers of C&A. Will you tell us who they are? And perhaps even more, will cut here and tuck in flap r--------------------------, TO: R. A. Sykes, Circulation Mgr. ,,, Computers & Automation & People ,,, I suggest you send information on C&A to ... (attach list if you like) ,,, (1)Name ___________________________________ , ,, Address ____________________________________ you let us use your name in writing to them? But with or without your name (we'll only use it if you grant permission) we need to know those you think might be interested in also reading C&A. * *' * *' 1 1 reprint from CD"'I?,,!ila~~~ =,:1, cu, City ____________ State _______ Z IP ______ ,,, ,,, , ,, (2) Name ___________________________________ (,I, '"'0 en ~ M ~ ,i U I- 2 ci 2- I- I- ~ ...J CI) a: u:: CI) '"'0 ~ ' !!!GI '~ 0 '"'0 CI) :] ' c: ~ 0 a: m w U Z 0.. UJ c: c, 0 Q) "C Q) C. ra co 1;; I al ...J ...J Cii :::> OJ ~ a: UJ CIl 0 ~ Q.. Q) ~ u Q) c: E 2 UJ E c. W ..J := a: CI) CI) UJ >CIl 0.. w Z ~ ...J UJ ::a: CJ <{ I- (/) 0 Q.. 1 Ig Ir+ I~ Address ____________________ City ____________ State _______ ZIP _____ May we use your name? DYES o NO 1 1 1 1 1 1 1 1 1 1 1 1 1 YES, , here - do not cut start my subscription to COMPUTERS AND AUTOMATION AND PEOPLE according to the instructions checked below, One Year (including the Computer Directory and Buyers' Guide 13 issues) U.S. only. 0 $23.50 One Year (excluding the Computer Directory and Buyers' Guide 12 issues) U.S. only. 0 $11.50 Country if not U.S.: _ _ _ _ _ _ _ _ _ _ __ Signature: _ _ _ _ _ _ _ _ _ __ P.O. No .. _ _ __ Z ZW <{ 1 Name: _______________ Title: ________ Organization: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ Address: _ _ _ _ _ _ _ _ _ _ _ _ __ City: _ _ _ _ _ _ __ _ _ _ _ Zip: _____ State: vi ~ 1 1 1 , Please give us your name and address on the form below so we can " send you your * * * * Reprint. Just cross out the subscription request , - unless you also want to enter your new or renewal order~ : :E ~ 1 I'; _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ~ut~er~ _ _ _ _ _ _ _ _ _ _ _ • ____________ Fold .... 1 1 1 ~, Science and the Advanced Society, by C. P. Snow, Ministry of Technology, London, England (April 1966) The Information Revolution and the Bill of Rights, by Dr. Jerome B. Wiesner, M.LT. (May 1971) Employment, Education, and the Industrial System, by Prof. John Kenneth Galbraith, Harvard Univ. (Aug. 1965) Computers and the Consumer, by Ralph Nader, Washington, D.C. (Oct. 1970) M 1 0 U c ca an t-
Source Exif Data:File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : No XMP Toolkit : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37 Producer : Adobe Acrobat 9.1 Paper Capture Plug-in Modify Date : 2009:03:25 01:29:22-07:00 Create Date : 2009:03:25 01:29:22-07:00 Metadata Date : 2009:03:25 01:29:22-07:00 Format : application/pdf Document ID : uuid:a1083e41-7def-4fcd-9f13-79a7fd3fd371 Instance ID : uuid:30f777e9-5b5a-4809-83c3-bc77b8bc4fad Page Layout : SinglePage Page Mode : UseNone Page Count : 52EXIF Metadata provided by EXIF.tools