197311

197311 197311

User Manual: 197311

Open the PDF directly: View PDF PDF.
Page Count: 52

Download197311
Open PDF In BrowserView PDF
SCIENCE & TECHNOL09YJ

November, 1973
Vol. 22, No. 11
UNTIL DECEMBER 31, 1973

CD
STARTING JANUARY 1, 1974

computers

and people

WORKING TOGETHER
Cooperative Facilities to Obtain the Advantages of Computers
Control in Time-Sharing Systems
Computer Art: The Search Beyond Manipulation
Computers in Science Fiction
Strategy and Action on World Trade
Virtue, in Spite of Erroneous Conceptions
Nixon and the Mafia - Conclusion

-

M. J. Cerullo
F. C. Castillo
G. C. Hertlein
M. Ascher
J. H. Binger
J. P. Frankel
J. Gerth

~

2. 1721
16

511.3

Here is the start of the most famous article that we ever published - excerpted from the May, 1970, issue of

Computers and Automation. If you would like to read this article, and look at the eleven photographs it contains,
send us $2 (prepayment is necessary). This issue is RETURNABLE IN 7 DAYS FOR FULL REFUND (IF IN
SALABLE CONDITION),
How can you lose?

Computers and Automation, 815 Washington St., Newtonville, Mass. 02160

THE ASSASSINATION OF PRESIDENT JOHN F. KENNEDY:
THE APPLICATION OF COMPUTERS
TO THE PHOTOGRAPHIC EVIDENCE
Part 1. Introduction
Who Assassinated President Kennedy?

On November 22, 1963, in Dallas, Texas, President
John F. Kennedy, while riding in an open limousine
through Dealey Plaza and waving to the surrounding
crowds, was shot to death. Lee Harvey Oswald, an
ex-Marine, and former visitor to the Soviet Union,
was arrested that afternoon in a movie theatre in
another section of Dallas; that night he was charged
with shooting President Kennedy from the sixth floor
easternmost window of the Texas School Book Depository Building overlooking Dealey Plaza. This act
Oswald denied steadily through two days of questioning (no record of questions and answers was ever
preserved). Two days later while Oswald was being
transferred from one jail to another, he was shot
by Jack Ruby, a Dallas night-club owner, in the
basement of the Dallas police station, while millions of Americans watched on television. The commission of investigation, appointed by President
Lyndon B. Johnson, and headed by Chief Justice Earl
Warren of the U. S. Supreme Court, published its
report in September 1964, and concluded that Oswald
was the sole assassin and that there was no conspiracy.
In view of the authority of the Warren Commission, that conclusion was accepted by many Americans
for a long time. But the conclusion cannot be considered true by any person who carefully considers
the crucial evidence - such as ,the physics of the
shooting, the timing of a number of events, and
other important and undeniable facts. In other
words, Oswald was not the sole assassin, and there
was a conspiracy.
This article will develop that thesis, prove it
to be true on the basis of substantial, conclusive
evidence, and in particular some analysis of the
photographic evidence.
There was in fact a conspiracy. Oswald played
a role in the conspiracy, although there is conclusive evidence that on November 22, 1963, he did
no shooting at President Kennedy, and that, just
as he claimed when he was in the Dallas jail, he
was a "patsy." At least three gunmen (and probably four) - none of whom were in the sixth floor
easternmost window of the Texas School Book Depository building where the Warren Commission placed
Oswald - fired a total of six shots at President
Kennedy.
One of these shots missed entirely; one hit
Governor John B. Connally, Jr. of Texas, riding
with Kennedy; and four hit President Kennedy, one
in his throat, one in his back, and two in his
2

by
Richard E. Sprague
Hartsdale, New York

head. (The bulk of the undeniable evidence for
these statements about the shots consists of:
(a) the physics of the motions of Kennedy and Connally shown in some 60 frames of the famous film
by Abraham Zapruder; (b) the locations of the injuries in Kennedy and in Connally; and (c) more
than 100 pictures, consisting of more than 30
still photographs and more than 70 frames of movies.)
More than 50 persons were involved in the conspiracy at the time of firing the shots. These
persons included members of the Dallas police force
(but not all of the Dallas police - and that ac{continued in the May 1970 issue of Computers and Automation}

Contents
Page
Parts
1
2

3
4

Introduction
The Photographic Evidence
The Application of Computers to
the Photographic Evidence
Appendices:
Acknowledgements and Notices
Epilogue
Bibliography

11

Figures
Helicopter View of Dealey Plaza
Policemen and "Tramps"
"Tramps"
Policemen and "Tramps"
Policemen and "Tramps"
6th Floor Easternmost Window of the
Texas School Book Depository
Building
Kennedy About the Time of the First
Shot
Kennedy After the First Three Shots
and Before the Fatal Shot
The Radio Communicator

1
2

Charts
Spatial Chart
Schematic Timing Chart

1
2
3
4
5

6, 7
8, 9
10

1

2
3
4
5

Tables
Index to Spatial Chart
Photographs Acquired by FBI and
Unavailable
Main List of Photographs
Preliminary List of Computer Codes
Preliminary Coding Sheet for
Computer-Assisted Analysis

2.0
34
56
58
59
60
37
38
39
40
41
42
43
44, 45
33

48, 49
51
46
50
52
57
58

COMPUTERS and AUTOMATION for November. 1973

THE PURSUIT OF IMPORTANT TRUTH
The magazine Computers and Automation has for more
than three years followed an unusual publication policy:
- The pursuit of truth in input, output, and processing, for the benefit of people,
and an unusual belief:
- That computers are too important to be left to
computer experts and must be integrated into a
socially responsible profession of information
engineering.
Where this policy has operated most is in publishing
information, articles, and reports on subjects which a
great many liberal and progressive newspapers and periodicals have left unexplored or unmentioned:
- The political conspiracies which have led to the
assassination of President John F. Kennedy, Senator Robert Kennedy, Martin Luther King, and
others - and their coverups
- The conspiracies, coverups, and lies in connection
with the pursuit. of war in Indochina and dictatorship by the Saigon regime
- The connections of President Richard M. Nixon
with organized crime and the Mafia
- The Watergate crimes
If you believe in the value of truthful, frank reporting
on the most important topics for the welfare of the
people of the United States today, we urge you to subscribe to our magazine, and buy our back copies (almost
everyone is in print). Please help us pursue the important
truth and report on it, by buying our products.

Unsettling, Disturbing, Critical ...
Computers and Automation, established 1951 and
therefore the oldest magazine inthe field of computers and data processing, believes that the profession of information engineer includes not only
competence in handling information using computers
and other means, but also a broad responsibility,
in a professional and engineering sense, for:
--- The reliability and social significance of
pertinent input data;
-- The social value and truth of the output
results.
In the same way, a bridge engi neer takes a professional responsibility for the reliability and
significance of the data he uses, and the safety
and efficiency of the bridge he builds, for human
beings to risk their lives on.
Accordingly, Computers and Automation publishes
from time to time articles and other information
related to socially useful input and output of data
systems in a broad sense. To this end we seek to
publish what is unsettling, disturbing, critical
--- but productive of thought and an improved and
safer "house" for all humanity, an earth in which
our children and later generations may have a future, instead of facing extinction.
The professional information engineer needs to
relate his engineering to the most important and
most serious problems in the world today: war,
nuclear weapons, pollution, the population explosion, and many more.

Edmund C. Berkeley, Editor

- - - - - - - - - - - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - - - - - - - TO: Computers and Automation (Computers and People, starting January 1, 1974)
815 Washington St., Newtonville, Mass. 02160, U.S.A.
YES, please start my subscription to your magazine ) Without the "Computer Directory": I enclose (
) U.S.A., $11.50
) With the "·Computer Directory": I enclose (
) U.S.A., $23.50

(

) Canada, $12.50
) Canada, $24.50 (

) Foreign, $17.50
) Forei~n, $32.50

) Please bill my organization.
) Please send me information about the important articles in back copies (usual cost, $2 each)
Name: _______________________________________________________ Title ________________________________
Organization: _______________________________________________________________________________________
Address: ________________________________________________________________________________________

Signature: ___________________________________________ Purchase Order No. _____________________________
COMPUTERS and AUTOMATION for November, 1973

3

UNTIL DECEMBER 31, 1973

computers
and automation
Vol. 22, No. 11
November, 1973
Editor

Edmund C. Berkeley

Assistant
Editors

Barbara L. Chaffee
Linda Ladd Lovett
Neil D. Macdonald

Software
Editor

Stewart B. Nelson

Advertising
Director

Edmund C. Berkeley

Contributing
Editors

John Bennett
Moses M. Berlin
Andrew D. Booth
John W. Carr III
Ned Chapin
Leslie Mezei
Bernhard W. Romberg
Ted Schoeters
Richard E. Sprague

Advisory
Committee

Ed Burnett
James J. Cryan
Bernard Quint

Editorial
Offices

Berkeley Enterprises, Inc.
815 Washington St.
Newtonville, Mass. 02160
617-332-5453

Advertising
Contact

The Publisher
Berkeley Enterprises, Inc.
815 Washington St.
Newtonville, Mass. 02160
617-332-5453

"Computers and Automation" is published monthly, 12 issues per year, at 815
Washington St•• Newtonville, Mass. 02160,
by Berkeley Enterprises, Inc. Printed in
U.S.A. Second Class Postage paid at Boston,
Mass., and additional mailing points, •
Subscription rates: United States, $11.50
for one year, $22.00 for two years. Canada:
add $1 a year; foreign, add $6 a year.
NOTE: The above rates do not include
our publication "The Computer Directory
and Buyer,s' Guide". If you elect to receive "The Computer Directory and Buyers'
Guide", please add $12.00 per year to your
subscription rate in U.S. and Canada, and
$15.00 per year elsewhere.
Please address all mail to:
Berkeley
Enterprises, Inc., 815 Washington St., Newtonville, Mass. 02160.
Postmaster: Please send all forms 3579
to Berkeley Enterprises, Inc., 815 Washington St., Newtonville, Mass. 02160.
© Copyright 1973, by Berkeley Enterprises, Inc.
Change of address:
If your address
changes, please send us both your new
address and your old address (as it appears on the magazine address imprint), and
allow three weeks for the change to be
made.

4

STARTING JANUARY 1, 1974

computers

and people

The Computer Industry
[T A]
8 Cooperative Facilities to Obtain the Advantages
of Computers
by Michael J. Cerullo, State University of New York,
Albany, N.Y.
How to plan, before operations begin, a cooperative service
bureau that will provide its sponsors with all the advantages
of electronic data processing, plus the advantages of greatly
reduced expenses.
10 Control in Time-Sharing Systems
[T A]
by Fermin Caro del Castillo, Fort Worth, Texas
How time-shared computer systems should be controlled,
made secure, and protected against incursions and hazards.
14 Alienation and the Systems Analyst
[T A]
by Alan E. Brill, The Chase Manhattan Bank, New York, N.Y.
How systems analysts are often looked upon as in a
"computer department" and outside of the firm - and
what might be done to correct this practice.

Computers and Art
18 Computer Art: The Search Beyond Manipulation
[T A]
by Grace C. Hertlein, California State University-Chico,
Chico, Calif.
How computer art is ranging through variation in patterns,
variations in design, and varying philosophies of art - and
where it may go.

Computers and the Future
20 Computers in Science Fiction - II
[NT A]
by Marcia Ascher, Professor of Mathematics, Ithaca College,
Ithaca, N.Y.
A survey of some two dozen themes of importance in
the real world that are reflected in science fiction when
astute writers explore the significance of computers to
human beings.
[NT E)
6 The Understanding of Natural Language by Computers
by Edmund C. Berkeley, Editor, Computers and Automation
Some rather convincing evidence suggests that before long
some large areas of ordinary natural language will be understood by computers.

World Affairs and Social Policy
15 Strategy and Action on World Trade
[NT A]
by James H. Binger, Chairman, Honeywell Inc., Minneapolis,
Minn.
Why it is important for the well-being of the people of
the United States to a.id the international division of
labor and production: - a discussion by the head of a
multinational company which is a computer company.
COMPUTERS and AUTOMATION for November, 1973

The magazine of the design, applications, and implications of
information processing systems - and the pursuit of truth in
input, output, and processing, for the benefit of people.

World Affairs and Social Policy (continued)
33 Virtue, in Spite of Erroneous Conceptions

[NT A]

by J. P. Frankel, Dean of the Faculty, Harvey Mudd
College, Claremont, Calif.
Which projects and problems should scientists work on?
and which projects and problems should receive support
by the government and which from other sources?

The Profession of Information Engineer and the Pursuit of Truth
3 Unsettling, Disturbing, Critical
Statement of policy by Computers and Automation

[NT F]

[NT F]
3 The Pursuit of I mportant Truth
by Edmund C. Berkeley, Editor
Four kinds of truth that are regularly unexplored and
unmentioned .

36 Nixon and the Mafia - Conclusion
[NT A]
by Jeff Gerth, SunDance Magazine, San Francisco, Calif.
The many connections of President Richard M. Nixon
with organized crime, scandal, etc.

26 Burying Facts and Rewriting History - II
[NT A]
by Edmund C. Berkeley, Editor, Computers and Automation
Taken together the information published May 1970 to
November 1973 in Computers and Automation effectively
destroys a large segment of the beliefs, the rewritten history,
that the establishment in the United States has arranged for
the people in the United States to believe.
[NT R]
28 Political Assassinations in the United States
Inventory of 41 articles published in Computers and
Automation May 1970 to October 1973 on the assassinations of President John F. Kennedy, Senator Robert
Kennedy, Reverend Martin Luther King, and other politically important persons in the United States: titles,
authors, and summaries.

27 The Watergate Crimes

[NT R]
Inventory of 12 articles published in Computers and
Automation August 1972 to September 1973 on the
burglarizing of the Democratic National Committee offices
in the Watergate Building, Washington, D.C., June 17,
1972, and the ramifications: titles, authors, and summaries.

Computers, Puzzles, and Games
35 Numbles
by Neil Macqonald

[T C]

Front Cover Picture
Three eighth graders - each from
a different continent - are working
together to solve complex mathematics problems. They are at the
new United Nations International
School, and are Laurence Ling May,
a Chinese-Thai American; Catharina
Nilson of Stockholm, Sweden; and
Arun Alagappan of India.
The
minicomputer system is a gift from
Digital Equipment Corp. For more
information, see page 43 of the
July 1973 issue.

Departments
42

50
50
32
48
46
47
23

Across the Editor's Desk Computing and Data
Processing Newsletter
Advertising Index
Calendar of Coming Events
Classified Advertisement
Monthly Computer Census
New Contracts
New Installations
Statement of Ownership

Key
[A]
[C]
[E]
[F]
[NT]

[R]
[T]

- Article
Monthly Column
Editorial
Forum
Not Technical
Reference
- Technical

Corrections
For changes in liThe Path to Championship Chess by Computer" by
ProfeSsor Donald Michie published in the January 1973 issue of
Computers and Automation, see page 23 of this issue, or page 24 of
the July issue.
For changes in the reprinting and the indexing of "Communication Three Way: Chimpanzee, Man, Computer",published in the July issue,
see page 32 of this issue.
COMPUTERS and AUTOMATION for November, 1973

NOTICE
*0 ON YOUR ADDRESS IMPRINT
MEANS THAT YOUR SUBSCRIPTION INCLUDES THE COMPUTER
DIRECTORY.
*N MEANS THAT
YOUR PRESENT SUBSCRIPTION
DOES NOT INCLUDE THE COMPUTER DIRECTORY.

5

EDITORIAL

The Understanding of Natural Language by Computers
Proposition: Computers are making long strides towards
understanding natural language as used by human
beings, and will eventually understand such language
as well as many human beings do.
What do we mean by: computers? understanding language? natural language? And what is the evidence for this
proposition?
The word "computers" here refers to powerful computers that have appropriate programs written by human beings plus the programmed capacity to improve their programs by using experience. An example of such improvement is Dr. A. L. Samuels' famous checker-playing program, which can learn from experience, and which plays
far better checkers than Dr. Samuels himself can play.
The experience may consist of the following at least:
Answers from human beings to questions posed by
the computer;
Differences between computed results and a priori
specified results;
Signals from the environment, such as instrument
readings;
Information obtained by "looks" at the environment,
as for example recognition of the character A, as
in optical character recognition;
The interpretation of words, as with FORTRAN expressions.
Probably there are even more categories of experience
which a powerful computer program can use to modify itself to become even a better program.
In regard to "understanding language", there are over
500 languages which computers have been programmed to
understand, when written precisely according to stated
rules: among them, BASIC, FORTRAN, COBOL, many
kinds of machine language, etc.
"Natural language" is the ordinary language used by human beings, subject to the requirement that for a computer
implicit understandings must be stated. For example, when
a speaker exclaims "Ouch!", a great deal of the meaning
comes from the listener's observations of the speaker. But
a computer, like a blind man, cannot "see" the situation,
and must be told more than the ordinary listener.
With some definitions taken care of, let us consider evidence for the main proposition stated above. This evidence
includes the information published in several recent articles in Computers and Automation.
The article '''Do What I Mean' - The Programmer's Assistant", by Warren Teitelman, in the Apri11972 issue,
described a "programmer's assistant", called "DWIM"; this
was a "front end" or preprocessor to an interactive program for operating with LISP expressions. The front end
was tolerant of the programmer's mistakes in typing, in lowlevel logic, etc.; it would catch misspellings, failures to have
a balancing number of left and right parentheses, etc. If a
6

mistake occurred, it would inquire of the human programmer what he meant, suggesting the correctly spelled alternative, and so on. In this way the human programmer was
relieved of much of the burden of expressing himself exactly and correctly the first time, and his efficiency in
using the LISP interactive program greatly increased.
The three articles "Computer Programming Using Natural Language" by Edmund C. Berkeley, Andy Langer, and
Casper Otten, in the June, July, and August 1973 issues,
demonstrated the understanding by a computer program
called GENIE of at least some sets of instructions in ordinary natural language. The vocabulary though small was
free, and there was unlimited freedom in putting the words
together, with about a 90% chance of complete understanding. The computer program that did this could be
called 15% GENIE, because, as the authors emphasized, it
was still in an early stage of development.
The article "Latest Computers See, Hear, Speak, and
Sing - and May Outthink Man" by David Brand, in the
October 1973 issue, enumerated many instances of computers (and robots equipped with computers) which could
deal with concepts expressed in natural language. One of
the programs mentioned could for example decipher naturallanguage commands dealing with the stacking of blocks
of various shapes, sizes, and colors.
The main tasks for understanding natural language appear to be the following:
Recognition of the framework of a sentence;
Recognition of the common meaning of groups of
synonyms, the collection of words that "say
the same thing";
Knowledge of context: the context is regularly
specified to the computer, so that it does not
have to deduce the context from "what is being
said";
Knowledge of a limited vocabulary consisting of perhaps 300 to 500 words - knowledge in the sense
that the computer program can attach meaning to
the words either by themselves or in phrases, as
for example it may attach the meaning of doing
something three times to the numeral 3;
Capacity to accept variation in the way something is
stated by a human programmer.
The three articles referred to above show instances of
the achievement of all of these tasks separately. Combining all the achievements should not be too hard, especially
since children as young as four years old show complete
capacities to listen to many kinds of natural language, understand, and respond.

C=~tAC.~
Edmund C. Berkeley
Editor
COMPUTERS and AUTOMAliON for November. 1973

The Notebook on
COMMON SENSEI ELEMENTARY AND ADVANCED
is devoted to development, exposition, and illustration of what
may be the most important of all fields of knowledge:

WHAT IS GENERAllY TRUE AND IMPORTANT

TECHNIQUES
FOR
AVOIDING
MISTAKES

+

+

+

+

JUDGEMENT
AND
MATURITY

help you avoid pitfalls
prevent mistakes before they happen
display new paths around old obstacles
point out new solutions to old problems
stimulate your resourcefulness
increase your accomplishments
improve your capacities
help you solve problems
give you more tools to think with

COMPUTERS and AUTOMATION for November. 1973

+

Topic:
SYSTEMATIC EXAMINATION
OF GENERAL CONCEPTS

Already Published

Already Published

Preventing Mistakes from:
Failure to Understand
Forgetting
Unforeseen Hazards
Placidity
To Come
Preventing Mistakes from:
Bias
Camouflage
Interpretation
Distraction
Gullibility
Failure to Observe
Failure to Inspect
Prejudice

COMMON SENSE, WISDOM, AND GENERAL SCIENCE

This field includes what is common to all the sciences, what
is generally true and important in the sciences.
MISTAKES are costly and to be AVOIDED This field includes the systematic study of the prevention of
mistakes.
MONEY is important The systematic prevention of mistakes in your organization
might save 10 to 20% of its expenses per year.
OPPORTUNITY is important If you enter or renew your subscription to both Computers
and Automation and the Notebook on Common Sense at
the same time, direct to us, - you may take off $2.00 per
year from the total cost.

+

Topic:
TH E SYST EMATI C
PREVENTION OF MISTAKES

8REASONS TO BE INTERESTED IN THE FIELD OF

COMPUTERS are important But the computer field is over 25 years old. Here is a new
field where you can get in on the ground floor to make
your mark.
MATHEMATICS is important But this field is more important than mathematics, because
common sense, wisdom, and general science have more
applications.
WISDOM is important This field can be reasonably called tIthe engineering of
wisdom".
COMMON SENSE is important _
This field includes the systematic study and development of
common sense.
SCI ENCE is important _

TECHNIQUES
FOR
SOLVING
PROBLEMS

+

+

PURPOSES:
to
to
to
to
to
to
to
to
to

+

SCIENCE
IN
GENERAL

The Concept of:
Expert
Rationalizing
Feedback
Model
Black Box
Evolution
Niche
To Come
Strategy
Understanding
Teachable Moment
Indeterminacy
System
Operational Definition

.. - - - - - - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - - - .. - - - - •• - -

, To: Computers and Automation
815 Washington St., Newtonville, Mass. 02160
' (
'

) Yes, please enter my subscription to The Notebook on Common
Sense, Elementary and Advanced at $12 a year (24 issues), plus
extras. I understand that you always begin at the beginning
and so I shall not miss any issues.

:
'
,
'

) Please send me as free premiums for subscribing:

(

1. Right Answers - A Short Guide to Obtaining Them
2. The Empty Column
3. The Golden Trumpets of Yap Yap

( ) I enclose $

4. Strategy in Chess
5. The Barrels and the Elephant
6. The Argument of the Beard

) Please bill my organization

RETURNABLE IN 7 DAYS FOR FULL REFUND IF NOT SATISFACTORY

HOW CAN YOU LOSE?
Name _ _ _ _ _ _ _ _~_ _ _ _ _ Title _ _ _ _ _ _ __
Organization--'---_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Address (including zip) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Signature _ _ _ _ _ _ _ _ _ __

Purchase Order No. _ _ __

7

Cooperative Facilities to Obtain
the Advantages of Computers
Michael J. Cerullo
Asst. Professor of Accounting
State Univ. of New York at Albany
1400 Washington Ave.
Albany, N. Y. 12222

"Because of general dissatisfaction, 30% of the surveyed service bureau clients
planned to discontinue using service bureaus."

Computer Use

A recent study of 2,500 companies conducted by
the Research Institute of America, revealed that 55%
of the firms regularly use computers in conducting
their business. Further breakdown of the study
shows that an average of 32% own or lease their own
computers, and 23% use an outside service bureau for
processing data. l
While a majority of the companies surveyed do use
computers in some form, a significant 45%.of the respondents do not use any type of computerized data
processing service. Those companies cited the following reasons for not using computers: 2
'Operation too small
Too costly
Looked into and tabled for the present
Present methods satisfactory
plan to install a computer within a
year
Plan to begin using a service bureau
within a year
.Other
Total (multiple answers)

Per Cent
50
35

Cooperative Service Bureaus

Both non-users and dissatisfied service bureau
clients, therefore, offer a ready market for a newer
approach to obtaining the advantages of EDP - the
formation of a cooperative service bureau. A cooperative service bureau consists of several sponsoring firms who jointly own a computer and share in
its operating costs at a much lower expense than individual ownership of a computer. If carefully
planned before operations begin, a cooperative ser~
vice bureau will provide its sponsors with all the
advantages of EDP plus many other advantages unique
to jointly-shared facilities and personnel.

31

21
8
8

166%

Service Bureau Use

In addition to the non-users, another recent
study revealed that most service bureau clients are
not effectively using their service bureau and, as
a result, are receiving few, if any, of the advantages q! electronic data processing (EDP). Most
of th~surveyed service bureau clients were: 3
1. Receiving routine services which do not save
them money.
2. Not planning to expand into more sophi sticated,
higher-payoff applications.
3. Not receiving indirect benefits and savings,
such as improved information for decision
making.
4. Not satisfied with current service&.
8

The study also disclosed that because of the general dissatisfaction, 30% of the surveyed service
bureau clients planned to discontinue using service
bureaus and purchase in-house computers. 4

Among these additional advantages are:
1. The sponsors would purchase a computer tailored to their specific needs.
2. They would have exclusive use of the computer.
3. Their computer would be available for use at
any time.
4. They could share the costs of any computer
programs developed.
5. They could share the costs of any package or
canned computer programs purchased.
6. They would have available for their exclusive
use a staff of data processing experts and
a computer - at a fraction of the cost of
individual ownership.
Factors Insuring the Success of the Cooperative

The first step in forming a successful cooperative service bureau is to enroll an appropriate number of comapnies. Ideally the cooperative should be
limited to five or six sponsoring firms. A larger
number may create unmanageable problems involving
operations, communications. control, scheduling of
computer time, and so forth. A smaller number may
make the venture economically unfeasible.
COMPUTERS and AUTOMATION for November. 1973

Lack of· Interest

At the present time, widespread lack of interest
in joining a cooperative is more of a problem to potential organizers than too much demand. The author
contacted a number of public accounting firms about
the feasibility of forming cooperatives and found
that three firms who had already made such an attempt could not interest enough firms to join. Their
comments were:
We tried to organize one several years ago;
the firms contacted were not interested.
We would like to explore this possibility
but we can't get anyone else interested.
At present there appears to be a tragic lack
of interest locally by other CPA firms.
Unquestionably, one reason for the lack of interest is a misunderstanding of the true nature of a
cooperative. Interested companies must therefore be
prepared to sell the idea to others. As more published material becomes available in the field, this
problem should be alleviated.
Confidential Information

disinterested third party, such as a firm of independent public accountants.
Sharing of Expenses: Startup Costs

With an adequate number of sponsoring firms lined
up and a sound security system worked out, the third
necessity in establishing a successful cooperative
is to determine methods of sharing the expenses.
There are two categories of costs to consider:
1. Startup ~osts. These include all costs incurred prior to the time that the cooperative commences
operations. Startup costs are either directly
traceable to a particular firm or are joint or common to all firms. An example of a direct cost would
be that of analyzing, modifying, and redesigning of
systems prior to conversion to the computer. An example of a joint or common cost would be the cost of
computer housing, including air conditioning, engineering supervision, false floors, ducts and pipes,
tranformers or motor generators, cabling and wiring,
and overhead racks and supports.
Each sponsoring firm should pay for its own direct costs. Joint costs should be shared equally or
apportioned among the firms according to some equitable formula.
Operating Costs

A second major reason for lack of interest is
that companies fear for the control and security of
their confidential or sensitive information. Such a
concern is certainly legitimate and underscores the
need for a cooperative that is to be successful, to
devise an adequate system for quality control and
security. A committee responsible for such a system
should ·be established at the outset by the sponsoring firms.
Protection

One of its duties should be to adequately safeguard the sponsors' records and documents against
fire, theft, water, and other hazards and disasters.
Statistics compiled by the Safe Manufacturers National Association show that about one-half of companies whose important records and documents were
destroyed through some catastrophe never resumed
business or were permanently closed down within six
months; an additional 13% suffered serious economic
impairment and were able to remain in business only
under severe operating handicaps.5 For this reason
the quality control and security committee must see
that the cooperative service bureau maintains:
protective devices
fireproof vaults
a method of reconstructing any destroyed
records
adequate insurance to cover loss of important client records or documents
The committee must also take measures to prevent
one client's records from becoming commingled with
another client's records - a not-unlikely occurrence
in such an environment.
Preventing Disclosure

Finally, the committee should determine how to
prevent disclosure of confidential information. For
example, no member of any sponsoring company should
be allowed in certain strategic parts of the computer center. Likewise, each company's records
should be coded and the code number known only to
key computer center personnel. In cases requiring
utmost security, the actual processing of data
should be monitored by a key employee of the computer center or possibly by a representative of a
COMPUTERS and AUTOMATION for November, 1973

2. Operating costs. These include the monthly
hardware and software costs to operate the cooperative. Hardware costs refer to the periodic rental
or purchase charge for the computer equipment. As a
minimum the computer equipment consists of an input
unit, a central processing unit, and an output unit.
Software costs include personnel costs, programming
costs, testing and debugging costs, magnetic tapes,
disc packs, punched cards, paper, paper tapes, repair parts, power, telecommunication lines, and so
on.
Operating costs that are directly traceable
should be paid by the' using firm. joint or common
costs can be shared equally or can be allocated to
each firm based on the number of transactions processed or the actual computer processing time used
during the period. In addition, if so desired, a
sponsor could be required to pay a minimum or maximum monthly charge.
Management
<'.

Fourthly, the sponsoring companies should decide
how to manage the venture. It is advisable to form
a committee to oversee the management and operation
of the cooperative. A decision must be made whether
each member regardless of size should have one vote
or whether another basis of voting should be used.
This decision should assure participants that no one
firm will dominate or control the cooperative.
Common Line of Business

A factor not to be overlooked when forming a cooperative, one which will avoid frustrations, complications, and extra expenses, is to see that each
member is in the same industry or business category.
Thus all sponsoring firms will have similar operating problems that can be simultaneously solved by
the computer personnel, resulting in the allocation
of smaller costs to each firm for each problem
solved. Also computer programs developed or packaged programs purchased can be shared by all sponsors with minimum modifications, thus resulting in
considerable programming cost savings.
(please turn to page 13)

9

Control in Time-Sharing Systems
Fermin Caro del Castillo
6043 Westridge Lane
Fort Worth, Texas 76116

'~

time-sharing installation (/ike every computer environment) is exposed to the seven major
dangers: fire, water, theft, fraud, sabotage, equipment malfunctions, and human errors."

Introduction

This article has as its main objective to furnish
and define some methods and provisions for control
and security in a computer time-sharing environment.
It is evident that computer time-sharing has become very popular during recent years. More and
more confidential information is being handled by
these systems, creating an urgent need for strong
measures of control and security.
Description of the System

The service provided by a single computer to many
telecommunications terminals has been called "computer time-sharing". With this type of service each
user shares simultaneously in the processing capabilities of the central processor. This new computer facility makes this service available to small
companies and/or other users who have little need
for their own computer.
Computing services that may go under the heading
of time-sharing include:
Commercial computing; text editing; databank
information retrieval services; application
services such as colleges' records, inventory
control, payrolls of small companies, and account receivables; administrative messages;
switching and collection services; and more.
Among the great number of time-sharing users are
hospitals (Welch Hospital, one of the biggest in
Europe, has acquired the large ICL 1904S computer
with 7020 terminals), banks (Gosbank, the national
bank of the USSR, has ordered two large-scale Honeywell series 600 with 100 terminals), schools and
colleges (British schools and colleges have started
using terminals), airlines (Continental Airlines
uses the Sonic 360 reservation system with 550 online terminals).
Trends

The growth in computer time-sharing has been phenomenal in recent years in spite of a short business
recession between 1970 and 1972. Time sharing was a
broker's dream in the '60s; many companies realized
its potential, entered the market, and failed because of: one, strong competitive pressure, and two,
because of the countless thefts and violations suffered. The highly competitive situation benefited
the user in regard to pricing, but the offsetting
consequence of lower profits caused a high casualty
rate among these companies. As a result, the number
of time-sharing firms dropped from 150 to 50 between
1969 and 1972.
10

A few of the companies which survived and which
account for most of today's time-sharing business
are Rapidata Corporation, Teletype Corporation (a
subsidiary of AT&T), Tymeshare Incorporated (the
largest independent firm and second only in size to
IBM and Honeywell time-sharing operations), and IBM,
Jerry Dreyer, executive president of ADAPSO, an
association of data processing service organization~
estimates that one time-sharing company out of three
was profitable in 1971, two out of five in 1972, and
probably three out of six in 1973. Nowadays, this
computer facility is coming back to its original
trend, and it is expected that the number of computers with terminals will grow from 32% at the end
of 1971 to 45% at the end of 1975, with the average
central processing unit driving 15 to 20 terminals.
One consultant, Creative Strategies of Palo Alto,
California, predicts that time-sharing sales by 1976
will increase to 2 billion from 331 million last
year. By 1975, says ADAPSO's Dreyer, time-sharing
will account for 1/3 of the $4.5 billion computer
services industry.
Technological Advances

Most important technological advances have been
achieved recently on on-line terminals linked to
central processors. Some of the improvements made
include solid state keyboards, which have greater
reliability and lower cost; visual display methods,
which incorporate more capacity, economy, and aesthetic appeal; non-impact printing techniques, which
provide faster, quieter and more reliable operations; improved lower cost memories; more powerful
logic capability; and faster and more accurate
modern techniques and improvements in central processor software.
This is only the beginning. It is foreseen that
in the future the equipment itself will change in
nature and will probably not be recognizable as
terminals per se. Rather, terminals wiil be modular systems consisting of the required input/output
functions for specific jobs, built around basic controller and communication interfaces; in many instances, terminals will become special purpose devices.
Hazards

A time-sharing installation, like every computer
environment, is exposed to the seven major dangers
of fire, water, theft, fraud, sabotage, EDP equipment malfunctions, and human errors. Fire is considered to be the greatest· threat to magnetic tapes.
Water does not constitute an important hazard to
magnetic tapes; but it does to computer installaCOMPUTERS and AUTOMATION for November. 1973

tions. Theft, fraud, sabotage, EDP equipment malfunctions, and human errors are considered the most
common dangers.

elude each of the following segments: physical·securitYi personnel security; procedural security;
audit control; insurancei and any needed interfacing.

On-line terminals connected to central processors
from remote points are more exposed to violations
and thefts. The increasing popularity of timesharing systems among large corporations and service bureaus has given rise to even more potential
security breaches. Data transmitted over a communication line could be subject to wire tapping and
a number of other hazards such as piggyback entry,
whereby the intruder intercepts and compromises
communication between a terminal and the processor
while a legitimate user is inactive but still holding the line open. The intruder can even cancel
the user's sign-off signal and continue operating
in his name. A knowledgeable person could enter
program changes from a terminal and play havoc with
the system.

The quality and level of protection required depends on the sensitivity of the data handled. Nevertheless, control and security in a time-sharing environment should encompass the whole system, since
it is well known that even the strongest control
measures can be violated at the weakest point. These
measures should be taken in the central processing
unit, software, personnel, communication lines, the
terminal, and its users.

Need for Protection

Due to the increasing popularity of computing
services. the issue of control and security protection has become more important. It is evident
that time-sharing systems present few obstacles to
unauthorized parties. The security problem has been
made much more critical by the growing number of
people trained in computers and by the fading of the
computer mystique. In addition, communication by
means of time-sharing systems has no more protection
than telephone conversations or Morse-coded methods,
since the technological skills necessary to interpret computerized data are widespread. More and
more companies are appointing security monitors from
their EDP staffs to centralize security matters.
Trade organizations such as the American Management
Association and the Bank Administration Institute,
computer firms, and research firms such as Advancement Management Research, Inc. find their seminars
on computer security overcrowded by data processing
managers and security officers from business and
government.
Target of Attacks

Computers have become an important source of information and. as a result, the target of many attacks. Some of the general information targets for
industrial espionage are sales and service information, market analysis strategies, bid prices, corporate finance, stockholder information, legal negotiations. planned policy changes, expansion plans,
product developments, personnel changes, payroll
data. general administrative matters; and the list
could be expanded even more.
Threats

-The case of an 18 year-old Cincinnati youth who
used long distance telephone to tap the lines of a
time-sharing system firm in Louisville, Kentucky,
and extra::;UE

monthly
. . . "" ......

lu" 0

Mt:

MO;:

UBLI::.H

R~(r.otprinte'J)

Berkeley Enterprises, Inc •• same address
. NAMES AND ADDRESSES OF PUBLISHER, EDITOR, AND MANAGING EDITOR

Page 7, second column, third paragraph; lines
1 and 2: replace "the Rand Corporation mathematician" by "the professional philosopher".

O".'n<~~'~:";;~:"~;;rkeley.
same
7. OWNER (If owned by

Page 8, the chess position for Figure IB
should be:

815 Washington St.. Newtonville. Mass. 02160

der former .ectlon 4359 01 this title
~~~~i:i~~ ~c~e;~:%e::t~ec~~:!.~~ollided under this .ub.ection unle.. he file. ennulIlIV with the Postel Service e written request for

!:t::~~:~:~~I~ ;~:ot~:e~r~;i~~n~.~. ~.I;:~"~~t., I hereby request permission to mal/the publication named In Item 1 et the ...duclld postage
1;:;lvnature.nd titleofedltor,pubtl.her,bullne"menager, or Own er

1 . t"uA ",OM LeiluN 8

NuN'l1u.-l

uRl:iANIZA luNS AUTHOH1ZI:u

0 MAIL AT SPECIAL RATES (Section 1]2.122, PonalManual

(Check one)

!~g:~~:I~~' !~~c~~;, :;:;:tn~;~~: ,~::u'F:~:~!~ 0 ~::I~;:!:c~~~:d
Incometallpurpo_

(lfchanged,publi.rhermUJt
submft exp/anation of change

12 month.

MiththiJnaterrwnt.)
AVERAGE NO. COPIES
EACH ISSUE DURING
PRECEDING 12 MONTHS

A. TOTAL NO. COPIES PRINTED (Ner

Page 9, the graph in Figure 2 should be
as follows (containing one more connecting link):

Pw" Rult)

D. FREE DISTRI8UTlON BY MAIL, CARRIER OR OTHER MEANS
1. SAMPLES, COMPLIMENTARY, AND OTHER FREE COPIES

ACTUAL NUMBER OF COPIES OF
SINGLE ISSUE PUBLISHED NEAREST TO FILING DATE

9008

8300

7611

7175

7611

7175

100

100

2. COPIES DISTRI8UTEO TO NEWS AGENTS, BUT NOT SOLD

E. TOTAL DISTRteUTION (Sum ofCCInd D)

G. TOTAL (Sum olE 4 F-Ihould equal

PSForm

COMPUTERS and AUTOMATION for November. 1973

3526

nerpr~.~n

showrr In A)

7711

7275

1297

1025

9008

8300

July 1971

23

A fabulous gift for Christmas:

"RIDE THE EAST WIND:

Parables of Yesterday and Today"
by Edmund C. Berkeley, Author and Anthologist

Over fifty parables (including anecdotes, allegories, and fables) by Berkeley and many other
authors, modern and ancient, dealing with famous problems, modern, classic, or ageless. Many
parables are decorated by a bouquet of proverbs and quotations - for readers who like to
choose which variety of lesson appeals to them. A short guide to some patches of common
sense and wisdom. An ideal gift. Illustrated. Hard cover. 224 pages.

Do you remember the story of the fox
and the grapes? illustrating a principle of
such timeless value that the phrase "sour
grapes" has been used and understood by
millions of people for 2000 years?
Well, why not make a collection of
ideas and principles of common sense and
wisdom - and why not illustrate them
with fables, allegories, and anecdotes of
enormous impact?
That was the plan of this book.
It comes right out of our work on the
"Notebook on Common Sense and Wisdom,
Elementary and Advanced" - which we
have been tal ki ng about for two years to
anyone who would listen.
Some of the issues of the Notebook
roused the interest of the president of
Quadrangle Books - and this book. is one
of the results.

You can't lose by taking a look at
this book:
•
•

•

You might enjoy it.
You might find much of it
humorous and imaginative as did Aesop's listeners.
You might find it instructive,
philosophical, worth thinking
about, and more besides.

You can see it, read it, keep it for
7 days, return it, and back comes the
full price of the book.
How can you lose?

We want only satisfied

customers.

The eagle in the great forest flew swiftly, but the Eastwind flew
more swiftly still
24

COMPUTERS and AUTOMATION for November, 1973

"RIDE THE EAST WIND:
The Fox of Mt. Etna and the Grapes

Parables or Yesterday and Today"

Table of Contents
Part 1. The Condition of Man
Pandora and the Mysterious Box / H. A. Guerber
The Garden of Paradise* / Hans Christian Andersen
*to which the King's son was transported by the East Wind

4I

The History of the Doasyoulikes / Charles Kingsley
The Locksmith and the Stranger / Edmund C. Berkeley (B)
The Elephant and the Donkey / James Reston
Where that Superhighway Runs, There Used to be a
Cornfield / Robert Redfield
The Fire Squirrels / B

The Fox decided that what he needed was Engineering
Technology. So he went to a retired Engineer who lived on
the slopes of Mt. Etna, because he liked· the balmy climate
and the view of the· Mediterranean Sea and the excitement of
watching his instruments that measured the degree of sleeping or waking of Mt. Etna. The Fox put his problem before the Engineer.

Part 2. On Flattery and Persuasion
The Crow and the Fox / Jean de La Fontaine
The Visitor who Got a Lot for Three Dollars /
George Ade
The Cuckoo and the Eagle / Ivan A. Kriloff
The Wind and the Sun / Aesop
The Lion in Love / Aesop
The Crow and the Mussel/Aesop, B
The Two Raccoons and the Button / B

Missile Alarm from Grunelandt / B
The National Security of Adularia / B
Doomsday in St. Pierre, Martinique / B
Part 7. Problem Solving
The Wolf and the Dog of Sherwood / Aesop, B
The Three Earthworms / B
The Hippopotamus and the Bricks / B
The Cricket that Made Music / Jean de La Fontaine, B
The Fox of Mt. Etna and the Grapes / B
The Mice of Cambridge in Council/Aesop, B
Brer Badger's Old Motor Car that Wouldn't Go / B
The First Climbing of the Highest Mountain in the
World /Sir John Hunt, B
The Evening Star and the Princess / B

I

Part 3. On Perseverance and Resourcefulness
The Crow and the Pitcher / Aesop
Robert Bruce and the Spider / Sir Walter Scott
Hannibal Mouse and the Other End of the World / B
The Fly, the Spider, and the Hornet / B

'.

?

Once there was a Fox who lived on the lower slopes of
Mt. Etna, the great vplcano in Sicily. These slo-pes are extremely fertile; the grapes that grow there may well be the
most delicious in the world; and of all the farmers there,
Farmer Mario was probably the best. And this Fox longed
and longed for some of Farmer Mario's grapes. But they
gr~ very high on arbors, and all the arbors were inside a
vineyard with high walls, and the Fox had a problem. Of
course, the Fox of Mt Etna had utterly no use for his famous ancestor, who leaping for grapes that he could not reach,
called them sour, and went away.

Part 4. Behavior - Moral and Otherwise
A Small Wharf of Stones / Benjamin Franklin
The Three Bricklayers / B
The Good Samaritan / St. Luke.
Much Obliged, Dear Lord / Fulton Oursler
The Fisherman, the Farmer, and the Peddler /8

Notes
Some Collections of Parables and Fables
To be published in' November 1973 by Quadrangle /
'The New York Times Book Co., hard cover, $6.95

Part 5. The Problem of Truth

o

On Being a Reasonable Creature / Benjamin Franklin
The Monkey and the Spectacles / Ivan A. Kriloff
The Golden Trumpets of Yap Yap / Mike Quin
The Barrels and the Pittsburgh Manufacturer / B
The Empty Column / William J. Wiswesser
The Differences in Two Strains of Corn / Edgar Anderson
The Six Blind Men of Nepal / B
The Sighting of a Whale / B
The Stars and the Young Rabbit / B
The Ocean of Truth / Sir Isaac Newton
Part 6. On Common Sense
The
The
The
The
The
The
The

Lark and her Young Ones / Aesop
Bear and the Young Dog / B
Bear and the Young Calf / B
Bear and the Young Beaver / B
Wasps and the Honey Pot / Sir Roger l'Estrange
Six-Day War and the Gulf of Dong / B
Deceived Eagle / James Northcote

RETURNABLE IN 7 DAYS IF NOT SATISFACTORY
(You can read it all in 7 days - and keep it only if
you think it is worth keeping.)

- - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - - - -

To:

I

(

Computers and Automation
815 Washington St., Dept. CA 11, Newtonville, Mass. 02160
Please send me wh~n published (November publication
expected) ___ copy(ies) of Ride the East Wind:
Parables of Yesterday and Today by Edmund C.
Berkeley, Author and Anthologist. I enclose $7.25
(Publication price + Postage and Handling) per copy.
Total enclosed

----

(Prepayment is necessary)

RETURNABLE IN 7 DAYS FOR FULL REFUND
IF NOT SATISFACTORY
My name and address are attached.

(.,

COMPUTERS and AUTOMATION· for November, 1973

25

EDITORIAL

(an updated version of an editorial first printed May 1973)

Burying Facts and Rewriting History - II

One of the efforts of this magazine is to pursue truth.
One of the ways in which truth is pursued is not to let
statements of the utmost importance be buried and forgotten in the pages of daily newspapers, nor unreported
and lost because they are no longer well covered in national news magazines.
Among those statements are two of permanent interest
in connection with the Watergate Caper (this phrase is establishmentese for "the Watergate Crime").
- The statement by Bernard L. Barker, one of the convicted operatives, which explains his motivation
and background (see November 1972, Computers
and Automation).
- The statement by Alfred Baldwin, 3rd, ex-FBI agent,
an employee of the Republican Committee to Reelect the President, telling what he did and saw
while five men burglarized the Watergate offices
of the Democratic National Committee on June
17,1972, about 2:30 a.m. (see December 1972,
C&A).
In addition, we have published seven installments of reports on the Watergate Crime by our contributing editor,
Richard E. Sprague (a computer professional of 25 years
standing) who as an avocation has studied for many years
dirty political operations in the United States, including
the assassinations by conspiracies (not "lone assassins") of
President John F. Kennedy, Senator Robert Kennedy, and
Reverend Martin Luther King.
Three years ago in May 1970, when we began to publish this type of article, we could not have spoken confidently of "the assassination by conspiracies" of two
Kennedys and one King. But the articles we have published - which are listed and characterized on the following pages - have together a remarkable impact.
Taken together, the information published May 1970 to
October 1973 in Computers and Automation effectively
destroys a large segment of the beliefs, the rewritten history, that the establishment in the United States has
arranged for people in the United States to believe. I do
not assert that the establishment is a conscious organism
or organization; perhaps the best description is this: a
loose confederation of overt conspiracies, silent conspiracies, and biased wealthy persons, with very intelligent
orchestration stemming from the Pentagon, the Central
Intelligence Agency and the Presidency, and with assists
from organized crime and the Mafia.
We challenge any fair minded person to read this collection of articles (back copies of Computers and Automation should be available in many large public libraries and
26

may be ordered from us), and after reading them, to still
believe that the assassinations are actually the actions of
"lone psychopaths," instead of fitting together into a plan
to install a certain kind of autocracy in the United States.
This kind of autocracy claims to be democratic, to
stand up for "national security," "executive privilege,"·
"separation of Constitutional powers," etc. It offers appearances of democracy, but it seizes the realities of
money and power. It cuts programs of social benefit; but
it allocates $80 billion a year to be paid to the militaryindustrial-Pentagon complex.
In the 1940's there was a name for this kind of autocracy. Its name was "fascism," effectively a dictatorship
in the interests of big business. What is now appearing in
the U.S. is "fascism" in the form of a dictatorship by the
military-industrial complex.
Here in a nutshell is an example of the present uneven
contest: it takes the form of two sentences in a report by
E. Drake Lundell, Jr., in Computerworld for April 22,
1973:
• The Antitrust Division of the Justice Department
is "outmanned and outgunned" when it comes to
prosecuting cases like the current action against IBM,
Senate investigators were told last week.
• In addition, witnesses before the Senate Antitrust
and Monopoly Subcommittee stated that often the
division cannot do its job properly because of political pressure from the White House ....
These two statements contain a world of implications.
Essentially, the Department of the United States Government which is charged with enforcing certain U.S. laws
against monopoly, can no longer properly function because
of (1) the enormous power of just one business, IBM, and
(2) political pressure from the White House (this phrase is
establishmentese for "President Richard M. Nixon").

We must dig up facts, remember them, and write
history the way it is.
We must take action to compel the persons who deceive
us and lie to us to leave the government of the United
States, such as Spiro Agnew, former Vice President.

Edmund C. Berkeley
Editor
COMPUTERS and AUTOMATION for November. 1973

o

The Watergate Crime
Articles Published in Computers and Automation August 1972 to September 1973
Inventory of Titles, Authors, and Summaries

August 1972
33

r
V

The June 1972 Raid on Democratic Party Headquarters - Part 1
by Richard E. Sprague, Hartsdale, N.Y.
A report on five men who have numerous connections with the Republican Party, the White
House, the Central Intelligence Agency, anti-Castro
Cubans, and plans for the assassination of President
John F. Kennedy, and who were arrested seeking
to bug Democratic National Headquarters at 2 :30
a.m., June 17, 1972.

communicado and a prisoner - reported on by
Mrs. Mitchell and the editor of Parade magazine.
27

The Watergate Cri me: An Eye-Witness Account
by Alfred Baldwin, 3rd
A round-by-round account by an ex-FB I agent, an
employee of the Republican Committee to Reelect the President, of what went on while five
men burglarized the Watergate offices, June 17,
2:30 a.m. Baldwin's main assignment was listening
to bugged calls to the Democratic National Committee.

33

President Richard M. Nixon, the Bay of Pigs, and the
Watergate Incident - Part 4
by Richard E. Sprague, Hartsdale, N.Y.
How President Nixon lied in 1960 about the plans
for the Bay of Pigs I nvasion, and is su ppressing in
1972 the investigations of the Watergate Incident.

26

The Watergate Crime and the Cover-Up Strategy -

October 1972
18

The Raid on Democratic Party Headquarters (The
Watergate Incident) - Part 2
by Richard E. Sprague, Hartsdale, N.Y.
A report on further developments in the June 1972
raid by James McCord, Bernard Barker, and others,
on National Democratic Party Headquarters, and
implications affecting a number of Republican
leaders and President Richard M. Nixon.
November 1972

26

January 1973

March 1973

Part 5
\
by Richard E. Sprague, Hartsdale, N.Y.
A report on the trial of E. Howard Hunt, 'Ja~s
McCord, Bernard Barker, and four other persons
for their raid on Democratic National Committee
Headquarters in June 1972 using funds of the Republican Committee for the Re-Election of the
President; and the strategies of cover-up that
have been employed.

Bernard L. Barker: Portrait of a Watergate Burglar
by Edmund C. Berkeley, Editor, Computers and

Automation
How a cloak and dagger operative and right-wing
activist, who was caught as a burglar in the Watergate Hotel offices of the Democratic National
Headquarters, looks at himself and his line of work.
29
.~J

J
0

Walter Sheridan - Democrats' Investigator? or Republicans' Countermeasure?
by Richard E. Sprague, Hartsdale, N.Y.
Walter Sheridan, recently employed by the Democratic National Committee to investigate the
Watergate I ncident, may actually be a " countermeasure" by the Republicans to defeat the Democratic investigation.

June 1973
26

December 1972
24

26

The Raid on Democratic Party Headquarters (The
Watergate Incident) - Part 3
by Richard E. Sprague, Hartsdale, N.Y.
A report on further developments in the June
1972 raid by James McCord, Bernard Barker, and
others, on National Democratic Party Headquarters,
and implications affecting a number of Republican
leaders and President Richard M. Nixon.
Martha Mitchell and the Watergate Incident
by Martha Mitchell, the magazine Parade, and
Richard E. Sprague
How Martha Mitchell (wife of former Attorney
General John Mitchell) was molested and kept in-

COMPUTERS and AUTOMATION for November. 1973

Watergate: What More is There to Hide? - Part 6
by Richard E. Sprague, Hartsdale, N.Y.
How investigation into the Watergate Crime is
leading to ramifications and implications, and
what are some more of the now hidden connections that may be revealed.
August 1973

36

Lessons of Watergate - Part 7
by Richard E. Sprague, Hartsdale, N.Y.
The collection of Watergate Crimes; the anatomy
of a "Really Big American Cover-Up"; other
cases of "Really Big American Cover-Ups"; and
the implications and ramifications.
September 1973

37

Six Parallels of 25 Years Ago
by Alger Hiss
How an establishment attacked Alger Hiss another parallel to the Watergate cover-up.
27

"

Political Assassinations in the United States
Articles Published in Computers and Automation May 1970 to October 1973
Inventory of Titles, Authors, and Summaries

May 1970
30

The Assassination of President John F. Kennedy:
The Application of Computers to the Photographic
Evidence
by Richard E. Sprague
A reexamination of some of the evidence relating
to the assassination of John F. Kennedy - with
emphasis on the possibilities and problems of
computerized analysis of the photographic evidence.
July 1970

29

The May Article, "The Assassination of President
John F. Kennedy: The Application of Computers to
the Photographic Evidence" - Report No.2:
32
More About Jim Hicks
32
Confirmation of FBI Knowledge 12 Days Before
Dallas of a Plot to Kill President Kennedy
The Second Conspiracy About the Assassination
35
of President Kennedy

Progress Report
by Richard E. Sprague
October 1970
52

The Conspiracy to Assassinate Senator Robert F.
Kennedy and the Second Conspiracy to Cover It Up
by Richard E. Sprague
A sumr:nary of what researchers are uncovering in
their investigation of what appears to be not one
but two conspiracies relating to the assassination
of Senator Robert F. Kennedy.

56

Index to "Special Unit Senator: The Investigation of
the Assassination of Senator Robert F. Kennedy"
An index is supplied for the Random House book
written by Robert A. Houghton, of the Los
Angeles Police Department, about the investigation
of the assassination of Senator Robert F. Kennedy.

The Assassination of Senator Robert F. Kennedy:
Preface, by Edmund C. Berkeley
Two Men With Guns Drawn at Senator Kennedy's
50
Assassir:tation: Statement to the Press, by Theodore Charach
50
Map of the Scene of the Assassination of Senator
Robert Kennedy
51
The Pantry Where Senator Robert Kennedy was
Assassi nated
52
Bullet Hole in the Frame of a Door
Two Bullet Holes in the Center Divider of the
53
Pantry Door

44

Confidential and Secret Documents of the Warren
Commission Deposited in the U.S. Archives
by Neil Macdonald, Assistant Editor
A list of the subjects of over 200 documents of
the Warren Commission which were classified confidential, secret, and top secret.

39

The Assassination of Reverend Martin Luther King,
Jr., The Role of James Earl Ray, and the Question
of Conspiracy
by Richard E. Sprague
James Earl Ray says he was coerced into entering
a plea of guilty to killing Martin Luther King ...
and contrary evidence (plus other evidence) have
led to filing of legal petitions for relief.

48

December 1970

September 1970
39

Patterns of Political Assassination: How Many Coincidences Make a Plot?
by Edmund C. Berkeley, Editor, Computers and

January 1971
45

Automation
How the science of probability and statistics can
be used as an instrument of decision to determine
if a rare event is: (I) within a reasonable range;
(2) unusual or strange or suspicious; or (3) the resuit of correlation or cause or conspiracy.
48

28

Computer-Assisted Analysis of Evidence Regarding
the Assassination of President John F. Kennedy -

~

November 1970

August 1970
48

0I

The Death of Walter Reuther: Accidental or Planned?
by Edmund C. Berkeley and Leonard Walden
Some significant questions about the plane crash
in May 1970 in which Walter Reuther was killed.
February 1971

48

The Report of the National Committee to Investigate
Assassinations
by Bernard Fensterwald, James Le~ar, and Robert
Smith
COMPUTERS and AUTOMATION for November, 1973

I)

What the National Committee in Washington, D.C.
is doing about computerizing files of evidence, initiating lawsuits to obtain information, etc.; and
comments on two new books by District Attorney
Jim Garrison and Robert Blair Kaiser.

blocked his investigation in more than a dozen
ways.
September 1971
26

March 1971
35

45

"The Assassination of President Kennedy: The Application of Computers to the Photographic Evidence" - Comment
35
I. Another View, by Benjamin L. Schwartz, Ph.D.
A polemical attack on "The Assassination of
President Kennedy: the Application of Computers to the Photographic Evidence" by
Richard E. Sprague published May 1970.
40
II. Response, by Edmund C. Berkeley, Editor

October 1971
41

The Assassination of President Kennedy - Declassification of Relevant Documents from the National
Archives
by Richard E. Sprague
The titles of the documents and other evidence
indicate convincingly that Lee Harvey Oswald was
trained in spy work by the CIA before his visit to
Russia; etc. Like the Pentagon Papers, these documents should be declassified.

24

The Assassination of President Kennedy: The Pattern
of Coup d'Etat and Public Deception
by Edmund C. Berkeley, Editor, Computers and
Automation
Five significant, eye-opening events from May 1970
to October 1971, showing patterns of coup d'etat,
assassination, and concealment; and some predictions.

District Attorney Jim Garrison on the Assassination
of President Kennedy: A Review of Heritage of Stone
by Neil Macdonald, Assistant Editor
April 1971

32

The Right of Equal Access to Government
Information
by the National Committee to Investigate Assassinations, Washington, D.C.

November 1971

May 1971
27

The Assassination of President Kennedy: The Spatial
Chart of Events in Dealey Plaza
by Robert B. Cutler, Architect
The chart, first published in May 1970, is revised
and brought up to date.
June 1971

41

The Case of Secret Service Agent Abraham W. Bolden
by Bernard Fensterwald, Attorney, Executive Director, National Committee to Investigate Assassinations
Bolden wanted to tell the Warren Commission
about a Chicago plot to kill President Kennedy,
and was jailed six years on a framed-up charge
for trying to do so.

51

The Central Intelligence Agency and The New York
Times
by Samuel F. Thurston, Newton, Mass.
The issue of systematic suppression of questions
about the assassination of President John F.
Kennedy, and a hypothesis.

Il

December 1971
32

July 1971

August 1971
37

Jim Garrison, District Attorney, Orleans Parish, vs.
the Federal Government
by Bernard Fensterwald, Attorney, Executive Director, National Committee to Investigate Assassinations
How District Attorney Jim Garrison of New
Orleans became interested in the New Orleans
phase of the assassination of President Kennedy;
and how the Federal government frustrated and

COMPUTERS and AUTOMATION for November. 1973

The Federal Bureau of I nvestigation and the Assassination of President Kennedy
by Bernard Fensterwald, Attorney
How J. Edgar Hoover and the FB I withheld much
pertinent information from the Warren Commission, flooded them with irrelevant information, and
altered some important evidence, thus concealing
Oswald's connections with the FBI.

6

The Assassination of President John F. Kennedy: A
Model for Explanation
by Vincent J. Salandria, Attorney, Philadelphia, Pa.
A study of the reasons why a great deal of the
Federal government's own evidence in the assassination of President John F. Kennedy declared
"conspiracy" - and a hypothesis, supported by
considerable evidence, about why the President
was assassinated and how the implications of that
action were to be signaled to those who could
read the signals.
The Strategy of Truth-Telling
by Edmund C. Berkeley
Editorial
January 1972

57

Spotlight on McGeorge Bundy and the White House
Situation Room
by Robert B. Cutler, Manchester, Mass.
An argument that the "lone assassin - no conspiracy" announcement from the White House
Situation Room could have resulted from information available in Dallas and Washington prior to
the announcement - and thus does not actually
demonstrate that someone there had a guilty foreknowledge of the shooting.
29

January 1973

February 1972
43

Who Shot President Kennedy? - Or Fact and Fable
in History
by Gareth Jenkins, Weston, Mass.
How the physical evidence actually published by
the Warren Commission relating to the assassination of President John F. Kennedy shows conelusively that more than one man was responsible
for the shooting - contrary to the Commission's
own report.

37

40

March, April, May, June 1972
28

Dallas: Who, How, Why? (in four parts)
by Mikhail Sagatelyan, Moscow, USSR
A long report published in Leningrad, USSR, by
an ace Soviet reporter about the circumstances of
the assassination of President John F. Kennedy,
and their significance from a Soviet point of view.

February 1973
26

July 1972
32

10

The Shooting of Presidential Candidate George ,C.
Wallace: A Systems-Analysis Discussion
by Thomas Stamm, Bronx, N.Y., and Edmund C.
Berkeley, Editor
An analysis of the shooting of Governor Wallace
of Alabama; and a discussion of systematic methods
for protecting American leaders from violent attacks.

30

The Shooting of Governor George C. Wallace, Candidate for President
by Edmund C. Berkeley, Editor
Editorial
September 1972

24

31

34

The Central Intelligence Agency: A Short History to
Mid-1963 - Part 2

38

Le Francais Qui Devait Tuer Kennedy (The Frenchman Who Was To Kill Kennedy)
by Philippe Bernert and Camille Gilles, Paris, France

December 1972

30

U.S. Electronic Espionage: A Memoir - Part 1
by Ramparts, Berkeley, Calif.
How the U.S. National Security Agency intercepts,
decodes, and understands almost all secret and top
secret electronic, communications and signals of all
nations all over the world.

U. S. Electronic Espionage: A Memoir - Part 2
by Ramparts, Berkeley, Calif.
How the National Security Agency intercepted and
decoded enemy messages in order to direct bombing strikes in Viet Nam, and often failed; and how
the hideousness of what the American military
forces were doing in Southeast Asia finally led
this interviewee to resigning and terminating.
April, May 1973

November 1972
The Central I ntelligence Agency: A Short History to
Mid-1963 - Part 1
by James Hepburn, author of Farewell America
The unverified, but probably largely true, secret
history of the Central Intelligence Agency of the
U.S. - as a preliminary to its involvement in the
assassination of President John F. Kennedy.

Analysis of the Autopsy on President John F. Kennedy, and the Impossibility of the Warren Commission's "Lone Assassin" Conclusion
by Cyril H. Wecht, M.D., Institute of Forensic
Sciences, Pittsburgh, Pa.
The coroner of Allegheny County, Pa., reports on
his examination of the evidence that still remains
(some of it is missing) locked up in the National
Archives of the United States, not accessible to
ordinary investigators.

March 1973

The Assassination of Senator Robert F. Kennedy:
Proofs of Conspiracy and of Two Persons Firing
by Richard E. Sprague, Hartsdale, N.Y.
A review and summary of the evidence showing
conclusively the fact of conspiracy and the presence of two guns firing, at the time of the assassination of Senator Robert F. Kennedy.

32

The Frenchman Who Was To Kill Kennedy
by Philippe Bernert and Camille Gilles, L 'Aurore,
Paris, France; translated by Ann K. Bradley
English translation of the French newspaper report on Jose Luis Romero, which was reprinted
in French in the December issue.
Why I Distrust the Romero Story
by Robert P. Smith, Director of Research, Committee to Investigate Assassinations, Washington, D.C.
The Romero report reprinted from L 'Aurore has
many earmarks indicating that it is very difficult
to believe.

34

The New Orleans Portion of the Conspiracy to Assassi nate President John F. Kennedy - Four
Articles:
(1) by Edmund C. Berkeley, in the April issue; (2)
by Jim Garrison, in the April issue; (3) by F. Irving
Dymond, in the May issue; (4). by Jim Garrison, in
the May issue
On November 20, 1972, the Supreme Court of the
United States refused to permit Jim Garrison, District Attorney, New O~leans, to prosecute Clay
Shaw for perjury. On November 21, Jim Garrison
issued a statement commenting on this refusal,
which is Article 4 of this set; Article 1 is an introduction; Articles 2 and 3 are opening statements
to the trial jury, by Jim Garrison, Prosecutor, and
COMPUTERS and AUTOMATION for November, 1973

~

f

F. Irving Dymond, attorney for the defendant, in
the February 1969 trial of Clay Shaw in New
Orleans; Clay Shaw was charged by the grand jury
with "having conspired with David W. Ferrie and
Lee Harvey Oswald to murder President John F.
Kennedy" - in regard to which the trial jury
found Clay Shaw "not guilty".
May 1973
6

Burying Facts and Rewriting History
by Edmund C. Berkeley, Editor, Computers and

Automation
Taken together, the information published May
1970 to May 1973 in Computers andAutomation
effectively destroys a large segment of the beliefs,
the rewritten history, that the establishment in
the United States has arranged for the people in
the United States to believe.

June, July 1973

36

The American News Media and the Assassination of
President John F. Kennedy: Accessories After the
Fact (in two parts)
by Richard E. Sprague, Hartsdale, N.Y.
An examination of what happened in many important American news organizations, to cover up
and hide the facts about how President John F.
Kennedy was actually·assassinated in Dallas.
September 1973

6

Establishments and Truth
by Edmund C. Berkeley, Editor, Computers and

Automation
38

The nature of an establishment as a system
A Parallel of 1963
by Marguerite C. Oswald, Ft. Worth, Texas
The ignoring of evidence of conspiracy regarding
Lee Harvey Oswald - a parallel to the Watergate
cover-up.
October 1973

21

The Framing of Lee Harvey Oswald
by Richard E. Sprague, Hartsdale, N.Y.
When Lee Harvey Oswald was arrested, Nov. 22,
1963, for the assassination of President John F.
Kennedy, he said to his captors in the Dallas jail
cell, "I'm a patsy". A review of the evidence
(including 18 photographs) proves that Oswald
was a patsy, and that he was "framed" for the
murder of President Kennedy - although "establishmentese" American history denies it.

Hertlein - Continued from page 19

human failing. Even the most broad-minded practitioner is bound by his or her capacities and philosophy. and it requires a deliberate and concerted effort to remain open-minded, and to appreciate varied
approaches that are not in accord with one's own
temporary aesthetic parameters. One discerns computer artists who prefer natural or man-made patterns and sounds, vs. those who desire only mathematics, electronic and computer sounds, sans the
human touch. There are those who exploit two or
three-dimensional static images, vs. the creators
who prefer moving permutations in flux, declaiming
that the computer is a perceptual medium, and therefore should not be imprisoned in static form, i.e.,
cybernetic art is "pure idea," ad infinitum. Ironically, even the newest of the arts appears destined
to hardening within specific schools of thought,
with separatist camps warring in "vs." expression
and debate.
Summary

It is obvious that the concept of manipulation
and processing via the computer is merely the first
stage of cybernetic creation~ Even now, far beyond
the statements of the artistic problem and aesthetic,
personal variation, is a vast, open territory that
is being explored by questioning, hardy intellectual pioneers, as they seek to perceive the inner
anatomy of art and philosophy:
Wha tis style?
What constitutes the aesthetic? How may this
be accomplished?
What is art? Music? Sculpture? Dance?
Poetry?
What is science? Mathematics?
Is art purely the man-made: The sound of
the human voice, or playing music upon
man-made instruments? The painting and
sculpting of man with hand-held tools?
Is art a part of life, embracing: The ordinary, the animal and natural sounds? The
patterns carved by the winds, sands. and
the water?
Is art perceptual, a mere fleeting moment or
experience in time, or is it permanent, enduring?
What is the optimum role of man in a cybernetic society?
What is the role of art in a technology-oriented world?
What is the symbiosis of man-and-the-machine?
What is thinking?
What is creativity?
Is man the measure of all things?
When man uses the computer as an aid in creation,
or when he attempts to create heuristic art, his
mind finds new questions to explore and to answer.
It appears highly possible that a renewed perception
of life and the arts awaits present and future generations of man, and that this may be partially accomplished by eliminating the boundaries of compartmentalized disciplines, and by walking freely between art and science, by combining interdisciplinary practices and materials. to hopefully bring
forth the ideal of an open, growing, and dimensional
perception of art/life for the human race.
[J
Editor's Note: This paper is published in accordance with a new editorial policy of allowing writers
freer expression, with no editing by the editors, in
the hope that greater variety of expression and
ideas will result for the benefit of readers.

COMPUTERS and AUTOMATION for November. 1973

31

Classified Advertisement

CORRECTION

THE COLLEGE OF

In the July 1973 issue of Computers and Automation,
a single article entitled "Communication -- ThreeWay: Chimpanzee, Man, Computer" was published. Part
1 was authored by Larry B. Dendy of the Public Relations Office of the University of Georgia and Part 2
was authored by Ernst von Glasersfeld et al of the
University of Georgia and the Yerkes Regional Primate Research Center of Emory University.

PETROLEUM & MIN'EiRALS
Dhahran, Saudi Arabi'a
This major technical university, serving the petroleum and minerals industry, is seeking candidates
for instructional faculty in a new College of Industrial Management, Department of DATA PROCESSING and
INFORMATION SCIENCES.

In compliance with the authors' wishes, the two
parts of that article have been reprinted as two
separate articles. The first article is authored
solely by Larry B. Dendy and is titled, "Communication -- Three Way: Chimpanzee, Man, Computer." The
second article is authored by Ernst von Glasersfeld
and his colleagues from the Yerkes Primate Research
Center and Georgia State University and is titled,
"A Computer Mediates Communication wi th a Chimpanzee."
Also, and in compliance with the authors' wishes, all
figures and tables of the article as published in
the July 1973 issue have been included in the second
of these articles.

Program will closely follow ACM curriculum committee
recommendations on Computer EducationforManagement.
Sophisticated configuration IBM 370/155 available.
All instruction in English. Appointments will be at
appropriate Academic Ranks for which candidates
qualify, and be effective 1 September 1974. Personal
interviews will be arranged after submission of documentation.
PROFESSOR (all Ranks)
Ph.D. in Information Science, Engineering or
related fields; 3 to 5 years teaching experience; extensive experience with commercial systems and management information systems;, broad
knowledge of data processing/information system
education; detailed knowledge of languages,
methods, hardware and software evaluation used
in commercial data processing application.

In the 1973 annual index Computers and Automation
will enter the two articles in this manner, which
serves to separate a regular article from a formal
scientific and technical report.

LECTURER/INSTRUCTOR PROGRAMMING and COMPUTER
SYSTEMS (all Ranks)
M.B.A. or M.Sc. in Business Administration or
similar academic qualifications; two to three
years experience in government, business or industry in area of computer systems, programming,
and systems analysis; previous teaching experience highly desirable but not essential; specific instructional capability: Programming
(COBOL); Information Structures; Storage and
Management; Sorting and Searching; Hardware/
Software C)nfiguration and Evaluation; File
Systems; Data Management Systems; Communication
System Organization; Data Base Development.

DID YOU ENJOY THIS ISSUE OF
COMPUTERS AND AUTOMA T/ON

Would you like to send it at no cost to some friends of yours,
with a message?
We'll join you half-way - you send us his name and address
(with zip) and the message, and we will send the issue and
your message to him TOGETHER WITH a gentle "soft-sell"
invitation to subscribe to Computers and Automation.
We have set aside a hundred copies of this issue for this purpose. So long as they last, we can carry out your request.
Just fill in the following and send it to us:
____ - - - - - - - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - - - - - - - - - - - -

LECTURER/INSTRUCTOR INFORMATION SYSTEMS (all
Ranks)
M.B.A. or M.Sc. in Business Administratiorr or
Management; two to three years experience in
Business Systems and Management Information with
work in both systems analysis and design; previous teaching experience highly desirable but
not essential. Specific instructional capabilities: Systems Organization or Management; Basic
Analysis tools; Systems Implementation; Management Systems; Systems Life Cycle; Long-Range
Planning; Systems Development; Scheduling and
Allocation; Queuing Models; Inventory Models;
Simulation Models.

.

To:
(

Computers and Automation and People
815 Washington St., Newtonville, MA 02160
) I request that you send a copy of the _ _ _ _ issue of
Computers and Automation and People to

1. Name ___________________

Address

2. Name ____________________ My message _ _ _ _ _ __
Address

------------------

3. Name ___________________

Please send detailed professional resume and address
all inquiries to:
College of Petroleum & Minerals
c/o Saudi Arabian Educational Mission
880 Third Avenue -- 17th Floor
New York, N.Y. 10022

32

My message _ _ _ _ _ _ __

Address

My message _ _ _ _ _ _ __

-----------------

My name and address (and zip) are attached. I am a subscriber to

Computers and Automation and People.

COMPUTERS and AUTOMAliON for November, 1973

:

!».

Virtue, in Spite of Erroneous Conceptions

J. P. Frankel
Dean of the Faculty
Harvey Mudd College
Claremont, Calif. 91711

UWe think of knowledge as knowing how-to-do-it, wisdom as knowing whether-to-do-it,
and virtue (if the answer is yes) as doing-it"

In this article, I mean virtue in a much narrower
sense than the theologians, and I mean erroneous conceptions in a much broader sense than planners of
parenthood.
Let me first speak of virtue.
We think of knowledge as knowing how-to-do-it,
wisdom as knowing whether-to-do-it, and virtue as
doing it. In this sense, at least in the universities, we think of scientists as knowing, the humanists as wise, and the engineers and other technicians (doctors, nurses, social workers and the like)
as virtuous, that is, the do-ers.
The World is Full of Problems

Now the world is full of problems where we need to
know how to do it, whether to do it, and (if the answer is yes) to do it. Each of us can make his own
list of pressing social problems: pollution, arms
limitation, or population growth. Fortunately we are
reasonably well supplied with scientists, humanists,
and technicians. To understand why we still have
these urgent problems, let us turn to erroneous conceptions.
The erroneous conceptions I wish to deal with
here are:
That it is within the power of scientists and
engineers to choose to work only on projects
"in the public interest," and
That the market place is where one discovers
the public interest.
Choice of Projects to Work on

Critics seem to assume that scientists and engineers are free to choose their projects, and complain
that they fail to consider the real public interest.
S~ientists may be free to choose their work, but they
Based on remarks delivered on Joseph C. Wilson Day, November 10,
1972, at the University of ROchester, Rochester, N.Y.

COMPUTERS and AUTOMATION for November. 1973

have no more to say about how their discoveries are
used than Christopher Columbus did.
As for the engineers, they have more to say about
the uses of science, since they are the ones who
choose which of science's ideas will be applied, but
they in turn have almost no way, at present, of identifying the public interest, and even less in determining which products or processes should be produced
to serve it.
A Moratorium on Science?

We will return to this matter of choice, but first
let's eliminate from the list of reasonable alternatives facing society, the silly and dangerous notion
of a moratorium on science.
The key notion in the moratorium idea is that if
you can't control it, you shouldn't do it. Therefore, we are urged, don't do any more science until
(presumably) the humanists devise suitable controls.
The trouble with this kind of conceptual contraception is two-fold. In the first place, as Paul Saltman has pointed out eloquently, you can't forbid
knowing any more than you can forbid writing poetry.
Science can be slowed down, of course, by driving it
underground, but even if we slowed it way down, there
is no evidence that we have either knowledge or wisdom enough to control its application, unless we
change some of our habits.
Ignorance and Fear Lead to Irrationality

One habit that needs correction has to do with the
thinking and feeling processes of the humanists -the philosophers, if you will -- who presumably are
to show us how to behave. Too often they are ignorant or fearful of science and engineering. What one
is ignorant or fearful of, he cannot deal with in a
rational way. There is no possibility that we can
learn to control what we do by some non-rational
process, such as satori, using mystically-fashioned
playing cards, etc. Control over what we do will

33

have to be done rationally. I also believe that it
will have to be done by humanists, and that before
they can do it, we have somehow to lower, or at least
make more permeable, the barrier that separates the
Two Cultures. We will come back to this point later.
Before that, let us return t~ the notion that engineers choose what they will work on.
The Choices of Engineers

Most engineers do not make cosmic choices. They
do not decide that this product will be built and
that one won't be. Practically all engineers, I suspect, work for other engineers, who work for others,
who work in companies where the products are determined not by science or philosophy, but by market
analysis. Now market analysis has come a long way
since the days of the Edsel, and it often guesses
accurately, although not always so, what the public
is interested in buying. But what the public buys is
not necessarily what it needs.
The Market-Place Guessing Game

We buy those things that are offered for sale
that are better (in some vague way) than the alternatives available to us. Except for advertising or
other ways of influencing public opinion, the basic
mechanism of the market-place is a guessing game.
Try this product, see if it sells. If it does, figure out what it was about it that sold, and push a
little harder. If this one does not sell, retrench
a little, or gamble on another change -- and so on.
Advertising and public opinion do play important
roles -- how else explain so many different labels
on the same bar of soap, the same automobile? -but the decision as to how the engineers' skills
will be used has, in the past, been largely determined by the instantaneous outcome of the market
game.
Major Civil Problems

Now please do not misunderstand me. The marketplace mechanisms are important for determining soap
or automobile styles. I believe that criteria of
risk-and-return of investment are elements of our
decision-making processes that we could discard only
at great peril to our society. What I am saying is
that the major civil problems: pollution, poverty,
and population density, for examples, are not likely
to be defined by market analysis.
These problems, for which acceptable solutions
are needed, share these characteristics:
First, they cross product classification lines,
and involve more than one sector of the economy.
They are not just problems of the auto industry, or
the mining companies, or manufacturing-but-notservice-industries -- they involve all of these.
All the skills that all these sectors employ may
have to be applied to these problems. The cement
plants in the country and the transport companies in
the city have pollution problems that differ only in
detail. To expect them to do the necessary research
and development separately, each with his eye on his
own segment of the market, is to postpone until
much too late, if not forever, solving even the
smaller parts of our problems. The problems, so to
speak, are too big.

pollution caused by internal combustion engines by
using electric autos, for example. If so, we may
replace polluted air in the cities with polluted
streams out in the country where the new massive
power plants are. Or we can replace with solar
energy the fissionable materials or fossil fuels we
now use for powerj however, at least in the near
future, we would then have either much less energy
or much more costly energy, and fewer jobs and more
poverty. (Some among us tend to paint even blacker
pictures. They point out that our society gave up
slavery only when our technology developed to the
point where machines were cheaper than slaves. Is
it possible that we could deliberately reverse this
process and end up with clean air, but with slaves?)
This characteristic of tight linkage, or inseparability of the big problems, also suggests that
we cannot rely upon the ordinary market-place mechanisms to determine how we employ our technology to
solve our problems.
Very Difficult Problems

The third characteristic of our problems that
forces us to reconsider the mechanisms of choice,
is that our problems are so very difficult. The
technical solutions do not exist outside of social
considerations. The social costs outweigh such usual factor costs as materials, labor, and capital.
Our cities present much tougher problems than putting man on the moon. As someone smarter than but
unknown to me, has said, "We couldn't have put a
man on the moon if the moon had been inhabited".
World-wide and Nation-wide Problems

All these characteristics, and others that I've
left out, such as geographical diversity -- some
problems are not local, nor even regional or national, but world-wide -- suggest that the organizations
needed for these new problem-solving teams differ
considerably from those of even our biggest, most
diversified companies, or else that we need some
super-industrial team of coordinators, who are to be
responsive not to the elements of the market-place,
but rather to the public interest. Whether that
public is regional, or national or world-wide, someone who has thought this problem further through
must tell. My own thoughts, tempered by a certain
sourly pragmatic view of the interactions of various national governments, suggests that the approach
most likely to succeed in the near future is the national one.
The National Science Policy and Priorities Act

These Problems are Hardly Separable

The essentials of a first step in a national plan
are contained in the National Science Policy and
Priorities Act, which, among other things, sets up
procedures for contracting out to universities, companies and other organizations, the research and development necessary for solution of the major civil
problems, including the design of civil science systems. Whether an agency like NASA should be set up,
as the Act says, or whether an existing agency
should supervise new programs, is a matter of debate. The importance to our discussion is that some
federal funding agency, not the various product
market-places, should establish the priorities and
fund the solutions to our civil problems.

In the same way, the major civil problems are not
readily separable. One can reduce the amount of air

As you see, this bill or Act or plan makes a
first approach to nationalizing the solution to national problems. At the same time it utilizes local

34

COMPUTERS and AUTOMATION for November. 1973

•

NUMBLES
collections of scientific, humanistic and engineering talent, that either already exist in the aerospace companies, universities and think tanks, or
can be collected there. In essence, this bill
solves one aspect of the problem. It replaces small
or local or single-commodity market-places with a
national market-place based on national needs. I
suspect that the new agency will find that big aerospace companies usually do not have the necessary
mix of talents, although they probably do have the
necessary organization. The universities, on the
other hand, probably do have the necessary mix of
talents, but probably do not have the proper organization. It seems, however, to be a logical first
step, and the sooner the bill becomes law, the
sooner we can begin to solve our problems.
International Institute of Applied Systems Analysis

An example of the international approach is the
recently established International Institute of Applied Systems Analysis in Vienna as a joint venture
of our National Academy of Sciences and the Soviet
Academy, among others. Since they will operate on
about three-and-a-half million dollars a year (the
Civil Science part of the National Science Policy
and Priorities Act allots an average of 270 million
per year for three years) it is unreasonable to expect anything more than papers for publication to
come out of Vienna. The international effort will
result in more knowledge and wisdom; on the proposed national budget we could become virtuous as
well.

Neil Macdonald
Assistant Editor
Computers and Automation

A "numble" is an arithmetical problem in which: digits
have been replaced by capital letters; and there are two
messages, one which can be read right away and a second
one in the digit cipher. The problem is to solve for the
digits.
Each capital letter in the arithmetical problem stands for
just one digit 0 to 9. A digit may be represented by more
than one letter. The second message, which is expressed in.
numerical digits, is to be translated (using the same key)
into letters so that it may be read; but the spelling uses
puns or is otherwise irregular, to discourage cryptanalytic
methods of deciphering.
We invite our readers to send us solutions, together with
human programs or computer programs which will produce
the solutions.

NUMBLE 7311

In Order to be Virtuous
One Must be Wise and Knowing

One final caution. I hope you have not heard
me suggest that only scientists and engineers are
capable of leading us out of the thicket of difficulties we are in. I am not advocating technocracy,
that totalitarian philosophy which says that only
engineers can lead us. I do not believe that for
one moment, nor does anyone who knows enough engineers and scientists. There is no reason to believe
that they, as a class, are any more capable of
leading our people than, say, the lawyers.

F YOU
x

Y L U Y I T

YOTRUO

We will need new kinds of agencies and organizations to define "the public interest" and to find
ways of organizing the talents that may solve some
of our problems. But organizations -- universities
and corporations and public agencies -- are built by
people, led by other people. So our leaders must be
part scientist, part humanist, and part engineer,
and they must use what they have, not in response to
some particular market-place: but in the true public
interest. Not nearly enough people will be born
with these characteristics. They will have to be
educated.
If this sounds like a very tall order to put to
an education system -- it is.

y

But we should be encouraged to redesign our education systems to help produce such people, not only
because we have to (God knows we do) if mankind is
too survive -- but also because we know it is possible.
0

COMPUTERS and AUTOMATION for November, 1973

GV

= CU

E U E U U E
TYCUOR
C T U IOU 0 V T

I would rather that you heard me say that no
longer is it virtue merely to do it, but rather
that in order to be virtuous one must also be wise
and also knowing.
Our Leaders Must Be Part Scientist,
Part Humanist, and Part Engineer

G I V E

327897972

Solution to Numble 7310

In Numble 7310 in the October issue, the digits 0
through 9 are represented by letters as follows:
0=0

W= 5

=1

P = 6

E=2

T=7

S=3

R=8

H=4

A=9

I

The message is: Eat what is ripe.

Our thanks to the following individuals for submitting
their solutions - to Numble 7310: Edward A. Bruno, N.
Bergen, N.J. - to Numble 739: Edward A. Bruno, N. Bergen, NJ.; T. P. Finn, Indianapolis, Ind . .....: to N ... mble 738:
Nihan Lloyd-Thurston, S. Nutfield, Surrey, England.

35

Nixon and the Mafia -

Conclusion

Jeff Gerth
Contributing Editor
SunDance Magazine
1913 Fillmore St.
San Francisco, Calif. 94115

"Organized crime will put a man in the White House someday, and he won't
even know it until they hand him the bill."
- Ralph Salerno

Part 1 of "Nixon and the Mafia" was publi shed in
the September issue of "Computers and Automation" ;
Part 2, in the October issue. Part 3 begins here
wi th further information about the relation of
President-to-be Richard M. Nixon wi th shady transactions in the Bahamas.

Shakeup in the Bahamas

By the middle Sixties there was a storm brewing.
Internal friction had forced out a few people like
Lou Chesler, while a wave of public investigations
were blaring the role of underworld figures like
Meyer Lansky. The 1967 Royal Commission of Inquiry
also dredged up another familiar name -- Richard
Nixon.
Testimony before the Royal Commission by Max
Courteney, a Lansky lieutenant, detailed a long
bookmaking career and brought out the names of a
large clientele, including the then ex-Vice President Richard Nixon.
Mary Carter Paint

The Royal Commission also bared a deal which implicated Richard Nixon far more deeply than passing
mention by an underground bookie.
In 1967 Lyndon Pindling became the first black
premier ever to serve the almost one hundred percent
black citizenry of the island. Pindling was hardly
a revolutionary, however, for among the people instrumental in putting him in office was a gambler
close to Lansky named Mike McLaney. The Royal Commission branded McLaney a "thoroughly dangerous person" and accused him of maneuvering Pindling into at
least one deal involving a questionable gambling
concession.
Part of the post-election controversy was a company based in Tampa which bore the innocuous name of
"Mary Carter Paint Company".
In 1965 Lansky's front-man (and former Key Biscayne landowner) Wallace Groves, filed a joint application with the Mary Carter Company to open a
Reprinted with permission from SunDance Magazine, November-December,
1972, Volume 1, Number 3, published by and copyright by Running Dog,
Inc., 1913 F-illmore St., San Francisco, Calif. 94115

36

casino on Paradise Island in the Bahamas. The ubiquitous Sir Stafford Sands handled the legalities.
Knowledgeable observers looked for the mystery man,
and a Justice Department memo, dated January 18,
1966, predicted that "the atmosphere seems ripe for
a Lansky skim".
After Pindling's election, Groves was forced out
and the Mary Carter Paint Company had itself two new
casinos. At the 1967 opening of one of them -- the
Nassau Bay Club -- the honored guest was Richard
Nixon.
The following year -- 1968 -- the other Mary Carter Club, the Paradise Island Casino, opened for
business. The owners felt close enough to Nixon to
offer him use of their facilities during the 1968
Republican Convention. Nixon felt more comfortable
at Key Biscayne, but some of his staff took up the
offer.
Mary Carter Becomes Resorts International

In 1969 Mary Carter -- now called Resorts International -- reluctantly "released" one Dino Cellini
claiming that while he "had a relatively unsavory
background, he had no criminal record, no criminal
associates". Cellini hopped across the water to
Miami, where, according to Dade County Sheriff Intelligence Reports, he continued to work in conjunction with Paradise Island Casino. The reports allege that Cellini was an almost daily visitor to Resorts International's Miami office, where he checked
credits and worked with a company booking junkets to
the Paradise Island Casino.
There are those who maintain that Cellini's connections with Resorts International symbolize the
influence of Lansky. In a 1971 editorial, the Las
Vegas Sun concluded an eleven part series on organized crime -- some of which centered on Resorts International -- by charging that "however cloaked and
cleverly concealed by the guardians, gambling in the
Bahamas is controlled by Meyer Lansky and it has
been established in police intelligence reports that
the fee is fifteen percent of the gross income". The
now defunct Toronto Telegram reported in 1970 that
"observers believe that the resourceful Lansky is
still managing to get his cut from the Bahamas".
Resorts International, through its'ninety-one
percent owned subsidiary, Intertel, has denied all
allegations of involvement with organized crime. It
COMPUTERS and AUTOMATION for November, 1973

was Intertel that ITT hired in 1972 to snoop on columnist Jack Anderson.
The latest and possibly most damaging charge in
the Resorts International battle came in June 1972
in an IRS inspired indictment of Meyer Lansky and
Dino Cellini. The indictment reads in part:
On or about May 17, 1968, unindicted co-conspirator Vincent Teresa met with defendants Meyer Lansky and Dino Cellini in Miami and had a discussion wherein defendants Lansky and Cellini gave
Teresa permission to conduct gambling junkets to
the Paradise Island Casino.
Thus government agents allege that in 1968 Lansky maintained at least some control in running junkets to Resorts International's Paradise Island Casino. The junket racket is an integral part of the
casino operation, and as recently as 1971 Lansky's
cohort Eddie Cellini was reportedly still arranging
junkets for the Paradise Island Casino.
Enter Nixon and Rebozo

It was in 1967 --- with Lansky still okaying junkets and Cellini still running the Paradise Island
Casino --- that Richard Nixon and Bebe Rebozo became
friends with the head of Resorts International.
It should be no surprise that James Golden, the
recently (1969) hired "deputy director of security"
for Resorts International is a good friend of Nixon's. As a Secret Service guard for Nixon when he
was Vice President, Golden made a good enough impression to be appointed staff security chief for
Nixon in 1968. Golden was also security director
of Nixon's convention headquarters in Miami that
year, and was security director for his subsequent
inauguration. Later that year he moved to Resorts
International. Golden is just one of a long string
of interesting Nixon security appointees, among
them Watergate indictees James McCord, Gordon Liddy,
and Howard Hunt.
There are rumors, some of which have been aired
in the press, that Richard Nixon owns stock in Resorts International. Former Republican Presidential
candidate Thomas E. Dewey does own stock in the company, and, according to organized crime investigator
Hank Messick among others, there are reports of Lansky buying stock as well. Nobody has proved anything one way or another about the stock connections, but that Nixon is connected to Resorts International, at least through Golden, is indisputable.
Perhaps more disquieting than rumors of Nixon
stock ownership in an underworld holding company for
Bahamian casinos are the reports of his meddling in
Bahamian affairs. In 1969 a proposed tax increase
on gambling profits to provide money for Bahamian
schools was slashed in half by the Minister of Finance. The Minister refused to explain the cut,
and told opposition members to "use your imagination" for an explanation.
The advice was taken literally by some Bahamian
papers who speculated that pressure came from "outside sources connected with casinos". One Bahamian
paper asked openly i f "a telephone call from the
White House was not responsible?"
Whereas our investigation into Cuban politics
brought evidence to light possible violations of the
Neutrality Act, we now have the possibility of an
American Piesident who has spent a significant
amount of his vacation time in the Bahamas also meddling in the affairs of that country.
COMPUTERS and AUTOMATION for November, 1973

Richard Nixon, a man with both visible and invisible links to the underworld'and politics of preCastro Cuba, turns up in the Bahamas with very SImIlar links, bringing some big names along with him.
Enter WiII,iam Rogers

Two men with histories both in Bahamian politics
and in the finances of organized crime have made
frequent use of the legal services of a firm whose
most prominent partner is Richard Nixon's old friend
William P. Rogers, one-time Secretary of State.
The two men are Mike McLaney, charged by the
Royal Commission in 1967, and a business cohort of
his named William Colusardo. McLaney and Colusardo
were investigated in 1967 by the Securities and Exchange Commission in connection with a blueberry
plantation that McLaney sold to a company controlled
by Colusardo. The subsequent corporate jugglings
implicated (among others) newly elected Bahamian
Premier Lyndon Pindling. Among Colusardo's "favors"
for Pindling were the use of his airplane during the
election campaign, and a $127,000 contribution in
the form of an "interest payment". The law firm
that defended McLaney and Colusardo against the SEC
was that of William P. Rogers. Rogers had been a
close friend and political associate of Nixon's for
twenty-five years. He accompanied Nixon on many of
his Bahamian jaunts and also made frequent stops
with him at the Key Biscayne Inn and Villas. In addition to being an "R & R" sidekick, Rogers was the
man Nixon turned to for counsel amidst his personal
crises in the Checkers affair and Eisenhowe~'s ~eri­
ous heart attack.
Rogers served the Eisenhower/Nixon team for eight
years in the Department of Justice, first as Deputy
Attorney General, and then, by 1957, as Attorney
General. The Justice Department's record against
organized crime in the years following the Kefauver
Commission was lackluster, to say the least. It was
Rogers who personally rejected the recommendations
of the specially constituted Wessell Committee on
organized crime set up in the wake of the infamous
Appalachian raid in upstate New York that revealed
a Mafia summit conference. The Committee's proposals for a concentrated and coordinated war on organized crime were only implemented some years later
by Attorney General Robert Kennedy.
A footnote in the Justice Department files was a
report by IRS Special Agent Josph Delfine, dated October 19, 1953. The IRS recommended to the Justice
Department that "criminal proceedings be instituted
against Meyer Lansky in the Southern JUdicial District of New York for the willful attempt to defeat
and evade a large portion of his income taxes for
the years 1945 and 1947 under section l45b ~f the
Internal Revenue Code". The Justice Department with William Rogers second in command at the time --respectfully declined to prosecute.
Lums Hot Dogs

Upon leaving his post as Attorney General in
1960, Rogers became a member of the New York firm of
Royal, Koegel and Wells. In 1969, with its leading
partner about to become Secretary of State, Royal,
etc. moved with its clients wholeheartedly into the
world of gambling casinos and organized crime.
A year later Royal took on the account of the
Miami-based hot dog chain, Lums Inc. What did a hot
dog chain have'to offer a prestigious New York law
firm? The answer may lie in where the firm took its
client;.
37

In 1969 Lums purchased the Ceasar's Palace Hotel
and Casino in Las Vegas for $60,000,000. A month
later the Nevada state gambling authorities were
looking into the hotels' "catering to twelve underworld figures from Kansas City".
A few months after the purchase the SEC filed
suit charging Lums and Ceasar's Palace with "false
and misleading" statements. The SEC wondered how
Ceasar's managed to lose $1,000,000 in five months
when the previous year (before Lums bought in) there
was a $2,200,000 profit for a comparable time period.
The SEC also questioned Lums concerning the
$3,500,000 Lums paid one Jerome Zarowitz, a convicted
professional sports fixer who wasn't even listed as
an owner of the casino. Top officials in both Ceasar's and Lums have been under investigation by IRS
intelligence in Miami and by Nevada gaming authorities in cases involving organized crime ever since
Rogers' firm took on the Lums account.
There is also the question of the 1971 Lums acquisition of a North Miami housing resort development called Sky Lakes. Both Sky Lakes and Ceasar's
Palace have received large sums of money from the
Teamsters -- $12,000,000 for the Miami project and
more than $16,000,000 for Ceasar's Palace.
With things going slowly, Lums announced plans
for a new $22,000,000 casino next door to Ceasar's
Palace. In December of 1971 the company decided
that the whole restaurant idea was no longer worth
the trouble. In a classic climax to a classic American success they changed their name to Ceasar's
World Inc. and sold their hot dog stands.
Meanwhile the Secretary of State's old law firm
reaped a bundle with their new-found involvement in
the Las Vegas underworld. With such stunning successes at home, one wonders what a firm with a link
to the Secretary of State could do abroad, in places
like the Bahamas or Vietnam, for example.

Some of the dealings of the Smith/Alessio combine
were brought to national prominence by a recent LIFE
magazine article which accused Attorney General - Richard Kleindienst of "tampering with justice" in a
case involving Alessio. According to the Wall Street
Journal, Smith raised $1,000,000 for Nixon's 1968
campaign. He and his wife took the first position
on the receiving line behind the President at the
White House inauguration.
More of the Same in California

Nixon's other favorite resting place besides Key
Biscayne is the area near his birthplace in southern
California. Here the underworld pattern of his
Florida involvements repeats itself -- in a strikingly similar pattern.
One story there involves Nixon's multi-millionaire backer, C. Arnholdt Smith, and the Del Charro
Hotel in La Jolla, just north of San Diego.
The Del Charro was a favorite stopover for Nixon
in the Fifties. Owned by the Murchison brothers,
who also owned the nearby Del Mar race track, the
hotel played host to numerous Detroit and Las Vegas
gangsters. Alan Witwer, a former. manager of the
hotel, has alleged in statements to this reporter and
others that the hotel served as a secret meeting
place for politicians and assorted business interests, some of them from the underworld. Witwer specifically cited a 1954 meeting attended by Nixon and
chaired by a leading member of ITT. He also claimed
that there was a bookmaking operation at the hotel,
but has offered no documented proof.
Mrs. C. Arnholdt Smith is a permanent resident of
the Del Charro, and the hotel's visitors have included John Connally, Barry Goldwater, and J. Edgar
Hoover. Hoover's $15,000-a-year bills were picked
up by the stockholders of the Murchison interests.
The fact that certain of Hoover's good friends
rubbed elbows, rather warmly, with Meyer Lansky, and
the fact that the nation's leading crime fighting
agency -- the FBI -- has come up almost blank in its
fight against organized crime may not prove anything
about Hoover. On the other hand, these facts don't
make it any easier to dismiss questions which might
arise about the influence of organized crime at the
highest levels of government.

Nor do the underworld implications of big names
surrounding Nixon end with the Secretary of State.
Murray Chotiner, a long-time Nixon aide and architect of his early smear campaigns, has past links to
the underworld. In 1962 Drew Pearson and Jack Anderson wrote that "Chotiner ... besides representing
the top gangster of Philadelphia, Marco Reginelli,
represented a long and amazing list of hoods, concession peddlers, income tax violators and others
needing influence in high places ... " It was Chotiner who brought Frank Vitale, "once involved in
the biggest bootlegging conspiracy on the West
Coast," onto Nixon's special plane to Moscow in 1959.

North of the Del Charro and thirty miles south of
the San Clemente White House, lies the mammoth La
Costa land resort development. The development is
tied to both Smith (his daughter is a director) and
to the Teamsters.

Nixon's recent appointment of Walter Annenberg as
Ambassador to England also echoes the themes of underworld involvement. Annenberg and his father were
indicted in 1939 for "aiding and abetting" in connection with their wire service operation inChicago,
an operation run with the protection of Al Capone,
for which the Annenbergs paid $1,000,000. The Annenberg family was also a major contributor to Nixon's 1968 election campaign.

LaCosta was originally developed by Cleveland
syndicate reliables Allard Roen and Moe Dalitz. The
development was reorganized in 1968 to bring Teamster control more in line with their investments,
which already exceeded $18,000,000. Like Sky Lakes,
its Florida counterpart, La Costa attracts a whole
range of figures from organized crime. La Costa
visitors have included Willie "Ice Pick" Alderman,
a St. Louis mob cohort Morris Shenker, and Wallace
Groves and Lou Chesler of Bahamas fame.

Further back in the Nixon saga, and closer to his
southern California birthplace, lies San Diego financier, C. Arnholdt Smith and his bookmaker partner
John Alessio. In 1946 Alessio and Smith introduced
Nixon to another bookmaker named Lew Lipinsky. Lipinsky, who was convicted for bookmaking in 1938,
served for three decades as a go-between for the
Smith/Alessio interests to their syndicate connections.
38

According to eyewitnesses, when Groves' helicopter sets down, the red carpet is rolled out. It may
be because Groves bought a home in La Costa, but
more likely it's because, as government agents put
it, '~here Groves appears, Meyer Lansky will not be
far behind".
Another mob frequenter of the La Costa development is Jake Arvey, an organizer of the Republic
COMPUTERS and AUTOMATION for November. 1973

•

National Bank in Miami, the bank through which Bernard Barker channeled funds for the Watergate crime.
The Teamsters Again

A recent visitor to La Costa was Frank Fitzsimmons, a key to Nixon's new-found support in organized labor. Fitzsimmons is president of the Teamsters Union. This summer he stopped in La Costa on
his way to see Nixon at San Clemente. Fitzsimmons
had just come from dinner in Detroit with a local
Mafia figure and soon after his Detroit-La Costa-San
Clemente excursion, Fitzsimmons announced his support for Nixon. One wonders whether the Teamster
decision to stay on the Pay Board and to support
Nixon is somehow related to what the Detroit Free
Press has been hinting strongly as of late: that the
administration has stopped prosecution of Frank's
son Richard Fitzsimmons -- the business partner of a
Detroi t mobster -- on charges of mi ssing union funds,
in exchange for Teamster support of the Republican
President.
Whatever deals Nixon and Fitzsimmons did make,
the Teamsters have a long working relationship with
organized crime. Their marriage goes back over
twenty years, where Jimmy Hoffa was introduced to
the Detroit underworld by Paul Dorfman, in exchange
for some multi-million dollar insurance business.
Dorfman's son, Paul, has residences at both Sky
Lakes and La Costa and was recently convicted of
taking kickbacks on a Teamster "loan.
The Teamster tradition of labor racketeering and
corruption made for a ready alliance with the mob.
Early government investigations of the Teamsters,
such as the Bobby Kennedy-led McClellan Permanent
Committee on Investigations, centered on labor racketeering. As Attorney General, Kennedy continued
his pursuit of the Teamsters and their boss, Jimmy
Hoffa. At one point Kennedy had twenty-nine grand
juries simultaneously investigating Hoffa's activity
-- one of which led to a conviction for mail fraud
and jury tampering.
In 1969, two Oakland Tribune reporters concluded
a six-month investigation with the charge that "the"
$628,000,000 Teamsters Central States, Southeast and
Southwest Pension Fund headquartered in Chicago, has
become a bankroll for some of America's most sinister underground figure".

-.

Nowhere does the relationship between this fund
and the mob surface more dramatically than in Las
Vegas, where Teamster trustees have approved loans
between $50 and $70,000,000, some shakily secured by
second mortgages and subordinated notes. A highranking Federal official has commented that "the
Teamster fund is a sort of open bank to people wellconnected in Las Vegas and well-connected to organized crime".
It was Hoffa's desire "to have [his] own bank in
every city" that brought on the Teamster takeover of
the Miami National Bank. The Bank in turn is just
one of a long list of ventures, suchas Ceasar's Palace, Sky Lakes, La Costa, Worldwide Realty, International Airport Hotel Systems, Truesdale Estates, in
which Teamster money amounting to over $60,000,000
figures prominently alongside the social and business partners of Richard M. Nixon -- a line of investments that leads from Nixon's three White Houses
to a federal clemency for Jimmy Hoffa and back to
organized crime.

The current head of the Justice Department's
Criminal Division saw enough evidence in 1967 to say
COMPUTERS and AUTOMATION for November, 1973

that he "knew for a moral certainty [that] in the
upper echelons there is an amalgamation between the
Cosa Nostra and the Teamsters Union". In 1971, when
a Federal Grand Jury probing the activities of Meyer
Lansky questioned Jimmy Hoffa, many wondered whether
the links between the two giants were more direct
than the numerous transactions between mutual
friends.
A few months after his testimony, Hoffa was
granted clemency after serving less than five years
of his thirteen-year sentence. The freeing of Hoffa
and three co-defendents of the 1963 wire fraud pension case is the latest and most crucial event in
Nixon's longstanding friendship, a friendship with
some clear public benefits for both. Jack Anderson
documents, for example, that as early as 1960, then
Vice-President Nixon and Attorney General Rogers intervened to halt an indictment against Hoffa in exchange for Hoffa's support in the 1960 election.
ANICO - More of the Same in Texas

In recent years the Teamster fund has been superseded by a gjant Texas insurance company as a major
source of finance for Las Vegas casinos tied to the
mob. The company is the American National Insurance
Company (ANICO) of Galveston, Texas. ANICO is close
to the heart and pocketbook of the two ranking Texans in the Nixon administration -- former Treasury
Secretary John Connally and former Assistant Attorney General Will Wilson.
As well as floating more than $40,000,000 to Las
Vegas casinos and $13,000,000 to premier mob attorney Morris Shanker, ANICO has made loans to two
Florida companies close to Richard Nixon -$1,750,000 in 1966 to the Mary Carter Paint Company,
and $3,000,000 in 1970 to a subsidiary of Worldwide
Realty.
That year a group of disenchanted stockholders
filed a multi-million-dollar suit, charging ANICO
officials with having taken control of the company
and using it as a private preserve as well as a
source of funds for the mob.
The defendants in the suit hired Nixon's New York
firm to handle the case. Connally's Houston law
firm has also been used by ANICO. The First National Bank of Houston, of which Connally was a director and in which some of his law partners were
officers, has provided an interest-free account of
more than $1,000,000 for ANICO. Connally was also
a director of a savings association which was purchased recently by ANICO.
Will Wilson was "general" of the Justice Department's "war" on crime from 1969-1971. He was head
of the Criminal Division until October 1971, when
his resignation was forced by disclosures tying him
to the scandal-rocked financial empire of Texas
wheeler-dealer Frank Sharp. Wilson has been charged
by dissident ANICO stockholders of helping to drag
ANICO into the twilight zones of finance with such
deals as the 1963 absorption of a defaulted $450,000
mortgage held by Sharp. Sharp's attorney and "financial advisor" on the deal was Will Wilson.
While Attorney General of Texas, Wilson sued the
foundation which controlled ANICO to bring three new
trustees onto the foundation's board of directors.
Wilson has no visible ties to the new trustees,
whose votes were instrumental in shaping the company's new financial course. But dissident stockholders have charged that the "negotiations" that

39

brought on the shift of control in the foundations
were handled by a Galveston law firm linked to the
mob. The stockholders also claim that John Connally
played a role in these negotiations, albeit a "backstage" role. The ANICO case is part of a long hi story of Wilson's involvement with the Galveston underworld.

Indeed, while the Nixon-Agnew-Mitchell team has
used the spectre of "CRIME" to keep the fear level
high and to guarantee large budgets and expanded
powers for their Justice Department, the actual "attempts" of the Nixon administration to cope with organized crime have resembled a somewhat sinister update of the Keystone Cops.

When he came to the Justice Department in Washington, Wilson discovered the organized crime division looking into the affairs of ANICO. Since then
there have been no indictments in the case and there
are reports that Wilson had the ANICO files locked
safely in his personal office. One source of those
reports is Stewart Hopps, a former Justice Department investigator.

For example, up to 1,000 of Kleindienst's vaunted
1600 indictees in gambling and organized crime may
have their cases thrown out for somewhat dubious
"improper procedures" technicalities. A Miami attorney named James Hogan has "discovered" irregularities on signatures required for electronic surveillance authorizations. Court-approved wiretaps require written authorization by the Attorney General
of a designated representative, in this case Will
Wilson. Instead of being signed by John Mitchell or
by Wilson, the authorizations in question were
signed by aides, thus rendering thousands of wiretap
authorizations -- and the indictments based on them
useless.

Some serious conflict-of-interest charges concerning ANICO remain:
• The officers of ANICO who were later represented
by Nixon's law firm, made a loan to a company
whose top officers are long-time friends of Nixon.
• The criminal division of the Justice Department
has been headed by a man with direct links in a
company the division is supposedly investigating.
• The company also has clear ties to Nixon's former
Treasury Secretary, a man mentioned for the VicePresidency, the national chairman of Democrats
for Nixon, and a key figure in the President's
re-election scheme.
Whose Justice Department?

The ANICO case takes us to a fitting endpoint to
the story of Richard Nixon's involvement with the
underworld -- the Department of Justice. It is an
old saw that criminal and criminal-chaser eventually
become involved in the same business, but in Richard
Nixon that old saw has become more of a reality than
perhaps ever before in American history. For Richard Nixon is a man whose name has been synonymous
with "law and order" in America for three decades.
Yet the four-year "war" on organized crime by the
Nixon administration bears more resemblance to the
"peace" in Vietnam than a sincere effort to get at
the mob.
In a recent interview in U.S. News and World Report (September 11, 1972), Attorney General Richard
Kleindienst hailed "about 1600" indictments of underworld figures brought by the Nixon administration
in the past three and half years. The Justice Department claims that many of these indictments involve top mobsters.
Those outside the Nixon administration, however,
have charged that the government's prosecution has
been both partisan and selective, aimed exclusively
at mobsters linked to big-city Democrats such as in
Newark, and at the "little fish" who are always in
abundance and who make little difference in conducting mob business. Time has reported that quotas
have been established (i.e. one hundred hoodlums a
month for New York City) and that arrests are "being
delayed so that future quotas can be filled". The
New York Times has editorialized about the ease-wfth
which petty gamblers can and have been rounded up,
and wondered aloud if the Justice Department isn't
conducting more a publicity war than one on organized crime. A Times report this year found the government was building up a backlog of gambling indictments, saving them for a crucial time during the
election campaign.
40

Hogan himself is a long-time syndicate attorney
and a partner of Ben Cohen, a former political boss
of Miami Beach who figures prominently in the Forties' takeover of Miami by organized crime. The
case in which Hogan made his discovery involved the
busting of the largest heroin/cocaine ring in Miami,
many of whose members were Cuban refugees. Inspection of various court papers, including wiretap
authorizations, confirmed "irregularities" in the
signature -- Will Wilson's signature. While resembling his actual handwriting, the signatures appeared as "Wil" instead of "Will".
While it may seem strange for an aide to misspell
his boss' name, it seems even stranger that Hogan
took the case. His normal fees start in five figures but he has been working on behalf of his courtdeclared indigent client for more than two years
with minimal compensation. While Hogan is known as
a "very thorough" attorney, it would be interesting
to find out more abo~~ the circumstances in which he
discovered the "irregularities".
Even more interesting, perhaps, are the circumstances under which Richard Kleindienst was offered
a bribe of $100,000 to qu~sh several mob indictments
In sworn testimony in November 1971, Kleindienst admitted to being offered the $100,000 bribe (which would
be paid in the form of a contribution to Nixon's
1972 campaign) in exchange for stopping prosecution
against several underworld figures caught in a stock
fraud case. The bribe was offered by an aide of
Senator Hiram Fong, a Republican from Hawaii. The
aide had worked previously with Kelindienst through
Fong's position on the Senate Judiciary Committee.
Kleindienst said he refused the offer but he also
said he did not realize it was a bribe for an entire
week I
In cross examination, the prosecutor asked Kleindienst, "If you had regarded the conversation as
something regarding a bribe offer you would have immediately report it, would you not?"
"Yes sir," replied Kleindienst, "I would have."
Kleindienst admitted he reported the bribe a full
week later, upon learning from J. Edgar Hoover that
Federal agents were investigating the case.
One would expect the Attorney General of the
United States to be more alert. But what is more
troubling are reports aired in the Washington Post
COMPUTERS and AUTOMATION for November, 1973

shortly after the indictments in the stock fraud
case in question (and ten months before Kleindienst's testimony on the bribe); Those reports
quoted "sources at the UoS. Attorney's office in New
York" and indicated that after the meeting between
Kleindienst and Fong's aide, "Kleindienst immediately contacted Justice's Criminal Division [then
headed by Will Wilson] and ... an FBI agent was assigned to infiltrate the group of alleged conspirators" .
Do we now believe Kleindienst's story that he
"didn't realize" he had been offered a bribe, or
do we believe the U.S. Attorney's office in New
York? Did Will Wilson and the Justice Department
hold off a week while Kleindienst '~ade up his
mind" that he had been offered a bribe, or was the
decision whether or not to take it? And did Hoover
and the FBI somehow interfere?
Perhaps the answer comes in the final outcome of
the actual prosecution involved. The defendants in
the stock-fraud case included Meyer LanSky's son-inlaw, a former director of the Bank of Miami Beach
and Johnny Dio, a notorious racketeer long associated with Jimmy Hoffao They were acquitted, while
the messengers who offered the bribe were convicted.
One wonders if that $100,000 did not find its way
into the Republican secret treasury after all.
The Tip of the Iceberg
'~he organized criminal relies on physical terror
and psychological intimidation, on economic retaliation and political bribery, on citizen's indifference and government acquiescence. He corrupts our governing institutions and subverts our
democratic processes."
-- Richard Nixon, April 24, 1969

Someone should tell President Nixon that resisting the power of organized crime demands, above all,
a President with a clean slate.
Nixon's life is like a complex jigsaw puzzle, the
pieces of which have been shuffled so as to defy
complete reconstructiono Some of the crucial pieces
have been removed, so a full picture cannot be
achieved. It is no accident that no other politician has been so much written about, yet so little
understood.
Indeed, much has been made of the "enigma" of
Richard Nixon, his tight-lipped bearing in relation
to his personal life, his unwillingness to divulge
What's really on his mind.
But maybe the answer to the enigma lies in his
old poker-playing instincts, in the unfailing ability to keep quiet when he's sitting on cards best
hidden from the table.
For there is one indisputable fact about Richard
Nixon's career -- his ascendancy to the pinnacle of
American power has required twenty-five years of
care and feeding by some very wealthy and very reactionary men, and an extraordinary number of them
have maintained connections with the world of organized crime.
During Nixon's years in office the underworld empire in the United States has prospered almost unrestricted by the Federal government. From its base
in the gigantic resources of heroin traffic, gambling, prostitution, "protection," and a host of
other enterprises of violence against society, organized crime has moved like a bulldozer into the
world of legal, "respectable" business.
COMPUTERS and AUTOMATION for November. 1973

Every link between Richard Nixon and organized
crime, however marginal, is of significance, if for
no other reason because he is President. And there
are people allover America, from government intelligence agents to hotel waiters, who have Nixon
stories to tell. He covers his tracks well, but not
well enough.
The full extent of Nixon's involvement with organized crime is just beginning to surface. The
evidence in this article is merely the top of a
dirty iceberg that will slowly become visible over
the coming years.
The milieu in which he has traveled for three
decades, and in which so many of his friends, associates, and appointees have been related to the
mob, throw a long and permanent shadow over everything Richard Nixon the "public servant" has ever
said, and over everything his political life has
ever meant.
For in light of his career, both past and present, Richard M. Nixon seems to be the factual embodiment of Ralph Salerno's prediction that organized crime would someday put its own man in the
White House.
[]
The information in this article was gathered
during a six-month investigation carried out in
many cities, primarily Miami, New York, Washington,
D.C., Los Angeles, San Diego, Las Vegas, Dallas,
Austin, Galveston, Tallahassee, and San Francisco.
Sources included interviews with over a hundred
people; court documents (including deeds, mortgages,
etc.); research in the National Archives, WaShington, DoC.; organized crime intelligence files (both
private and government); and newspaper clippings.

Unsettling, Disturbing, Critical
Computers and Automation, established 1951 and
therefore the oldest magazine in the field of computers and data processing, believes that the profession of information engineer includes not only
competence in handling information using computers
and other means, but also a broad responsibility,
in a professional and engineering sense, for:
The reliability and social significance of
pertinent input data;
The social value and truth of the output
results.
In the same way, a bridge engineer takes a professional responsibi li ty for the reliabi li ty anel
significance of the data he uses. and the safety
and efficiency of the bridge he builds, for human
beings to risk their lives on.
Accordingly, Computers and Automation publishes
from time to time articles and other information
related to socially useful input and output of data
systems in a broad sense. To this end we seek to
publish what is unsettling, disturbing, critical
-- but productive of thought and an improved and
safer "house" for all humani ty, an earth in which
our children and later generations may have a future, instead of facing extinction.
The professional information engineer needs to
relate his engineering to the most important and
most serious problems in the world today: war,
nuclear weapons, pollution, the population explosion, and many'more.

41

ACROSS THE EDITOR'S DESK
Computing and Data Processing Ne·wsletter
Table of Contents

APPLICATIONS

National American Bank Installs ComputerBased Security System
Nova Computer Checks Strength of Roof in
Coal Mine
Phone Books by Computer

42
42

Ballpoint Pen Under Development

45

MISCELLANEOUS
43

APPLICATIONS
NATIONAL AMERICAN BANK INSTALLS
COMPUTER-BASED SECUR ITY SYSTEM

Tom Burbank
National American Bank
200 Carondelet
New Orleans, La. 70130

A computer-based system designed to prevent unauthorized access to high security areas has gone
into operation at National American Bank here --one of the first U.S. banks to install such a system. The IBM Controlled Access System (CAS) at National American is based on the use of magnetically
ericoded, wallet-sized identification cards similar
to bank credit cards.
Each person authorized to enter a security area
is assigned a card coded with his own security number. Employees seeking entry to an area covered by
the system simply insert their cards into .compact
reading devices on entrance doors, and. the information is transmitted to an IBM System/7 computer for
identification.
Stored in the computer's memory is a list of employee numbers and building areas these numbers are
designated for. If the number of the card entitles
the bearer access to that area, the computer signals
the door to unlock. If the person is unauthorized
to enter, the door remains closed and a security
guard is notified. The elapsed time is approximately
one second.
If a card is lost or stolen, a new card (with a
new number) is issued and the system is alerted to
deny entry to the original card. If the old card
is used, the guard is alerted.
As an additional safeguard, the system can automatically log all entrance activity by individual
security code, door number, date and time of day.
This helps track who is where and for how long.
National American can now analyze the number of
42

44
44

RESEARCH
"Talkin~('

EDUCATION NEWS

Digjtal,Equipment Corp. Computer Aids M.I.T.
Music Project

Composing by Computer at ISU
Student Programs Computer for Remedial
Instruction

ICCP Names Directors and Officers
IFIP Congress' 74 Travel Grants

45
47

.,

times ?n individual enters and at what time of day
or night this activity occurs. The system also has
built-in failsafe mechanisms which insure security
in the event of a power failure.
"Unfortunately. we are doing business in a time
when public and private institutions are increasingly vulnerable to lawless elements," said National
American President Louie J. Roussel III. "By adding
the IBM Controlled Access System to our current security procedures, we are taking a major step to insure that our customers and employees are protected.
And, by controlling access to the collateral instrument storage areas, we can make it very difficult
for unauthorized people to gain access to valuable
assets stored in the bank."
NOVA COMPUTER CHECKS STRENGTH
OF ROOF IN COAL MINE

Edgar E. Geithner
Data General Corp.
Southboro, Mass. 01772

Data General's minicomputers track hurricanes
from airplanes for the U.S. Air Force; the Army has
mounted them in helicopters; Scripps Oceanographic
Insti tute has one ;on a ship; a scienti st bounces
over Canadian glaciers with one mounted in his
tracked vehicle; and an oil company uses one of the
computers to control an oilfield in the Libyan desert. Now engineers at the University of Texas (Austin) have a minicomputer in the bottom of a mine.
Dr. A. L. Podio, an assistant ,professor in the
university's Department of Petroleum Engineering,
and a team of researchers from the Center for Earth
Sciences and Engineering, use a Nova'82~ computer to
detect possible weak spots in the roofs of mines.
The computer system, developed for the U.S. Bureau
of Mines, has been on the job on thel floor of Kaiser
Corporation's York Canyon coal mine in New Mexico.
"One of the most frequent causes of mine accidents
is roof. collapse," Dr. Podio said. "This system was
de~igned to use the principles of seismic explorations to identify failure planes and fracture zones
in the rocks overlaying the mine roof. If tests
COMPUTERS and AUTOMATION for November, 1973

(

show the area around a roof is weakening, it can be
supported by beams or roof bolts."

new listings and monthly reprints f~r the telephone
companies' directory assistance operators.

In seismic exploration, a high energy explosion
is set off, and sensitive instruments determine the
structure and makeup of surrounding land by recording how fast the shock waves travel through the
ground. The.waveforms can be int~rpreted to pinpoint probable deposits of oil, and to describe rock
formations. "Using a large energy souce like an explosion in a mine is out of the question," Dr. Podio
said, "so a manually controlled impact device was
designed to generate the shock waves." The impact
device, which works like a BB gun, uses air pressure
to shoot a round projectile at a striker plate
mounted at the end of the barrel.

Although customers may see no obvious differences
in the computer-produced directory, listings are
easier to read and pages cleaner looking. The directories also have uniform abbreviations. The system has built-in cross-checks for consistent spelling of street names and for obvious errors in street
and telephone numbers. There also is provision for
massive directory listing changes, caused by renaming of streets and buildings.

When the striker plate is pressed against the
wall or roof of the mine and the device is triggered,
shock waves are ~ent through the surrou~ding rock.
The shock waves are picked up by wideband transducers, digitized by a fast transient recorder, and
processed through the Nova 820 for waveform enhancement. The waveform is then displayed on an oscilloscope, with the results of velocity and depth calculations. Permanent records of the waveform can be
made on paper tape, or by transmitting the data to a
large scale remote computer.
"A mine could make daily checks with the system
to detect changes in rock strata as the working face
of the mine advances," Dr. Podio said, "or the system could be transported throughout the mine to make
daily checks on the condition of roofs at predetermined key locations." Dr. Podio noted that similar
systems could be used to predict the quality of rock
in rapid excavation projects or could be used in
nondestructive tests of large concrete structures.
PHONE BOOKS BY COMPUTER
Peter A. Cassels
Bell Telephone Laboratories
Mountain Ave.
Murray Hill, N.J. 07974

The Bell System is using computer technology to
modernize production of the White Pages telephone
books. A system designed to improve customer service, control costs and streamline massive recordkeeping operations is now being implemented. The
system -- called DIR/ECT (for DIRectory projECT) -was developed by Bell Laboratories, the research
and development unit of the Bell System. Michigan
Bell Telephone Company recently issued its first
directory containing listings produced by the system. Michigan Bell also is using the system to
produce some of its directory assistance records.
DIR/ECT is a more sophisticated outgrowth of its
prototype, PHOTAC, a similar process developed by
the New York Telephone Company under sponsorship of
the nationwide Bell System. The first directory
produced by the PHOTAC system was distributed in
1966. Since then, New York Telephone has converted
some 4.5 million listings to the process. Currently
the 12 major downstate White Pages directories are
produced by PHOTAC.
The DIR/ECT system stores in a computer memory
directory information such as the customer's name,
address, telephone number -- even telephone book
delivery instructions. The information in the computer memory then is fed into a device called a
photocomposer, which provides ready-to-print listings for White Pages. Besides the annual White
Pages directories, DIR/ECT produces daily updates of
COMPUTERS and AUTOMATION for November, 1973

Today, listings for phone directories are generally set line-by-line in metal type. Changes in
listings must be reset and inserted by hand. With
the new system, changes can be made quickly (because
information is stored on magnetic computer tape and
not metal type), the need to store tons of lead type
will end, and the growing cost of publishing directories will be lessened.
EDUCATION NEWS
M.I.T. MUSIC PROJECT USES DEC COMPUTER
News Office
Massachusetts Institute of Technology
Cambridge, Mass. 02139

The Massachusetts Institute of Technology has begun work on a project aimed at making the Institute
a major center for the study and composition of
electronic music. Barry Vercoe, assistant professor
of music, working with a computer given to the Department of Humanities' music section by Digital
Equipment Corp. of Maynard, is in the early stages
of developing a major electronic music production
facility at the Institute.
Professor Vercoe said the computer facili ty "will
be a tool both in the hands of the teacher and the
composer that will greatly aid the development of
creativity. The facility also will provide an excellent tool in the teaching of musical composition
for conventional instruments.
"This is definitely not a scientific project. I'm
not interested in merely getting a computer to sound
exactly like a trumpet. The technological application, however, will interest some students who might
not approach music otherwise and some of these will
be drawn into its aesthetic considerations, through
the back door as it were," Professor Vercoe said.
Why compose music for a machine at all?

"I suppose someone asked that very question when
man first composed music for what are now tradi tional
instruments, instead of for the human voice alone,"
Professor Vercoe said. "Electronic music merely expands the forces available to the practicing composer."
The PDP-ll/45 computer -- coupled with music input -- also will lend itself to other forms of music
research, such as syntactic analysis of music structures.
Professor Vercoe is the author of the widely used
Music 360 language for digital sound synthesis. He
has taught at M.I.T. for two years and is director
of the Experimental Music Studio. His work, "Metamorphoses for OrChestra," was given its Boston premier early this year by the M.I.T. Symphony and was
performed by the orchestra on its subsequent nation-

43

wide tour. Working with Professor Vercoe on the
project are Richard J. Steiger, a graduate student,
and Stephen Haflich, a recent M.I.T. graduate.

tric and a National Science Foundation institutional
grant of $8,698. The prototype employs a mini-computer that is owned by Iowa State.

COMPOSING BY COMPUTER AT ISU

The studio will be used as a teaching tool for
the ISU music program. Computer software, the programs (sequences of operations to be performed by
the computer) written for the system, will be developed so a composer can use the studio equipment
without having prior knowledge of computer programming. Students will be able to learn basic acoustical concepts and principles of electronic music synthesis and to develop sensitivity to timbre with the
ISMUS. Also contributing to introductory computer
science courses, ':the system wi 11 be a novel example
of computer application in a non-scientific field.

Information Service
Iowa State University of Science and Technology
Ames, Iowa 50010

Music composers at Iowa State University may turn
from their piano keyboards and hand-written scores
to a more efficient instrument for composing musjc
-- a computer. ISU faculty members are b~ilding a
computerized electronic music studio -- a system
that will technologically simplify composing electronic music. The studio is being designed and
built by an interdisciplinary group from Iowa
State's music, computer science, and electrical engineering departments, under the direction of ~tefan
Silverston, assistant professor of computer SCIence,
Terry Smay, professor of electrical engineering, and
Gary White, associate professor of music.
Electronic music is produced by purely electronic
means and the Iowa State Computerized Music System
(ISMUS) will be doing just that -- generating music
with computer equipment. A composer will sit at the
computer and write a musical composition using an
electronic keyboard.
The new system, which was expected to be operable
this fall, should be an easier method of modifying
and editing a musical piece. The normal hand operations of changing notations on a printed score or
splicing tapes of recorded music are "more timeconsuming and inaccurate" processes for correcting
a composition, according to Gary White.
The computer composing process begins when the
composer inserts introductory instructions into a
teletype machine. On an electronic keyboard he then
begins to compose his piece. The computer records
all musical instructions which are transformed
through a digital-to-analog sound converter and
loudspeaker into sound. This immediate feedback
system enables the composer to hear what he is composing simul taneously. The computer also allows· the
composer to automatically play back and edit what he
has written simply by striking another key.
The musician has now completed one" layer" of
music. If he wants to add further musical instructions to the composition, he repeats the entire process again. All layers merge together to obtain the
product -- a completed electronic composition.
The music instructions which the composer inserts
into the system are a special electronic music notation -- a "computer language." The English words it
uses can ,be compared to musical notation found on a
conventional score -- treble and bass clefs, notes,
rests, and the like.
Electronic music has been used in commercial recordings, and as background music for television,
radio and film. The rowa State system will be sophisticated enough for use in serious compositional
study, the production of background music for various media, and for the demonstration of sound properties.
The ISMUS presently being built is a protytype of
a full-scale model. If the "test-system" proves
satisfactory. "we will look for funding to build a
full-scale model," says White. The project is presently supported by a $1,170 grant from Western Elec44

STUDENT PROGRAMS COMPUTER
FOR REMEDIAL INSTRUCTION
Edward J. Canty
Digital Equipment Corp.
Maynard, Mass. 01754

Using programs developed by a local high school
student, School District 91 in Idaho Falls, has put
its newly-acquired computer to work as a "super
tutor" in remedial studies for disadvantaged children in this southeastern Idaho community. Designed
to improve the arithmetic and language arts skills
of children in grades 2 through 6, the project was
introduced by director of curriculum Dr. Wallace
Manning with federal Title I aid during the district's 1973 summer session for children largely
from rural farm families. According to John A.
Christensen, computer sciences coordinator, the
project proved so successful in its initial application that it has been continued in the fall seniester.
The student programmer is Robert Huntsman, 18, a
June graduate of Idaho Falls' Skyline High School.
Using the district's PDP-ll/20 timesharing computer
system installed last December by Digital Equipment
Corporation, Huntsman developed programs for arithmetic and language drill to serve between 40 and 50
pupils on each of two teletypewriter terminals situated in local elementary schools.
In a typical arithmetic routine, the computer
types a problem and waits for the pupil's response
-- ten seconds if the problem is a memory exerci se ,.
longer if it involves several columns for addition
or several digits for multiplication. If the student's answer is correct, Huntsman's program directs
the terminal to ring a bell in congratulation; if
incorrect, the computer supplies a hint on where the
mistake occurred and encourages him to try again.
Answers to English and social studies workbook
questions have been entered in the computer memory,
allowing students to do their homework at a terminal
and receive immediate response. The computer keeps
score of right and wrong ~nswers to produce reports
for teacher guidance. Spelling-recognition exercises are also in use and Huntsman has undertaken
development of an arithmetic program involving fractions
"One of the computer's major advantages is its
ability to pay attention to individual children,"
Chri stensen said. "Every child enrolled in the
regular summer session was able to get experience
at a terminal and benefit from these interactive
programs." He said high school laboratory assistants will continue to write instructional programs
for elementary and junior high levels, expanding the
library begun by Huntsman. For future summer sesCOMPUTERS and AUTOMATION for November. 1973

sions, he added, the district hopes to make such
computer assistance available at a nearby rural elementary school attended by children of migrant farm
workers.

RESEARCH FRONTIER
''TALKING'' BALLPOINT PEN UNDER DEVELOPMENT
Ronald I. Deutsch
Stanford Research Institute
Menlo Park, Calif. 94025

A prototype model of a simple, inexpensive "talking" ballpoint pen, under development at Stanford
Research Institute (SRI), could reduce massive paperwork and delay in routine business transactions.
The pen is similar to an ordinary pen in size and
shape except that it is wired to a computer system.
The computer is programmed to receive signals generated instantaneously as a person hand-prints characters with the pen to record information.
"Such instantaneous and remote processing of data
might be invaluable to large businesses engaged in
daily consumer-oriented services, such as banks, insurance companies and uti Ii ties," says staff scientist Dr. Hewitt D. Crane, the inventor. For example, the pen could be used by a bank teller crediting a savings or checking account. In this case,
according to Dr. Crane, the data would not have to
be retranscribed from a piece of paper by another
employee, or the paper itself put through expensive
automatic reading equipment. Thus, costs·and delays could be reduced in crediting accounts or establishing cash requirements.
In another case, a meter reader making his rounds
for a utility could use the pen in combination with
a cassette recorder. When he returned to his office, the cassette tape would be programmed into the
system, thus eliminating the need for manual retranscription of a day's worth of data.
In the present laboratory version, the pen is
hooked to an audio unit as well as a teleprinter,
so that as a person writes, the characters appear on
the teleprinter and are spoken by the audio unit.
SRI holds a patent on the pen and is currently
seeking financial support for further development,
Dr. Crane says. He estimates that the pen itself
might cost about $25 to $50. A central computer
unit would be extra but could serve many pens.

MISCELLANEOUS
ICCP NAMES DIRECTORS AND OFFICERS
Paul M. Pair, Secretary & Chairman
Institute for Certification of Computer Professionals
P. O. Box 1442
Chicago, III. 60690

At a meeting in late September, the incorporators of the Institute for Certification of Computer
Professionals, Chicago, Ill., adopted bylaw& for
the newly-formed organization and named a board of
directors which, in turn, held its first meeting and
elected officers. The ICCP is the outgrowth of over
two years of intensive preparation and study by representatives of major computing societies. Its primary focus is the enhancement of certification acCOMPUTERS and AUTOMAnON for November. 1973

tivities in the computing industry.
porated August 13, 1973.

It was incor-

Elected as officers by the board of directors
were:
President -- John K. Swearingen, Computer Sciences Corp., Las Vegas, Nev., representing
Data Processing Management Association CDPMA).
Vice President -- Fred H. Harris, University of
Chicago, Association for Computing Machinery.
Treasurer -- William S. Eick, Alexander Grant
& Co., Chicago, Associatfon of Computer Programmers and Analysts.
Secretary -- Paul M. Pair, Control Data Institute,
Chicago, Association for Educational Data
Systems.
Ten professional societies participated in the
organization of ICCP and are eligible for charter
membership. Of these, seven have exercised their
right to such membership, and are entitled to two
members on the ICCP board. The seven charter members are: Association of Computer Programmers and
Analysts; Society of Certified Data Processors; Association for Computing Machinery; Association for
Educational Data Systems; Society of Professional
Data Processors; Data Processing Management Association; and Automation 1 Association.
The other three associations eligible for charter
membership are: Canadian Information Processing Society', the Computer Society of the Insti tute of
Electri~al and Electronics Engineers and the Society
of Data Educators. 1hey are expected to act before
the end of 1973.
(please turn to page 47)

45

NEW CONTRACTS
Sanders Associates, Inc.,
Nashua, N.H.

CAE Electronics,
Montreal, Canada

ITT Creed Limited,
Great Britain

British Post Office

Univac Div., Sperry Rand
Corp., Blue Bell, Pa.

Auto Tell Services, Inc.,
Vi 11 anova, Pa.

Computer Sciences Corp.,
El Segundo, Calif.

National Aeronautics and Space
Administration (NASA)

Honeywell, Inc.,
Wellesley Hills, Mass.

State of Arizona,
Phoenix, Ariz.

Computer Sciences Corp.,
El Segundo, Calif.
Philco-Ford Corp.
Willow Grove, Pa.

National Aeronautics and Soace
Administration (NASA)
.
U.S. Army Electronics Command,
Fort Monmouth, N.J.

Raytheon Data Systems,
Norwood, Mass.

Eastern Air Lines, Miami,
Fla.

National Cash Register
Co., Dayton, Ohio

Publix Super Markets, Inc.,
Lakeland, Fla.

Computer Sciences Corp.,
El Segundo, Calif.
Interdata, Inc.,
Oceanport, N.J.

National Aeronautics and Space
Administration (NASA)
DATRAN (Data Transmission Co.),
Vienna, Va.

McDonnell Douglas Automation
Co. (MCAUTO), St. Louis, Mo.

Buffums'
Southern California

Informatics Inc., Western Div.,
Canoga Park, Calif.
Logicon, Inc., Torrance,
Calif .

Illinois Bell Telephone Co.,
Chi cago, Ill.
U.S. Air Force

TRW Inc., Redondo Beach,
Calif.

Los Angeles County Road
Department (LACRD), Calif.

Systems Engineering Laboratories, Inc., Ft. Lauderdale,
Fla.
Boeing Commercial Airplane
Co., Renton, Wash.

Singer Simulation Products,
Div. of Singer Co.
Manufacturing Technology Div.,
A.F. Materials Labs., Wright
Patterson AFB, Ohio
Arkansas State Educational
Television Commission

Di splay system segment of Canadian Joint En- 18.6 million
route Terminal System (JETS) Program; first
phase consists of seven Enroute and two
Terminal Systems for air traffic control
$11 mi Ilion
6000 machines -- teleprinters and associated equipment -- to be used mainly for
Telex customer-to-customer teleprinter
system
$7 mi Ilion
1100 Uni vac DCT-515 Data Communications Terminals to be used by automobile dealers who
subscribe to ATS services on-line computerized services
$6.7 million
Computer services support toSimulator Computer System Branch at Ames Research Center,
Mountain View, Calif.
$5+ mi Ilion
A Honeywell Multics (Multiplexed Information and Computing Service) system, for
use by 13 state agencies
Engineering and related services to NASA's
$5 million
(approximate)
Wallops Station, Wallops Island, Va.
$4.6 mi Ilion
Improving computerized communications network, identified as '73 AEP for AUTODIN Enhancement Program, at. 10 overseas AUTODIN
sites, Ft. Monmouth, N.J., and Fort Detrick, Md.
$2+ million
Data display terminals and associated equipment as part of expansion of EAL' s Automated
Passenger Processing and Reservation System
$2 million
30 NCR 255 supermarket checkout systems in(approximate)
voiving a total of 357 NCR 255 terminals
and 30 NCR 726 in-store minicomputers plus
120 NCR 250 free-standing electronic cash
registers
$1. 2 mi Ilion
Analysis and programming services to Langley Research Center, Hampton, Va.
Dual processor Model 55 data communications $1+ mi Ilion
concentrators, with software and technical
support, for an information network DATRAN
is designed and installing on a turnkey basis
for International Brotherhood of Teamsters
$725,000
Computer processing of all company data;
(approximate)
includes accounts payable, receivables,
sales analyses, payroll, inventory control and statistics
$500,000+
Design and applications programming support for a new payroll/personnel system
Verifying and validating (V&V) cri tical mis$365,000
sile flight safety (MFS) software used on
western test range of Space and Missile Test
Center (SAMTEC), Vandenberg AFB, Calif.
$365,000 .
Designing Integrated Information Management (IIMS); 10 subsystems cover accounting; billing; budgets; management of contracts, and projects, inventory control,
production and performance, and road inventory information
$330,000
Central control and simulation element of
a Nuclear Plant Simulator for Carolina
Power & Light Co., Raleigh, N.C.
$251,000
Developing Air Force Computer Aided Manufacturing (AFCAM) master plan

Bunker Ramo Corp., Trumbull,
Conn.

Reliance Federal Savings &
Loan Asso. of New York,
Jamaica, N.Y.

Collins Radio Co., Dallas,
Texas

U.S. Air Force

Diablo Systems, Inc.,
Subsidiary of Xerox Corp.
Hayward, Calif.
MRI Systems Corp., Austin,
Texas

Wang Laboratories, Tewksbury, Mass.

$37,000
Engineering studies and detailed plans for
four new ETC (Educational Television) stations, and an interconnecting microwave network
31 BR 2001 Universal Teller Terminals for
equipping teller stations in all nine Reliance offices; terminals will be tied by
highspeed communications circuits to a
Univac 9480 computer
Continuing development of systems and equipment for the U.S. Air Force Satellite Communication System (AFSATCOM); eventual production awards, depending upon Air Force requirements, could total more than $125million
Series 40 disk drives to be incorporated
into Wang's new line of mini computer systems

U.S. Dept. of Agriculture,
Washington, D.C. and New
Orleans, La.

Lease of SYSTEM 2000 for Farm management applications; at least nine SYSTEM 2000 data
bases are planned for implementation thi s year

Atlantic Research Corp.,
Alexandria, Va.

46

COMPUTERS and AUTOMATION for November. 1973

(

NEW INSTALLATIONS
Uurroughs B 4700 system

Computer Management Group (CMG)
Ltd., North-west London, England

Walter E. Heller & Co., Chicago,
Ill.
(2 systems)
Control Data CYBER 70 Model 74
system

Century Research Center Corp.
(CRC) , Tokyo, Japan

Control Data CYBER 70 Model 76
system

Atmospheric Environment Service
of Canada, Montreal, Canada

Control Data 3150 system

Ingalls Iron Works Co., Birmingham, Ala.

IBM System 370 Model 155 system

Educational Information Services
(EIS), Princeton University,
Princeton, N.J.
Datacrown Limited, Willowdale,
Ontario, Canada

IBM System/370 Model 168 system

Interdata Model 70 systems
NCR Century 101 system
NCR Century 200 system
NCR Century 251 system
Univac 1106 system

U.S. Army Electronics Command,
Fort Monmouth, N.J.
(2 systems)
Radyne Limi ted,
Great Bri tafn
Green Shield Trading Stamp Company of Edgware, Colindale, England
Columbia EDP Centers, Inc.,
Columbia, Mo.
British Gas Corp., Hinckley,
England

University of Connecticut Medical
Center, Farmington, Conn.

Univac 1110 system

Pacific International Computing
Corp., Gaithersburg, Md.

pnivac 9480 system

Reliance Federal Savings & Loan
Asso. of New York, Jamaica, N.Y.

Across the Editor's Desk - Continued from page 45
IFIP CONGRESS '74 TRAVEL GRANTS
P. E. Welch

U.S. Committee for IFIP Congress 74
Box 426
New Canaan, Conn. 06840

The National Science Foundation will support a
travel grant program for attendance at IFIP Congress
74 to be held August 5-10, 1974, in Stockholm. The
triennial IFIP (International Federation for Information Processing) Congresses have become the major
international media for exchange of information
among developers and users of information processing
techniques and technology.
COMPUTERS and AUTOMATION for November, 1973

The first of two B4700 systems (which are included
in a five-system order) to be installed at CMG's
North-west London, England center
(entire 5 computer system order valued at $4.3
million)
Providing internal processing speed to keep pace
with continued growth of data processing operations;
system will allow expansion without reprogramming or
recompiling; replaces two Burroughs B3500 systems
Increasing CRC's processing capabilities toinclude
remote batch data processing services via high
speed communication line control devices, and offer
a wide range of services to various types of users;
system will be connected to a previously installed
CDC, 6600 computer
(system valued ai~$3 million)
Upgrading weather forecasting facilities throughout
the country; system installed at Canadian Meteorological Center in Montreal, Canada
(system valued at $6.3 million)
Expanding automated design activities; system will
operate in conjunction with a previously installed
CDC 3150 to support CONSTRUCTS, an automated enineerin desi n software acka e
Linking with university's IBM System 360 Model 91
to significantly expand a variety of data processing services
The first of two systems that will more than double
current batch processing capacity and increase its
capability to provide for transaction-oriented tetminals; replaces Model 165 currently in use
(systems valued at $12 million)
Use in experiments involving automated tactical
surveillance and target acquisition
An advanced inventory management and control system
(system valued at $6.3 million)
Expansion of automated stock control system for its
gift houses and new Argos chain of catalog showrooms
General data processing services to a variety of
customers including several banks
Assistance in controlling National Grid pipeline by
performing forward simulations on a real-time,
round-the~clock-basis; in addition~ system will act
as a service bureau to scientific and engineering
departments within the Corporation
All aspects of Medical Center's work including patient admissions, monitoring patient care, scheduling outpatient appointments, support of library information and research statistical programs, and
general accounting and payroll processing chores
(system valued at $1.3 million)
The first of two systems whose primary applications
include project management, engineering and business data processing; the system will also include
time-sharing capability as well as remote job entry
from terminals in the field
Faster customer service at any bank branch

The DivisiDn of Mathematical Sciences of the National Research Council will administer the program
and award grants to qualified people from the United
States whose accomplishments in and potential contributions to the field of information processing
are most noteworthy, regardless of the formal labels
for their specialties.
Younger members of the information science community are urged to apply. William F. Atchison of
the University of Maryland, Financial Support Chairman of the U.S. Committee for IFIP, said that special efforts will be made to support their attendance.
Applications may be obtained through the Math Division, National Research Council, Washington, D.C.
20418. Applications must be received on or before
December 31, 1973.
47

MONTHLY COMPUTER CENSUS
Neil Macdonald
Survey Editor
COMPUTERS AND AUTOMATION
The following is a summary made by COMPUTERS AND AUTOMATION of reports and estimates of the number of general purpose digital computers
manufactured and installed, or to be manufactured and on order. These
figures are mailed to individual computer manufacturers quarterly for
their information and review, and for any updating or comments they
may care to provide. Please note the variation in dates and reliability of the information. A few manufacturers refuse to give out,
confirm, or comment on any figures.
Part 1 of the Monthly Computer Census contains reports for United
States manufacturers, A to H, and is published in January, April, July,
and October. Part 2 contains reports for United States manufacturers,
I to Z, and is published in February, May, August, and November.
Part 3 contains reports for manufacturers outside of the United States
and is published in March, June, September, and D"ecember.
Our census seeks to include all digital computers manufactured anywhere. We invite all manufacturers located anywhere to submit inforthat would help make these figures as accurate and complete as possible.

The following abbreviations apply:
(A) -- authoritative figures, derived essentially from information
sent by the manufacturer directly to COMPUTERS AND
AUTOMATION
C
figure is combined in a total
(D)
acknowledgment is given to DP Focus, Marlboro, Mass., for
their help in estimating many of these figures
E
figure estimated by COMPUTERS AND AUTOMATION
(N)
manufacturer refuses to give any figures on number of installations or of orders, and refuses to comment in any
way on those numbers stated here
(R)
figures derived all or in part from information released
indirectly by the manufacturer, or from reports by other
sources likely to be informed
(S)
sale only, and sale (not rental) price is stated
X
no longer in production
information not obtained at press time and/or not released
by manufacturer

SUMMARY AS OF OCTOBER 15, 1973
NAME OF
NAME OF
MANUFACTURER
COMPUTER
Part 2. United States Manufacturers I-Z
IBM
305
White Plains, N.Y.
650
(N) (D) (Oct. 1973)
1130
1401
l40l-G
l40l-H
1410
1440
1460
1620 I, II
1800
7010
7030
704
7040
7044
705
7020,
7074
7080
7090
7094-1
7094-II
System/3 Model 6
Sys tem/ 3 Model 10
System/3 Model 15
System/7
360/20
360/25
360/30
360/40
360/44
360/50
360/65
360/67
360/75
360/85
360/90
360/91
360/190
360/195
370/115
370/125
370/135
370/145
370/155
370/158
370/165
370/168
370/195
Interdata
Model 1
Oceanport, N.J.
Model 3
(A) (Oct. 1973)
Model 4
Model 5
Model 7/16
Model 7/32
Model 15
Model 16
Model 18
Model 50/55
Model 70
Model 74
Model 80
Model 85
48

DATE OF
FIRST
INSTALLATION

AVERAGE OR RANGE
OF MONTHLY RENTAL
$(000)

NUMBER OF INSTALLATIONS
Outside
In
In
World
U.S.A.
U.S.A.

12/57
10/67
2/66
9/60
5/64
6/67
11/61
4/63
10/63
9/60
1/66
10/63
5/61
12/55
6/63
6/63
11/55
3/60
3/60
8/61
11/59
9/62
4/64
3/71
1/70

3.6
4.8
1.5
5.4
2.3
1.3
17.0
4.1
10.0
4.1
5.1
26.0
160.0
32.0
25.0
36.5
38.0
27.0
35.0
60.0
63.5
75.0
83.0
1.0
1.1

40
50
2580
2210
420
180
156
1690
194
285
416
67
4
12
35
28
18
10
44
13
4
10
6
8
5

11/71
12/65
1/68
5/65
4/65
7/66
8/65
11/65
10/65
2/66
12/69
11/67,

0.35 and up
2.7
5.1
10.3
19.3
11.8
29.1
57.2
133.8
66.9
150.3

15
7161
1112
5487
2454
109
1135
604
65
50
11
5
1
13

4/71
4/73
5/72
9/71
2/71
-/73
5/71
-/73
6/73
12/70
5/67
8/68
11/70
-/74
-/74
1/69
5/71
6/71
5/72
10/71
2/73
10/72
6/73

15
18
1227
1836
450
140
116
1174
63
186
148
17
1
1
27
13
3
3
26
2
2
4
4

55
68
3807
4046
870
320
272
2864
257
471
564
84
5
13
62
41
21
13
70
15
6
14
10

6075
759
2535
1524
57
445
144
6
17
1

13236
1871
8022
3978
166
1580
748
71
67
12
15
9

232.0
8.2-13.8
14.4
23.3
48.0
49.5-85.0
98.7
93.0-170.0
190.0-270.0
3.7
13.1
8.5
X

20.0
X
X

NUMBER OF
UNFILLED
ORDERS

1780
1287
1363
39
662
562
99
12
55

48

1
13
2
2
1
3
1
244

75

274
70

115
20

319
200
389
90

40
1
2
75
466
41
15
1

24
6
7
10
116
8
3

64
7
9
85
582
49
18

X

32
X

X
X
X

115
107
126
20

COMPUTERS and AUTOMATION for November, 1973

NAME OF
MANUFACTURER
Microdata Corp.
Irvine, Calif.
~A2 ~Se12t. 1973)
NCR
Dayton, Ohio
(N) (R) (Oct. 1973)

Philco
Willow Grove, Pa.
~N2 pan. 1969)
Raytheon Data Systems Co.
Norwood, Mass.
(A) (July 1973)

Standard Computer Corp.
Los Angeles, Calif.
(A) (June 1972)
Systems Engineering Laboratories
Ft. Lauderdale, Fla.
(A) (Se12t. 19732
Texas Ins truments Inc.
Houston, Tex.
(A) (June 1973)
UNIVAC Div. of Sperry Rand
Blue Bell, Pa.
(A) (Aug. 1973)

UNIVAC - Series 70
Blue Bell, Pa.
(A) (Feb. 1973)

Varian Data Machines
Newport Beach, Calif.
(A) (Mar. 1973)

Xerox Data Systems
E1 Segundo, Calif.
(N) (R) (Oct. 1973)

DATE OF
AVERAGE OR RANGE
NAME OF
FIRST
OF MONTHLY RENTAL
COMPUTER
INSTALLATION
$(000)
0.1-0.5
Micro 400/10
12/70
0.2-3.0
Micro 800
12/68
0.2-3.0
12/71
Micro 1600
X
304
1/60
X
310
5/61
7.0
315
5/62
9.0
315 RMC
9/65
0.7
390
5/61
1.0
500
10/65
251
Century 50
1.6
2/71
Century 100
2.6
9/68
3.7
Century 101
12/72
7.0
Century 200
6/69
Centu;y 300
21.0
2/72
X
1000
6/63
200-210,211
X
10/58
2000-212
X
1/63
X
250
12/60
X
440
3/64
X
520
10/65
703
12.5
10/67
7.2
704
3/70
706
5/69
19.0
IC 4000
9.0
12/68
IC 6000-6000/E
16.0
5/67
IC 7000
17.0
8/70
IC-9000
400.0
5/71
SYSTEMS 810A/810B
6-66/9-68
1.8/2.6
SYSTEMS 71/72
8-72/9-71
0.9/1.0
SYSTEMS 85/86
7-72/6-70
6.0/10.0
960
X
6/70
960A
0.2-2.7
11/71
X
980
5/68
980A
0.3-2.7
8/72
9200
1.5
6/67
9300/9380
3.4
9/67
9400/9480
7.0
5/69
9700
418 III
6/63
11.0
494
1106
1108
68.0
9/65
1110
X
I & II
3/51 & 11/57
File Computers
X
8/56
LARC
135.0
5/60
1107, UIII, 490/1/2,
418II, 1004/5,
1050, SS80/90
X
301
2/61
7.0
501
14.0-18.0
6/59
601
14.0-35.0
11/62
3301
17.0-35.0
7/64
Spectra 70/15. 25
4.3
9/65
Spectra 70/35
1/67
9.2
Spectra 70/45
22.5
11/65
Spectra 70/46
11/68
33.5
Spectra 70/55
34.0
11/66
Spectra 70/60
32.0
11/70
Spectra 70/61
4/70
42.0
70/2
16.0
5/71
70/3
25.0
9/71
70/6
25.0
9/71
70/7
12/71
35.0
EMR 6020
4/65
5.4
EMR 6040
6.6
7/65
EMR 6050
2/66
9.0
EMR 6070
10/66
15.0
EMR 6130
8/67
5.0
EMR 6135
2.6
EMR 6145
7.2
EMR 6140
620
X
11/65
620i
X
6/67
R-620i
4/69
520/DC, 520i
12/69;10/68
620/f
X
11/70
620/L, 620/L-00C
4/71;9/72
620/f-100
6/72
620/L-100
5/72
Varian 73
11/72
XDS-92
4/65
1.5
XDS-910
8/62
2.0
XDS-920
9/62
2.9
XDS-930
6/64
3.4
XDS-940
4/66
14.0
XDS-9300
11/64
8.5
XDS-530
7.6
8/73
Sigma 2
12/66
1.8
Sigma 3
12/69
2.0
Sigma 5
8/67
6.0
Sigma 6
6/70
12.0
Sigma 7
12/66
12.0
Sigma 8
2/72
Sigma 9
35.0

COMPUTERS and AUTOMATION for November, 1973

(S)
(s)

(S)

(S)

NUMBER OF INSTALLATIONS
In
Outside
In
U.S.A.
World
U.S.A.
0
139
139
810
3737
2927
1009
914
95
2
7
5
0
8
8
200
455
255
90
55
35
325
485
160
2850
1100
1750
1
580
0
580
1958
1175
783
51
1
50
335
910
575
5
5
10
16
16
12
20
135
115
20
1
26
27
179
33
212
100
400
300
92
17
75
0
9
9
0
3
3
0
4
4
0
1
1
412
382
30
24
19
5
50
3
47

NUMBER OF
UNFILLED
ORDERS

X
X

X
X
X
X
X
X

0
40
1
2
1

X
X

1360
795
212
3
40
62
61
163
11
23
13
2

616
675
228
11
77
46
143
92
17

1976
1470
440
14
117
108
204
255
28

2063
143
17
0
74
18
95
265
30
10
18
7
63
7
24
7
15
6
15
7
34
36

1442

3505

X

1
0
2
8
13
5

16
6
17
15
47
41

0
0
0
0
0
4
8
0
X
X

43
170
120
159
33
25-30

4
10
12
14
3
4

75
1300
80
500
207
740
100
200
40
47
180
132
173
36
29-34

163
21
32
3
31
5
7

36
1
14

199
22
46

X
X

0

150
X

101
43
235
39

38

49

CAL.ENDAR 'OF C'OMING EVENTS
Nov. 28-30, 1973: 1st Annual Systems Engineering Conference,
Statler-Hilton Hotel, New York, N.Y. / contact: Technical Services, All E, 25 Technology Park/Atlanta, Norcross, GA 30071
Dec. 4-5, 1973: 1973 Vehicular Technology Conference, SheratonCleveland, Cleveland, Ohio / contact: Robert Wylie, Motorola
Communications, Inc., 12955 Snow Rd., Cleveland, OH 44130
Dec. 6-8, 1973: National Symposium on Computer Applications in
the Juvenile Justice System, Marriott Motor Hotel, Atlanta, Ga. /
contact: Lawrence A. Boxerman, Project Dir., National Council
of Juvenile Court Judges, Univ. of Nevada, Box 8000, Reno, NV
89507
Deco 9-11, 1973: Computer Architecture, Flagler Inn & Reitz
Union, Gainesville, Fla. / contact: G. Jack Lipovski, 229 Larsen
Hall, Univ. of Florida, Gainesville, FL 32601
Jan ..16-18, 1974: 3rd Annual All E-MHI Seminar, Marriott Motor
Hotel, Philadelphia, Pa. / contact: Technical Services, AilE, 25
Technology Park/Atlanta, Norcross, GA 30071
Jan. 16-19, 1974: Internepcon/Japan '74, Harumi Convention
Center, Tokyo, Japan / contact: Industrial & Scientific Conf.
Mgmt., Inc., 222 W. Adams St., Chicago, I L 60606
Feb. 12-14, 1974: Computer Science Conference, Detroit Hilton,
Detroit, Mich. / contact:
Seymour J. Wolfson, Computer
Science Section, Wayne State Univ., Detroit, MI 48202
Feb. 13-15, 1974: International Solid State Circuits Conference,
Univ. of Penna., Marriott Hotel, Philadelphia, Pa. / contact: Virgil Johannes, Bell Labs., Room 3E331, Holmdel, NJ 07733
Feb. 19-22, 1974: 3rd Annual National Communications Week
Convention, Chase-Park Plaza Hotel, St. Louis, Mo. I contact:
David C. Brotemarkle, Communications Systems Management
Assoc., 1102 West St., Suite 1003, Wilmington, DE 19801
Feb. 26-28, 1974: Computer Conference (COMPCON), Jack Tar
Hotel, San Francisco, Calif. / contact: Jack Kuehler, IBM Corp.,
P 35, Bldg. 025, Monterey & Cottle Rds., San Jose, CA 95114
Mar. 25-29, 1974: IEEE International Convention (lNTERCON),
Coliseum & Statler Hilton Hotel, New York, N.Y. / contact:
J. H. Schumacher, IEEE, 345 E. 47th St., New York, NY 10017
April 3, 1974: Minicomputers - Trends and Applications, Nat'l
Bureau of Standards, Gaithersburg, Md. I contact: Harry Hayman, 738 Whitaker Ter., Silver Spring, MD 20901
April 8-11, 1974: Computer Aided Design, Int'l Conference & Exhibition, Univ. of Southampton, Southampton, England / contact: Inst. of Civil Engrs., Great George St., Westminster, London SW1, England
April 9-11, 1974: Optical Computing Symposium, Zurich, Switzerland / contact: Samuel Horvitz, Box 274, Waterford, CT 06385
April 21-24, 1974: International Circuits & Systems Symposium,
Sir Francis Drake Hotel, San Francisco, Calif. / contact: L. O.
Chua, Dept. of EE, Univ. of Calif., Berkeley, CA 94720
April 21-24, 1974: 1974 Annual Assoc. for Systems Management
Conf., Dallas Convention Center, Dallas, Tex. / contact: R. B.
McCaffrey, ASM, 24587 Bagley Rd., Cleveland, OH 44138
May 5-8, 1974: Offshore Technology Conference, Astrohall, Houston, Tex. / contact: Offshore Tech. Conf., 6200 N. Central Expressway, Dallas, TX 75206
May 6-10, 1974: 1974 National Computer Conference & Exposition, McCormick Place, Chicago, III. / contact: Dr. Stephen S.
Yau, Computer Sciences Dept., Northwestern University, Evanston, I L 60201
50

May 13-17, 1974: European Computing Congress (EUROCOMP),
Brunei Univ., Uxbridge, Middlesex, England / contact: Online,
Brunei Univ., Uxbridge, Middlesex, England
May 13-17, 1974: International Instruments, Electronic and Automation Exhibition, Olympia, London, England / contact: Industrial Exhibitions Ltd., Commonwealth House, New Oxford St.,
London, WC1 A 1 PB, England
June 24-26, 1974: Design Automation Workshop, Brown Palace
Hotel, Denver, Colo. / contact: ACM, 1133 Ave. of the Americas, New York, NY 10036
June 25-28, 1974: 1974 Annual International Conference & Business Exposition, Minneapolis, Minn. / contact: Data Processing
Management Assoc., 505 Busse Highway, Park Ridge, IL 60068
July 15-19, 1974: 1974 Conference on Frontiers in Education,
City University, London, England / contact: Conf. Dept., Institution of Electrical Engineers, Savoy Place, London, England
WC2R OBL
July 23-26, 1974: Circuit Theory & Design, I EE, London, En~land
/ contact:
lEE, Savoy PI., London WC2R OBL, England
Aug. 5-10, 1974: I FIP Congress 74, St. Erik's Fairgrounds, Stockholm, Sweden / contact: U.S. Committee for IFIP Congress 74,
Box 426, New Canaan, CT 06840
Aug. 5-10, 1974: Medinfo 74, St. Erik's Fairgrounds, Stockholm,
Sweden / contact: Frank E. Heart, Bolt Beranek and Newman,
Inc., 50 Moulton St., Cambridge, MA 02138
Aug. 21-23, 1974: Engineering in the Ocean Environment International Conf., Nova Scotian Hotel, Halifax, Nova Scotia / contact:
O. K. Gashus, EE Dept., Nova Scotia Tech. Coli., POB 100, Halifax, N.S., Canada

ADVERTISING INDEX
Following is the index of advertisements. Each item
contains: product / name and address of the advertiser / name of the agency, if any / page number
where the advertisement appears.
COMPUTERS AND AUTOMAT/ON / Computers and Automation, 815 Washington St., Newtonville, MA 02160 /
page 52
ELECTRONIC RESEARCH CORP., 7618 Wedd, Overland
Park, KS 66204 / ERC Advertising / page 45
INSTRUCTIONAL FACULTY OPENINGS / College of
Petroleum & Minerals, c/o Saudi Arabian Educational
Mission, 880 Third Ave.-17th Floor, New York, NY
10022 / page 32
THE NOTEBOOK ON COMMON SENSE, ELEMENTARY
AND ADVANCED / published by Computers and Automation, 815 Washington St., Newtonville, MA 02160/
page 7
R/DE THE EAST W/ND: Parables of Yesterday and Today,
published by Quadrangle/New York Times Book Co. /
Computers and Automation, 815 Washington St., Newtonville, MA 02160 / pages 24, 25
WHO'S WHO /N COMPUTERS AND DA TA PROCESSING
/ jointly published by Quadrangle/New York Times
Book Co., and Berkeley Enterprises, Inc., 815 Washington St., Newtonville, MA 02160 / page 51
COMPUTERS and AUTOMATION for November, 1973

~~WHO'S

WHO IN COMPUTERS
AND DATA PROCESSING"
EDITION 5.2 = 5th EDITION + 2 SUPPLEMENTS ALREADY ISSUED

THE

MOST

ESSENTIAL COMPONENTS IN COMPUTERS
AND DATA PROCESSING ARE

PEOPLE
Who are they?

Consult

What do they do?
Where do they do it?

"WHO'S WHO IN COMPUTERS AND DATA PROCESSING"
jointly published by Computers and Automation (Berkeley
Enterprises, Inc.) and Quadrangle / New York Times Book Co.

We are confident that you will find the subscription
will repay you many times over. In fact, one day when
this wealth of material gives you the inside track with
someone important to you, you'll find the information
PRICELESS: the most essential component in EDP is
CAPABLE PEOPLE.

"Who's Who in Computers and Data Processing" has
been changed 'to a periodic subscription basis as follows:
1. The latest Cumulative Edition (the 5th edition
pu blished 197 1, con taining over 15,000 capsllle biographies, over 1,000 pages long, 3
volumes, hardbound) PLUS
2. Three Updating Supplements per period totaling
over 3.,000 entries
Both for $34.50 in any period when a cumulative
edition is supplied ... and $15.00 per period when a
cumulative edition is not supplied.

RETURNABLE IN 10 DAYS FOR FULL REFUND
(if not satisfactory)

r- - - - - - I
I

BASED ON continual data gathering from computer professionals carried out by Computers and Automation

YES, please enroll me as a subscriber to WHO'S WHO
IN COMPUTERS AND DATA PROCESSING at
the following rate:
$34.50 including the last cumulative edition

This reference is particularly useful for:
Personnel managers
Libraries
Conference planners
Directors of computer installations
Suppliers to the computer industry
Execut ive search organizations
Prospective authors
Prospective speakers ...
anyone who needs to keep up with the important people
in the field.

(may be copied on any piece of paper)- - - - - - - - -

WHO'S WHO IN COMPUTERS AND DATA PROCESSING
815 Washington St., Newtonville, Mass. 02160

OR
$15.00 since I already have access to the last cumulative edition
I understand that for each period of subscription I shall
receive three updating supplements, totaling over 3,000
entries.
) Please bill me.
) Payment enclosed
( ) Please bill my organization
RETURNABLE IN 10 DAYS FOR FULL REFUND
(if not satisfactory)

Each computer professional has a capsule biography
detailing: last name; first name and middle initial (if
any); occupation; year of birth; university education
and degrees; year entered the computer field; main
interests; job title; organization and its address; publications, honors and memberships; home address.

COMPUTERS and AUTOMATION for November, 1973

Name
Title
Organization
Address
City

State & Zip

Your Signature

P.O. No. (if company order)
51

i
I
I
I

WILL YOU HELP?

Please give us their names and addresses on the
form below or add anothe'r sheet of paper. Trim out the
card with scissors and drop it in the mail. We'll gladly
pay the postage to learn of possible new friends. And many
thanks for your help! As a token of our appreciation we'll
send you our ****Reprint .

Yes, you. It may come as a surprise that you'd be asked
. . . but as a reader of Computers & Automation you are
in a unique position to help us.

P.S. If you like you may mail your list separately to:
R. A. Sykes, Circulation Mgr.
Computers & Automation & People
815 Washington Street
Newtonville, MA 02160

NAMES ... people, institutions, companies who
should be interested in 1) the computer industry and/or
2) seeking truth in information are very much needed to
join you as readers of C&A.

Will you tell us who they are? And perhaps even more, will

cut here and tuck in flap

r--------------------------,
TO: R. A. Sykes, Circulation Mgr.
,,,
Computers & Automation & People
,,, I suggest you send information on C&A to ... (attach
list if you like)
,,, (1)Name ___________________________________
,
,, Address ____________________________________

you let us use your name in writing to them? But with or
without your name (we'll only use it if you grant permission)
we need to know those you think might be interested in also
reading C&A.

* *' * *'

1
1

reprint from

CD"'I?,,!ila~~~

=,:1,

cu,

City ____________ State _______ Z IP ______

,,,
,,,
,
,,

(2) Name ___________________________________

(,I,

'"'0

en

~

M

~

,i

U
I-

2

ci

2-

I-

I-

~
...J

CI)

a:

u::

CI)

'"'0

~

' !!!GI
'~

0

'"'0

CI)

:]

' c:

~ 0
a: m
w

U

Z

0..

UJ

c:

c,

0
Q)

"C
Q)

C.
ra

co

1;;

I
al

...J


...J

Cii
:::>
OJ

~

a:
UJ
CIl

0

~

Q..

Q)

~
u

Q)

c:

E

2

UJ

E

c.

W

..J

:=

a:
CI)
CI)

UJ

>CIl

0..

w

Z

~

...J



UJ

::a:

CJ
<{

I-

(/)

0

Q..

1

Ig

Ir+

I~

Address ____________________
City ____________ State _______ ZIP _____

May we use your name?

DYES

o

NO

1
1
1
1
1
1
1
1
1
1

1
1
1

YES,

,

here - do not cut

start my subscription to

COMPUTERS AND AUTOMATION AND PEOPLE

according to the instructions checked below,
One Year (including the Computer Directory and Buyers'
Guide 13 issues) U.S. only. 0 $23.50
One Year (excluding the Computer Directory and Buyers'
Guide 12 issues) U.S. only. 0 $11.50

Country if not U.S.: _ _ _ _ _ _ _ _ _ _ __
Signature: _ _ _ _ _ _ _ _ _ __
P.O. No .. _ _ __

Z

ZW

<{

1

Name: _______________
Title: ________
Organization: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Address: _ _ _ _ _ _ _ _ _ _ _ _ __
City: _ _ _ _ _ _ __
_ _ _ _ Zip: _____
State:

vi
~

1
1
1

, Please give us your name and address on the form below so we can
" send you your * * * * Reprint. Just cross out the subscription request
, - unless you also want to enter your new or renewal order~

: :E

~

1

I';

_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ~ut~er~ _ _ _ _ _ _ _ _ _ _ _ • ____________ Fold

....

1
1
1

~,

Science and the Advanced Society, by C. P. Snow, Ministry
of Technology, London, England (April 1966)
The Information Revolution and the Bill of Rights, by
Dr. Jerome B. Wiesner, M.LT. (May 1971)
Employment, Education, and the Industrial System, by
Prof. John Kenneth Galbraith, Harvard Univ. (Aug. 1965)
Computers and the Consumer, by Ralph Nader,
Washington, D.C. (Oct. 1970)

M

1

0

U

c

ca

an
t-


Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37
Producer                        : Adobe Acrobat 9.1 Paper Capture Plug-in
Modify Date                     : 2009:03:25 01:29:22-07:00
Create Date                     : 2009:03:25 01:29:22-07:00
Metadata Date                   : 2009:03:25 01:29:22-07:00
Format                          : application/pdf
Document ID                     : uuid:a1083e41-7def-4fcd-9f13-79a7fd3fd371
Instance ID                     : uuid:30f777e9-5b5a-4809-83c3-bc77b8bc4fad
Page Layout                     : SinglePage
Page Mode                       : UseNone
Page Count                      : 52
EXIF Metadata provided by EXIF.tools

Navigation menu