197412
197412 197412
User Manual: 197412
Open the PDF directly: View PDF  .
.
Page Count: 36

computers 
and 
people 
formerly 
Computers and Automation 
.. 
(:-
December, 
1974 
scrE~e{AND' 
sUs. 
NDESERT ROSEN 
Engineering  Computer Pro-
grams: 
How 
They 
Grow 
-A.  Marcos 
and 
S. 
L. 
Chu 
Changing  Technology and 
Medical  Specialization 
-
Ray 
M. 
Antley 
and 
Mary 
Ann 
Antley 
The Computer 
Industry 
and  Unionization 
-A.  A.  I mberman 
The  Radiation 
from 
Com-
puters  I 
nto 
Everywhere 
-
Neil 
Macdonald 
Watergate  South 
-Nancy A. 
Miller 
The Assassination 
of 
the 
Reverend  Martin  Luther 
King, Jr., Conclusion 
-Wayne  Chastain, 
Jr 
. 

INVENTORY 
OF 
THE 
36 
ISSUES 
OF  -
TITLES 
AND 
SUMMARIES 
THE 
NOTEBOOK 
ON 
COMMON 
SENSE, 
FIRST 
YEAR 
VOLUME  1 
1.  Right  Answers - A 
Short 
Guide 
to 
Obtaining 
Them 
A  collection 
of 
82 
principles 
and 
maxims.  Example: 
"The 
moment 
you  have 
worked 
out 
an answer, 
start 
checking it  -it 
probably 
isn't 
right." 
2. 
The 
Empty 
Column 
A  parable 
about 
a  symbol 
for 
zero, 
and 
the 
failure 
to 
recognize 
the 
value 
of 
a good  idea. 
3. 
The 
Golden 
Trumpets 
of 
Yap  Yap 
4. 
Strategy 
in 
Chess 
5. 
The 
Barrels 
and 
the 
Elephant 
A  discussion 
of 
truth 
vs.  believability. 
6. 
The 
Argument 
of 
the 
Beard 
The 
accumulation 
of 
many 
small  differences 
may 
make a  huge difference. 
7. 
The 
Elephant 
and 
the 
Grassy  Hillside 
The 
concepts 
of 
the 
ordinary everyday 
world 
vs. 
the 
pointer 
readings 
of 
exact 
science. 
8. 
Ground 
Rules 
for 
Arguments 
9.  False  Premises,  Valid  Reasoning, 
and 
True 
Conclusions 
The 
fallacy 
of 
asserting 
that 
the 
prem ises 
must 
first 
be 
correct 
in 
order 
that 
correct 
conclusions be 
derived. 
10. 
The 
I nvestigation 
of 
Common 
Sense 
11. Principles 
of 
General  Science 
and 
Proverbs 
8  principles 
and 
42 
proverbs. 
12. 
Common 
Sense -Questions 
for 
Consideration 
13.  Falling 
1800 
Feet 
Down  a  Mountain 
The 
story 
of 
a  skimobiler 
who 
fell 
1/3 
of 
a  mile 
down 
Mt.  Washington,  N.H., 
and 
was  rescued 
the 
next 
day; 
and 
how 
he used  his 
common 
sense 
and 
survived. 
14. 
The 
Cult 
of 
the 
Expert 
15.  Preventing  Mistakes from  Failure 
to 
Understand 
Even 
though 
you  do 
not 
understand 
the 
cause 
of 
some 
trouble, 
you  may still  be  able 
to 
deal  with 
it. 
The 
famous 
example 
of 
a 
cure 
for 
malaria. 
16. 
The 
Stage 
of 
Maturity 
and 
Judgement 
17.  Doomsday 
in 
St. 
Pierre,  Martinique -
Common 
Sense 
vs. 
Catastrophe 
How 
30,000 
people refusing 
to 
apply 
their 
common 
sense  died 
from 
a volcanic 
eruption. 
18. 
The 
History 
of 
the 
Doasyoulikes 
19.  Individuality 
in 
Human  Beings 
Their chemical  natures are as  widely varied  as 
their 
external features. 
20.  How 
to 
be  Silly 
71 
recipes 
for 
being silly.  Example: 
"Use 
twenty 
words 
to 
say  something when 
two 
will 
do." 
21. 
The 
Three 
Earthworms 
A  parable 
about 
curiosity; 
and 
the 
importance 
of 
making observations for oneself. 
22. 
The 
Cochrans 
vs. 
Catastrophe 
The  history 
of 
Samuel Cochran, 
Jr., 
who 
ate 
some 
vichyssoise soup. 
23.  Preventing  Mistakes from  Forgetting 
24. What 
is 
Common 
Sense? -
An  Operational  Definition 
A 
proposed 
definition of 
common 
sense 
not 
using 
synonyms 
but 
using  behavior 
that 
is 
observable. 
25. 
The 
Subject 
of 
What 
is 
Generally  True 
and 
Important 
-
Common 
Sense,  Elementary and  Advanced 
26.  Natural  History, 
Patterns, 
and 
Common 
Sense 
Some 
important 
techniques 
for observing. 
27.  Rationalizing 
and 
Common 
Sense 
28. 
Opposition 
to 
New  Ideas 
Some 
of 
the 
common 
but 
foolish  reasons 
for 
opposing new ideas. 
29. A  Classification 
and 
Review 
of 
the 
Issues 
of 
Vol. 
30. 
Index 
to 
Volume  1 
2 
VOLUME  2 
31. 
Adding  Years 
to 
your 
Life 
Through 
Common 
Sense 
A  person 
who 
desires 
to 
live  long 
and 
stay 
well  needs 
to 
understand 
some 
20 
principles,  including 
how 
to 
test 
all 
the 
health advice  he  receives 
for 
its 
common 
sense, 
and 
how 
to 
develop  habits 
of 
health  practices 
which 
fit 
him. 
32. 
The 
Number 
of 
Answers 
to 
a  Problem 
Problems may  have 
many 
answers, 
one 
answer, 
or 
no 
answer 
... 
and 
answers 
that 
are 
good 
at 
one 
time 
may 
be bad 
at 
another. 
33. 
"Stupidity 
has a  Knack 
of 
Getting  Its 
Way" 
" 
... 
as 
we 
should 
see 
if 
we  were 
not 
always so 
much 
wrapped 
up 
in 
ourselves." 
-
Albert 
Camus 
34. Time, Sense, 
and 
Wisdom  -
Some 
Notes 
The 
supply 
of 
time, 
the 
quantity 
of 
time, 
the 
kinds 
of 
time, 
and 
the 
conversion 
of 
time. 
. 
.. 
A  great deal 
of 
the 
time 
in 
a 
man's 
life 
is 
regularly, systematically, 
and 
irretrievably wasted.  This 
is 
a  serious mistake. 
35. 
Time, 
Sense, 
and 
Wisdom  -
Some 
Proverbs 
and 
Maxims 
56 
quotations 
and 
remarks 
by 
dozens 
of 
great  men. 
36. 
Wisdom  -
An 
Operational  Definition 
"A 
wise  person 
takes 
things as 
they 
are 
and, 
knowing 
the 
conditions, 
proceeds 
to 
deal  with 
them 
in 
such a 
manner as 
to 
achieve 
the 
desired 
result." 
-Somerset  Maugham 
EXCITING:  Q: 
Is 
the 
Notebook 
exciting? 
A: 
Some 
of 
the 
issues,  like 
"Falling 
1800 
Feet 
Down a 
Mountain" 
and 
"Doomsday 
in 
St. 
Pierre, 
Martinique", 
are among 
the 
most 
exciting 
true 
stories 
we 
know. 
USEFUL:  Q: 
Is 
the 
Notebook 
useful? 
A:  It 
ought 
to 
be 
useful 
to 
anybody 
-as  useful 
as 
common 
sense. 
There 
exists no 
textbook 
on 
common 
sense; 
the 
Notebook 
tries 
to 
be a  good  beginning 
to 
common 
sense, science,  and  wisdom. 
PAST  ISSUES:  As a 
new 
subscriber, 
you 
do 
not 
miss  past is-
sues.  Every subscriber's subscription 
starts 
at 
Vol.  1,  no. 
1, 
and 
he eventually  receives  all  issues. 
The 
past 
issues 
are 
sent 
to 
him  usually 
four 
at 
a 
time, 
every week 
or 
two, 
until  he  has 
caught 
up, 
and 
thus 
he 
does 
not 
miss 
important 
and  interesting  issues 
that 
never go 
out 
of 
date. 
GUARANTEE: 
(1)  You 
may 
return 
(in  7  days) 
the 
first  batch 
of 
issues we  send 
you, 
for 
FULL 
REFUND, 
if 
not 
satis-
factory. 
(2) 
Thereafter, 
you 
may 
cancel 
at 
any 
time, 
and 
you  will  receive a 
refund 
for 
the 
unmailed 
portion 
of 
your 
subscription. -
WE 
WANT  ONLY  HAPPY  AND 
SATISFIED 
SUBSCRIBERS. 
I  - - - - - - - - - - (may be 
copied 
on 
any 
piece 
of 
paper)  - - - - - - - - - - - - -
~ 
To: 
Berkeley  Enterprises, Inc. 
815 
Washington 
St., 
Newtonville, 
MA 
02160 
)  YES,  I 
would 
like 
to 
try 
the 
"Notebook 
on 
Common 
Sense, 
Elementary 
and 
Advanced". 
Please 
enter 
my 
subscription 
at 
$12 
a  year, 
24 
issues,  newsletter style, 
and 
extras. 
Please send 
me 
issues  1 
to 
6  as 
FREE 
PREMI UMS 
for 
subscribing. 
I enclose 
_____ 
_ 
) Please  bill 
my 
organization. 
Name  Title 
_________ 
_ 
Organization 
__________________ 
_ 
Address 
___________________________________ 
___ 
Signature 
_________ 
Purch. 
Order 
No. 
____ 
__ 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 

9 
1 
The 
Notebook 
on 
COMMON 
SENSE, 
ELEMENTARY 
AND 
ADVANCED 
is 
devoted 
to 
development, 
exposition, 
and 
illustration 
of 
what 
may 
be 
the 
most 
important 
of 
all  fields 
of 
knowledge: 
WHAT 
IS 
GENERAllY 
TRUE 
AND  IMPORTANT 
+  WISDOM  + 
+  + 
PURPOSES: 
to 
help 
you 
avoid  pitfalls 
to 
prevent 
mistakes 
before 
they 
happen 
to 
display  new 
paths 
around 
old 
obstacles 
to 
point 
out 
new 
solutions 
to 
old 
problems 
to 
stimulate 
your 
resourcefulness 
to 
increase 
your 
accomplishments 
to 
improve 
your 
capacities 
to 
help 
you 
solve 
problems 
to 
give 
you 
more 
tools 
to 
think 
with 
8REASONS 
TO 
BE 
INTERESTED  IN THE 
FIELD 
OF 
COMMON 
SENSE, 
WISDOM,  AND 
GENERAL 
SCIENCE 
COMPUTERS 
are 
important 
-
But 
the 
computer 
field 
is 
over 
25 
years old.  Here 
is 
a 
new 
field 
where 
you 
can 
get 
in 
on 
the 
ground 
floor 
to 
make 
your 
mark. 
MATHEMATICS 
is 
important 
-
But 
this field 
is 
more 
important 
than 
mathematics, 
because 
+ 
+ 
Topic: 
AVOIDANCE 
OF 
LOGICAL 
FALLACIES 
THE 
SYSTEMATIC 
PREVENTION 
OF 
MISTAKES 
Already Published 
Preventing  Mistakes 
from: 
Failure 
to 
Understand 
Forgetting 
Unforeseen  Hazards 
Placidity 
Camouflage 
To 
Come 
Preventing  Mistakes 
from: 
Bias 
Interpretation 
Distraction 
Gullibility 
Failure 
to 
Observe 
Failure 
to 
Inspect 
Prejudice 
+ 
Topic: 
SYSTEMATIC EXAMINATION 
OF 
GENERAL 
CONCEPTS 
Already Published 
The 
Concept 
of: 
Expert 
Rationalizing 
Feedback 
Model 
Black Box 
Evolution 
Niche 
Understanding 
To 
Come 
Strategy 
Teachable 
Moment 
Indeterminacy 
System 
Operational 
Definition 
+ 
common 
sense, 
wisdom, 
and 
general science have 
more 
applications. 
LOGIC 
is 
important 
-.- - - - - - - - - - - - - - - -
(may 
be 
copied 
on 
any 
piece 
of 
paper)  - - - - - - - - - - .  - - .  - - - - - - - - - . 
~ 
o 
To: 
Berkeley  Enterprises,  Inc. 
But 
this 
field 
is 
more 
important 
than 
logic,  because 
common: 
815 
Washington 
St., 
Newtonville, 
MA 
02160 
sense  plus 
wisdom 
plus science  in  general 
is 
much 
broader 
than 
logic. 
WISDOM 
is 
important 
-
This field 
can 
be 
reasonably called 
"the 
engineering 
of 
wisdom". 
)  Yes,  please 
enter 
my 
subscription 
to 
The 
Notebook on  Common 
Sense, 
Elementary 
and 
Advanced 
at 
$12 
a  year 
(24 
issues),  plus 
extras. 
I 
understand 
that 
you 
always begin 
at 
the 
beginning 
and 
so  I shall 
not 
miss 
any 
issues. 
COMMON 
SENSE 
is 
important 
-0  (  )  Please send 
me 
as 
free 
premiums 
for 
subscribing: 
This field  includes 
the 
systematic 
study 
and 
development 
of: 
1. 
Right 
Answers 
- A 
Short 
Guide 
to 
Obtaining 
Them 
4. 
Strategy 
in 
Chess 
2. 
The 
Empty 
Column 
5. 
The 
Barrels 
and 
the 
Elephant 
common 
sense. 
SCI ENCE  is 
important 
-o 
3. 
The 
Golden 
Trumpets 
of 
Yap Yap 
6. 
The 
Argument 
of 
the 
Beard 
This field  includes 
what 
is 
common 
to 
all 
the 
sciences, 
what: 
is 
generally 
true 
and 
important 
in 
the 
sciences. 
MISTAKES 
are 
costly 
and 
to 
be  AVOIDED  -
This field  includes 
the 
systematic 
study 
of 
the 
prevention 
of 
: 
mistakes. 
MON 
EY 
is 
important 
-
The 
systematic 
prevention 
of 
mistakes in 
your 
organization 
0 
might save 
10 
to 
20% 
of 
its expenses 
per 
year. 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 
(  )  I enclose $  ) Please bill 
my 
organization 
RETURNABLE IN 7 DAYS 
FOR 
FULL 
REFUND IF NOT SATISFACTORY 
HOW 
CAN  YOU  LOSE? 
Name 
_____________ 
Title 
_______ 
_ 
Organization 
____________________ 
_ 
Address 
(including 
zip) 
_________________ 
_ 
Signature 
__________ 
_ 
Purchase 
Order 
No. 
___ 
_ 
3 

Vol. 
23,  No.  12 
December, 
1974 
Editor and 
Edmund 
C. 
Berkeley 
Publisher 
Assistant 
Editors 
Art 
Editor 
Software 
Editor 
Contributing 
Editors 
Barbara 
L. 
Chaffee 
Linda  Ladd  Lovett 
Neil  D.  Macdonald 
Grace C.  Hertlein 
Stewart 
B. 
Nelson 
George 
N. 
Arnovick 
John 
Bennett 
Moses 
M. 
Berlin 
Andrew 
D. 
Booth 
John 
W. 
Carr 
III 
Ted 
Schoeters 
Richard 
E. 
Sprague 
London 
Thomas 
Land 
Correspondent 
Advisory 
Ed 
Burnett 
Committee  James 
J. 
Cryan 
Editorial 
Offices 
Advertising 
Contact 
Bernard 
Quint 
Berkeley  Enterprises,  Inc. 
815 
Washington  St. 
Newtonville, 
MA 
02160 
617-332-5453 
The 
Publisher 
Berkeley  Enterprises,  Inc. 
815 
Washington  St. 
Newtonville, 
MA 
02160 
617-332-5453 
"Computers 
and 
People," 
formerly 
"Computers 
and 
Automation," 
is 
published 
monthly, 
12 
issues 
per 
year, 
at 
815 
Washing-
ton 
St., 
Newtonville, 
MA 
02160, 
by 
Berkeley 
Enterprises, 
I 
nco 
Printed 
in 
U.S.A. 
Second 
Class 
Postage 
paid 
at 
Boston, 
MA, 
and 
addi-
tional 
mailing 
points. 
Subscription 
rates: 
United 
States, 
$11.50 
for 
one 
year, 
$22.00 
for 
two 
years. 
Canada: 
add 
$1 
a 
year; 
Mexico, 
add 
$6 
a 
year. 
Else-
where: 
one 
year, 
Swiss 
francs 
60; 
order 
through 
Reliable 
Information 
Publishing 
Company, 
P.O. 
Box 
52, 
6354 
Vitznau, 
Switzerland. 
NOTE: 
The 
above 
rates 
do 
not 
include 
our 
publication 
"The 
Computer 
Directory 
and 
Buyers' 
Guide". 
If 
you 
elect 
to 
re-
ceive 
"The 
Computer 
Directory 
and 
Buyers' 
Guide," 
please 
add 
$12.00 
per 
year 
to 
your 
subscription 
rate 
in 
U.S. 
and 
Canada, 
and 
$15.00 
in 
Mexico; 
elsewhere, 
the 
price 
of 
the 
Directory 
is 
Swiss 
francs 
90, 
not 
includ-
ing 
postage 
and 
handling; 
please 
order 
through 
Reliable 
I 
nformation 
Publishing 
Company, 
P.O. 
Box 
52, 
6354 
Vitznau, 
Switzerland. 
Please 
address 
mall 
to: 
Berkeley 
Enter-
prises, 
Inc., 
815 
Washington 
St., 
Newton-
ville, 
MA 
02160, 
or 
to 
Berkeley 
Enterprises, 
Inc., 
c/o 
Reliable 
I 
nformation 
Publishing 
Co., 
P.O. 
Box 
52, 
6354 
Vitznau, 
Switzerland. 
Postmaster: 
Please 
send 
all 
forms 
3579 
to 
Berkeley 
Enterprises, 
Inc., 
815 
Washing-
ton 
St., 
Newtonville, 
MA 
02160. 
© 
Copyright 
1974, 
by 
Berkeley 
Enter-
prises, 
Inc. 
Change 
of 
address: 
If 
your 
address 
changes, 
please 
send 
us 
both 
your 
new 
address 
and 
your 
old 
address 
(as 
it 
ap-
pears 
on 
the 
magazine 
address 
imprint), 
and 
allow 
three 
weeks 
for 
the 
change 
to 
be 
made. 
4 
computers 
and 
people 
formerly  Computers 
and 
Automation 
Computers 
and 
Engineering 
8  Engineering 
Computer 
Programs: 
How 
They 
Grow 
by 
A.  Morcos 
and 
S.  L. 
Chu, 
Sargent 
and 
Lundy, 
Chicago, 
III. 
How 
computer 
programs 
for 
engineering 
situations 
actually 
develop 
and 
evolve. 
Computers 
and 
Medicine 
15 
Changing 
Technology 
and 
Medical  Specialization 
by 
Ray 
M. 
Antley 
and 
Mary 
Ann 
Antley, 
Indianapolis,  Ind. 
How 
25 
years 
of 
applying 
computer 
systems 
in 
medicine 
are 
leading 
to 
integrated 
control 
of 
the 
environment 
for 
the 
benefit 
of 
patients. 
The  Computer 
Industry 
[A] 
[A] 
12 
The 
Computer 
Industry 
and 
Unionization 
[A] 
by 
A. A.  I 
mberman, 
I 
mberman 
and 
DeForest, 
Chicago, 
III. 
How 
to 
really  listen 
to 
employee 
grievances 
while 
they 
are 
still 
minor, 
and 
respond 
quickly 
to 
them, 
to 
the 
advantage 
of 
nearly 
everybody 
concerned. 
11 
The 
Radiation 
from 
Computers 
Into 
Everywhere  [A] 
by 
Neil 
Macdonald, 
Survey 
Editor, 
Computers 
and 
People 
Some 
of 
the 
ever-widening  influences 
of 
computers 
upon 
many 
different 
areas. 
7 
Contact 
with 
Holders 
of 
the 
Certificate 
of 
Data  Processing 
[F) 
by 
John 
K. 
Swearingen, Pres.,  I 
nstitute 
for 
Certification 
of 
Computer 
Professionals, Chicago, 
III. 
An 
effort 
to 
reach all  COP  holders. 
7 
Annual 
Computer 
Programming 
Contest 
[F) 
by 
Dr. 
Gary 
G. 
Bitter, 
Arizona 
State 
Univ. 
For 
students 
in 
grades 7 
to 
12: 
the 
annual 
contest 
of 
the 
Association 
for 
Educational 
Data 
Systems. 
Applications 
of 
Computers 
32 
Computing 
and 
Data 
Processing 
Newsletter 
[C) 
Computer 
Gives  New  Mexico  Museum  Full  Access 
to 
its 
Mineral 
Collection 
Computer 
System 
for 
a  Racing 
Yacht 
that 
Won 
Cameras 
and 
Computers 
Combine 
to 
Analyze 
Rocket 
Flights 
1 
"Desert 
Rose" 
[Front 
Cover] 
A 
"desert 
rose" 
of 
crystal 
gypsum, 
at 
the 
New  Mexico 
Mineralogical  Museum 
of 
the 
New Mexico 
Bureau 
of 
Mines.  A 
computer 
uses X-ray  results 
to 
analyze 
each 
specimen, 
and 
catalogs 
it. 
See  page 
32. 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 
.. 
, 

The  magazine 
of 
the 
design,  applications, 
and 
implications 
of 
information  processing 
systems 
-
and 
the 
pursuit 
of 
truth 
in 
input, 
output, 
and 
processing, 
for 
the 
benefit 
of 
people. 
6 
"1 
Am 
Interested 
To 
Know 
What a 
Computer 
Can  Do  [E] 
For 
Me" 
by 
Edmund 
C.  Berkeley, 
Editor 
What 
sorts 
of 
questions 
a 
computer 
can 
answer, 
and 
how 
it answers 
them. 
7 
"Computer 
Art 
for 
the 
Artist" 
-
Comment 
[F] 
by 
James 
C. 
Ver  Hague, 
Jr., 
State 
University 
of 
New 
York 
at 
Buffalo 
Additional 
information 
wanted 
for 
teaching 
computer 
art. 
7 
"Can 
Tigger 
Think? 
Can  Peder 
Think?" 
-
Comment 
[F] 
by 
Bryce 
M. 
Mitchell,  Universidade  Federal 
de 
Sao 
Carlos, Sao Carlos,  Brazil 
The  Profession 
of 
Information 
Engineer 
and 
the 
Pursuit 
of 
Truth 
18 
Watergate 
South 
[A] 
by 
Nancy A.  Miller, 
Princeton, 
N.J. 
How a 
third 
effort 
was 
made 
by 
many 
Watergate-
connected 
figures 
to 
provoke 
violence 
and 
riots, 
and 
prepare 
the 
groundwork 
for 
a 
cancelation 
of 
the 
1972 elections. 
26 
The 
Assassination 
of 
the 
Reverend  Martin 
Luther 
King, 
Jr., 
and 
Possible  Links 
with 
the 
Kennedy 
Murders -Part 
11 
(Conclusion) 
[A] 
by 
Wayne Chastain, 
Jr., 
Attorney, 
Memphis, 
Tenn. 
The 
final 
instalment 
of 
a 
report 
of 
a 
diligent 
study 
into 
the 
details 
and 
circumstances 
of 
the 
assassination 
of 
the 
Reverend  Martin 
Luther 
King, 
Jr., 
on 
April 
4, 
1968, 
and 
related  events, 
and 
the 
considerable 
evidence 
of 
a  conspiracy. 
Computers,  Puzzles, 
and 
Games 
30 
Games 
and 
Puzzles 
for 
Nimble  Minds  -
and 
Computers 
[C] 
Key 
[A] 
[C] 
[E] 
[F] 
by 
Neil  Macdonald, Assistant 
Editor 
GIZZMO  -
Some 
computational 
Jabberwocky. 
MAXIMDIJ  -Guessing a 
maxim 
expressed 
in 
digits. 
NA YMANDIJ  - A 
systematic 
pattern 
among 
randomness? 
NUMBLES -Deciphering 
unknown 
digits 
from 
arithmet-
ical  relations. 
SIXWORDO -Paraphrasing a  passage 
into 
sentences 
of 
not 
more 
than 
six 
words 
each. 
Article 
Monthly 
Column 
Editorial 
Forum 
NOTICE 
*0 
ON 
YOUR 
ADDRESS 
IMPRINT 
MEANS 
THAT 
YOUR 
SUBSCRIP-
TION 
INCLUDES 
THE 
COMPUTER 
DIRECTORY. 
*N 
MEANS 
THAT 
YOUR 
PRESENT  SUBSCRIPTION 
DOES 
NOT 
INCLUDE 
THE 
COM-
PUTER 
DIRECTORY. 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974, 
ANNOUNCEMENT 
THE  COMPUTER  CENSUS 
which 
Computers 
and 
People  has  pub-
lished 
in 
the 
past will 
now 
be 
published 
separately 
and 
more 
completely 
as a 
quarterly 
service,  regular 
subscription 
price 
$33.00 
per  year.  Until 
January: 
10,  1975, 
any 
subscriber 
to 
Computers 
and People 
may 
subscribe 
at 
half  price. 
Outside 
U.S.,  Canada, 
and 
Mexico, 
please 
add 
$5.00 
per year 
for 
addi-
tional costs. 
NEW 
CONTRACTS 
AND 
NEW 
INSTALLATIONS 
which 
Computers 
and 
People  has 
pub-
lished 
in 
the 
past will 
now 
be 
published 
separately 
and 
more 
completely 
as a 
bimonthly 
service,  regular 
subscription 
price 
$30.00 
per  year.  Until 
January 
10,  1975, 
any 
subscriber 
to 
Computers 
and 
People  may subscribe 
at 
half  price. 
Outside 
U.S.,  Canada, 
and 
Mexico, 
please 
add 
$5.00 
per year 
for 
addi-
tional  costs. 
------
-(may 
be 
copied 
on-
------
--
I 
any 
piece 
of 
paper) 
TO: 
Computers 
and 
People 
Berkeley  Enterprises,  Inc. 
815 
Washington  Street 
Newtonville, 
MA 
02160, U.S.A. 
(  )  YES,  please  send  me 
(  ) 
THE 
COMPUTER  CENSUS, 
quarterly, 
at 
$33.00 a  year 
NEW 
CONTRACTS 
AND 
NEW 
INSTALLATIONS, 
bimonthly, 
at 
$30.00 a  year 
(  )  I  claim  50% discount 
as 
a subscriber 
to 
Computers 
and 
People 
Total 
payment 
_____ 
_ 
I  enclose  check 
Please 
bill 
my 
organization; 
the 
pur-
chase 
order  no. 
is 
_____ 
_ 
My 
name and  address  are  attached. 
5 

EDITORIAL 
ttl 
Am 
Interested 
To 
Know 
What 
a 
Computer 
Can 
Do 
For 
Me" 
The 
man 
who 
said 
that 
to 
me 
was 
an 
old 
friend. 
He 
was 
no 
mathematician, 
but 
a  former  dean 
of 
a 
dental 
school; 
he 
had 
specialized 
in 
dental 
public 
health; 
he 
had  had 
an 
excellent 
education. 
In 
spite 
of 
be-
ing 
no 
mathematician 
he 
had 
navigated 
a  small 
ship 
out 
of 
sight 
of 
land; 
and  he  had  computed  means, 
stan-
dard 
deviations, 
chi-squared 
tests, 
and 
other 
statis-
tical 
measures. 
How 
could  I  answer 
this 
useful 
question? 
The 
first 
step 
was 
to 
send 
him 
a 
list 
of 
many 
ap-
plications 
of 
computers. 
In 
1973 
we 
published 
a 
list 
of 
over  2400 
applications 
of 
computers.  That 
list 
contained 
179 
applications 
in 
medicine; 
here 
is 
a 
small 
excerpt: 
Coronary 
artery 
disease 
prediction 
Cystic 
fibrosis: 
detection 
in 
new-born 
babies 
Cytology 
diagnosis 
Cytophotometric 
analysis 
Dermatoglyphic 
analysis 
But  what 
is 
the 
second 
step? 
What 
ideas 
do 
you 
give 
to 
an 
ordinary 
person 
(nontechnical 
but 
educa-
ted) 
so 
that 
he 
can  conceive 
of 
how 
a  computer  can 
be 
of 
help 
to 
him? 
In 
the 
case 
of 
a  motor 
car, 
there 
is 
no 
great 
problem 
in 
"knowing  what  a  motor 
car 
can 
do 
for 
me." 
A 
car 
can 
take 
you 
somewhere  where 
you 
want 
to 
go. 
And 
you 
are 
already 
full 
of 
ideas 
of 
places 
where 
you 
want 
to 
go. 
However, 
for 
any 
particular 
trip 
in 
a  motor 
car 
you 
have 
to 
make 
a 
decision 
about  where 
you 
want 
to 
go.  Also, 
if 
you 
do 
not 
know 
the 
way 
there, 
you 
have 
to 
get 
hold 
of 
a 
map 
and  choose 
the 
way:  which  roads 
you 
will 
travel 
on, 
how 
far 
on 
each 
you 
will 
go,  what 
turnings 
you 
will 
take, 
what 
signs 
you 
will 
be 
guided 
by. 
Much 
the 
same 
situation 
applies 
when 
you 
want 
to 
find 
some 
information 
that 
has  probably  been 
publish-
ed. 
Recently 
at 
a 
birthday 
party 
somebody 
showed 
me 
an 
old  book: 
Volume 
2 
of 
"The 
Life 
of 
George 
Wash-
ington" 
by 
Washington 
Irving, 
published 
in 
1900. 
My 
curiosity 
was 
stirred 
about  George  Washington. 
The 
next 
day  I  looked 
up 
in 
an 
encyclopedia 
the 
entry 
"George  Washington," 
and 
sati 
sfied 
much 
of 
my 
curios-
ity. 
I  used 
the 
standard 
travel-map 
rules 
applying 
to 
reference 
books:  begin  with 
an 
encyclopedia, 
and 
look 
for 
the 
topic 
name 
in 
alphabetical 
sequence. 
A computer, 
like 
a  motor 
car 
and 
a 
reference 
book, 
can 
take 
you 
where 
you 
want 
to 
go. 
First 
you 
have 
to 
want 
to 
know 
something,  and  second 
you 
have 
to 
ob-
tain 
knowledge 
of 
how 
to 
figure 
it 
out. 
6 
A computer  can 
figure 
out 
averages, 
standard 
de-
viations, 
chi-squared 
tests, 
and 
other 
statistical 
measures 
--
if 
you 
want 
to 
know 
them. 
You 
can 
usu-
ally 
buy 
a 
map 
for 
this 
purpose,  which 
will 
be 
call-
ed  a  "computer  program."  A computer  can  even 
tell 
you 
the 
answer 
(if 
you 
want 
to 
know 
it) 
to 
such  a 
question 
as, 
"What 
is 
the 
minimum 
number 
of 
cubes 
whi 
ch 
when 
added 
wi 
11 
equal  a  gi 
ven 
number?" 
and 
which  cubes  they 
are. 
For  example,  suppose 
the 
giv-
en  number 
is 
229. 
Then 
the 
ariswer 
is 
that 
the 
mini-
mum 
number 
of 
cubes 
is 
7; 
and 
there 
are 
exactly 
three 
solutions, 
and  here  they 
are: 
3  x 
64 
+  1  x 
27 
+  1  x  8  +  2  x  1 
1  x  125  +  1  x 
64 
+  5  x  8 
1  x 
216 
+  1  x  8  +  5  x  1 
In 
this 
case, 
the 
map, 
the 
way 
to 
produce 
the 
answers 
desired, 
will 
probably 
require 
some 
clever 
program-
mer 
to 
spend 
several 
hours  producing  a  sequence 
of 
some 
300 
instructions 
in 
machine  language 
that 
the 
computer  needs 
for 
a 
map. 
The 
situation 
of 
computer 
maps 
is 
much 
like 
driv-
ing 
your 
car 
in 
a 
strange 
land  where 
there 
is 
no 
light, 
only 
thick 
black 
darkness 
--
and 
all 
the 
signs 
are 
written 
in 
a  language 
that 
you 
do 
not 
understand. 
So 
before 
you 
start 
out 
driving, 
you 
have 
to 
get 
from 
somebody 
a  complete  and 
accurate 
set 
of 
instructions; 
and 
the 
instructions 
must 
include 
the 
names 
of 
the 
signposts 
at 
the 
intersections; 
and 
when 
you 
come 
to 
an 
intersection, 
you 
turn 
on 
your 
flashlight, 
read 
all 
the 
signs 
carefully, 
compare  them  with 
the 
ap-
propriate 
notes 
in 
your 
set 
of 
instructions, 
and 
then 
try 
your 
best 
to 
choose 
the 
right 
turning. 
Fortunately, 
in 
this 
dark 
land 
where  computer 
maps 
are 
used,  whenever 
you 
travel 
a  second  time 
from 
place 
A 
to 
place 
B, 
if 
your  road 
map 
worked 
OK 
the 
first 
time, 
then 
it 
will 
work 
OK 
over 
and  over 
again. 
And 
each 
later 
time 
it 
will 
work 
lightning 
fast. 
So 
whenever 
you 
want 
to 
travel 
again, 
you 
have 
practically 
no 
problem 
at 
all. 
The 
inefficien-
cy 
of 
the 
first 
trip 
is 
replaced 
by 
utmost 
efficien-
cy 
for 
all 
later 
trips. 
But 
you 
still 
need  a 
place 
you 
want 
to 
go 
to 
(a 
question 
you 
want  answered)  and  a 
map 
of 
how 
to 
get 
there 
(a  complete 
set 
of 
instructions 
for 
figuring 
out 
the 
answer). 
E"~d...c. 
.. 
~ 
Edmund 
C. 
Berkeley 
Editor 
COMPUTERS 
and 
PEOPLE 
for 
December. 
1974 

THE 
PURPOSE 
OF  FORUM 
• 
To 
give 
you,  our  readers, 
an 
opportunity to  discuss 
ideas  that 
seem 
to  you  important. 
• 
To 
express criticism  or comments on  what you 
find 
published  in  our 
magazine. 
• 
To 
help  computer  people  and  other  people  discuss 
significant  problems  related  to  computers,  9ata 
processing,  and their applications 
and 
implications, 
including information engineering, professional be-
havior,  and  the  pursuit 
of 
truth in  input, output, 
and 
pro 
cessing. 
Your  participation 
is 
cordially invited. 
ANNUAL 
COMPUTER  PROGRAMMING CONTEST 
AEDS 
Programming  Contest 
Association 
for 
Educational Data  Systems 
Dr.  Gary 
G. 
Bitter 
College 
of 
Education 
Arizona State  Univ. 
Tempe, 
AZ 
85281 
This 
12th  annual 
contest 
is 
for 
students 
in 
Grades 
7  through  12.  Seven 
first 
prizes 
of 
$25 
(in 
bonds) 
will 
be  awarded 
in 
the 
categories: 
business, 
bio-
logical 
science; 
computer 
science; 
games; 
humanities; 
mathematics; 
physical 
science. 
A Grand 
Prize 
of 
$100 
(in 
bonds) 
will 
be  awarded 
to 
one 
of 
the 
win-
ners 
in 
the 
individual 
categories. 
All 
entries 
must 
be 
received 
by 
March 
1. 
The 
Association, 
also 
known 
as 
AEDS, 
is 
a 
national 
organization 
comprised 
of 
administrators, 
teachers, 
systems 
analysts, 
and  programmers 
of 
educational 
data 
processing 
systems 
in 
vocational, 
public, 
and 
pri-
vate 
schools. 
The 
contest 
is 
on 
the 
approved 
list 
of 
national 
contests 
and 
activities 
of 
the 
National 
Association 
of 
Secondary  School 
Principals. 
The 
Programming 
Contest 
winner 
will 
receive 
not 
only 
a  U.S.  Savings 
Bond 
but 
also 
an 
expense-paid 
trip 
to 
the 
1975 
AEDS 
Convention 
in 
Virginia 
Beach, 
Virginia, 
on 
April 
29-May 
2. 
The 
winning 
student's 
teacher 
also 
will 
receive 
an 
expense-paid 
trip 
to 
the 
convention. 
"COMPUTER 
ART 
FOR  THE 
ARTIST" 
-COMMENT 
To: 
The 
Art 
Editor: 
From: 
James 
C. 
Ver 
Hague, 
Jr. 
Department 
of 
Art 
State  Univ. 
of 
New  York 
at 
Buffalo 
Buffalo, 
NY 
14214 
Your 
article, 
"Computer  Art 
for 
the 
Artist," 
ap-
pearing 
in 
the 
August  1974 
issue 
of 
"Computers  and 
People," 
was 
very 
interesting 
to 
me. 
The 
Department 
of 
Art 
here 
is 
initiating 
a 
course 
in 
computer 
art 
and 
graphics 
beginning 
this 
fall 
semester. 
As 
the 
instructor 
for 
the 
course, 
I  found  your 
outline 
to 
be 
very 
well-conceived 
and  have 
restructured 
some 
of 
the 
planned 
course 
material 
as  a 
result. 
I  would 
very 
much 
appreciate 
your  sending 
to 
me 
a 
more 
de-
tailed 
course 
plan 
including 
your 
bibliography 
of 
references 
and/or 
any 
additional 
material 
that 
you 
feel 
might 
aid 
in 
getting 
such  a 
course 
successfully 
off 
the 
ground. 
Does 
there 
exist 
the 
possibility 
of 
an 
exchange 
of 
computer  programs 
either 
with 
you 
or 
others 
that 
have 
taught 
a 
similar 
course? 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 
MULTI-ACCESS 
FORUM 
Like  a  number 
of 
people 
interested 
in 
computer 
art, 
my 
background 
is 
primarily 
a 
technological 
one. 
I  have 
an 
M.S. 
in 
mathematics  and  worked 
for 
four 
years 
in 
the 
aerospace 
developing 
computer  programs 
for 
structural 
analysis 
research. 
While  working 
on 
one 
of 
the 
plot 
programs,  I 
accidentally 
began 
gen-
erating 
forms 
that 
suggested 
sculptural 
possibili-
ties 
to 
me. 
Eventually, 
I  became 
more 
interested 
in 
the 
potentialities 
of 
computer 
art 
than 
in 
the 
work  I 
was 
doing  and 
finally 
quit 
to 
obtain 
more 
formal 
training 
in 
the 
field 
of 
art. 
I 
am 
current-
ly 
a  Teaching 
Assistant 
completing 
my 
final 
year 
in 
the 
M.F.A.  Program 
at 
Buffalo. 
I 
am 
looking 
forward 
to 
receiving 
your 
detailed 
course 
plan. 
"CAN 
TIGGER THINK?  CAN  PEDER 
THINK?" 
-COMMENT 
Bryce 
M. 
Mitchell 
universidade  Federal 
de 
Sao 
Carlos 
Laboratorio 
de 
Idiomas 
Sao 
Carlos  13560,  Brazil 
We 
would 
like 
to 
request 
permission 
to 
reprint 
a 
section 
from  "Computers  and 
People," 
Vol.  23, 
No. 
6, 
page 
6. 
We 
propose 
to 
use 
this 
editorial 
by 
Edmund 
C. 
Berkeley 
as 
a 
reading 
in 
a 
textbook 
for 
the 
teaching 
of 
scientific 
and 
technical 
English 
to 
speakers 
of 
other 
languages. 
We 
will, 
of 
course, 
give 
full 
credit 
to 
the 
source. 
Thank  you  very 
much 
for 
your 
consideration 
in 
this 
matter. 
EditD.rial Note: 
Permission 
granted. 
CONTACT WITH  HOLDERS OF  THE CERTIFICATE OF 
DATA 
PROCESSING 
John 
K. 
Swearingen,  President 
Institute 
for 
Certification 
of 
Computer Professionals 
Box  1442 
Chicago,  III.  60690 
The 
Institute 
of 
the 
Certification 
of 
Computer 
Professionals 
on 
October 
5, 
1974 
made 
its 
first 
mail-
ing 
to 
approximately 
15,000 
holders 
of 
the 
Certifi-
cate 
of 
Data 
Processing 
(COP). 
In 
order 
to 
contact 
those 
COP 
holders 
whose 
up-
to-date 
address 
we 
did 
not 
have,  would 
you 
please 
publish 
this 
notice, 
addressed 
to 
holders 
of 
the 
Certificate: 
If 
you 
did 
not 
receive 
our 
mailing 
of 
October 
5, 
1974, 
it 
is 
probably 
because 
we 
do 
not 
have 
your 
correct 
address. 
We 
have  a  message 
of 
in-
terest 
and 
importance 
to 
you. 
Please 
send  us 
your 
correct 
address, 
class 
year, 
and 
your 
Cer-
tificate 
Number 
if 
available. 
7 

Engineering  Computer 
Prlograms: 
How 
They 
Grow 
A. 
Marcos 
S. 
L. 
Chu 
Structural Analytical Division 
Sargent and  Lundy,  Engineers 
55 
East  Monroe  St. 
Chicago, 
IL 
60603 
"Although a program  cannot 
as 
yet take over conceptual design,  nevertheless, used 
as 
a 
tool 
for 
analysis, 
it 
can 
study complex models swiftly, and provide  reliable  and quick 
estimates 
of 
the merits 
of 
various  engineering solutions  to  a problem. " 
Two  Basic  Functions 
In 
engineering 
design 
firms, 
computer  programs 
perform 
two 
basic 
functions: 
carrying 
out 
calcula-
tions, 
and 
presenting 
the 
results 
in 
a 
prescribed 
format. 
Yet 
neither 
the 
programs  nor 
the 
functions 
they 
perform 
are 
static. 
Both  change  as 
often 
as 
engineers 
change 
designs, 
methods 
of 
analysis 
or 
even 
personal 
tastes 
regarding 
the 
looks 
of 
computer 
output. 
This 
is 
especially 
true 
of 
the 
programs  used 
in 
the 
design 
of 
nuclear 
power 
plants, 
an 
area 
which 
is 
a  prime  concern 
with 
us. 
In 
this 
design 
area, 
there 
is 
a 
continual 
advance 
in 
technology. 
Consequently, 
it 
naturally 
follows 
that 
the 
programs  used  must 
con-
tinually 
evolve 
to 
keep 
pace. 
Numerous  Computer  Programs 
Although  a  program 
cannot, 
as 
yet, 
take 
over 
the 
conceptual 
design 
function, 
nevertheless, 
used 
as 
a 
tool 
for 
analysis, 
it 
can 
study 
complex  models 
swift-
ly, 
and 
provide 
reliable 
and  quick 
estimates 
of 
the 
merits 
of 
various 
engineering 
solutions 
to 
a 
given 
problem.  Because 
of 
this 
increasing 
importance, 
it 
is 
not 
unusual 
to 
find 
numerous  computer  programs 
being 
conceived 
daily 
to 
handle 
the 
ever-increasing 
engineering 
problems 
confronting 
engineering 
design 
firms. 
Let's 
follow 
the 
evolution 
of 
a 
typical 
en-
gineering 
computer  program. 
Birth 
of 
a  Program 
The 
conception 
of 
a 
new 
program  and 
its 
subsequent 
gestation 
generally 
take 
place 
in 
engineering 
research 
groups; 
at 
Sargent 
& Lundy 
the 
analytical 
divisions 
are 
assigned 
this 
task. 
These 
divisions 
may 
inves-
tigate 
and 
recommend 
modification 
of 
one 
of 
the 
ex-
isting 
programs 
or 
develop 
a 
new 
one. 
Validation 
For  our 
purposes, 
let's 
consider 
that 
a 
new 
pro-
gram  has  been 
initiated. 
After 
it 
is 
written 
and 
de-
bugged, 
validation 
begins. 
By 
this 
process 
the 
pro-
gram 
is 
insured 
of 
doing  what 
the 
programmer 
intends 
it 
to; 
or 
in 
other 
words, 
the 
program 
is 
checked 
for 
internal 
consistency. 
Known 
simple 
calculations 
may 
be  used 
to 
check 
for 
uniformity; 
or 
another 
program 
with 
similar 
capabilities 
but 
with 
a 
different 
ap-
proach 
may 
be  used 
for 
verification. 
8 
Continuing  Growth 
The 
next 
step 
in 
the 
maturation 
of 
the 
newly-born 
program 
is 
qualification 
for 
the 
problem 
at 
hand. 
For 
this, 
a  few  examples 
are 
run 
and 
if 
solved 
satis-
factorily, 
the 
program 
is 
officially 
issued. 
The 
qualification 
process 
does 
not 
stop 
at 
this 
point 
but 
continues 
indefinitely, 
drawing 
not 
only  from 
experience 
gained 
through  use 
but 
also 
from 
the 
in-
teraction 
between 
the 
writers 
or 
maintainers 
of 
the 
program  and 
its 
users. 
The 
interaction 
between 
user 
and 
writer 
is 
a 
ma-
jor 
factor 
in 
the 
program's 
growth. 
Starting 
with 
a  model 
for 
the 
engineering 
problem 
at 
hand, 
the 
user 
and 
writer 
team  examine 
it. 
They 
decide 
whether 
the 
program,  as 
written, 
can 
solve 
the 
problem. 
This 
process 
of 
user-writer 
interaction 
can 
serve 
to 
qual-
ify 
the 
program 
for 
a 
wider 
set 
of 
problems, 
or 
dis-
qualify 
it 
for 
certain 
problems. 
Continuing  Qualification 
The 
program  does 
not 
stop 
evolving 
after 
the 
qual-
ification 
process 
by 
the 
development  team.  A 
con-
tinual 
stream 
of 
techniques 
for 
refined 
or 
improved 
analysis 
calls 
for 
continual 
reevaluation 
of 
the 
com-
puter 
programs 
that 
use 
the 
original 
techniques. 
This 
process 
of 
selective 
change  and  improvement 
is 
reminiscent 
of 
biological 
evolution; 
growth, 
adjust-
ment, 
atrophy, 
specialization 
and 
breeding 
are 
all 
present. 
Biological  Analogy 
The 
diagram 
in 
Figure 
1 
illustrates 
this 
biologi-
cal 
analogy. 
Let's 
follow 
the 
evolution 
of 
this 
particular 
program.  Version  I 
is 
the 
initial 
stage 
of  a  frame 
analysis 
program.  Version 
II 
is 
its 
first 
mutation 
when 
rigid 
members 
and  end 
releases 
are 
in-
troduced 
and  a 
new 
version 
is 
required. 
With 
the 
ad-
vent 
of 
better 
methodology,  Version 
III 
is 
developed. 
This 
negates 
the 
usefulness 
of 
Versions 
I  and 
II. 
New 
requirements 
imposed 
by 
the 
Atomic  Energy  Commission 
produce 
yet 
another 
stage, 
Version  IV.  However, 
in 
this 
case 
Version 
III 
may 
still 
be 
functional 
for 
some 
applications 
and 
therefore 
is 
not 
discontinued. 
In 
time, 
Version 
IV 
is 
expanded  upon 
when 
a 
particu-
lar 
group 
in 
the 
company 
requests 
a 
version 
which 
will 
output 
the 
results 
of 
the 
program 
in 
a  format 
to 
suit 
the 
special 
needs 
of 
that 
group; 
in 
this 
case, 
a 
specialized 
version 
is 
written 
for 
that 
group 
while 
the 
original 
Version 
IV 
is 
kept 
intact. 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 

Merger 
with 
Another 
Program 
Program  Evolution 
Figure  1 
Then 
again 
another 
group 
may 
request 
that 
two 
types 
of 
analysis 
be  performed 
in 
one  program,  such 
as 
static 
and  dynamic 
analyses. 
To 
accomplish 
this, 
it 
may 
be 
necessary 
to 
combine 
two 
or 
three 
programs, 
forming  a 
new 
program. 
If 
the 
company 
leases 
a 
big-
ger 
computer 
that 
allows 
for 
the 
solving 
of 
more 
joints 
and  members, 
an 
expanded 
version 
of 
the 
new 
program 
that 
would 
take 
advantage 
of 
the 
size 
and 
speed  of 
the 
new 
computer 
is 
written. 
Thus, 
the 
computer  program  can 
evolve 
into 
many 
stages. 
In 
numerous 
instances 
issuing 
the 
first 
version 
of 
a  program 
is 
only 
20 
per 
cent 
of 
the 
to-
tal 
work. 
An 
Example 
of 
Extensive  Growth 
A 
typical 
example 
of 
this 
evolutionary 
process 
in 
our 
design 
group 
is 
our 
MASS 
program 
(~atrix 
Analy-
sis 
Seismic 
Stresses). 
First 
written 
in 
1965, 
it 
performed  dynamic 
analysis 
of 
rigid 
frames  and 
trus-
ses. 
Since 
that 
time 
MASS 
II, 
MASS 
III, 
MASS 
IV, 
and 
MASS 
V have  been  developed 
to 
incorporate 
addi-
tional 
features. 
The 
reactor 
pressure 
vessel 
of 
a 
nuclear 
plant 
can  be  modeled 
to 
fit 
into 
the 
MASS 
program 
(Figure 
2). 
A program 
called 
DYNAPIPE 
evolved  from 
the 
ongI-
nal 
MASS 
computer  program  as  a 
special 
version 
to 
analyze 
the 
dynamic 
behavior 
of 
the 
piping 
system. 
For  example, 
when 
a 
pipe 
break 
is 
postulated, 
the 
response 
of 
the 
pipe 
during 
the 
accident 
can  be 
com-
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 
puted 
by 
this 
program. 
Just 
as 
the 
first 
~ffiSS 
pro-
gram 
was 
continually 
expanded,  so 
too 
was 
the 
DYNA-
PIPE 
program. 
At 
present 
there 
are 
four 
separate 
versions. 
A dynamic 
analysis 
program 
created 
independently 
from 
the 
~ffiSS 
family 
(named 
DSASS) 
is 
based 
on 
the 
theory 
that 
slabs 
and 
walls 
in 
nuclear 
plants 
can 
be  modeled  by  a  system 
of 
slabs 
vibrating 
in 
their 
own 
plane 
and 
interconnected 
by 
translational 
springs 
representing 
the 
stiffness 
of 
the 
walls. 
Figure 
3 
shows 
a 
DSASS 
model. 
Guide 
Tubes 
Dynamic Model 
of 
Reactor 
Pressure 
Vessel 
&  Internals 
Figure  2 
Combining 
the 
MASS 
IV 
and 
DSASS 
programs  produced 
DYNAS, 
which 
is 
used 
to 
perform 
seismic 
analysis 
for 
coupled 
structures 
in 
a 
nuclear 
plant. 
As 
shown 
in 
Figure 
4, 
the 
reactor 
pressure 
vessel 
is 
modeled 
as 
a  system 
of 
discrete 
masses  and 
weightless 
members, 
with 
its 
internals 
connected 
to 
the 
surrounding 
slabs 
and 
walls. 
SLSAP 
is 
a 
modified 
version 
of 
SAP 
acquired 
from 
a 
university; 
it 
is 
a 
general-purpose 
finite-element 
program. 
It 
is 
used 
to 
investigate 
framed 
structures, 
containment 
structures 
and 
sacrificial 
shields. 
When 
a 
part 
of 
SLSAP 
was 
extracted 
and  combined 
with 
DYNA-
PIPE  4, 
PIPSYS 
was 
born. 
This  program 
was 
instituted 
to 
perform 
static 
and  dynamic 
analysis 
of 
three 
di-
mensional 
piping 
systems, 
compute 
the 
combined 
stress-
es, 
and  compare  them 
to 
the 
allowable 
stresses 
of 
ap-
plicable 
codes. 
In 
this 
way 
has 
the 
evolution 
of 
the 
MASS 
family 
occurred 
during 
the 
past 
seven 
years. 
The 
program 
9 

14 
712-
12 
642-
630 
-
617 
-
602-
2 
592-
500 
-
560 
~~~~~m~~ 
Elevation 
(Ft.) 
DSASS 
Model-Slabs and  Shear 
Walls 
of 
a Turbine-Auxiliary Building 
Figure  3 
4 
3 
has  been  expanded 
many 
times 
from 
its 
original 
size; 
yet 
it 
still 
possesses 
the 
capacity 
to 
grow 
into 
other 
analysis 
areas. 
The  Limitations 
Although 
expansion 
is 
an 
important 
step 
in 
achiev-
ing 
a 
versatile 
computer  program, 
there 
should 
be  a 
limit 
to 
the 
size 
of 
the 
program 
for 
its 
optimum 
ef-
ficiency 
at 
an 
engineering 
design 
office 
(as 
distinct 
from  a 
software 
development 
firm). 
Programs 
develop-
ed 
in 
a 
design 
office 
must  remain 
flexible 
and 
readi-
ly 
modifiable. 
Overly 
large 
programs  which 
involve 
several 
writers 
tend 
to 
be 
difficult 
to 
use, 
diffi-
cult 
to 
maintain, 
difficult 
to 
modify  and 
with 
out-
puts, 
difficult 
to 
interpret. 
"Dinosaurs" 
In 
fact, 
excessively 
large 
programs  can  run 
the 
risk 
of 
being 
discarded 
altogether 
by 
the 
user 
be-
cause 
of 
their 
immense 
size. 
We 
call 
these 
obese 
algorithms 
dinosaurs. 
Nature, 
like 
some 
programmers, 
may 
have 
thought 
the 
bigger, 
the 
better, 
when 
dino-
saurs 
were 
produced. 
But 
when 
flexibility 
was 
im-
portant, 
dinosaurs 
vanished 
in 
a 
relatively 
short 
time. 
Accept  with  Caution 
More 
important 
than 
the 
limitation 
of 
computer 
program 
size 
is 
the 
avoidance 
of 
blind 
acceptance 
of 
the 
computer's 
output. 
When 
an 
instructor 
first 
introduced 
the 
slide 
rule 
to 
his 
class 
he 
explained 
that 
the 
simple 
piece 
of 
wood 
would 
enable 
them 
to 
divide, 
multiply, 
take 
square 
roots, 
do 
just 
about 
anything 
except 
add.  But 
he 
then 
cautioned 
that 
they 
10 
Slab 
-
Shear 
Wall 
----------/'--------------
7 
10 
Space 
Frame 
~ 
6 
19 
18..----
.... 
5 
17 
24 
9 
8  4 
16 
23 
3 
Combined  Building and 
Reactor  Pressure  Vessel  Dynamic Model 
Figure 4 
must 
know 
the 
approximate 
answer 
since 
the 
slide 
rule 
does 
not 
give 
the 
decimal 
point. 
Although  com-
puters 
do 
give 
the 
decimal 
point, 
the 
instructor's 
warning 
is 
still 
true, 
and 
we 
should 
often 
remind 
ourselves 
of 
it. 
Knowing 
the 
limitations 
of 
the 
computer  program 
will 
enhance 
the 
success 
of 
its 
growth.  0 
NOTICE 
The plates for  printing 
TH 
E 
COM 
PUTE 
R D I RECTO 
RY 
AND 
BUYERS'  GUIDE,  1974,  have  been  at 
the 
printer 
and  waiting 
to 
run  on 
his 
presses since  early September, 
while 
the 
printer waits for  the delivery of  promised 
pa-
per. 
As 
of 
Nov. 
13 
the 
printer was  still  waiting. 
We 
re-
gret very  much this delay -which 
is 
outside 
of 
our pos-
sibilities of control. 
To partially compensate for  this delay, any purchaser 
of 
the 
1974 directory may order a  copy 
of 
the 
1973 di-
rectory 
at 
half  price  ($9.25  instead  of $18.50).  Prepay-
ment 
is 
necessary. 
Edmund 
C. 
Berkeley,  Editor 
COMPUTERS 
and 
PEOPLE 
for 
December. 
1974 

The 
Radiation 
from 
Computers 
Into 
Everywhere 
Neil 
Macdonald, Survey 
Editor 
"Computers and People" 
"Dear 
#067-12-3948*: 
You are  in  danger. 
We 
don't 
know 
who  you are 
but 
the 
government 
does. 
They've 
got 
your 
number 
and they're 
not 
the 
only 
ones. 
" 
1. 
From 
Society 
of 
Manufacturing Engineers 
20501 
Ford 
Road 
Dearborn, 
MI 
48128 
How 
industry 
is 
using 
computer-aided 
technology 
to 
obtain 
good  economic 
results 
will 
be  emphasized 
at 
the 
third 
Computer-Aided  Design  and  Computer-Aided 
Manufacturing  Conference  and 
Exposition. 
This 
is 
sponsored 
by 
the 
Society 
of 
Manufacturing 
Engineers 
at 
the 
Hyatt 
Regency  O'Hare 
Hotel 
in 
Chicago 
Febru-
ary 
10-13,  1975.  Nine  Conference 
sessions 
and  dem-
onstrations 
of  computer-based  equipment,  systems,  and 
software 
used 
in 
industrial 
applications 
will 
com-
prise 
CAD/CAM 
III. 
More 
than 
1,000 
industrialists, 
manufacturing 
ex-
ecutives, 
and 
engineers 
responsible 
for 
computer-
based 
industrial 
and 
manufacturing 
operations 
are 
expected 
to 
attend. 
2. 
From 
Association 
for 
Computing Machinery 
1133 Avenue 
of 
the Americas 
New 
York, 
NY 
10036 
The 
Association 
for 
Computing  Machinery  announces 
a 
new 
quarterly, 
ACM 
TRANSACTIONS 
ON 
MATHEMATICAL 
SOFTWARE 
(TOMS). 
The 
first 
issue 
is 
scheduled 
for 
March,  1975. 
This 
quarterly 
will 
publish 
significant 
research 
and  development 
results 
in 
the 
area 
of 
fundamental 
mathematical 
algorithms 
and 
associated 
software 
(com-
puter 
programs). 
Papers 
and 
other 
items 
will 
have 
natural 
importance  and 
relevance 
to 
mathematical 
soft-
ware  and 
they 
will 
support 
significant 
areas 
of 
com-
puter 
application. 
The 
content 
of 
papers 
in 
those 
areas 
that 
are 
primarily 
applications 
will 
be 
rele-
vant 
to 
a 
reasonably 
wide 
class 
of 
problems  and 
not 
just 
to 
the 
specific 
considerations 
that 
motivated 
the 
paper. 
There 
will 
be 
increasing 
emphasis 
on 
utilitarian 
values 
of 
programs. 
3. 
From 
David 
L. 
Emerick 
Association 
of 
Computer Time-Sharing 
Users 
c/o Borg Warner  Chemicals 
Borg Warner  Corporation 
Parkersburg, 
WV 
26101 
Computer 
time-sharing 
users 
are 
being 
invited 
to 
join 
a 
new 
non-profit 
professional 
association, 
The 
Association 
of 
Computer  Time-Sharing 
Users, 
dubbed 
"ACTSU." 
The 
stated 
purpose 
of 
the 
association 
is 
"the 
evaluation, 
comparison  and  improvement 
of 
the 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 
services 
offered 
by 
the 
time-sharing 
industry." 
The 
Association 
will 
seek 
to 
help 
time-sharing 
users. 
Comprehensive 
industry 
surveys 
are 
planned, 
to 
provide 
members 
with 
comparisons  and 
evaluations 
of 
the 
services 
offered 
by 
time-sharing 
companies. 
Some 
of 
the 
aspects 
that 
the 
industry 
surveys 
will 
cover 
include: 
processing 
costs, 
operating 
charac-
teristics, 
pre-programmed  packages, 
frequency 
of 
down-time, 
quality 
of 
technical 
support, 
geographi-
cal 
coverage, 
liability 
under 
service 
contracts, 
and 
quality 
of 
educational 
materials. 
Interested 
persons 
are 
urged 
to 
write 
ACTSU, 
210 
Fifth 
Avenue, 
New 
York,  N.Y.  10010 
or 
to 
telephone 
Hillel 
Segal  (212)  752-2000, 
Ext. 
8379, 
for 
addi-
tional 
information 
and  membership 
applications. 
4. 
From 
Karen 
A. 
Duncan 
Association 
for 
the  Development 
of 
Computer-Based 
Instructional Systems  (ADCIS) 
c/o 
Office 
of 
Computer Resources 
College 
of 
Dental Medicine 
80 
Barnes  St. 
Charleston, 
SC 
29401 
The 
1975 
Winter 
Conference 
of 
the 
Association 
for 
the 
Development 
of 
Computer-Based 
Instructional 
Sys-
tems 
is 
sponsored 
by 
this 
college, 
and 
will 
take 
place 
here 
January 
28-30,  1975. 
Persons 
interested 
in 
computer-assisted 
instruc-
tion 
or 
computer-managed 
instruction 
are 
invited. 
This 
conference 
provides 
a 
professional 
arena 
for 
the 
sharing 
of 
research 
findings, 
operational 
notes, 
theories, 
educational 
strategies 
and  developments 
regarding 
CAl 
and 
CMI. 
Commercial  and  noncommercial 
groups 
are 
invited 
to 
discuss 
their 
release 
policies 
and 
potential 
ways 
in 
which  courseware 
may 
be 
shared. 
5. 
From 
Civil Liberties  Union 
of 
Massachusetts 
3 
Joy 
St. 
Boston,  MA 
02108 
Dear  u067-12-3948*: 
You 
are 
in 
danger. 
We 
don't 
know 
who 
you 
are, 
but 
the 
government 
does. 
They've 
got 
your  number  and 
they're 
not 
the 
only 
ones. 
Your  bank  has 
it, 
and  so  does  your 
insurance 
company, 
your 
credit 
card 
company,  and  even 
the 
Registry 
of 
(please 
turn 
to 
page 
29) 
*This 
is 
a 
fictitious 
number. 
11 

The  Computer  Industry  and  Unionization 
A. 
A. 
I mberman 
I mberman and 
De 
Forest 
Consultants  to  Management 
209 
South  LaSalle  St. 
Chicago, 
III. 
60604 
"The most painful way to 
learn 
about unionization 
is 
to  lose 
a National  Labor  Relations  Board election. " 
The 
Computer 
Field:  Ripe for  Unionization? 
Can 
the 
computer 
industry 
grow  and  expand 
in 
pro-
duction 
and 
sales 
without 
experiencing 
some 
problems 
with 
labor? 
The 
rising 
tide 
of 
strikes 
(in 
union-
ized 
plants 
producing 
computer 
hardware), 
and 
of 
union 
organizing 
campaigns 
in 
the 
non-union 
plants, 
is 
some 
indication 
of 
what 
lies 
ahead. 
The 
computer 
industry 
is 
expected 
to 
chalk 
up 
new 
performance 
records 
this 
year, 
with 
shipments 
ex-
ceeding 
$10 
billion. 
A 
10% 
in~rease 
is 
forecast, 
in 
response 
to 
strong 
demands 
both 
in 
the 
United 
States 
and 
abroad. 
Industry 
revenues 
are 
currently 
grow-
ing 
even  more 
rapidly 
than 
shipments. 
In 
part, 
this 
differential 
reflects 
the 
relatively 
slow  pace 
of 
trade-ins 
of 
third 
generation 
equipment 
in 
connec-
tion 
with 
the 
purchase 
of 
new 
computers. 
Addition-
ally, 
despite 
stiff 
borrowing 
costs, 
manufacturers 
are 
experiencing 
a 
higher 
than 
usual 
percentage 
of 
outright 
sales 
and  a 
corresponding 
decline 
in 
direct 
leasing. 
Helping 
to 
account 
for 
this 
shift 
are 
gains 
in 
third-party 
leasing 
and 
the 
popularity 
of 
less 
ex-
pensive 
mini-computers. 
The 
computer 
industry's 
success 
in 
maintaining 
impressive 
growth 
largely 
reflects 
an 
impressive 
ability 
to 
achieve 
continuing 
advances 
in 
hardware. 
In 
particular, 
rapid 
strides 
in 
semiconductor 
tech-
nology  have 
led 
to 
significant 
improvements 
in 
com-
puter 
memory 
capacities 
and 
operating 
speeds 
while, 
at 
the 
same 
time, 
enabling 
manufacturers 
to 
reduce 
prices. 
All 
of 
these 
factors 
indicate 
eventual 
la-
bor 
union 
activities. 
212 
Union  Victories 
In 
the 
last 
four 
years, 
I  have 
analyzed 
212  union 
victories 
in 
representation 
elections 
in 
a  whole 
va-
riety 
of 
industries. 
Of 
the 
212  companies,  9  were 
in 
the 
professional, 
scientific 
and 
controlling 
in-
struments 
(manufacturing) 
industry. 
I  found 
that 
timely 
precautions 
might  have 
prevented 
most 
of 
these 
union 
victories. 
How 
the 
trend 
had  gone 
in 
the 
professional, 
scientific 
and 
controlling 
instru-
ments 
industry 
might  be 
judged 
from 
the 
accompanying 
table. 
The 
guideline 
controls 
have  had 
some 
hamper-
ing 
influence 
on 
union 
activity. 
As 
a 
result 
of 
our 
comprehensive 
study, 
these 
conclusions 
became 
evident: 
1. 
Most 
elections 
in 
which  wages  and  hours  were 
alleged 
to 
be 
the 
main 
issue 
(which 
accounted 
for 
12 
~. 
A. 
Imberman 
did 
his 
undergraduate 
work 
at 
New 
York 
Univ., 
and 
his 
graduate 
work 
at 
Johns 
Hopkins. 
He 
has 
directed 
the 
Management  Seminar 
at 
the 
Univ. 
of 
Chicago  and 
Illinois 
Institute 
of 
Technology 
for 
over 
20 
years. 
He 
has 
written 
widely, 
and 
is 
an  employee 
relations 
consultant 
to 
major  companies, 
including 
Dupont,  Avis, 
Mc-
Graw 
Edison, 
Sears 
Roebuck,  and 
many 
others. 
about 
60 
per 
cent 
of 
the 
elections), 
were 
won 
by 
the 
unions 
because 
of 
employee 
ignorance 
of 
the 
com-
petitive 
situation 
of 
the 
company.  Employer 
speeches 
in 
the 
election 
period 
had 
no 
effect. 
They  were 
too 
late. 
2. 
Most 
complaints 
about  working 
conditions 
(a 
basic 
cause 
of 
nearly 
30 
per 
cent 
of 
the 
elections) 
were 
well-founded 
and 
reflected 
real 
issues. 
Elec-
tion 
speeches 
had 
no 
effect 
here 
either. 
3. 
Most 
elections 
in 
which 
arbitrary, 
tyrannical 
and 
abusive 
supervisors 
were 
specifically 
named,  were 
truly 
the 
result 
of 
poor 
supervisory 
methods. 
More 
than 
50 
per 
cent 
of 
the 
elections 
involved 
his 
is-
sue. 
The 
most 
painful 
way 
to 
learn 
about 
unionization 
is 
to 
lose 
a 
National 
Labor 
Relations 
Board 
election. 
Yet  even 
with 
disputes 
over  money, 
almost 
all 
labor 
unrest 
could 
have  been 
quelled 
before 
unions  took 
control 
of 
the 
work 
force. 
How? 
By 
setting 
up 
a 
two-way  communications  system,  and 
training 
super-
visors 
in 
modern  management  methods. 
Failure 
to 
Listen 
to 
Employees 
A 
typical 
example  of 
this 
lack 
of 
two-way 
commu-
nications 
--
this 
failure 
to 
listen 
to 
employees 
--
taken 
from 
39 
of 
these 
212 
election 
situations, 
is 
the 
case 
history 
of 
a 
single 
department 
in 
an 
East 
Coast 
plant 
in 
this 
industry 
(professional, 
scien-
tific 
and 
controlling 
instruments 
--
manufacturing). 
The 
department 
had 
developed 
troubles 
that 
led 
to 
an 
election. 
This 
was 
a 
basic 
department 
on 
which 
other 
pro-
duction 
departments 
depended.  Within 
the 
past 
year 
its 
quality 
of  work  had 
deteriorated. 
Production 
schedules 
seemed 
too 
often 
to 
be 
out 
of 
gear 
with 
the 
rest 
of 
the 
plant. 
Union 
organization 
in 
the 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 

s 
s 
Professional,  Scientific and  Controlling 
I nstruments  (Manufacturing) 
Fiscal 
Number 
of 
NLRB 
Number 
Won 
Percent 
Won 
Year 
Elections 
Held 
By 
Unions 
By 
Unions 
1973  67 
35 
52.2 
1972  62 
29 
46.7 
1971 
46 
14 
30.4 
1970 
51 
17 
33.3 
1969  62 
26 
41.9 
1968  68 
35 
51.4 
1967  48 
21 
43.7 
1966  59 
31 
52.5 
Source: 
National 
Labor 
Relations 
Board 
Reports. 
plant 
had  been 
led 
by  employees  from 
this 
basic 
de-
partment. 
The 
plant 
manager  had 
talked 
with 
the 
department 
supervisor 
a  number  of 
times. 
The 
answer 
was 
more 
or 
less 
the 
same:  employees 
in 
the 
department 
were 
quarrelling, 
there 
were 
bitter 
disputes 
over 
who 
was 
to 
be 
favored 
with 
overtime 
and 
Saturday 
work,  squab-
bles 
over 
department 
seniority, 
some 
hard 
feeling 
over 
wage 
differentials, 
and 
general 
distrust 
of 
management. 
None 
of 
this 
had  been 
true 
before. 
What 
was 
worse, 
there 
was 
nothing 
that 
management 
could 
put 
its 
finger 
on, 
to 
correct, 
even 
after 
the 
~ 
election. 
The  Supervisor's  Health 
Called 
in 
to 
advise 
the 
company 
on 
how 
to 
deal 
with 
the 
growing 
absenteeism 
and 
turnover 
in 
the 
plant, 
I 
elicited 
some 
interesting 
information 
from 
the 
employees 
in 
that 
department 
which  went 
far 
to 
explain 
the 
election 
result. 
After 
a  number 
of 
weeks 
of 
interviews, 
it 
seemed 
to 
me 
that 
the 
trouble 
seemed 
to 
revolve 
around 
the 
department 
supervisor 
himself. 
One 
of 
the 
troubles 
mentioned  by 
all 
employees 
in 
the 
department 
was 
the 
harshness 
of 
the 
supervisor. 
He 
was 
unreasonable, 
tyrannical, 
arbitrary, 
hard 
to 
get 
along 
with. 
Since 
he  had  been 
with 
the 
company 
for 
about 
15 
years, 
and 
the 
complaints 
were 
recent 
in 
origin, 
I 
decided 
to 
talk 
with 
him. 
Heat 
and 
Cold 
It 
was 
discovered 
that 
he  had 
arthritis, 
and  I 
recommended 
that 
the 
supervisor 
be 
sent 
to 
a 
physi-
cian. 
Since 
his 
department 
was 
in 
a 
colder 
part 
of 
the 
plant, 
his 
arthritic 
pain 
was 
accentuated 
by 
lack 
of 
heat. 
This 
affected 
his 
whole 
disposition 
and 
actions 
towards 
his 
employees. 
Brought 
to 
the 
company's 
attention, 
a 
new 
fore-
man 
was 
assigned 
to 
that 
department. 
The 
older 
fore-
man 
was 
transferred 
to 
another 
department 
where 
room 
temperatures 
were 
much 
higher. 
Within 
three 
months, 
the 
trouble 
in 
the 
basic 
department 
cleared 
up.  The 
old 
foreman 
--
in 
the 
new 
"hot" 
department 
--
was 
like 
a  changed  man.  But 
the 
company  had 
already 
lost 
the 
election. 
No 
amount 
of 
veiled 
promises 
or 
threats 
in 
speech-
es 
to 
employees 
during 
the 
election 
period 
could 
have 
any 
effect 
on 
this 
situation. 
Only 
careful 
listen-
ing 
to 
the 
employees 
to 
uncover 
the 
roots 
of 
the 
dis-
content 
would  have  had  any 
beneficial 
effect. 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 
Opinion 
Polls 
Hundreds 
of 
other 
managements 
try 
questionnaires, 
polls, 
"employee 
audits," 
suggestion 
boxes, 
etc., 
in 
their 
search 
for 
easy 
information 
about 
worker 
dis-
content. 
Yet 
complaints 
remain. 
For  example, 
of 
the 
212 
election 
situations 
in-
vestigated, 
some 
49 
were 
similar 
to 
the 
case 
of 
a 
Midwest  company 
in 
this 
industry. 
The  company 
tried 
an 
"opinion 
poll" 
questionnaire 
as 
a 
possible 
solu-
tion 
for 
its 
employee 
gripes, 
even 
installing 
sug-
gestion 
boxes. 
These 
suggestion 
boxes  were 
design-
ed 
to 
give 
employees  a  chance 
to 
write 
anonymously 
about 
pet 
gripes. 
The 
plan 
met 
with 
disappointment. 
The 
questionnaire 
uncovered 
only 
general 
worker 
com-
plaints; 
little 
of 
it 
was 
news 
to 
management  and 
none  of 
it 
was 
of 
any 
help 
in 
finding 
or 
pinpointing 
solutions. 
The 
suggestion 
box 
was 
crammed 
with 
sil-
ly, 
unconstructive 
criticism, 
sometimes 
quite 
vic-
ious. 
Lack 
of  Explanation 
The 
problem 
of 
still 
another 
Southwest  company 
in 
this 
industry 
comes 
to 
mind. 
Difficulties 
arose 
when 
this 
plant 
mushroomed  from  a 
small 
operation 
to 
that 
of 
a 
larger 
plant. 
Where 
the 
same 
executives 
had 
experienced 
no 
labor 
unrest 
when 
the 
facility 
was 
small, 
they 
had  an 
alarming 
amount  of 
it 
as 
the 
plant 
expanded. 
Despite 
an 
elaborate 
"employee 
au-
dit" 
and 
questionnaire, 
an 
election 
petition 
was 
filed 
with 
the 
NLRB 
and 
voting 
was 
held 
soon 
after-
wards. 
The 
company 
lost 
by  a  narrow  margin. 
Wage 
rates 
were 
the 
alleged 
reason. 
Called 
in 
by 
the 
parent 
corporation 
to 
make 
a 
detailed 
investigation, 
I  soon  uncovered 
the 
fact 
that 
most  of 
the 
difficulties 
stemmed  from 
rapid 
changes 
in 
production 
methods 
coupled 
with 
intol-
erant, 
abusive 
supervisors. 
These 
production 
chan-
ges  of 
course, 
were 
necessary 
because 
of 
changes 
in 
design, 
but 
nobody 
bothered 
explaining 
these 
things 
to 
employees.  They  were  merely 
switched 
from  one 
production 
method 
to 
another, 
and 
since 
they 
were 
being 
paid 
good 
rates, 
management 
felt 
that 
the 
em-
ployees 
merely  had 
to 
comply 
with 
orders. 
Resistance, 
to 
Change 
Unfortunately, 
most 
semi-skilled 
workers, 
after 
learning 
one 
or 
two 
operations, 
become 
frustrated 
when 
those 
operations 
are 
changed 
without 
proper 
explanation 
of 
the 
cause 
and 
without 
the 
help 
of 
patient, 
trained 
foremen. 
This 
frustration 
works 
itself 
out 
in 
various 
complaints 
about 
many 
things, 
and 
eventually, 
if 
enough  employees 
in 
the 
plant 
feel 
the 
same 
way, 
there 
is 
a  blow-up. 
After 
long 
experience, 
and 
careful 
evaluation 
of 
the 
49 
similar 
instances, 
I 
concluded 
that 
paper-
and-pencil 
questionnaires 
and 
suggestion 
boxes 
for 
blue 
collar 
workers 
cannot 
take 
the 
place 
of 
man-
to-man 
contact 
in 
the 
plant. 
A 
systematic 
procedure 
recognized 
as 
representing 
top 
management,  must  be 
used 
to 
listen 
regularly 
to 
employees,  and 
to 
act 
upon 
the 
gripes. 
Too  Simple a  Prescription? 
So 
simple 
and 
elementary 
is 
this 
prescription 
that 
every 
reader 
who 
manages  a 
factory 
will 
immed-
iately 
snort 
in 
derision. 
Every  employer 
in 
this 
industry 
believes 
that 
he 
listens 
to 
his 
employees 
and 
that 
his 
foremen 
are 
well 
trained. 
13 

Unfortunately, 
most 
employers, 
with 
the 
utmost 
good 
will 
in 
the 
world, 
do 
not 
have 
the 
patience 
to 
listen, 
or 
the 
time, 
or 
the 
systematic 
machinery. 
They 
therefore 
depend  upon 
personnel 
department 
peo-
ple 
and  more 
particularly, 
on 
foremen  and 
line 
super-
visors 
to 
listen. 
Very  few 
of 
these 
people 
know 
how 
to 
listen 
"with 
the 
third 
ear," 
a 
talent 
which  can 
be 
developed 
by 
training. 
Moreover, 
very 
few 
of 
these 
management 
people 
can 
be  depended  upon 
to 
give 
management  a 
straightfor-
ward 
report 
on 
what  employees 
are 
saying 
--
not 
that 
personnel 
department 
people, 
foremen, 
line 
supervi-
sors, 
et 
al. 
wish 
to 
deceive 
the 
front 
office. 
On 
the 
contrary, 
most 
often 
they 
are 
wholeheartedly 
on 
management's 
side. 
But  most 
of 
these 
people 
(consciously 
or 
uncon-
sciously) 
report 
only 
what 
they 
LIKE 
to 
report, 
or 
report 
only 
what 
THEY 
think 
is 
important. 
Often 
this 
is 
not 
the 
whole 
story, 
even 
if 
employees  gave  them 
the 
whole 
story, 
which 
they 
rarely 
do. 
Listening 
to 
employees 
is 
also 
a 
way 
for 
employ-
ers 
to 
forestall 
union 
organizers 
who 
roam 
smaller 
communities  of 
every 
state, 
seeking 
plants 
to 
organ-
ize. 
Once 
organized, 
union 
officials 
believe, 
the 
employees 
are 
locked 
into 
the 
union 
for 
years 
and 
years. 
How 
often 
does  a 
decertification 
election 
succeed? 
Not 
too 
often. 
Union  Tactics 
One 
common 
attack 
by 
union 
organizers 
is 
to 
visit 
employees 
in 
their 
homes 
and  promise  them 
all 
sorts 
of 
pie 
in 
the 
sky. 
The 
organizers 
don't 
have 
to 
deliver 
anything. 
Under 
the 
law 
they 
can  promise 
anything 
they 
like. 
If 
their 
promises 
don't 
work 
out, 
it's 
the 
selfish 
employer's 
fault. 
And 
the 
trouble 
continues. 
What 
can  employers  do? 
For 
this 
sort 
of 
common 
tactic, 
there 
is 
only 
one  weapon: 
LISTEN 
TO 
THE 
EMPLOYEE 
and 
train 
your 
supervisors. 
There 
is 
no 
other 
way 
that 
an  employer  can 
find 
out 
just 
what 
is 
troubling 
his 
employees, 
or 
what  he  must 
do 
to 
overcome 
the 
difficulties 
on 
which  union 
organizers 
build. 
Center 
of 
Trouble on  3rd 
or 
4th 
Floor 
Another  example,  from 
about 
21 
similar 
cases 
cov-
ered 
in 
this 
study, 
might  be 
of 
interest 
here. 
It 
was 
a 
California 
company 
in 
this 
industry. 
The 
hot-
bed 
of 
union 
sentiment 
seemed 
to 
be 
centered 
on 
the 
third 
of 
the 
four 
floors 
of 
the 
plant. 
There  seemed 
no 
obvious 
reason, 
yet 
judicious 
and 
cautious 
inter-
viewing 
of 
employees 
throughout 
the 
plant 
led 
a 
skil-
led 
consultant 
interviewer 
to 
uncover 
some 
interest-
ing 
facts. 
No 
Refrigerator 
The 
first, 
second,  and 
fourth 
floors 
had 
small 
refrigerators 
in 
the 
employee's 
restrooms. 
The 
wo-
men 
brought 
their 
lunches 
and 
deposited 
the 
bags 
in 
the 
refrigerators. 
But 
the 
women 
on 
the 
third 
floor 
had 
no 
refrigerator. 
Theirs 
had  broken 
down 
a 
year 
ago,  and  had 
never 
been 
repaired. 
They  used 
the 
second 
or 
fourth 
floor 
refrigerators. 
By 
so 
doing, 
their 
lunch  bags  were 
often 
pushed 
aside 
by 
the 
em-
ployees 
of 
the 
other 
floors; 
sometimes, 
if 
there 
wasn't 
enough  room, 
the 
third 
floor 
lunch  bags  were 
removed  from 
the 
refrigerators 
entirely. 
They  had 
complained 
to 
their 
foremen  over  and 
over, 
but 
the 
foremen  were 
too 
busy 
to 
raise 
the 
question 
with 
the 
plant 
manager. 
14 
Now 
it 
is 
difficult 
to 
believe 
that 
anything 
so 
trivial 
would 
heat 
up 
a  group  of 
about 
80  employees, 
yet 
such 
was 
the 
fact. 
From 
this 
small 
beginning, 
festering 
for 
about 
a 
year, 
80  employees  became 
dis-
satisfied 
with 
everything 
--
the 
ventilation 
in 
the 
plant, 
the 
location 
of 
the 
overhead 
lights, 
the 
treatment 
they 
received 
from 
supervisors, 
wage 
rates, 
etc. 
Everything 
the 
company 
did, 
was  bad,  bad,  bad. 
From 
this 
humble 
beginning, 
employee 
dissatisfaction 
spread 
through 
the 
plant. 
Not  a 
single 
foreman  had 
tried 
to 
deal 
with 
the 
situation, 
or 
reported 
it 
higher 
up. 
It 
took  seven  weeks 
of 
careful 
interviewing, 
care-
ful 
listening, 
and 
running 
down 
of 
all 
clues, 
to 
un-
cover 
this 
basic 
trivial 
cause. 
Installation 
of  a 
$80 
renovated 
refrigerator 
in 
the 
third 
floor 
rest-
room 
cleared 
up 
most 
of 
the 
difficulty. 
Could 
the 
company  have  uncovered 
clues 
indicat-
ing 
that 
lack 
of 
a 
refrigerator 
to 
hold 
employee 
lunch  bags 
on 
the 
third 
floor 
was 
causing 
a 
severe 
shift 
in 
employee 
sentiment? 
Without  foremen 
train-
ed 
to 
listen 
and 
report, 
the 
only 
other 
alternative 
would  be 
to 
talk 
to 
every 
employee 
in 
the 
plant. 
Troublesome 
as 
that 
might  have  been, 
it 
doesn't 
com-
pare 
with 
the 
subsequent 
trouble 
(and 
expense) 
of 
dealing 
with 
a 
union. 
"Trained  Ear" Gets  Results 
It 
takes 
special 
training 
and 
special 
techniques 
to 
invite 
and 
enjoy 
the 
confidence 
of 
employees. 
(Here  and 
there 
throughout 
the 
country 
are 
some 
skilled 
consultants, 
who 
specialize 
in 
such 
labor-
management 
techniques. 
Usually, 
these 
men 
are 
con-
nected 
with 
a 
college 
or 
university. 
Interested 
company 
executives 
might 
secure 
a 
list 
of 
recommen-
ded  names 
by 
writing 
to 
the 
University 
Research  Cen-
ter, 
121 
West 
Adams, 
Chicago, 
Illinois 
60603.) 
Sudden  Labor Trouble 
Here 
is 
another 
case 
from  our 
study 
which  some-
what 
parallels 
32 
others. 
About  300 
men 
were 
in-
volved. 
A 
70-year-old 
company 
in 
this 
industry, 
with 
no 
labor 
or 
union 
trouble 
history, 
suddenly 
found 
itself 
facing 
an 
organization 
drive. 
The 
com-
pany 
wage 
scale 
was 
in 
line 
with 
that 
of 
the 
com-
munity 
--
yet 
suddenly 
men 
in 
the 
plant 
seemed 
to 
be  swallowing 
all 
sorts 
of  union 
organizer 
promises 
--
something 
they 
had 
never 
done 
before. 
Why 
the 
sudden 
labor 
trouble? 
In 
this 
small 
town, 
no 
other 
company  had  a 
union, 
yet 
somehow 
the 
union  seemed 
to 
have 
gathered 
streng-
th 
in 
this 
plant. 
The 
company 
won 
the 
election 
by 
a 
very 
slim 
majority, 
and 
then 
as 
a 
result 
of 
unfair 
labor 
charges, 
another 
election 
was 
ordered. 
How-
ever, 
in 
the 
interim, 
the 
company  had  used 
an 
out-
side 
consultant 
who 
did 
nothing 
but 
interview 
and 
listen 
to 
employees,  and 
provide 
training 
for 
super-
visors. 
Hearing  Loss? 
The 
basis 
of 
his 
findings 
was 
the 
noise 
in 
one 
department 
that 
caused  a  number 
of 
employees 
to 
fear 
hearing 
loss. 
This 
was 
mainly 
a 
reaction 
to 
the 
current 
publicity 
about 
OSHA 
legislation, 
on 
which 
the 
union 
organizer 
capitalized. 
Those 
em-
ployees 
who 
complained  had 
merely 
been 
given 
uncom-
fortable 
ear 
plugs 
without 
explanation 
--
a 
sort 
of 
impersonal 
treatment 
which 
many 
resented. 
This 
re-
sentment  cropped 
up 
in 
complaints 
about 
many 
other 
working 
conditions 
--
formerly 
accepted 
as 
a 
matter 
(please 
turn 
to 
page 
25) 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 

i 
r 
i-
r. 
I, 
.. 
·10 
Changing  Technology  and 
Medical 
Speciali,zation 
Ray 
M. 
Antley, 
M.D. 
Department 
of 
Medical  Genetics 
Indiana 
Univ. 
School 
of 
Medicine 
Indianapolis, 
Ind. 
46202 
and 
Mary 
Ann 
Antley, M.A. 
Department 
of 
English 
Indiana  Univ.-Purdue 
Univ. 
at 
Indianapolis 
Indianapolis, 
Ind. 
46202 
"The process 
of 
data  collecting 
by 
computers will cause  interaction 
between the technology and the illness  which 
it 
is 
designed to 
diag-
nose and treat, and these changes  will result in  computers perform-
ing 
not 
old jobs better 
but 
completely 
new 
jobs. " 
Twenty-Five Years 
of 
Computers 
in  Medicine 
Twenty-five 
years 
of 
computers, 
and  computers 
in 
medicine, 
bring 
us 
to 
the 
threshold 
of 
their 
acceler-
ated 
introduction 
into 
clinical 
medicine. 
To 
date, 
there 
has  been  an 
opportunistic 
application 
of 
com-
puters 
to 
medicine. 
This 
unstructured 
approach 
is 
about 
to 
change,  however, 
(1) 
because 
of 
the 
techno-
logical 
advances  which  have  been 
achieved 
through 
computer 
research 
and 
are 
ready 
for 
utilization, 
and 
(2) 
because 
of 
the 
developments 
in 
concepts 
of 
com-
prehensive 
health 
care 
and 
its 
delivery. 
People 
who 
have  had 
little 
or 
no 
care, 
people 
who 
have  had 
par-
tial 
care 
through 
some 
form 
of 
insurance, 
and 
people 
who 
have  been 
able 
to 
afford 
total 
care, 
are 
collec-
tively, 
either 
through 
insurance, 
through 
unions, 
or 
through 
government 
health 
programs,  demanding  compre-
hensive 
health 
care 
at 
moderate 
cost 
to 
modest 
cost. 
The 
dual 
problems 
of 
obtaining 
manpower 
to 
staff 
such 
a 
health 
service 
and 
of 
keeping 
the 
total 
cost 
of 
that 
service 
as 
low 
as 
possible, 
lend 
themselves 
to 
solutions 
through 
technology. 
Evolution 
of 
Technology 
The 
developments 
in 
technology 
act 
in 
concert 
with 
the 
recognition 
of 
the 
need 
for 
expanded 
medical 
care. 
They 
are 
compounded 
by 
the 
existing 
doctor 
shortage. 
These  powerful 
interacting 
forces 
will 
structure 
the 
future 
application 
and  development 
of 
automation 
in 
medicine. 
These 
forces 
have 
thus 
far 
tended 
to 
chan-
nel 
technological 
application 
towards 
assisting 
the 
primary 
physician 
in 
the 
delivery 
of 
health 
care. 
Furthermore, 
the 
evolution 
of 
technology 
is 
such 
that 
this 
assisting 
phase 
will 
be 
transient, 
for 
pro-
grams 
are 
already 
being 
developed 
which 
will 
do 
much 
of  what 
the 
physician 
does 
now. 
Finally, 
the 
process 
of 
data 
collecting 
by  computers 
will 
cause 
interac-
tions 
between 
the 
technology 
and 
the 
substrate 
of 
ill-
ness 
which 
it 
is 
designed 
to 
diagnose 
and 
treat, 
an V 
these 
changes 
will 
result 
in 
computers 
performing 
no 
old 
jobs 
better, 
but 
completely 
new 
jobs 
• 
_____ 
This 
article 
seeks 
to 
explore 
the 
evolution 
of 
machines 
in 
medicine 
and 
to 
discuss 
some 
of 
the 
prob-
lems 
inherent 
in 
change. 
We 
have 
divided 
the 
evolu-
tion 
in 
medical 
technology 
into 
three 
phases 
based 
upon 
inferences 
about 
the 
role 
of 
the 
physician 
in 
relationship 
to 
his 
machines  and 
his 
patients. 
Phase 
I 
is 
called 
the 
assisting 
phase; 
Phase 
II, 
the 
auto-
mated 
phase; 
and  Phase 
III, 
the 
environmental 
control 
phase. 
After 
each 
phase 
we 
have 
attempted 
to 
indi-
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 
cate 
some 
of 
the 
consequences 
of 
the 
different 
stages. 
It 
should 
be 
apparent 
that 
different 
lev-
els 
of 
the 
progression 
are 
occurring 
simultaneously 
and 
that 
there 
is 
no 
sharp 
demarkation 
between 
phas-
es. 
What 
might 
not 
be 
apparent 
is 
that 
Phase 
II 
should 
be  a 
reality 
in 
the 
next 
decade 
and 
that 
Phase 
III 
will 
probably 
be 
the 
dominant  form 
of 
medical 
practice 
within 
the 
career 
of 
present 
day 
medical 
students. 
Phase  I -
The 
Assisting  Phase 
The 
introduction 
of 
technology 
into 
medicine 
has 
been 
at 
such  a 
rate 
that 
each 
new 
machine  has  been 
seen  as  an 
individual 
innovation 
which 
helps 
with 
a 
particular 
diagnostic 
or 
treatment 
function. 
When 
a 
new 
machine 
appears, 
it 
is 
tested 
and 
incorpora-
ted 
into 
the 
doctor's 
routine 
on 
the 
basis 
of 
its 
utility 
and 
efficiency. 
This 
random 
incorporation 
of 
such 
innovations 
as 
the 
electrocardiogram 
(ECG), 
the 
electroencephalogram 
(EEG), 
the 
fiber 
gastro-
scope, 
the 
heart-lung 
machine  and 
patient 
monitor-
ing 
equipment 
throughout 
all 
fields 
of 
medicine 
has 
obscured 
the 
collective 
impact 
on 
medical 
practice 
of 
machines, 
i.e., 
the 
channelling 
of 
medical 
prac-
tice 
toward 
technological 
specialties. 
The 
phenom-
ena 
of 
medical 
specialization 
has  been 
largely 
at-
tributed 
to 
an 
increased 
work  load  and 
to 
the 
in-
formation 
explosion. 
This 
hypothesis, 
however, 
misses 
the 
important 
relationship 
between 
the 
de-
velopment 
of 
a  machine  and 
the 
development 
of 
in-
formation 
and  a 
specialty 
as 
a 
direct 
result 
of 
that 
machine. 
The 
Electrocardiogram and 
the 
Cardiologist 
For 
example, 
the 
introduction 
of 
the 
electrocar-
diogram 
did 
much 
to 
strengthen 
the 
cardiologist 
--
who 
was 
previously 
solely 
organ 
based. 
The 
ECG 
established 
scientific 
credibility 
to 
the 
diagnosis 
and 
treatment 
of 
myocardial 
infarction 
syndrome. 
Second,  a 
literature 
developed 
about 
the 
technical 
aspects 
of 
the 
ECG 
machine 
itself, 
followed 
by 
a 
literal 
explosion 
of 
information 
about 
ECG 
diagnosis. 
Each 
diagnosis 
has 
usually 
been  enhanced 
by 
reports 
related 
to 
prognosis 
and 
treatment 
to 
such  an 
extent 
that 
it 
becomes  a 
full 
time 
job 
keeping 
abreast 
of 
the 
publications 
in 
this 
field 
alone. 
Although  more  has  gone 
into 
the 
development 
of 
cardiology 
than 
the 
ECG, 
it 
is 
hard 
to 
conceive 
of 
that 
specialty 
without 
it. 
From 
this 
beginning 
there 
has  been  a 
proliferation 
of 
other 
innovations: 
15 

the 
intensive 
care 
units, 
specialists 
in 
intensive 
care, 
respiration 
therapists, 
second 
generation 
ma-
chines 
like 
pace  makers  and 
cardiac 
monitors. 
As 
technology 
provides 
equipment 
to 
investigate 
a 
par-
ticular 
organ  system 
in 
depth, 
a 
new 
information 
ex-
plosion 
and 
subsequent 
specialty 
frequently 
develops. 
Thus, 
the 
new 
technology's 
effects 
have  been 
to 
im-
prove  medicine 
through 
specialization, 
to 
increase 
its 
complexity, 
and 
to 
heighten 
its 
intellectual 
stimulation 
related 
to 
content. 
New  Innovations 
in 
Machines 
Relatively 
recent 
innovated 
machines 
are 
in 
the 
laboratory, 
the 
nursery, 
the 
intensive 
care 
unit, 
the 
emergency 
room 
and 
the 
operating 
room.  They 
pervade 
the 
care 
of 
the 
critically 
ill 
inpatient. 
They 
structure 
the 
clinic's 
business 
procedures 
if 
not 
influencing 
the 
individual 
doctor's 
practice 
pro-
cedures. 
It 
is 
significant 
that, 
in 
addition 
to 
helping 
the 
doctor 
do 
what  he 
did 
before, 
these 
machines 
do 
jobs 
which 
really 
cannot 
be 
equaled 
by 
the 
physician 
alone. 
Increasingly, 
machines 
are 
molding 
the 
way 
in 
which  medicine 
is 
practiced, 
even 
to 
the 
extent 
of 
having 
influence 
over 
the 
formulation 
of 
medical 
ethics 
in 
regard 
to 
the 
definition 
of 
death. 
This 
same 
technology, 
by 
its 
very 
existence, 
raises 
ex-
tremely 
perplexing 
questions 
about 
who 
will 
die. 
Dependence 
of 
the 
Doctor 
on  Machines 
The 
introduction 
of 
technology 
into 
medicine  has 
several 
effects 
upon 
the 
doctor. 
One 
is 
that 
in 
routine 
practice, 
the 
doctor 
has 
unconsciously 
be-
come 
dependent 
on 
the 
laboratory, 
x-ray, 
drugs 
pack-
aged 
by 
automated  systems  and 
various 
electronic 
in-
struments 
to 
such 
an 
extent 
that 
the 
practice 
of 
medicine  would  be 
starkly 
different 
if 
they 
were 
suddenly  removed. 
By 
examining 
the 
prospects 
of 
their 
removal,  one 
is 
able 
to 
develop 
some 
feel 
for 
the 
amount  of 
evolution 
they 
have 
induced. 
Also,  a 
forward 
anticipation 
of 
comparable  change 
in 
the 
next 
ten 
years 
to 
what 
we 
have  had 
in 
the 
past 
25 
years 
is 
helpful 
in 
grasping 
the 
magnitude  and 
rates 
of 
change 
we 
will 
experience. 
Changes in  Medical  Practice 
Thus, 
these 
machines,  which  have  been 
readily 
ac-
quired 
and  used 
by 
the 
medical 
profession 
to 
help 
them  perform 
tasks 
and 
detect 
disease 
more 
quickly 
and 
accurately, 
have 
subtly 
effected 
a  change 
in 
the 
environment 
of 
medical 
practice 
in 
the 
twentieth 
cen-
tury. 
A change 
in 
the 
environment 
is 
rarely 
only 
additive 
or 
linear. 
You 
seldom, 
if 
ever, 
have  an 
old 
environment 
PLUS 
a 
new 
element, 
such  as  a 
printing 
press 
or 
an 
ele~tric 
plug; 
what  you  have 
is 
a 
totally 
new 
envIronment. l 
From 
the 
individual 
family 
doctor 
of 
the 
early 
1900's 
who 
treated 
a 
patient 
for 
all 
his 
illnesses, 
practice 
has  evolved 
in 
a 
predictable 
technological 
form 
into 
a  system 
in 
which 
many 
specialists 
treat 
specific 
diseases 
that 
manifest 
themselves 
in 
the 
same 
patient. 
This 
evolution 
from 
patient-centered 
to 
disease-centered 
treatment 
has 
taken 
place 
grad-
ually 
over 
the 
past 
70 
years. 
The 
rate 
of 
change 
has  been  slow  enough 
to 
allow 
for 
the 
training 
of 
new 
physicians 
in 
the 
new 
specialties 
created 
by  an 
expanding  medical 
technology. 
The 
very 
real 
changes 
in 
the 
role 
of 
the 
physician 
and 
the 
system 
of 
health 
delivery 
that 
have 
occurred 
have  been 
effected 
with 
relatively 
little 
trauma 
to 
the 
earlier 
physicians 
16 
who 
have  been 
able 
to 
continue 
their 
roles 
as 
gen-
eralists 
in 
an 
increasingly 
specialized 
world. 
Med-
icine 
has 
adjusted 
to 
the 
presence 
of 
technology 
and 
now 
reflects 
its 
qualities 
so  smoothly  and  so 
com-
pletely 
that 
it 
requires 
a 
detached 
view 
to 
even 
rec-
ognize 
the 
great 
change 
in 
orientation 
that 
has  oc-
curred. 
Phase  II -
The 
Automated 
Phase 
Now, 
into 
this 
seemingly 
stabilized 
system  of 
health 
delivery 
care 
based 
on 
scientific, 
technolo-
gical 
specialization, 
a 
different 
sort 
of 
machine 
is 
being 
introduced. 
Its 
long  term 
effects 
will 
re-
sult 
in 
another 
major  change 
in 
the 
environment 
of 
medical 
practice. 
These 
are 
automated  machines 
that 
are 
capable 
of 
replacing 
those 
functions 
which  have 
so 
far 
been  performed  only 
by 
the 
physician 
himself. 
Because 
the 
physician 
has 
become 
conditioned 
to 
ac-
cepting 
technology 
in 
medicine, 
these 
more 
sophisti-
cated 
instruments 
have  been 
introduced 
without 
arous-
ing 
questions 
about 
their 
long-term 
implications, 
or, 
more 
often, 
without 
even  a 
recognition 
of 
what 
these 
implications 
are. 
A 
computer-acquired 
history 
and  a  programmed  phy-
sical 
examination 
are 
today  almost 
existing 
reali-
ties.
2
,3,4,5 
Machines  which 
will 
perform 
a 
physical 
examination 
by 
analyzing 
data 
coming 
directly 
from 
self-propelled 
sensing 
devices 
are 
projected 
at 
this 
time. 
Once 
the 
software 
has  been 
developed, 
the 
retrieval 
of 
data 
from  medical 
records, 
along 
with 
results 
from  automated 
clinical 
laboratories, 
and 
the 
integration 
of 
these 
data 
for 
processing 
by 
a  computer 
will 
be 
simple 
procedures. 
The 
import 
from 
the 
capabilities 
of 
these 
existing 
and 
realis-
tically 
projected 
machines 
is 
that 
they 
are, 
and 
will 
be, 
able 
to 
do 
what 
the 
physician 
now 
does. 
Here 
again, 
as 
in 
1900, 
the 
role 
of 
the 
physician-
will 
be 
affected 
and 
the 
present 
system 
of 
health 
delivery 
will 
restructure 
itself 
around  a 
new 
con-
cept 
in 
patient 
care. 
But 
this 
change 
will 
be  un-
like 
the 
gradual 
readjustment 
that 
accrued 
when 
medi-
cine 
entered 
the 
technological 
era. 
Because 
of 
the 
productive 
capacity 
of 
our 
electronics 
industry, 
the 
lead 
time  between 
the 
development 
of 
an  automated 
process 
in 
health 
delivery 
care 
and 
the 
moment 
when 
widespread  change 
occurs 
will 
be 
short, 
that 
is 
years, 
not 
decades. 
The 
resulting 
effect 
on 
the 
physician 
will 
be  one 
of 
frequent 
and 
significant 
change 
in 
his 
role. 
Trained 
as 
a 
specialist 
in 
disease 
detection 
he 
will 
be 
confronted 
with 
ma-
chines 
that 
are 
equally 
specialized, 
that 
can 
also 
differentiate 
diseases, 
and 
that 
will 
bring 
to 
this 
process 
a 
degree 
of 
efficiency 
and  a 
capability 
for 
information 
storage 
far 
beyond 
human 
abilities. 
"Future 
Shock" 
for 
the 
Physician 
Thus,  as 
in 
so 
many 
other 
fields 
that 
have 
be-
come 
automated, 
the 
physician 
will 
experience 
not 
.the 
introduction 
of 
new 
techniques 
which  can 
co-
exist 
with 
his 
present 
job, 
but 
the 
actual 
replac~
ment 
of 
much 
of 
his 
present 
function 
by 
a  machine. 
The 
years 
of 
training 
in 
scientific 
disease 
detec-
' 
tion 
and 
the 
old 
methods  of 
specialist-based 
health 
care 
delivery 
will 
have  been  made, 
in 
large 
measure, 
obsolete. 
He 
will, 
in 
fact, 
experience 
"future 
shock". 
Future 
shock 
occurs 
when 
you 
are 
confronted 
by 
the 
fact 
that 
the 
world  you  were 
educated 
to 
believe 
in 
doesn't 
exist. 
Your  images 
of 
re-
ality 
are 
apparitions 
that 
disappear 
on 
con-
tact. 
There 
are 
several 
ways 
of 
responding 
to 
such  a 
condition, 
one 
of 
which 
is 
to 
with-
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 

. 
v 
draw  and 
allow 
oneself 
to 
be  overcome  by  a 
sense 
of 
impotence. 
More 
commonly,  one  con-
tinues 
to 
act 
as 
if 
his 
apparitions 
were 
sub-
stantial, 
relentlessly 
pursuing 
a 
course 
of 
action 
that 
he 
knows 
will 
fail 
him.l 
A 
third 
reaction 
to 
being 
suddenly  exposed 
to 
a 
new 
environment 
is 
to 
rationally 
evaluate 
your 
situ-
ation 
and 
adjust 
to 
the 
demands 
of 
the 
new 
milieu. 
In 
order 
to 
make 
this 
reorientation, 
the 
physician 
will 
first 
need 
to 
recognize 
that 
there 
is 
a 
new 
environment. 
Then 
he 
will 
need 
to 
have 
the 
flexi-
bility 
necessary 
to 
adapt 
to 
the 
new 
roles 
which 
the 
doctor 
will 
fulfill 
in 
a  world 
of 
automated 
medicine. 
Some 
of 
these 
roles 
will 
be 
in 
the 
new 
specialties, 
created 
by 
the 
machines  once  more; 
others 
will 
be 
in 
computer 
administration 
and  programming; 
many 
more 
will 
be 
connected 
with 
counseling 
patients 
and 
re-
sponding 
to 
their 
illnesses 
with 
empathy.  There 
are 
many 
variations 
within 
these 
categories. 
The 
important 
thing 
is 
for 
the 
physician 
today 
to 
recog-
nize 
the 
change  which 
is 
going 
on 
in 
medicine 
and 
automation 
so 
that 
he 
will 
be 
prepared 
for 
the 
new 
demands  which 
will 
follow. 
Phase 
III 
-
The 
Environmental 
Control 
Phase 
The 
development 
of 
machines  which 
are 
able 
to 
replace 
hitherto 
unique 
diagnostic 
functions 
of 
the 
physician 
is 
only 
the 
intermediary 
phase 
in 
the 
evo-
lution 
of 
machines 
in 
medicine. 
Rapidly 
following 
this 
era 
will 
come 
the 
stage 
in 
which 
heuristic 
com-
puters 
interact 
to 
develop 
strategies 
for 
medical 
care 
which 
are 
peculiarly 
suitable 
to 
the 
abilities 
of 
technology 
rather 
than 
to 
human 
organization. 
Changes 
in 
information 
about 
the 
illness 
and 
the 
alterations 
in 
disease 
caused 
by 
the 
automation 
\~ill 
result 
in 
changes 
not 
only 
in 
functions 
related 
to 
diagnosis 
and 
treatment, 
but 
also 
in 
the 
goals 
of 
medical 
care. 
Perhaps 
the 
first 
goal 
of 
automated 
medical 
care 
should 
be 
to 
treat 
a 
sick 
person, 
and 
this 
would 
shift 
to 
prevention 
of 
illness, 
and 
in 
time 
this 
might  change 
to 
maintaining 
an 
equilibrium 
between 
birth 
and 
death 
rates. 
These 
goals 
will 
undoubtedly 
be 
altered 
from 
time 
to 
time 
by 
the 
needs 
of 
society. 
At 
this 
point, 
the 
computer 
may 
be 
assigned 
a 
task 
and 
the 
assigner 
not 
know 
how 
the 
computer 
arrived 
at 
an  answer, 
but 
only 
that 
it 
arrived 
at 
a 
carefully 
planned 
answer, 
perhaps 
making 
calculations 
and 
tri-
als 
that 
it 
would 
take 
an 
individual 
100 
or 
more 
years 
to 
duplicate. 
This 
later 
phase 
of 
automation 
will 
be 
characterized 
by 
two 
new 
facets 
as 
described 
by  John 
Diebold: 
(1) 
Technological 
advances 
are 
self-gener-
ating. 
"No 
longer 
must 
technological 
progress 
wait 
on 
the 
next 
individual 
scientific 
discovery: 
tech-
nology 
itself 
is 
pushing 
research 
into 
new 
discov-
eries 
and 
new 
dimensions." 
This 
process 
will 
produce 
whole 
new 
sets 
of 
com-
puters 
which 
will 
acquire, 
store, 
and 
process 
infor-
mation  which 
only 
the 
machine 
through 
its 
own 
pro-
cesses 
evaluated 
as 
being 
relevant 
to 
treatment 
and 
health 
to 
begin 
wi 
th 
--
wholly 
a  machine 
idea. 
(2) 
Computers 
rather 
than 
being 
given 
a 
defined 
task 
to 
perform, 
can  be 
assigned 
a 
goal, 
the 
computer 
at 
this 
highest 
point 
of 
machine 
intelligence 
will 
pursue 
a 
goal 
with 
minimum 
instruction, 
devising 
its 
own 
stra-
tegy 
in 
pursuit 
of 
that 
goal.
6  _ 
Direction Determined 
by 
the 
Machine 
In 
this 
final 
stage, 
machines 
will 
again 
be 
re-
sponsible 
for 
a  changed  environment 
in 
medicine, 
but 
this 
time 
the 
change 
will 
occur 
not 
through 
the 
re-
structuring 
of 
the 
present 
system  around  a  newly 
in-
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 
troduced 
mechanism, 
but 
under 
the 
external 
direction 
of 
the 
machine 
itself. 
For  example, 
in 
a  world  whose 
goals 
are 
a 
healthy 
population, 
the 
emphasis 
of 
medi-
cine 
in 
the 
future 
may 
well 
be 
on 
prevention 
rather 
than 
diagnosis 
and 
treatment. 
With 
the 
precedent 
for 
using 
machines 
in 
problem 
solving 
situations 
firmly 
established, 
and 
with 
the 
concurrent 
develop-
ment 
of 
machines 
that 
can 
devise 
strategy 
in 
the 
pursuit 
of 
goals,6 
it 
is 
predictable 
that 
these 
com-
puters 
will 
be  used 
in 
problem 
solving 
situations 
in 
health 
delivery. 
We 
predict 
that 
their 
recommended 
approaches 
to 
health 
delivery 
problems 
will 
influ-
ence 
the 
direction 
that 
medicine 
takes 
in 
the 
next 
decade. 
Thus 
far, 
the 
three 
phases 
of 
the 
evolution 
of 
machines 
in 
medicine 
have  been 
delineated. 
It 
may 
be  seen 
that 
the 
first 
phase, 
in 
which  machines 
as~ 
sist 
the 
physician, 
is 
evolving 
into 
Phase 
II, 
in 
which  machines 
are 
designed 
to 
replace 
functions 
which 
heretofore 
had  been  unique 
to 
the 
role 
of 
the 
physician. 
It 
may 
also 
be  seen 
that 
this 
second 
phase 
is 
only 
intermediary 
in 
a 
progression 
that 
will 
result 
in 
machines 
themselves 
being 
used 
to 
devise 
new 
approaches 
to 
health 
care. 
Thus, 
tech-
nology 
continues 
to 
shape 
the 
direction 
of 
medical 
practice 
through 
its 
increasing 
incorporation 
into 
diagnosis 
and 
treatment. 
The 
development 
of 
new 
skills 
by 
physicians 
in 
response 
to 
technical 
ad-
vancement 
will 
be 
necessary, 
while 
appropriate 
edu-
cation 
in 
medical 
school 
should 
facilitate 
this 
a-
daptive 
development. 
Culture 
Influencing 
the 
Physician 
The 
preceding 
discussion 
has 
demonstrated 
that 
the 
physician 
is 
influenced 
both 
subtly 
and 
overtly 
by 
the 
culture 
in 
which  he 
lives. 
At 
the 
present 
time 
that 
culture 
is 
technological, 
and 
both 
the 
practice 
of 
medicine 
and 
the 
job 
of 
the 
physician 
are 
inseparably 
chained 
to 
that 
technology. 
Tech-
nological 
advances, 
such 
as 
the 
ECG, 
which  have 
cre-
ated 
new 
jobs 
and 
new 
fields 
of 
medicine 
are 
exam-
ples 
of 
this 
interdependency 
upon 
technology 
in 
medi-
cine 
today. 
In 
like 
manner, 
it 
may 
be  assumed 
that 
new 
machines 
will 
continue 
to 
structure 
new 
special-
ties 
and 
define 
new 
jobs 
in 
the 
future. 
Therefore, 
because 
of 
what  has  happened 
in 
the 
past 
twenty 
years 
and 
is 
continuing, 
predictions 
can  be 
made 
about 
the 
effect 
of 
technological 
ad-
vances 
on 
the 
role 
of 
the 
physician 
in 
the 
future. 
Finally, 
with 
these 
changes 
in 
mind 
it 
is 
possible 
to 
suggest 
some 
changes 
in 
the 
present 
medical 
edu-
cation 
system 
that 
will 
be 
necessary 
in 
order 
to 
prepare 
physicians 
to 
practice 
medicine 
in 
an 
in-
creasingly 
automated 
environment. 
Changes in  Medical 
Education 
Among 
the 
possibilities 
that 
cluster 
around 
the 
role 
of 
the 
physician 
in 
the 
late 
twentieth 
century, 
two 
large 
areas 
may 
be  emphasized. 
Some 
doctors 
will 
need 
to 
become  advanced 
technologists 
in 
order 
to 
conceive, 
design, 
operate, 
and 
understand 
the 
new 
generations 
of 
machines. 
Secondly, 
with 
the 
increased 
use 
of 
machines 
for 
technical 
functions, 
many 
physicians 
will 
be 
called 
upon 
to 
help 
the 
pa-
tient 
understand 
the 
technical 
findings 
of 
his 
exami-
nation 
and 
to 
facilitate 
the 
constructive 
use 
of 
this 
information 
in 
the 
patient's 
life. 
The 
genetic 
counselor 
already 
serves 
this 
function 
today, 
helping 
the 
counselee 
to 
incorporate 
the 
information 
that 
he 
has 
acquired 
in 
the 
counseling 
session 
for 
construc-
tive 
planning; 
while 
the 
thanoto!ogist 
works 
with 
terminally 
ill 
patients 
as 
they 
deal 
with 
the 
know-
ledge 
of 
thei 
r 
approachi 
ng 
dea 
tli·
r I  25) 
p 
case 
turn  to 
page 
17 

WATERGATE 
SOUTH 
Nancy 
A. 
Miller 
16  Ober  Road 
Princeton,  NJ  08540 
"In  Fayetteville, Arkansas,  I 
was 
working  with  Vietnam  Veterans  Against the 
War. 
One 
of 
the veterans  there,  William 
W. 
Lemmer, turned 
out 
to  be an  FBI  informer .
... 
We 
broke 
his cover and exposed him. 
He 
immediately suggested he become a double agent on the FBI." 
Introduction 
Investigations 
by 
the 
press, 
Congressional 
com-
mittees, 
and 
the 
courts 
have 
slowly 
revealed 
the 
nature 
of 
"Watergate 
East" 
and 
"Watergate 
West." 
The 
first 
refers 
to 
efforts 
to 
undermine  Democratic 
Party 
presidential 
candidates 
and 
the 
subsequent 
cover-up; 
the 
second, 
Watergate 
West, 
to 
the 
viola-
tion 
of 
the 
rights 
of 
Dr.  Lewis 
Fielding 
in 
an 
at-
tempt 
to 
seal 
off 
leaks. 
The 
inter-relationship 
be-
tween 
Watergates 
East 
and 
West 
is 
rather 
ambiguous 
without 
an 
examination 
of 
"Watergate 
South," 
which 
has  been 
almost 
totally 
overlooked. 
The 
evidence 
supporting 
the 
hypothesis 
that 
there 
was 
a 
southern 
extension 
is 
scattered 
through 
Ervin 
Committee 
tes-
timony, 
press 
statements, 
affidavits 
and 
depositions 
filed 
in 
several 
courts, 
and 
other 
statements 
by 
some 
of 
those 
involved. 
Many 
clues 
or 
references 
may 
still 
lie 
undetected, 
but 
a 
consistent 
picture 
has 
emerged,  from 
those 
that 
have  been  found, 
of 
an 
attempt 
to 
keep 
Richard 
M. 
Nixon 
in 
the 
White  House 
at 
almost 
any 
cost. 
I 
first 
stumbled 
into 
Watergate 
South 
in 
a  most 
unlikely 
place, 
Fayetteville, 
Arkansas.  I 
was 
liv-
ing 
there 
in 
the 
spring 
of 
1972  and  working 
with 
the 
Vietnam 
Veterans 
Against 
the 
War 
(VVAW). 
One 
of 
the 
veterans 
there, 
William 
W. 
Lemmer, 
turned 
out 
to 
be 
an 
FBI 
informer. 
It 
was 
through 
him 
that 
several 
of 
us  began 
to 
learn 
of 
what  was 
being 
planned 
for 
that 
presidential 
election 
year. 
In 
late 
May, 
1972, 
we 
broke 
Lemmer's 
cover 
and  exposed  him 
as 
an 
informer. 
He 
immediately 
suggested 
that 
he  become  a 
double 
agent, 
spying 
on 
the 
FBI. 
To 
prove 
the 
good 
faith 
of 
his 
offer, 
he 
voluntarily 
agreed 
to 
be 
interview-
ed, 
on 
tape, 
by 
two 
other 
Fayetteville 
veterans. 
The 
interview 
was 
conducted 
on 
June  3  and 
4, 
two 
weeks 
before 
the 
discovery 
of 
the 
Watergate 
break-ins. 
I 
was 
present 
during 
the 
second 
day's 
session, 
when 
Lemmer 
made 
his 
most  ominous 
statements. 
Assertions 
that 
Violence 
Was 
Planned 
for 
the 
1972 
Political  Conventions 
Watergates 
East 
and  West 
reveal 
an 
hysterical 
at-
tempt 
to 
seal 
the 
White  House 
off 
from 
the 
rest 
of 
the 
country. 
But 
why 
the 
hysteria? 
Why 
the 
frantic 
cover-up? 
Much 
of 
the 
answer 
lies 
in 
Watergate 
South. 
Even 
the 
most 
cooperative 
witnesses 
have 
shied 
away 
from 
this 
area 
of 
the 
total 
puzzle, 
probably 
because 
its 
implications 
are 
so 
staggering. 
James 
W. 
McCord, 
Jr., 
came 
close 
to 
it 
when 
he 
was 
testifying 
before 
the 
Ervin 
Committee 
in 
May 
of 
1973. 
He 
stated 
that 
18 
he 
believed 
he  had 
acted 
in 
the 
nation's 
best 
inter-
est 
because 
of 
plans 
allegedly 
being 
made 
by 
groups, 
working 
with 
the 
Democrats, 
to 
violently 
disrupt 
the 
conventions. 
Therefore, 
telephone 
taps 
of 
Democra-
tic 
committee  members  were 
necessary 
to 
learn 
of 
plans 
in 
time 
to 
head 
off 
the 
trouble 
makers. 
Mc-
Cord 
testified 
to 
receiving 
"almost 
daily" 
reports 
from 
the 
Internal 
Security 
Division 
of 
the 
Justice 
Department, 
some 
of 
which 
linked 
the 
Democratic 
Par-
ty 
to 
VVAW. 
One 
of 
those 
reports 
came 
concurrently 
with 
some 
other 
information 
that  that 
same 
group 
(VVAW) 
was 
planning 
vio-
lence 
at 
the 
Republican 
National 
Convention 
involving 
danger 
to, 
threats 
to 
life 
of 
indi-
viduals. 
•  •  • 
The 
Vietnam 
Veterans 
Against 
the 
War 
was 
one 
violence-oriented 
group 
that 
was 
already 
saying 
in 
the 
spring 
of 
1972 
that 
they 
were 
going 
to 
cause 
destruction 
to 
life 
and 
property 
at 
the 
August 
Republican 
conven-
tion, 
using 
in 
their 
own 
words, 
their 
own 
bod-
ies 
and  weapons 
as 
the 
spearhead 
of 
the 
attack 
there 
--
these 
are 
their 
exact 
words,  and 
some 
of 
them 
(the 
Gainesville 
8) 
have 
since 
been 
indicted 
in 
Tallahassee, 
Florida, 
with 
addi-
tional 
plans 
to 
damage 
the 
life 
and 
property 
of 
the 
convention.
l 
Earlier, 
during 
the 
trial 
of 
the 
Watergate 
burg-
lars 
in 
January, 
1973,  one 
of 
McCord's 
attorneys, 
Gerald  Alch, 
explained 
the 
rationale 
of 
this 
de-
fense. 
If 
one 
is 
under  a 
reasonable 
apprehension 
--
regardless 
of 
whether 
that 
apprehension 
is 
in 
fact 
correct 
--
he 
is 
justified 
in 
breaking 
a 
law 
to 
avoid 
the 
greater 
harm,  which 
in 
this 
case 
would  be 
violence 
directed 
to 
Republican 
officials, 
including 
but 
not 
limited 
to, 
the 
President.
2 
The 
first 
question 
that 
needs 
to 
be  asked 
is: 
did 
McCord 
have 
cause 
for 
a 
"reasonable 
apprehen-
sion" 
that 
violence 
was 
planned 
for 
the 
1972  conven-
tions? 
The 
answer 
to 
this 
question 
seems 
to 
be: 
yes, 
violence 
was 
planned. 
The 
proof 
of 
this 
answer 
is 
found 
in 
the 
tangled 
web 
of 
a  second 
question: 
who 
was 
planning 
to 
initiate 
and 
direct 
the 
violence? 
Questionable Nature 
of 
Internal 
Security 
Division 
Information 
Supporting 
Charges Against VVAW 
The 
government 
alleged 
that 
VVAW 
members 
conspired 
to 
be 
the 
instigators 
of 
the 
violence. 
The 
source 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 
f 
i-
I' 
1,/ 

d 
and 
veracity 
of 
these 
allegations, 
however, 
is 
high-
ly 
questionable. 
The 
"New 
York 
Times"  spoke 
with 
a 
highly 
placed 
Florida 
law 
enforcement 
official 
who 
participated 
in 
the 
security 
planning 
and 
operation 
for 
both 
conventions 
and  saw 
the 
top-
level 
intelligence 
reports 
(who) 
said 
in 
an 
interview 
last 
August  (1972) 
that 
there 
was 
no 
mention 
in 
the 
intelligence 
reports 
of 
the 
plot 
described 
by 
the 
Government 
in 
its 
indict-
ment 
(of 
the 
Gainesville 
8). 
After 
checking 
the 
intelligence 
reports 
for 
the 
security 
operation 
again 
to 
refresh 
his 
memory, 
the 
source 
repeated 
that 
the 
strongest 
warning 
about 
any 
potential 
activities 
of 
the 
V.V.A.W. 
was 
a 
report 
that 
it 
had  bought 
"be-
tween 
five 
and  one-hundred 
slingshots." 
And 
a  check 
of 
the 
secret 
intelligence 
and 
op-
eration 
logs 
of 
the 
Dade 
County 
Public 
Safety 
Department, 
made 
available 
to 
the 
New 
York 
Times, 
also 
shows 
no 
signs 
of 
Federal, 
state 
and 
local 
reports 
of 
the 
alleged 
plot.
3 
At 
least 
two 
undercover 
officers 
with 
the 
Dade 
County 
Public 
Safety 
Department, 
Gerald 
Rudoff  and 
Harrison 
Crenshaw,  had 
infiltrated 
VVAW 
as 
informers 
and  had 
attended 
VVAW 
meetings 
in 
the 
Miami 
area 
prior 
to 
the 
conventions. 
Had 
they 
heard 
of 
any 
plans 
that 
could 
be 
construed 
as 
potentially 
dis-
ruptive, 
surely 
Rudoff  and  Crenshaw  would  have 
re-
ported 
them.  These 
reports 
should  have  been 
among 
the 
materials 
available 
to 
the 
Florida 
law 
enforce-
ment 
official 
if 
he  and 
his 
co-workers 
were 
to 
be 
able 
to 
maintain 
order 
and 
to 
protect 
the 
lives 
of 
those 
present 
in 
and  around 
the 
conventions. 
The 
use 
of 
informants 
is 
based 
upon 
the 
need 
to 
fulfill 
such 
responsibilities. 
In 
view 
of 
the 
absence 
of 
such 
reports, 
it 
is 
reasonable 
to 
assume 
that 
there 
had  been 
no 
indications 
that 
VVAW, 
or 
any 
other 
movement 
group, 
was 
planning 
to 
incite 
violence. 
Facts 
tend 
to 
support 
this 
contention. 
Convention  Disruptions 
Started 
by 
People 
Apparently 
Not 
in 
the 
Peace  Movement 
VVAW 
was 
the 
only 
movement 
organization 
whose 
members  were 
indicted 
for 
conspiring 
to 
violently 
disrupt 
either 
convention. 
It 
was 
also 
the 
only 
group  mentioned  by 
McCord 
in 
his 
testimony 
as 
being 
a 
source 
of 
concern 
to 
security 
personnel 
at 
the 
conventions. 
Aside  from 
sporadic 
trashing 
and  a 
disorganized 
skirmish 
the 
last 
night 
of 
the 
Republican 
Convention, 
there 
was 
no 
violence 
at 
either. 
That 
incident 
the 
final 
night 
involved 
little 
more 
than 
blocking 
traf-
fic, 
which 
is 
far 
from 
the 
blowing 
up 
of 
the 
Cause-
way 
to 
Miami 
Beach, 
of 
police 
stations, 
and 
of 
com-
munications 
installations 
that 
the 
Gainesville 
8 
were  charged 
with 
planning. 
Of 
the 
1,200 
demonstra-
tors 
arrested 
that 
night, 
only 
a  few 
--
some 
reports 
say 
no 
--
VVAW 
members  were 
arrested. 
Several 
times 
people 
in 
Miami 
Beach 
noticed 
that 
groups 
of 
younger 
demonstrators 
were 
roused 
to 
start 
trashing 
by 
agitators 
who 
quickly 
faded  from  view 
when 
the 
trouble 
started. 
Some 
of 
these 
instigators 
may 
have  been 
irrational 
hotheads 
from 
the 
ranks 
of 
the 
movement, 
but 
not 
all 
of 
them 
were. 
A 
reporter 
for 
the 
"Miami 
Herald" 
saw 
two 
pro-Nixon 
youths 
physically 
disrupt 
a 
\~omen's 
anti-war 
demonstration 
outside 
conven-
tion 
hall. 
One 
of 
the 
young 
men 
identified 
himself 
as 
Stephen  McNellis,  Minnesota 
coordi-
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 
nator 
for 
VVJP 
(Vietnam 
Veterans 
for 
a 
Just 
Peace) 
.••• 
Since 
then, 
as 
part 
of 
the 
Watergate 
disclo-
sures, 
the 
White  House  has 
admitted 
that 
the 
pro-Nixon 
veterans 
group 
(VVJP) 
was 
in 
fact 
financed 
with 
GOP 
campaign  funds  and 
directed 
by 
Charles 
Colson.4 
No 
Government Case 
to 
Support 
Indictment 
of 
the 
Gainesville  8 
Sizable 
contingents 
of 
VVAW 
members  were 
present 
at 
both 
conventions, 
yet 
the 
expected 
violence 
did 
not 
occur. 
It 
is 
conceivable, 
if 
the 
charges 
against 
the 
Gainesville 
8  were 
true, 
that 
VVAW 
abandoned 
its 
plans 
for 
the 
August 
convention 
after 
some 
of 
its 
members  were 
indicted 
in 
July. 
However, 
the 
jury 
found 
the 
eight 
defendants 
innocent 
of 
all 
charges 
after 
hearing 
a  month 
of 
prosecution 
witnesses, 
only 
one 
defense 
witness, 
and 
after 
deliberating 
for 
only 
four 
hours. 
Obviously, 
the 
government  had 
no 
case 
to 
support 
its 
charges, 
despite 
the 
fact 
that 
VVAW 
was 
heavily 
infiltrated. 
Two 
FBI 
inform-
ers, 
Lemmer 
and  Karl  Becker,  were 
present 
during 
the 
meetings 
from  which 
the 
indictment 
was 
derived. 
An-
other 
FBI 
informer, 
Emerson 
L. 
Poe, 
was 
working 
close-
ly 
with 
the 
Florida 
VVAW 
coordinator, 
Scott 
Camil, 
who 
was 
later 
indicted 
as 
one 
of 
the 
Gainesville 
8. 
Rudoff  and  Crenshaw  were  working 
on 
the 
local  level 
in 
Miami 
with 
Camil  and  Alton 
C. 
Foss, 
another 
de-
fendant. 
All 
but 
Rudoff 
testified 
at 
the 
trial 
and 
still 
the 
government  had 
no 
case. 
The 
only 
assump-
tion 
that 
can 
possibly 
be  drawn 
is 
that 
there 
was 
no 
conspiracy 
by 
VVAW 
members 
to 
initiate 
violence 
at 
the 
conventions. 
If 
violence 
was 
planned, 
but 
it 
was 
not 
planned 
by 
the 
VVAW, 
then 
others 
must  have  done 
so. 
If 
other 
movement  groups  had, 
then 
the 
indictment 
of 
the 
Gainesville 
8  would 
not 
have 
inhibited 
them. 
They  might  even  have  assumed 
that 
they 
were 
not 
un-
der 
heavy 
surveillance 
and, 
therefore, 
were 
free 
to 
do 
as 
they 
wished, 
with 
a 
fair 
degree 
of 
assurance 
that 
they 
would 
escape 
blame 
since 
others 
had 
al-
ready 
been 
charged 
with 
what 
they 
planned 
to 
do. 
The 
absence 
of 
any 
serious 
outbursts 
is 
indicative 
of 
the 
peaceful 
intentions 
of 
the 
demonstrators. 
This 
fact, 
together 
with 
the 
questionable 
activities 
of 
members 
of 
such  groups 
as 
the 
pro-Nixon 
VVJP, 
sup-
port 
the 
belief 
that 
the 
conspirators 
were 
not 
among 
the 
sincere 
protestors. 
The 
Case  Against 
the 
Government 
The 
Gainesville  Meeting 
Adding 
still 
further 
credence 
to 
this 
possibility 
are 
two 
examples 
of 
government 
involvement 
through 
the 
FBI. 
First, 
the 
so 
called 
Gainesville 
meeting, 
from  which  most 
of 
the 
indictment 
against 
the 
8 
was 
derived, 
was 
set 
up 
by 
Becker. 
Donald 
C. 
Donner,  a 
veteran 
from 
Fayetteville, 
Arkansas, 
who 
had 
under-
taken 
the 
responsibility 
of 
arranging 
for 
the 
meet-
ing, 
got 
so 
far 
as 
sending 
out  a 
letter 
asking 
for 
suggestions 
on 
a 
date 
and 
place 
to 
meet 
before 
Beck-
er 
took 
over. 
As 
Donner 
said: 
The 
meeting 
was 
apparently 
set 
up 
by  Karl 
(Becker) 
•••. 
Karl 
told 
me 
that 
he  went 
on 
with 
my 
idea, 
informed  everybody, 
tried 
to 
inform 
me 
and 
was 
unable 
to 
do 
so. 
I 
shouldn't 
have  been 
that 
hard 
to 
find 
•.•• 
He 
said 
he 
went  ahead 
with 
a 
date 
on 
the 
letter 
and 
there 
is 
not 
a 
date 
on 
the 
letter. 
All 
in 
all, 
the 
way 
the 
meeting 
got 
set 
up 
is 
very 
question-
able.
S 
19 

Second, 
Lemmer 
was 
instructed 
to 
go 
to 
the 
meeting 
by 
his 
control, 
Special 
Agent  Richard 
J. 
O'Connell, 
who 
made 
it 
known 
to 
me 
prior 
to 
my 
leaving 
.•• 
that 
the 
Jacksonville 
office, 
Jacksonville, 
Florida, 
office 
of 
the 
FBI,  had 
requested 
my 
presence 
in 
Gainesville 
and  I 
was 
told 
that 
it 
would  be 
up 
to 
them 
to 
finance 
my 
trip 
down 
there 
--
that 
if 
and 
when 
it 
came 
time 
to 
move, 
I 
was 
to 
contact 
John 
Maher 
and 
pick 
up 
money 
for 
that 
trip 
down 
there 
•  •  •  • 
They 
gave 
me 
$210 
to 
make 
the 
round 
trip 
from 
New 
York 
to 
Gainesville 
and  back 
to 
New 
York. 6 
Squad 
19 
It 
looks 
as  though 
members 
of 
the 
government  were 
the 
actual 
conspirators 
and 
that 
they 
were 
attempt-
ing 
to 
set 
VVAW 
up 
as 
a 
scapegoat 
for 
their 
actions. 
A September,  1971, 
statement 
by 
Louis  Tackwood,  a 
former  Los  Angeles 
Police 
Department 
agent 
provoca-
teur, 
suggests 
a 
disturbing 
basis 
for 
this 
conten-
tion. 
Tackwood, 
in 
a 
press 
conference, 
described 
a 
plot 
involving 
a 
special 
group,  Squad  19,  which 
was 
created 
by 
the 
Criminal 
Conspiracy 
Section 
of 
the 
Los 
Angeles 
Police 
Department  and 
the 
FBI. 
This 
plan 
entailed 
planting 
a  number 
of 
agent 
provocateurs 
both 
inside 
and 
outside 
the 
Con-
vention. 
Agents  were 
to 
infiltrate 
the 
groups 
planning 
demonstrations 
against 
the 
war  and 
poverty. 
At 
the 
time 
of 
the 
demonstrations, 
the 
agents 
were 
to 
provoke 
street 
battles 
with 
police 
surrounding 
the 
convention 
hall. 
Mean-
while, 
agents 
inside 
the 
convention 
hall 
were 
to 
plant 
explosives 
timed 
to 
blow 
up 
coinci-
dental 
with 
riots 
in 
the 
streets. 
The 
purpose 
was 
to 
kill 
a  number 
of 
delegates. 
The 
result 
would  be 
to 
create 
a 
nationwide 
hysteria 
that 
would 
then 
provide 
President 
Nixon 
with 
the 
popular 
support 
necessary 
to 
declare 
a 
state 
of 
national 
emergency.  Orders 
for 
Squad 
19 
came 
directly 
from 
the 
California 
State 
Depart-
ment 
of 
Justice, 
and 
State 
Attorney 
General 
Evelle 
Younger.  Richard  Nixon  would 
then 
ar-
rest 
all 
militants 
and 
left-wing 
revolutiona-
ries 
and 
cancel 
the 
1972 
elections. 
He 
could 
invoke 
special 
emergency  powers 
leading 
to 
the 
detention 
of 
political 
activists.
7 
Agent Provocateurs Active  in  VVAW  Planning 
for 
the 
Convention 
Demonstrations 
William  Lemmer 
Tackwood's 
charges 
are 
too 
serious 
to 
be 
accepted 
without 
an 
examination 
of 
available 
facts. 
First, 
he  claimed 
that 
"agent 
provocateurs 
•  •  •  were 
to 
infiltrate 
the 
groups 
planning 
demonstrations." 
VVAW, 
which 
was 
planning 
demonstrations, 
was 
infiltrated 
and 
at 
least 
one 
of 
the 
infiltrators 
was 
a 
provoca-
teur: 
Lemmer, 
the 
"star" 
witness 
in 
the 
Gainesville 
8 
trial. 
While  he 
was 
stationed 
at 
Fort 
Benning, 
Georgia, 
he  encouraged 
others 
to 
telephone 
bomb 
threats 
and 
tried 
to 
get 
them 
to 
blow 
up 
a 
water 
tower. 
After 
he 
got 
out 
of 
the 
Army, 
in 
July, 
1971, 
he 
moved 
to 
Fayetteville, 
Arkansas,  where  he 
instruc-
ted 
a  high  school 
student 
in 
the 
manufacture 
of 
a 
fire 
bomb 
and 
then 
accompanied 
the 
boy 
to 
the 
site 
of 
the 
attempted 
fire 
bombing. 
Lemmer 
described 
the 
incident 
to 
the 
three 
of 
us 
in 
Fayetteville. 
20 
He 
asked 
me 
if 
ether 
would  be  a 
better 
fuel 
than 
gasoline 
and  I 
told 
him, 
by 
all 
means, 
ether 
would 
definitely 
be 
better 
than 
gaso-
line. 
The 
night 
that 
he 
got 
busted 
(arrested) 
we 
went  over 
to 
his 
house, 
picked 
up 
the 
material, 
and  I  went 
out 
to 
watch. 8 
Lemmer 
also 
talked 
a 
Fayetteville 
veteran 
into 
send-
ing 
a 
bomb 
threat. 
And 
in 
another 
incident, 
he 
helped 
talk 
demonstrators 
at 
an 
Air 
Force 
base 
in 
Oklahoma 
into 
going 
on 
the 
base 
despite 
police 
and 
military 
orders 
not 
to 
do 
so. 
In 
the 
last 
three 
in-
stances 
people, 
other 
than 
Lemmer, 
served 
time. 
Lemmer 
also 
tried 
to 
project 
a 
violent 
image 
of 
VVAW, 
contradictory 
to 
the 
organization's 
history 
of 
only 
staging 
peaceful 
protests. 
During  a 
local 
Arkansas  march, 
Lemmer 
insisted, 
in 
vain, 
that 
the 
VVAW 
members 
be  armed  and 
defy 
police 
orders. 
In 
May 
of 
1972,  he 
stepped 
up 
his 
campaign. 
At 
a  dem-
onstration 
in 
Washington 
Lemmer 
tried 
to 
get 
fire-
works  and 
explosives 
to 
set 
off 
in 
trashcans, 
which 
would  sound 
like 
gun 
fire, 
in 
order 
to 
divert 
police 
attention 
away 
from 
the 
main  body 
of 
demonstrators 
and 
on 
to 
VVAW. 
Again 
he 
was 
unsuccessful. 
About 
a 
week 
later, 
on 
a 
trip 
to 
Florida, 
while 
easily 
identifiable 
as  a 
VVAW 
member 
since 
he 
was 
wearing 
military 
fatigues 
and  a 
VVAW 
button, 
he 
talked 
loud-
ly 
in 
public 
places 
about  bombing  and 
killing. 
Pablo 
Fernandez 
Another 
agent 
provocateur, 
Pablo 
M. 
Fernandez, 
while 
not 
actually 
infiltrating 
VVAW, 
did 
befriend 
Camil  and 
other 
Florida 
veterans. 
As 
an 
FBI 
and 
Miami 
Police 
Department 
informer, 
Fernandez 
tried 
to 
sell 
weapons,  from  guns 
to 
hand 
grenades 
and 
mines, 
to 
Camil  and 
Foss. 
Major 
Adam 
Klimkowski, 
Commander 
of 
the 
Miami 
Police 
Department's 
Special 
Investigations 
Section, 
stated: 
We 
were  hoping 
for 
the 
overt 
act 
necessary 
to 
produce  a 
charge 
of 
conspiracy 
..•• 
We 
did 
not 
want  Camil 
to 
actually 
acquire 
wea-
pons, 
••• 
we 
wanted 
to 
find 
out 
what 
was 
in 
the 
back 
of 
his 
mind. 9 
Government 
witnesses 
have 
consistently 
contended 
that 
Camil  and  Foss  asked 
for 
weapons, 
while 
the 
two 
defendants 
have 
insisted 
they 
were 
offered 
them. 
Klimkowski's 
statement, 
while 
ambiguous, 
tends 
to 
support 
Camil  and 
Foss. 
Whatever 
the 
truth 
may 
be, 
one 
fact 
is 
irrefutable: 
no 
member 
of 
VVAW 
followed 
up 
and  bought  any 
of 
the 
weapons. 
Fernandez 
was 
part 
of 
a  group 
of 
agitators 
paid 
to 
go 
to 
J. 
Edgar  Hoover's 
funeral, 
May 
5, 
1972, 
to 
harrass 
demonstrators. 
The 
group 
included 
Watergate 
burglars 
Bernard  L.' 
Barker, 
Frank 
Fiorini 
(alias 
Frank 
A. 
Sturgis), 
Virgilio 
R. 
Gonzales,  and 
per-
haps  Eugenio  Rolando 
Martinez, 
under 
the 
name 
of 
Rolando 
Martinez. 
One 
of 
the 
Fielding 
burglars, 
Felipe 
de  Diego, 
was 
also 
in 
the 
party 
as  were 
Reinaldo 
Pico, 
Angel 
Ferrer, 
and  Humberto  Lopez. 
In 
a 
"Miami 
Herald" 
article, 
Fernandez 
is 
quoted 
as 
saying: 
I 
kicked 
a 
hippie. 
.  •  .  I 
knew 
someone 
big 
was 
protecting 
us 
because 
the 
Capitol 
police 
did 
not 
try 
to 
arrest 
me.
lO 
Fernandez  went 
into 
more 
detail 
when 
he 
discussed 
this, 
and 
other 
activities, 
with 
another 
Miamian, 
Angelica  Rohan.  She 
appears 
to 
be 
nearly 
the 
only 
informant 
involved 
in 
convention 
intelligence 
who 
was 
sincerely 
working 
for 
peaceful 
demonstrations, 
"so 
the 
name 
of 
the 
Cubans  would  be 
clean 
and 
every-
thing 
would  be  good 
for 
the 
Cubans."ll 
On 
May 
23, 
1973, 
Rohan 
gave  sworn 
testimony 
to 
U. 
S. 
District 
Judge 
W. 
O. 
Merhtens 
in 
which  she 
read 
and 
interpre-
ted 
her 
notes 
of 
what  Fernandez  had 
told 
her. 
Many 
COMPUTERS 
and 
PEOPLE 
for 
December. 
1974 
to, 
t 
/t<., 
-,!J 
\1 
~ 

;-
I 
i' 
'It" 
of 
the 
points 
she  mentioned 
are 
supported 
by 
other 
reports 
of 
the 
incident. 
I 
am 
going 
to 
quote  whatever  Pablo  (Fernandez) 
told 
me, 
which  I  took 
down 
as  he 
was 
giving 
it 
to 
me. 
I 
read 
it 
back 
to 
him,  and 
when 
some-
thing 
was 
not 
clear 
I  went  back  and 
redid 
it 
Briefed 
by 
Mr. 
Bernard 
Barker 
and 
Mr. 
Martinez 
at 
the 
hotel 
before 
the 
2-hour 
break 
upon 
ar-
rival 
in 
Washington. 
When 
we 
had 
to 
go 
to 
the 
funeral, 
the 
instructions 
were 
that 
one 
of 
the 
group 
that 
spoke 
English 
had 
to 
insult 
Mr. 
Dan-
iel 
Ellsberg 
or 
Doctor 
Daniel 
Ellsberg. 
One 
group  would 
destroy 
Ellsberg's 
loud 
speakers 
and 
all 
his 
equipment 
•••• 
They  were 
given 
pictures 
of 
Mr. 
Ellsberg 
and  he 
told 
them 
to 
aim 
at 
him 
•••• 
(Sturgis)* 
started 
insulting 
Ellsberg, 
then 
Pablo, 
then 
Barker. 
Pico 
threw 
a  punch 
at 
a 
hippie 
and 
that 
is 
when 
everything 
started. 
Rolando  Martinez  and 
Virgilio 
Gon-
zales 
had  whoever  appeared 
to 
be 
Ellsberg's 
security 
man, 
held 
him 
while 
Pablo  punched 
him. 
(Sturgis) 
and 
Ferrer 
were 
taken 
by 
the 
police, 
the 
Riot 
Control, 
to 
a 
car 
and 
then 
released. 
Capitol 
police 
were 
five 
feet 
away 
and  were 
like 
protecting 
the 
Cubans,  you 
know, 
like 
"Well 
done," 
by 
a 
sergeant 
of 
the 
police 
at 
the 
Capitol 
told 
Pablo 
after 
punching 
Ells-
berg's 
security 
man. 
The 
police 
protected 
Pablo  and  he 
left 
the 
site.
12 
Barker 
paid 
all 
the 
expenses 
and  gave  $100 
in 
cash 
to 
each 
participant, 
according 
to 
Rohan's 
statement. 
Sometime 
after 
that 
trip, 
Eugenio  Martinez 
tried 
to 
enlist 
Fernandez's 
services 
to 
create 
trouble 
at 
the 
Democratic 
convention. 
Watergate 
burglar 
Eugenio 
R. 
Martinez 
offered 
(Fernandez)  $700  a 
week 
to 
infiltrate 
protest 
groups 
at 
last 
summer's  Democratic 
convention 
and  embarrass  George 
McGovern 
"for 
the 
Repub-
lican 
Party." 
Pablo  Manuel  Fernandez,  28,  a 
burly, 
heavy 
equipment 
parts 
clerk 
who 
left 
Cuba 
as 
a 
teen-
ager, 
said 
he 
was 
told 
by 
Martinez: 
"You 
get 
10 
people 
and 
get 
inside 
McGovern 
headquarters 
in 
the 
hotel." 
•• 
Fernandez 
said 
Martinez 
came 
to 
him 
with 
the 
long-range 
offer 
in 
which  he 
was 
told 
he 
could 
make 
$700  a 
week 
from 
last 
June  (1972) 
until 
"after 
the 
President 
took 
office 
early 
this 
year", 
presumably  meaning 
the 
inauguration 
of 
Nixon's 
second 
term.
13 
According 
to 
Rohan, 
at 
least 
two 
other 
Cubans  were 
to 
head 
other 
teams,  which  sound 
very 
similar 
to 
the 
fireteams 
the 
Gainesville 
8  were  accused 
of 
forming. 
Others 
Asked 
to 
Infiltrate 
VVAW 
Vincent 
Hannard 
Frank 
Sturgis 
approached 
another 
Floridian 
with 
a 
similar 
offer. 
Vincent 
J. 
Hannard  gave  sworn 
testi-
mony 
in 
private 
and 
then 
spoke 
to 
reporters. 
'* 
Rohan 
used 
Fiorini, 
but 
I  have 
substituted 
Sturgis 
since 
this 
is 
the 
name 
by 
which  most 
people 
know 
him. 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 
Vincent 
J. 
Hannard 
of 
Miramar,  a 
private 
in-
vestigator 
•  •  • 
said 
he 
was 
offered 
work 
in 
"intelligence 
and 
instigation" 
during 
the 
con-
ventions 
at 
Miami 
Beach. 
Hannard 
claimed 
he 
received 
separate 
calls 
from 
Sturgis, 
and 
maybe 
Barker, 
and 
two 
others 
and 
they 
asked 
him 
to 
help 
disrupt 
activities 
of 
the 
Vietnam 
Veterans 
Against 
the 
War 
--
an 
organization 
thoroughly 
infiltrated 
by 
police 
and 
federal 
informers 
before 
and 
during 
the 
conventions. 
According 
to 
Hannard,  each 
call 
came 
from  a 
different 
person, 
and  each 
caller 
tried 
to 
persuade 
him 
that 
it 
was 
his 
patriotic 
duty 
to 
help 
undermine 
the 
VVAW. 
Hannard 
said 
he 
was 
sure 
it 
was 
Sturgis, 
be-
cause 
he 
has 
known 
him 
for 
more 
than 
13 
years 
and 
recognized 
his 
voice. 
Hannard 
said 
another 
caller 
identified 
himself 
as 
Barker. 
However,  Hannard 
said 
he 
never 
has 
met 
Barker 
and 
could 
not 
be 
certain 
who 
act-
ually 
called 
him.  .  •  • 
Hannard 
said 
he 
told 
an 
FBI 
agent, 
Jack 
Acker-
ly, 
about 
the 
calls 
shortly 
after 
he 
received 
them.  Ackerly 
said 
he 
knows 
Hannard, 
but 
re-
fused 
to 
talk 
about 
conversations 
he 
may 
have 
had 
with 
him. 
According 
to 
Hannard,  none 
of 
the 
four 
callers 
told 
him 
what  would  be 
expected 
of 
him 
if 
he 
agreed 
to 
do 
the 
proposed 
undercover 
work. 
But  he 
said 
each  mentioned 
the 
VVAW 
and 
de-
scribed 
the 
task 
as 
covert 
intelligence 
and 
instigation. 
"It 
was 
clear 
from  what 
they 
said 
that 
I 
was 
supposed 
to 
incite 
trouble 
or 
riots 
from 
the 
anti-war 
groups," 
he 
said. 
"I 
was 
told 
it 
would  be 
activity 
pertaining 
to 
the 
convention 
and 
an 
opportunity 
to 
travel. 
"And 
there 
would  be 
great 
rewards 
when 
the 
President 
was 
re-elected." 
Hannard 
said 
he 
was 
offered 
$1,000 
a 
week 
for 
that 
work 
but 
that 
in 
the 
fourth 
call 
the 
of-
fer 
was 
raised 
to 
$1,500.
14 
John 
Kifner, 
for 
"The 
New 
York 
Times," 
filled 
in 
some 
details 
in 
Hannard's 
story. 
In 
a  long 
deposition 
taken 
by 
the 
Broward 
County 
State's 
Attorney's 
Office, 
a 
man 
with 
Cuban 
and 
Central 
Intelligence 
Agency 
ties, 
Vincent 
J. 
Hannard 
said 
that 
he  had  been 
of-
fered 
$1,500 
a 
week 
in 
a 
telephone 
call 
from 
a 
man 
calling 
himself 
"Eduardo" 
--
(E.  Howard) 
Hunt's 
code 
name 
--
to 
infiltrate 
the 
VVAWand 
cause 
trouble. 
"Basically 
we 
had 
to 
expose 
the 
V.V.A.W. 
be-
ing 
pink 
and  Communist  and 
all 
this 
stuff," 
he 
said, 
adding 
that 
he 
was 
wanted 
"because 
of 
my 
reputation 
as 
an 
instigator 
rather 
than 
an 
investigator." 
He 
said 
that 
he  had 
refused 
because 
the 
amount 
of 
money 
being 
offered 
made 
the 
job 
seem 
too 
dangerous. 
Mr. 
Hannard  has  worked 
as 
an 
In-
former 
for 
the 
C.I.A., 
the 
F.B.I. 
and 
local 
police 
forces 
.15 
21 

Alfred  Baldwin  and John 
Eck 
Alfred 
C. 
Baldwin, 
3rd, 
the 
ex-FBI 
agent 
who 
mon-
itored 
the 
illegally 
placed 
telephone 
taps 
at 
the 
Democratic 
National 
Headquarters, 
was 
also 
asked 
to 
infiltrate 
VVAW. 
A 
Miami 
gun 
dealer, 
John  Eck,  ad-
mitted 
that 
he 
too 
had  been 
contacted 
but 
would  not 
say 
by 
whom 
other 
than 
by 
someone 
named 
in 
connec-
tion 
with 
the 
Watergate 
case. 
Government Support 
of 
Plans 
to 
Kill 
Convention  Delegates 
Returning 
to 
Tackwood's 
statement, 
to 
examine 
another 
of 
his 
contentions, 
he 
said 
that 
"the 
pur-
pose" 
of 
the 
riots 
and 
explosions 
"was 
to 
kill 
a 
number 
of 
delegates." 
Fernandez 
claimed 
to 
be 
able 
to 
get 
the 
weapons 
necessary 
to 
produce 
the 
explo-
sions. 
Lemmer 
proposed  a 
variation. 
In 
January 
or 
February, 
1972 
--
just 
four 
or 
five 
months 
after 
Tackwood's 
press 
conference 
and 
six 
months 
before 
the 
first 
national 
political 
convention 
--
Lemmer 
suggested 
to 
several 
VVAW 
members 
that 
they 
should 
break 
down 
automatic 
weapons, 
strap 
them 
to 
their 
bodies 
under 
their 
clothes, 
smuggle  them 
into 
the 
convention 
hall, 
and 
"rip 
people 
off" 
--
in 
other 
words, 
kill 
them. 
Just 
as 
no 
one  bought  weapons 
from  Fernandez, 
no 
one 
accepted 
Lemmer's 
suggestion. 
Lemmer, 
like 
Fernandez, 
confided 
in 
a 
woman, 
Bar-
bara 
Stocking. 
On 
May 
25 
and  26, 
during 
a 
drive 
to 
Florida, 
he 
told 
Stocking 
of 
plans 
that 
she  found 
so 
disturbing 
she 
filed 
an 
affidavit, 
in 
which  she 
said 
Lemmer 
said 
that 
I 
should 
not 
go 
to 
the 
Miami 
con-
ventions 
because, 
he 
said, 
all 
of 
the 
VVAW 
leaders 
were 
going 
to 
be  picked 
up 
and 
taken 
out  of 
circulation, 
and  he  and 
some 
other 
people 
were  going 
to 
shoot 
leaders 
of 
the 
New 
Left, 
and 
start 
a 
riot, 
and 
there 
would  be  a 
lot 
of 
fighting 
and 
shooting, 
and  everyone 
would  be 
arrested. 
He 
also 
spoke 
of 
shooting 
the 
"Trots" 
(Trotskyites) 
and 
Progressive 
Labor 
movement 
people 
and 
pretending 
that 
VVAW 
had  done 
it, 
and 
this 
would 
discredit 
the 
VVAW 
and 
split 
the 
peace  movement. 
He 
said 
he  had  a 
source 
of 
unlimited 
funds 
to 
carry 
this 
out.
16 
Stocking's 
statement 
that 
Lemmer 
told 
her 
"there 
would  be  a 
lot 
of 
fighting 
and 
shooting 
and  everyone 
would  be 
arrested," 
supports 
Tackwood's 
contention 
that 
"the 
result 
would  be 
to 
create 
a 
nationwide 
hysteria 
that 
would 
then 
provide 
President 
Nixon 
with 
the 
popular 
support 
necessary 
to 
••• 
invoke 
special 
emergency  powers 
leading 
to 
the 
detention 
of 
political 
activists." 
Proposed 
Mass 
Kidnappings 
of 
Movement Activists 
FBI 
Participation 
There 
is 
a  good 
bit 
of 
evidence 
that 
preparations 
were 
being 
made 
for 
the 
"detention 
of 
political 
ac-
tivists." 
When 
describing 
his 
activities 
with 
the 
FBI, 
Lemmer 
told 
us  a 
little 
about  a 
plan 
the 
FBI 
had 
to 
round 
up 
movement 
leaders. 
22 
LE~mIER: 
I 
was 
told 
to 
prepare 
a 
Ii 
st 
of 
move-
ment 
people 
around 
me, 
around 
Fayetteville, 
a 
list 
of 
movement 
people 
who 
I 
could 
count 
on 
should  I  have 
to 
go  underground. 
The 
fact 
that 
they 
said, 
"I 
have 
to 
go 
underground" 
told 
me 
something,  more 
than 
in 
the 
back 
of 
my 
mind. 
Q: 
The 
resident 
agent 
here 
requested 
it? 
A: 
Right. 
Well,  I 
guess 
you 
could 
say 
re-
quested. 
I 
was 
told 
to 
prepare 
a 
list. 
The 
list 
of 
people 
was 
made 
up.  I  have 
discussed 
with 
him, 
not 
the 
list 
specifically, 
but 
the 
possibilities 
of 
certain 
developments 
in 
Miami 
and 
across 
the 
country 
making 
it 
necessary 
for 
a  round-up, 
similar 
to 
the 
ones 
we 
saw 
of 
the 
Japanese-Americans 
in 
World 
War 
II. 
He 
has 
confirmed 
that 
possibility 
openly 
at 
one 
of 
our 
meetings, 
in 
fact, 
the 
last 
of 
our  meet-
ings. 
Q: 
Did  he 
give 
you  any 
sort 
of  a 
••• 
proba-
bility 
reading 
on 
it? 
A: 
An 
extremely 
good 
possibility, 
to 
the 
point 
that 
we 
discussed 
alternate 
identifica-
tion 
for 
myself 
so 
that 
I  would  have 
the 
abili-
ty 
to 
move 
about 
the 
country, 
have  freedom 
of 
movement, 
during 
any 
type 
of 
round-up,  any 
type 
of 
situation 
during 
which 
the 
movement 
would  have 
to 
go 
clearly 
underground.
17 
There  was, 
indeed, 
a 
list 
of 
local 
movement 
people 
in 
the 
files 
of 
the 
Fayetteville, 
Arkansas, 
FBI 
of-
fice. 
White  House and  CRP  Participation 
Both  John 
W. 
Dean, 
3rd, 
and 
Jeb 
Stuart 
Magruder, 
in 
their 
testimony 
to 
the 
Ervin 
Committee, 
stated 
that 
mass 
kidnappings 
of 
radicals 
had 
at 
least 
been 
considered 
by 
them  and  John 
Mitchell 
as 
a 
part 
of 
the 
so 
called 
Liddy 
plan, 
devised 
by 
G. 
Gordon  Liddy. 
MAGRUDER: 
There  were 
projects 
relating 
to 
the 
abduction 
of 
individuals, 
particularly 
members 
of 
radical 
groups 
that 
we 
were 
con-
cerned 
about 
on 
the 
convention 
at 
San 
Diego.* 
Mr. 
Liddy  had  a 
plan 
where 
the 
leaders 
would 
be  abducted  and 
detained 
in 
a 
place 
like 
Mexi-
co  and 
that 
they 
would 
then 
be 
returned 
to 
this 
country 
at 
the 
end  of 
the 
convention.
18 
DEAN: 
Plans 
called 
for 
mugging  squads, 
kid-
napping  teams, 
prostitutes 
to 
compromise 
the 
opposition, 
and 
electronic 
surveillance. 
He 
(Liddy) 
explained 
that 
the 
mugging  squad 
could, 
for 
example,  rough 
up 
demonstrators 
that 
were 
causing 
problems. 
The 
kidnapping 
teams 
could 
remove 
demonstration 
leaders 
and 
take 
them 
below 
the 
Mexican 
border 
and 
thereby 
diminish 
the 
ability 
of 
the 
demonstrators 
to 
cause 
trouble 
at 
the 
San 
Diego 
convention.
19 
Lemmer 
told 
us 
that 
the 
detained 
activists 
would  be 
held 
in 
the 
old 
concentration 
camps,  where 
the 
Jap-
anese-Americans  were 
held, 
which  he  claimed  were 
being 
renovated, 
but 
he 
told 
Stocking 
that 
the 
radi-
cals 
would  be 
taken 
to 
Mexico 
City. 
Both  Magruder  and 
Dean 
referred 
to 
the 
kidnapping 
and  mugging  teams  only 
in 
reference 
to 
the 
first 
of 
Liddy's 
proposals, 
which 
was 
rejected, 
leaving 
the 
implication 
that 
they 
were 
among 
the 
more 
"bizarre" 
elements 
that 
had 
to 
be  removed 
before 
the 
plan 
could 
be  approved,  as 
it 
was 
on 
March 
30,  1972.  But 
Magruder, 
in 
his 
book 
"An 
American 
Life: 
One 
Man's 
Road 
to 
Watergate", 
mentions 
that 
he 
told 
his 
wife 
in 
the 
spring 
of 
1972 
that 
the 
government  might  have 
to 
round 
up 
radicals 
and 
take 
them 
to 
Mexico,  adding 
that 
they 
might 
not 
come 
back. 
Since 
the 
first 
two 
*At 
the 
time 
that 
the 
Liddy 
plan 
was 
under 
consider-
ation, 
the 
Republican  Convention 
was 
still 
scheduled 
to 
be 
held 
in 
San 
Diego. 
COMPUTERS 
and 
PEOPLE 
for 
December. 
1974 
.. 

;, 
J-
versions 
of 
Liddy's 
plan 
were 
considered 
on 
January 
27 
and 
February 
4,  which 
are 
unquestionably 
in 
the 
winter, 
Magruder's 
statement 
suggests 
that 
the 
idea 
of 
the 
kidnappings 
was 
still 
under 
consideration, 
at 
least, 
when 
the 
plan 
was 
finally 
approved 
in 
late 
March. 
Putting 
a  few 
events 
into 
chronological 
order 
shows 
that 
such 
bizarre 
acts 
as 
kidnapping 
and 
mug-
ging 
at 
government 
direction 
may 
not 
have  been 
among 
those 
aspects 
of 
the 
Liddy 
plan 
that 
were  removed. 
The 
plan 
was 
approved 
on 
March 
30,  1972.  Fernandez 
admitted 
to 
being 
part 
of 
a  mugging  team 
(although 
without 
using 
those 
exact 
words) 
at 
Hoover's 
funeral 
on 
May 
5. 
Lemmer's 
descriptions, 
in 
late 
May 
and 
early 
June, 
of 
a 
kidnapping 
plot 
is 
almost 
an 
exact 
duplicate 
of 
the 
one 
described 
by 
both 
Dean 
and 
Ma-
gruder 
a 
year 
later. 
Detention 
of 
VVAW 
Members 
Mass 
kidnappings 
did 
not 
occur, 
probably 
because 
the 
June 
17 
discovery 
of 
the 
Watergate 
break-ins 
forced 
a  change 
in 
plans. 
More 
than 
twenty 
VVAW 
members  were 
detained, 
however, 
during 
the 
Democrat-
ic 
National 
Convention. 
In 
a 
coordinated 
two-day 
sweep, 
covering 
at 
least 
five 
states, 
FBI 
agents 
issued 
subpoenas 
to 
approximately 
twenty-three 
VVAW 
members 
ordering 
them 
to 
appear 
before 
a 
federal 
grand 
jury 
in 
Tallahassee 
the 
morning 
of 
July 
10, 
the 
day 
the 
Democratic  Convention  opened.  Never 
be-
fore 
had  so 
many 
people 
been  subpoenaed  by  a 
federal 
grand 
jury 
to 
appear 
on 
a 
single 
day. 
This 
raised 
at 
least 
three 
questions. 
The 
first 
involved 
the 
possibility 
that 
the 
government 
was 
deliberately 
denying 
these 
people's 
rights 
to 
present 
their 
case 
to 
political 
delegates 
by 
detaining 
them. 
The 
sec-
ond, 
the 
probability 
that 
the 
government  used 
the 
grand 
jury 
to 
further 
embarrass 
the 
Democratic 
Party 
by 
calling 
an 
unusual 
evening 
session 
from  which  an 
indictment 
was 
issued 
against 
some 
of 
the 
veterans 
about 
two 
hours 
after 
the 
Democrats  approved  a 
reso-
lution 
in 
support 
of 
the 
subpoenaed 
VVAW 
people. 
But 
the 
third 
question 
raises 
the 
most 
disturbing 
suspicions. 
Was 
the 
government  hoping 
to 
turn 
those 
VVAW 
demonstrators 
who 
were 
in 
Miami 
Beach 
into 
an 
unruly 
mob? 
These  members  were 
furious 
about 
the 
subpoenas. 
The 
government 
may 
well 
have  assumed 
that 
the 
veterans 
were 
without 
leaders, 
since 
most 
of 
the 
men 
responsible 
for 
VVAW's 
demonstrations 
were 
being 
held 
in 
Tallahassee. 
Angry 
leaderless 
groups 
of 
people 
can  be 
roused 
to 
violence 
and 
several 
agi-
tators 
were  found 
in 
their 
midst. 
At 
least 
one, 
after 
being 
evicted 
from 
the 
campsite 
by 
veterans 
because 
he 
was 
causing 
trouble, 
is 
reported 
to 
have 
returned 
with 
the 
police 
and 
identified 
himself 
as 
an 
undercover 
agent. 
The 
veterans, 
however, 
did 
manage 
to 
maintain 
discipline, 
directing 
their 
an-
ger 
into 
explanations 
of 
the 
situation 
to 
the 
dele-
gates. 
Riots as  Excuse 
to 
Cancel 
1972 
Elections 
Finally, 
Tackwood 
stated 
that 
"a 
nationwide 
hys-
teria 
••• 
would 
then 
provide 
President 
Nixon 
with 
the 
popular 
support 
necessary 
to 
declare 
a 
state 
of 
national 
emergency  •  •  .  and 
cancel 
the 
1972 
elec-
ti 
ons. 
"  There 
is 
evidence 
that 
members 
of 
the 
gov-
ernment  had 
given 
serious 
consideration 
to 
such  a 
cance 
lla 
ti 
on. 
In 
the 
spring 
of 
1970,  William  Howard,  a  Wash-
ington, 
D.C. 
reporter 
for 
the 
conservative 
Newhouse 
chain, 
published 
a 
story 
about 
a 
"contingency 
plan 
to 
cancel 
the 
1972 
elec-
tions," 
which  he 
claimed 
he 
learned 
about 
COMPUTERS 
and 
PEOPLE 
for 
December. 
1974 
from 
the 
wife 
of 
a 
Rand 
Corporation 
executive. 
There 
was 
a 
virtual 
news 
blackout 
on 
the 
sub-
j 
ect. 
According 
to 
Howard, 
the 
President 
(Nixon)  had 
ordered 
the 
Rand 
Corporation 
think 
tank 
in 
Santa 
Monica, 
California, 
to 
do 
a 
"feasibili 
ty 
study" 
of 
the 
cancellati 
on 
possibi 
li 
ty 
in 
1972, 
because 
of 
Nixon's 
concern 
about 
possible 
"dis-
ruption 
by 
the 
left." 
The 
"Los  Angeles 
Free 
Press" 
picked 
up 
the 
story 
and 
was 
told 
privately 
by 
persons 
at 
Rand 
that 
it 
"had 
for 
once  done  a  good  and 
right 
thing 
in 
publishing 
the 
story."20 
This 
study 
may 
have  been 
ordered 
originally 
as 
a 
precaution 
against 
pOlitically 
oriented 
violence, 
which 
did 
seem 
to 
be 
escalating 
in 
1969  and  1970. 
This 
would  be  a 
perfectly 
valid 
reason 
for 
doing 
such  a 
study. 
But 
it 
assumes 
sinister 
implications 
when 
seen  from 
the 
perspective 
of 
1972. 
By 
this 
time, 
incidences 
of 
violence 
from 
the 
left 
had  dwin-
dled 
drastically, 
as  had 
talk 
of 
it 
within 
movement 
groups. 
But 
while 
interest 
in 
violence 
had  been 
languishing, 
provocateurs 
had  been 
proliferating. 
Aside  from 
those 
known 
to 
be 
involed 
with 
VVAW, 
there 
was 
Robert  Hardy, 
without 
whose 
help, 
and 
the 
money 
he 
received 
from 
the 
FBI, 
the 
Camden 
28 
would 
not 
have 
destroyed 
draft 
files. 
There 
is 
good 
reason 
to 
believe 
that 
some 
of 
the 
Weathermen 
might 
not 
have  done  so 
much 
damage 
if 
FBI 
provoca-
teur 
Larry 
Grantwohl  had 
not 
been  so 
insistent. 
These 
are 
just 
two 
of 
many 
such 
cases. 
It 
is 
rea-
sonable 
to 
assume, 
therefore, 
that 
members 
of 
the 
Nixon 
administration, 
and 
others 
working 
in 
concert 
with 
them,  were  hoping 
for 
the 
disturbances 
that 
would 
justify 
the 
invocation 
of 
martial 
law  and 
the 
cancellation 
of 
the 
elections 
as  a  means 
to 
circum-
vent 
the 
balancing 
controls 
contained 
in 
the 
con-
stitution. 
This 
would 
give 
them  an 
indefinite 
ten-
ure 
in 
a 
position 
of 
power  beyond 
reach 
of 
either 
Congress 
or 
the 
courts. 
Thus, 
the 
existence 
of 
such 
a 
study 
in 
a 
climate 
so 
infected 
with 
provocateurs 
indicates 
that 
members 
of 
the 
government  were 
at-
tempting 
to 
ensure 
that 
the 
havoc 
they 
needed  would 
occur. 
Conclusion 
Watergate 
South 
appears 
to 
go 
far 
beyond  what 
has 
thus 
far 
been 
revealed 
in 
Watergates 
East 
and 
West, 
into 
a  scheme 
to 
subvert 
the 
United 
States' 
constitutional 
system 
of 
government. 
The 
evidence, 
while 
not 
being 
conclusive, 
is 
consistent. 
It 
in-
dicates' 
that 
a 
plan 
may 
have  been  implemented 
in 
which 
provocateurs 
would 
instigate 
riots 
at 
one 
or 
both 
1972 
political 
conventions. 
Leaders 
of 
the 
movement  would  be 
arrested 
and 
taken 
from 
the 
coun-
try. 
This  would  be  done 
either 
before 
the 
conven-
tions 
to 
prevent 
them  from 
controlling 
their 
people, 
so 
that 
the 
provocateurs 
could 
be  more 
effective, 
or 
in 
response 
to 
the 
instigated 
rioting, 
thus 
provok-
ing 
still 
more 
violent 
reactions 
from 
those 
remain-
ing. 
The 
American 
people, 
terrified 
by 
such 
dis-
turbances, 
would 
then 
be  amenable 
to 
the 
imposition 
of 
martial 
law,  and 
perhaps 
even 
the 
cancellation 
of 
the 
elections. 
This 
is 
a 
disturbing 
hypothesis, 
but 
events 
do 
tend 
to 
support 
it. 
Far 
more 
inten-
sive 
investigations 
must  be  conducted 
either 
to 
prove 
or 
to 
disprove 
this 
theory. 
The 
implications 
of 
Watergate  South 
are 
too 
serious 
to 
remain  an  ob-
scure 
question 
of 
which 
only 
a  few 
people 
are 
aware. 
(more) 
23 

Biographical  Information 
Jack 
ACKERLY 
-
Florida 
FBI 
agent 
to 
whom 
Vincent  Han-
nard 
allegedly 
reported 
the 
offer 
from  Frank 
Stur-
gis 
to 
infiltrate 
VVAW 
Gerald 
ALCH 
-Attorney 
for 
James 
McCord 
during 
his 
trial 
for 
the 
Watergate 
break-in 
Alfred 
C. 
BALDWIN, 
3rd  -Former 
FBI 
agent 
who 
moni-
tored 
taps 
on 
telephones 
at 
the 
DNC, 
asked 
to 
in-
filtrate 
VVAW 
Bernard 
L. 
BARKER 
-Convicted 
member 
of 
the 
"plumbers" 
unit 
who 
directed 
Cuban 
agitators 
at 
J. 
Edgar 
Hoover's 
funeral 
Karl 
BECKER 
-
Charles 
Henry  Becker, 
3rd, 
FBI 
inform-
er 
from 
New 
Orleans 
who 
testified 
against 
the 
Gainesvi 
lle 
8 
Scott 
CAMIL 
- A 
Gainesville 
8  defendant  and  formerly 
Florida 
regional 
coordinator 
for 
VVAW 
Charles 
W. 
COLSON 
-Former 
special 
counsel 
to 
then 
President 
Richard  Nixon,  pleaded 
guilty 
to 
ob-
structing 
justice 
Harrison 
CRENSHAW 
-
Dade 
County 
(Florida) 
Public 
Safety 
Department 
officer 
who 
infiltrated 
VVAW, 
now 
deceased 
John 
W. 
DEAN, 
3rd  -Former  counsel 
to 
then 
President 
Richard  Nixon,  pleaded 
guilty 
to 
conspiracy 
to 
obstruct 
justice 
Felipe 
de 
DIEGO 
-
Cuban 
exile 
and 
member 
of 
the 
"plumbers" 
unit 
who 
has  admitted 
breaking 
into 
Dr.  Lewis 
Fielding's 
office 
Donald 
C. 
DONNER 
-
The 
VVAW 
member 
from 
Fayetteville, 
Arkansas, 
who 
conducted 
the 
June,  1972, 
interview 
with  William 
Lemmer 
John 
ECK 
-
Miami 
gun 
dealer 
asked 
to 
infiltrate 
VVAW 
"EDUARDO" 
-See 
E. 
Howard 
Hunt, 
Jr. 
Daniel 
J. 
ELLSBERG 
-Former 
Rand 
Corporation 
employ-
ee 
who 
turned  over 
the 
Pentagon  Papers 
to 
"The 
New 
York 
Times" 
Pablo 
M. 
FERNANDEZ 
-
Cuban 
exile, 
FBI 
and 
police 
in-
former 
in 
Miami, 
and 
paid 
agitator 
at 
J. 
Edgar 
Hoover's 
funeral 
Angel 
FERRER 
-
Cuban 
exile 
and 
paid 
agitator 
at 
J. 
Edgar  Hoover's 
funeral 
Lewis 
FIELDING 
-Daniel 
Ellsberg's 
psychiatrist 
whose 
office 
was 
broken 
into 
by 
members 
of 
the 
"plumbers" 
unit 
Frank 
FIORINI 
- A 
soldier 
of 
fortune, 
convicted 
mem-
ber 
of 
the 
"plumbers" 
unit, 
better 
known 
as  Frank 
Sturgis 
Alton 
C. 
FOSS 
- A 
Gainesville 
8 
defendant 
and 
for-
merly 
Dade 
County 
coordinator 
for 
VVAW 
Virgilio 
R. 
GONZALEZ 
-
Cuban 
exile 
and 
convicted 
member 
of 
the 
"plumbers" 
unit 
Larry 
GRANTWOHL 
-
An 
FBI 
informer  and 
provocateur, 
in 
late 
1969 
and 
early 
1970, 
who 
trained 
and 
en-
couraged  Weathermen 
in 
Ohio 
Vincent 
J. 
HANNARD 
-
Private 
investigator 
from  Mira-
mar, 
Florida, 
who 
was 
active 
in 
Cuba 
when 
Castro 
took  over,  asked 
to 
infiltrate 
VVAW 
Robert 
HARDY 
-
An 
FBI 
informant  whose  admissions 
in 
court 
led 
to 
the 
dismissal 
of 
the 
Camden 
28 
char-
ges 
on 
grounds 
of 
entrapment 
J. 
Edgar 
HOOVER 
-Former 
FBI 
Director 
who 
died 
May 
2, 
1972 
William 
HOWARD 
-
The 
reporter 
who 
broke 
the 
story 
of 
the 
Rand 
Corporation 
study 
on 
the 
cancella-
tion 
of 
the 
1972 
elections 
E. 
Howard 
HUNT, 
Jr. 
-Former 
CIA 
agent, 
White 
House 
consultant, 
and 
convicted 
of 
conspiracy, 
bribery, 
and 
wiretapping, 
known 
to 
Cuban 
exiles 
as  Eduardo 
John 
Kifner 
-
Reporter 
for 
"The 
New 
York 
Times" 
who 
covered 
the 
Gainesville 
8 
case 
Major 
Adam 
KLIMKOWSKI 
-
Commander 
of 
the 
Special 
In-
vestigations 
Section 
of 
the 
Miami 
Police 
Depart-
ment 
William 
W. 
LEMMER 
-Former 
FBI 
informer 
from  Arkan-
sas 
and 
principal 
witness 
against 
the 
Gainesville 
8 
24 
G. 
Gordon 
LIDDY 
-Former  White  House 
aide, 
counsel 
to 
CRP, 
convicted 
of 
bribery 
and 
wiretapping 
Humberto 
LOPEZ 
-
Cuban 
exile 
and  paid 
agitator 
at 
J. 
Edgar  Hoover's 
funeral 
Jeb 
Stuart 
MAGRUDER 
-Former  White 
House 
aide, 
chief-
of-staff 
for 
CRP, 
pleaded 
guilty 
to 
conspiring 
to 
obstruct 
justice 
John  F. 
MAHER 
-
FBI 
agent  working  out  of 
the 
New 
York 
City 
office 
Eugenio 
R. 
MARTINEZ 
-
Cuban 
exile 
and 
convicted 
mem-
ber 
of 
the 
"plumbers" 
unit 
Rolando 
MARTINEZ 
-Paid 
agitator 
at 
J. 
Edgar  Hoover's 
funeral 
who 
may 
be 
convicted 
"plumber"  Eugenio 
R. 
Martinez 
James 
W. 
McCORD, 
Jr. 
-Former 
CIA 
agent, 
security 
coordinator 
for 
CRP, 
and 
convicted 
of 
burglary 
and 
wiretapping 
George 
McGOVERN 
-
The 
1972 
Democratic 
presidential 
candidate 
Stephen 
McNELLIS 
-Minnesota 
coordinator 
of 
the 
Vietnam  Veterans 
for 
a 
Just 
Peace 
W. 
O. 
WEHRTENS 
-U.S. 
District 
Judge 
in 
Miami 
John 
N. 
MITCHELL 
-Former  U.S. 
Attorney 
General, 
director 
of 
CRP, 
and 
under 
indictment 
for 
con-
spiracy, 
obstruction 
of 
justice, 
and 
perjury 
Richard 
M. 
NIXON 
-Former 
President 
of 
the 
United 
States, 
unindicted 
co-conspirator 
for 
obstruction 
of 
justice, 
since 
pardoned 
Richard 
J. 
O'CONNELL 
-
FBI 
agent 
and  William  Lemmer's 
resident 
control 
in 
Fayetteville, 
Arkansas 
Reinaldo 
PICO 
-
Cuban 
exile 
and 
paid 
agitator 
at 
J. 
Edgar  Hoover's 
funeral 
Emerson 
L. 
POE 
-
FBI 
informer 
from 
Florida 
who 
tes-
tified 
against 
the 
Gainesville 
8 
Angelica 
ROHAN 
-
Cuban 
exile 
and 
police 
informant 
in 
1972 
to 
whom 
Pablo  Fernandez 
confided 
Gerald 
RUDOFF 
-
Dade 
County 
(Florida) 
Public 
Safety 
Department 
officer 
who 
infiltrated 
VVAW 
Barbara 
STOCKING 
-Former  Teaching  Fellow 
in 
Philo-
sophy 
at 
Boston 
University 
to 
whom 
William 
Lemmer 
confided 
Frank 
A. 
STURGIS 
-See  Frank 
Fiorini 
Louis 
TACKWOOD 
-
Los 
Angeles 
agent 
provocateur 
for 
ten 
years 
who 
broke 
his 
cover  and 
talked 
in 
1971 
Evelle 
YOUNGER 
-
California 
State 
Attorney 
General 
allegedly 
directing 
Squad 
19 
Bibliography 
1.  James 
W. 
McCord, 
Jr., 
May 
18 
and  22,  1973,  Hear-
ings 
before 
the 
Select 
Committee 
on 
Presidential 
Campaign 
Activities 
of 
the 
United 
States 
Senate, 
Phase 
I: 
Watergate 
Investigation, 
Book 
1,  pp. 
180  and 
200 
2.  Gerald  Alch,  as  quoted 
by 
Walter  Rugaber,  "The 
New 
York 
Times,"  January  17,  1973 
3. 
John 
Kifner, 
"The 
New 
York 
Times,"  August  9,  1973 
4. 
Rob 
Elder, 
"Miami 
Herald," 
June  13,  1973 
5. 
Unpublished  commentary 
by 
Donald 
C. 
Donner 
on 
the 
June,  1972, 
interview 
of  WHliam 
Lemmer 
6. 
Transcript 
of  unpublished 
interview 
with  William 
Lemmer 
conducted  June  3  and  4, 
1972 
7.  Richard 
E. 
Sprague,  "The  June  1972  Raid 
on 
Demo-
cratic 
Party 
Headquarters  (The  Watergate 
Incident) 
--
Part 
2, 
"Computers  and  Automation,"  October, 
1972,  pp.  24-25 
8. 
Interview 
with  William 
Lemmer 
9. 
Rob 
Elder, 
"Miami 
Herald," 
May 
26, 
1973 
10. 
Rob 
Elder, 
"Miami 
Herald," 
May 
23,  1973 
11.  Unpublished 
statement 
given 
by 
Angelica 
Rohan 
to 
U.S. 
District 
Judge 
W.O. 
Mehrtens 
on 
May 
23, 
1973 
12.  Statement 
of 
Angelica 
Rohan 
13. 
Rob 
Elder, 
"Miami 
Herald," 
May 
23, 
1973 
14.  Dennis  Holder, 
"Miami 
Herald," 
June  8, 
1973 
15.  John 
Kifner, 
"The 
New 
York 
Times:'  August  8, 
1973 
16.  Unpublished 
affidavit 
submitted 
by 
Barbara 
Stock-
ing 
on 
July 
9,  1972 
COMPUTERS 
and 
PEOPLE 
for 
December. 
1974 

e 
17. 
Interview 
of  William 
Lemmer 
10. 
Jeb 
Stuart 
Magruder, 
June 
14,  1973, 
Hearings 
be-
fore 
the 
Select 
Committee,  Phase 
I, 
Book 
2,  pp. 
707-788 
19.  John 
W. 
Dean, 
3rd, 
June  25,  1973, 
Hearings 
be-
fore 
the 
Select 
Committee,  Phase 
I, 
Book 
3, 
p. 
929 
20. 
Citizens 
Research  and 
Investigation 
Committee 
and  Loui s 
E. 
Tackwood,  "The 
Glass 
House 
Tapes," 
Avon, 
New 
York,  1973, 
p. 
171 
0 
Imberman 
-Continued 
from 
page 
14 
of 
course 
--
and 
was 
responsible 
for 
the 
union 
ac-
tivity. 
The 
consultant 
recommended  a  system 
of 
baffles 
~e 
installed 
to 
cut 
the 
noise 
in 
the 
department, 
ahd 
In 
the 
nearby 
area. 
In 
addition, 
he 
suggested 
piped-
in 
music  which  (by 
contrast) 
seemed 
to 
diminish 
the 
racket. 
Having  music 
in 
the 
plant 
was 
so  novel 
that 
it 
went 
far 
to 
eliminate 
the 
basic 
complaint. 
In 
ad-
dition, 
improvements  were 
made 
in 
the 
physical 
work-
ing 
condi 
tions 
that 
had  been  mentioned 
by 
many 
employ-
ees. 
The  company 
won 
the 
second 
election 
2-to-l. 
Most 
often, 
our 
research 
indicates, 
worker 
dis-
satisfaction 
does 
not 
seek 
outlet 
along 
union 
lines. 
Such 
dissatisfaction 
is 
simply 
channelled 
in 
that 
direction 
by 
organizers 
who 
know 
how 
to 
take 
advan-
tage 
of 
discontent. 
Recognize 
Discontent 
It 
is 
therefore 
vital 
for 
management 
to 
discover 
what 
is 
breeding 
worker 
discontent. 
Some 
trivial 
things 
such  as 
inadequate 
lighting, 
poor 
circula-
tion 
of 
heat 
in 
a 
department, 
wet 
or 
dirty 
floors, 
leaky 
restrooms, 
or 
begrimed  windows 
may 
be 
the 
cause 
and 
very 
often 
is 
the 
cause 
--
if 
employers 
had  a  good  upward  communications  system 
to 
bring 
those 
matters 
to 
the 
surface 
quickly. 
A more  im-
portant 
matter 
such 
as 
heavy-handed  foremen 
may 
cause 
worker 
revolt 
despite 
the 
fact 
that 
they 
have 
borne 
that 
burden 
for 
years. 
This 
latter 
is 
common 
but 
most 
executives 
never 
recognize 
it. 
Or 
finally: 
the 
demand 
for 
cost-of-living 
increases 
--
far 
ex-
ceeding 
guidelines 
--
crops 
up, 
with 
employees 
ig-
norant 
of 
what  such 
cost 
increases 
might 
do 
to 
the 
company's 
competitive 
position 
AND 
EMPLOYEE 
JOBS. 
Understanding  Employees 
It 
takes 
a 
great 
deal 
of 
time, 
effort 
and 
skill 
to 
listen 
to 
employees  and 
to 
understand 
them. 
This 
important 
chore 
is 
part 
of 
sophisticated 
foremen 
training, 
and 
is 
not 
too 
common. 
In 
this 
connec-
tion, 
I  have  been 
through 
288 
NLRB 
elections 
win-
ning 
9~.4 
~er 
cent 
just 
by 
inaugurating 
a 
tw~-way 
commUnICatIons  system  and  foremen 
training. 
Most 
of 
the 
losses 
were 
the 
result 
of 
being 
called 
in 
when 
the 
fire 
was 
already 
up 
to 
the 
attic. 
Given 
time, 
techniques 
employed 
by 
such 
experts 
can  be 
learned 
by  company 
personnel. 
Employee Goodwill 
Such 
techniques 
work 
splendidly, 
not 
to 
under-
mine  union 
sentiment 
particularly, 
but 
more  impor-
tantly 
to 
win  employee 
goodwill 
for 
management 
--
even  where 
unions 
exist. 
Then 
production 
and 
sales 
may 
go 
on 
uninterruptedly, 
enabling 
both 
management 
and 
labor 
to 
earn 
larger 
returns. 
For  management  and 
labor 
each 
to 
earn 
its 
fair 
share, 
it 
becomes 
important 
to 
listen 
with 
a 
trained 
"third 
ear" 
and 
to 
train 
supervisors 
and 
top 
manage-
ment 
how 
to 
do 
so 
--
if 
the 
number 
of 
NLRB 
elections 
in 
this 
industry 
is 
to 
be 
reduced 
and 
not 
extended. 
0 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 
Antley 
-Continued 
from 
page  17 
We 
can 
predict 
the 
need 
for 
physicians 
who 
can 
di-
r~c~ 
the 
advancing 
technology 
of 
medicine, 
and  phy-
SICIans 
who 
can 
interpret 
the 
knowledge 
made 
possible 
through 
technology 
to 
the 
patients. 
But 
because 
of 
~he.rapid 
chan~es 
in 
medicine 
which 
are 
occurring, 
It 
IS 
not 
possIble 
to 
foresee 
all 
of 
the 
specific 
a7e~s 
that 
w~ll 
demand 
new 
skills. 
A 
formal 
recog-
nItIon 
of 
thIS 
state 
of 
rapid 
change 
should 
be 
ac-
knowledged,  however. 
It 
should 
be 
taken 
into 
con-
sideration 
in 
a 
reorganization 
of 
medical 
education, 
so 
that 
new 
physicians 
will 
be 
educated 
with 
the 
skill 
to 
recognize 
and 
adapt 
to 
new 
situations. 
The 
Super-Technologist 
Indeed, 
perhaps 
the 
greatest 
significance 
to 
be 
gained 
from 
predicting 
the 
role 
of 
the 
physician 
in 
the 
near 
future 
is 
in 
the 
adaptation 
of 
medical 
edu-
cation 
today. 
Obviously 
two 
different 
areas 
need 
to 
receive 
serious 
consideration 
in 
an 
evolving 
cur-
riculum. 
The 
first 
would  be 
concerned 
with 
training 
the 
super-technologist. 
The 
emphasis 
on 
this 
train-
ing 
should 
be  towards 
proficiency 
in 
theoretical 
mathematics, 
statistics, 
physics, 
computers  and 
electronics. 
However, 
the 
fact 
that 
it 
may 
be 
nec-
essary 
for 
a 
man 
to 
retrain 
himself 
several 
times 
in 
his 
career 
should 
be 
stressed, 
and 
adaptive 
skills 
for 
this 
should 
be 
developed. 
This 
is 
not 
a 
simple 
task. 
Its 
requirements 
infer 
that 
the 
trainee 
needs 
to 
have 
the 
most 
current 
technical 
information 
either 
~ithout 
having 
his 
identity 
strongly 
associated 
with 
Its 
content 
or 
that 
he  have 
the 
capacity 
to 
take 
a 
new 
identity 
with 
each 
retraining. 
The 
Really  Effective Counselor 
A second 
area 
of 
emphasis 
in 
medical 
education 
should  be 
on 
helping 
the 
physician 
to 
become  an 
ef-
fective 
counselor. 
There 
are 
several 
approaches 
to 
this 
problem. 
Educational 
programs 
for 
clinical 
psychologists 
and 
psychiatrists 
have 
already 
devel-
oped  methods 
of 
training 
aspirants 
in 
communicative 
and 
facilitory 
skills. 
These 
techniques 
are 
avail-
able 
to 
the 
aspiring 
physician-counselor 
and 
should 
be 
uti 
Ii 
zed. 
Techniques, 
however. 
are 
not 
in 
themselves 
solu-
tions 
to 
educating 
counselors. 
The 
ability 
to 
em-
pathize 
with 
patients, 
to 
accept 
each 
one 
as 
an 
in-
dividual. 
and 
to 
respect 
his 
value 
system  and 
life-
style 
is 
not 
~cquired 
through 
skill 
courses. 
It 
may 
be 
developed 
In 
part 
through 
the 
study 
of 
sociology 
and 
anthropology, 
but 
philosophical 
knowledge  does 
not 
equal 
compassion  and 
sensitivity. 
To 
develop 
these 
paramount 
qualities 
of 
a 
counselor 
some 
work 
in 
personal 
growth, 
either 
in 
group 
or 
i~dividual 
therapy 
is 
probably 
required. 
Group 
work 
described 
by  Cadden 
et 
a1
7  and  Kubler-Ross8 
with 
severely 
ill 
pati~n~s.suggests 
effective 
methods 
for 
developing 
sensItIVIty. 
Thus. 
technology 
continues 
to 
shape 
the 
direction 
of 
medical 
practice 
through 
its 
increasing 
incorpora-
tion 
into 
diagnosis 
and 
treatment. 
The 
development 
of 
new 
skills 
by 
physicians 
in 
response 
to 
technical 
adv~nce~ent 
w~ 
11 
be 
necessary; 
while 
appropriate 
edu-
catIon 
In 
medIcal 
school 
should 
facilitate 
this 
adap-
tive 
development. 
References 
1. 
Postman  N •• 
Weingartner 
C.: 
Teaching 
as 
a 
sub-
versive 
activity. 
Dell 
Publishing 
Co., 
Inc., 
1969 
(please 
turn 
to 
page 
34) 
25 

The 
Assassination  of  the  Reverend 
Martin 
Luther 
King, 
Jr., 
and 
Possible 
Links 
With the  Kennedy  Murders 
Wayne  Chastain,  Jr. 
810 
Washington  Ave., 
Apt. 
408 
Memphis,  Tenn. 
38105 
Was 
the 
murder 
of 
the  Reverend 
Martin 
Luther 
King,  Jr., 
the result 
of 
a  conspiracy?  Previous  installments 
of 
this 
series  described  the  "eggs 
and 
sausage" man,  later given  the 
code  name 
of 
Jack  Armstrong,  who  appeared 
on 
the  scene 
the 
day 
of 
the  murder. 
Also 
appearing  on  the  scene  were 
Tony'Benavides 
and 
J. 
Christ Bonnevecche  who  claimed 
to 
have 
information 
and 
understanding 
of 
Dr.  King's 
and 
John 
F. 
Kennedy's assassinations. 
Are 
these 
two 
men 
to 
be  believed? 
Are 
they 
one 
and 
the 
same 
person  -possibly 
aliases 
for 
Jack  Armstrong? 
Is 
there  a  relationship  between  these  assassinations?  a 
con-
spiracy 
at 
work 
by 
an  organization 
or 
several  individuals? 
or 
are  these  murders  more 
simply 
vendettas?  Mr.  Chastain 
con-
tinues 
to 
seek  the  answer  to  these  questions 
and 
to 
the 
mur-
ders 
of 
Dr. 
King 
and 
the  Kennedys. 
Charlie 
Q. 
Stephens 
Neither 
Atty. 
Gen. 
Phil 
Canale 
nor 
his 
team 
of 
prosecutors 
ever 
summoned 
Jones 
or 
myself 
to 
testify. 
No 
doubt, 
Jones' 
credibility 
would  have  been 
attacked 
by 
prosecutors 
if 
the 
defense 
had 
attempted 
to 
put 
Jones 
on 
the 
stand. 
Jones 
has  a 
criminal 
record 
because 
of 
felony 
convictions 
for 
theft 
by 
check. 
On 
the 
other 
hand, 
Canale 
and 
his 
prosecutors 
had 
no 
qualms 
about 
constructing 
their 
entire 
case 
on 
the 
testimony 
of 
Charlie 
Q. 
Stephens, 
a 
man 
with 
155 
arrests 
on 
his 
record, 
including 
an 
assault 
to 
mur-
der 
with 
firearms. 
Why 
would 
Stephens 
be  deemed  by 
the 
prosecution 
as 
a  more 
reliable 
witness 
than 
Jones, 
despite 
154 
more 
arrests 
than 
Jones? 
Jones 
is 
black 
and 
Stephens 
is 
white. 
As 
stated 
in 
Part 
9, 
Stevens 
said 
he 
saw 
the 
man 
who 
ran 
out 
of 
the 
bathroom  and 
that 
he  was 
"nig-
ger". 
Stephens 
made 
this 
statement 
to 
this 
reporter, 
both 
on 
the 
night 
of 
the 
slaying 
and 
the 
next 
day. 
On 
the 
night 
of 
the 
slaying, 
Mrs.  Brewer  and  Mrs. 
Walden, 
who 
were 
both 
sober, 
told 
me 
to 
ignore 
Ste-
phens 
because 
he  was 
"falling 
down 
drunk" 
at 
the 
time 
of 
King's 
slaying. 
A 
third 
witness, 
Charles 
McGraw, 
the 
cab 
driver, 
would 
later 
inform 
me 
also 
that 
Ste-
phens 
was 
intoxicated 
at 
the 
time. 
Police 
and 
FBI 
agents 
ignored 
Stephens' 
state-
ments 
for 
several 
weeks 
after 
King's 
death. 
Then, 
Stephens 
changed 
his 
story 
and 
his 
credibility 
is 
seemingly  enhanced. 
Stephens 
came 
forth 
and 
said 
he 
saw 
a 
white 
man 
come 
out 
of 
the 
bathroom  and 
that 
Ray 
was 
the 
man. 
26 
-
Part 
11 
(Conclusion) 
The  metamorphosis 
of 
memory 
evolved 
along 
a 
tor-
tuous 
route, 
climaxed 
with 
the 
transformation 
of 
a 
drunken 
derelict 
into 
a 
reliable 
witness, 
and 
the 
degredation 
of 
a 
reliable 
witness 
--
Mrs.  Walden 
--
into 
a  supposed 
psychotic. 
Could 
the 
discrediting 
of 
Mrs.  Walden  have  been 
the 
result 
of 
her 
earlier 
state-
ment 
that 
she  had 
heard 
the 
shot 
fired 
from 
outside 
the 
rooming  house 
--
a 
statement 
that 
confirms 
Jones' 
contention 
that 
he 
saw 
the 
man 
outside 
the 
rooming 
house  and 
in 
the 
bushes 
--
and 
that 
the 
man 
she 
saw 
coming 
out 
of 
the 
bedroom 
was 
neither 
Ray 
nor 
the 
man 
described 
by  Mrs.  Brewer 
as 
John 
Willard? 
Stephens' 
belated 
recall 
came 
after 
a 
drinking 
session 
with 
a 
British 
newspaper  man. 
Ray 
had 
just 
been  apprehended 
in 
London. 
The 
British 
newspaper 
man 
gratuitously 
provided 
Stephens 
with 
a 
fifth 
of 
whisky  and 
at 
least 
$30 
in 
cash. 
Wayne 
Chastain 
of 
Memphis, 
Tenn., 
is 
a 
veteran 
newspaper 
reporter 
and 
Southern 
j 
ournali 
st 
wi 
th 
experience 
on 
several 
metropoli 
tan 
dailies 
in 
Texas, 
including 
EI  Paso,  Houston, 
Dallas 
and  San 
Antonio,  as 
well 
as 
on 
the 
St. 
Louis  Globe-Demo-
crat 
and  a 
Memphis 
daily. 
He 
had 
traveled 
with 
Dr. 
King's 
entourage 
on 
and 
off 
for 
two 
years 
prior 
to 
the 
assassination. 
He 
had 
spent 
the 
last 
two 
days 
of 
King's 
life 
covering 
hi 
s 
speeches 
in 
Memphi 
s 
pri 
or 
to 
the 
shooting. 
He 
was 
on 
the 
mur-
der 
scene 
wi 
thin 
10 
minutes 
after 
Dr.  King 
was 
shot. 
He 
interviewed 
eyewitnesses 
for 
one 
of 
the 
fi 
rst 
comprehensive 
news 
accounts 
to 
the 
nati 
on 
of 
Dr. 
King's 
death. 
A 
native 
Texan  and  a 
graduate 
of 
the 
Uni 
versi 
ty 
of 
Texas 
wi 
th 
a 
bachelor's 
de-
gree 
in 
hi 
story 
and 
poli 
tical 
science. 
Mr. 
Chas-
tain 
also 
spent 
several 
months 
in 
early 
1964 
in-
vestigating 
and 
researching 
the 
assassination 
of 
President 
Kennedy, 
Jack 
Ruby's 
link 
with 
Lee 
Har-
vey  Oswald  and  a  group 
of 
pro-Cuban  arms 
runners, 
and 
other 
activities 
related 
to 
Kennedy's 
death. 
Months 
before 
The 
Warren  Commission's 
report, 
which 
was 
published 
in 
the 
fall 
of 
1964, 
Mr. 
Chas-
tain 
--
after 
exhaustive 
interviews 
with 
hundreds 
of 
witnesses 
--
had 
reached 
the 
conclusion 
that 
President 
Kennedy's 
death 
was 
the 
result 
of 
a 
plot 
involving 
paramilitary 
professionals 
financed 
by 
a  group 
of 
weal 
thy, 
right-wing 
Texans 
wi 
th 
strong 
connections 
wi 
th 
former 
high 
officials 
with 
the 
Central 
Intelligence 
Agency 
as 
well 
as  lower 
echelon 
CIA 
personnel 
still 
assigned 
to 
the 
bu-
reau. 
The 
present 
installment 
is 
an 
excerpt 
from 
a 
forthcoming 
book 
enti 
tIed: 
Who 
Really 
Ki 
lIed 
Dr.  King 
--
And 
the 
Kennedys?  A 
Disturbing 
View 
of 
Political 
Assassinations 
In  America. 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 

... 
, 
The 
next 
day,  under 
the 
newspaperman's 
byline, 
Stephens 
is 
quoted 
as 
saying 
he 
recognized 
Ray 
from 
newspaper 
photographs 
as 
the 
man 
whom 
he  had  seen 
running 
out 
of 
the 
bathroom. 
FBI 
and 
Police  Disbelieve 
Stephens 
FBI 
and 
Memphis 
police 
assiduously 
avoided 
Ste-
phens 
--
especially 
after 
his 
previous 
drunken 
as-
serti 
ons 
that 
it 
was 
a 
"nigger" 
--
as 
early 
as 
the 
morning 
after 
the 
slaying, 
after 
Mrs.  Brewer  and 
Mrs.  Walden  had 
described 
his 
condition 
of 
the 
night 
before 
to 
them. 
Suddenly, 
Stephens' 
recuperative 
recall 
powers 
re-awakened 
the 
interest 
of 
the 
FBI. 
Inspector 
N. 
E.  Zachary, 
although 
a 
fervent 
believer 
in 
the 
lone 
assassin 
theory, 
never 
did 
attach 
any 
credence 
to 
Stephens' 
statements 
--
even 
after 
the 
elaborate 
rehabilitation 
of 
Stephens 
by 
the 
FBI. 
Zachary 
accounts 
for 
the 
transformation 
of 
Ste-
phens 
into 
a 
credible 
witness 
as 
a 
"bureacratic 
blun-
der." 
An 
FBI 
agent 
in 
Washington,  D.C.,  happened 
to 
read 
the 
story 
by 
the 
British 
newspaper 
writer 
quoting 
Ste-
phens. 
There 
was 
nothing 
in 
the 
investigative 
reports 
coming 
to 
Washington 
about 
a 
witness 
named 
Stephens. 
(He 
was 
deemed  so 
lacking 
in 
credibility 
that 
the 
field 
agents 
did 
not 
even  mention  him 
in 
their 
reports.) 
So, 
the 
Washington 
agent 
clipped 
the 
British 
article 
and 
sent 
an  immediate 
bulletin 
to 
the 
~lemphis 
office 
of 
the 
FBI 
to 
pick 
up 
Stephens. 
The 
FBI 
notified 
the 
police 
dispatcher 
to 
have 
Stephens 
picked 
up. 
Stephens 
was 
a  well-known 
police 
character, 
and 
his 
early 
morning 
hang-outs 
were 
well 
known 
to 
the 
police 
dispatcher, 
who 
immediately 
sent 
a 
patrol 
car 
to 
a  downtown  park 
to 
have 
Ste-
phens 
picked 
up. 
After 
Stephens 
was 
picked 
up, 
the 
patroman 
called 
the 
dispatcher 
back  and  asked  where 
to 
take 
him. 
The 
dispatcher, 
knowing  Zachary 
as 
the 
inspector 
in 
charge 
of 
the 
Memphis 
police 
department 
investigation 
of 
the 
King 
slaying, 
told 
the 
patrolman 
to 
take 
Stephens 
to 
Zachary's 
office, 
temporarily 
forgetting 
that 
the 
request 
came 
from 
the 
FBI. 
The 
patrolman 
delivered 
Stephens 
to 
Zachary's 
office. 
Zachary 
was 
on 
the 
phone,  so 
the 
patrolman 
left 
Stephens 
with 
another 
officer 
outside 
Zachary's 
office. 
When 
Zachary's 
call 
was 
finished, 
the 
offi-
cer 
outside 
said 
Stephens 
was 
there. 
Zachary, 
familiar 
with 
the 
statements 
by  Mrs. 
Brewer,  Mrs.  Walden,  and 
others 
in 
the 
rooming  house, 
said: 
"What  do  I  want 
with 
him 
.•. 
let 
him 
go." 
Later 
in 
the 
day 
when 
the 
FBI 
called 
again 
and 
asked 
if 
Stephens 
had  been 
picked 
up, 
the 
search 
for 
Stephens 
was 
launched 
again 
and  he 
was 
located. 
"lie 
was 
strictly 
an  FBI 
witness 
••• 
not 
ours," 
Zachary 
later 
said. 
Iluring 
the 
extradition 
hearings, 
FBI 
agents 
took 
Stephens 
into 
protective 
custody, 
kept 
him 
in 
posh 
motels, 
and 
provided 
him 
with 
money 
and 
liquor 
--
and 
away 
from 
the 
press. 
Mrs.  Walden  Disappears 
Meanwhile,  Mrs.  Walden 
mysteriously 
disappeared. 
Tlli s 
reporter 
spent 
three 
days 
looking 
for 
Mrs.  Wal-
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 
den 
after 
the 
State 
Department 
said 
Stephens' 
state-
ment 
identifying 
Ray 
as 
the 
man 
Stephens 
saw 
come 
out 
of 
the 
bathroom 
was 
introduced 
into 
evidence 
during 
the 
extradition 
hearing 
in 
London. 
Later, 
I 
learned 
she  had  been  committed 
to 
the 
West  Tennessee 
Psychiatric 
Hospital 
in 
Bolivar, 
about 
60 
miles 
from  Memphis, 
on 
the 
same 
day 
that 
the 
FBI 
finally 
got 
custody 
of 
Stephens 
as 
a 
material 
witness. 
The 
procedures 
used 
to 
commit  Mrs.  Walden  were 
not 
only 
unorthodox, 
but 
illegal, 
as 
a 
subsequent 
hearing 
three 
years 
later 
confirmed. 
Staff 
physicians 
at 
the 
institution 
said 
Mrs.  Walden 
should 
never 
have 
been  committed, 
but 
with 
her 
common-law  husband 
in 
protective 
custody 
by 
the 
FBI, 
there 
were 
no 
family 
members 
that 
could 
obtain 
her 
release 
or 
protest 
the 
commi 
ttment. 
In 
January 
1969,  a  month 
before 
the 
trial 
of  James 
Earl 
Ray,  a 
staff 
psychiatrist 
at 
the 
hospital 
recom-
mended  Mrs.  Walden  be 
immediately 
discharged 
and 
noted 
in 
his 
record 
that 
her 
committment  had 
violated 
the 
procedures 
set 
forth 
in 
the 
Tennessee 
mental 
health 
committment 
statute 
--
a  modern  law 
based 
on 
model  codes 
prescribed 
by 
both 
legal 
and 
medical 
associations. 
In 
his 
report, 
the 
psychiatrist 
said 
Mrs.  Walden 
had 
never 
had  a 
psychiatric 
history; 
at 
the 
time 
of 
her 
committment,  she 
did 
not 
exhibit 
any  symptoms 
of 
psychosis 
serious 
enough 
to 
warrant 
her 
committment 
to 
Western 
State. 
This 
institution 
usually 
becomes 
the 
repository 
of 
mental 
patients 
who 
have 
failed 
to 
respond 
to 
rehabilitative 
therapy 
at 
the 
Tennessee 
Psychiatric 
Hospital 
in 
Memphis. 
Someone 
in 
the 
City 
of 
Memphis 
government 
first 
had  Mrs.  Walden  committed 
in 
the 
City 
of 
Memphis 
Hospital's 
psychiatric 
ward  which 
is 
under 
the 
con-
trol 
of 
the 
Memphis 
police 
department. 
At 
that 
facility, 
patients 
undergo 
only 
brief 
therapy, 
and 
are 
either 
discharged 
or 
committed 
for 
short 
'range 
therapy 
--
sometimes 
lasting 
less 
than 
a 
week 
and 
sometimes 
lasting 
three 
months 
--
at 
the 
Tennessee 
Psychiatric 
Hospital 
three 
blocks 
away 
in 
Memphis. 
Charles 
Murphy,  a 
Memphis 
attorney 
who 
later 
was 
retained 
to 
represent 
Mrs.  Walden,  was 
eventually 
successful 
in 
gaining 
an 
adjudication 
that 
Mrs.  Wal-
den 
was 
illegally 
committed. 
Murphy 
said 
when 
Mrs.  Walden 
was 
rushed 
from 
the 
rooming  house 
to 
the 
City 
of 
Memphis 
Hospital's 
psychiatric 
ward, 
she 
had  been 
recovering 
from  an 
operation 
for 
a 
rare 
skin 
disease. 
She 
had  been  an 
alcoholic 
and  had  been 
rehabilitated 
under  an 
AA 
program 
that 
met 
at 
the 
Tennessee 
Psychiatric 
Hos-
pital. 
"She  had  been 
sober 
for 
a  month 
before 
King's 
death, 
and 
she 
had  been 
sober 
for 
a  month 
after-
wards, 
right 
up 
until 
the 
time 
of 
her 
committment," 
Murphy 
said. 
The 
normal 
procedure 
would  have  been 
to 
have 
turned 
Mrs.  Walden 
over 
to 
a 
clinical 
psychiatrist 
at 
the 
Tennessee 
Psychiatric 
Ilospital 
for 
an 
evalu-
ation 
and 
for 
a 
short-range 
commitment 
at 
the 
Mem-
phis 
institution 
before 
she  would  be 
sent 
to 
West-
ern 
State. 
"They 
bypassed 
the 
entire 
procedure," 
Murphy 
said. 
"She 
was 
in 
the 
City 
psychiatric 
ward 
less 
than 
a 
day 
before 
she 
was 
transferred 
to 
Western 
State, 
60 
miles 
away." 
(more) 
27 

Murphy 
cites 
Mrs.  Walden 
as 
the 
source 
of 
the 
report 
that 
Stephens, 
her 
common-law  husband, 
was 
induced 
to 
change 
his 
story 
by 
the 
blandishments 
of 
the 
British 
newspaper 
man. 
"They  had 
to 
get 
rid 
of 
me 
to 
make 
Charlie's 
story 
stand 
up 
in 
court," 
Murphy 
quoted  Mrs. 
Walden 
as 
say-
ing. 
Meanwhile, 
while 
Charlie 
Stephens 
was 
in 
the 
pro-
tective 
custody 
of 
the 
FBI, 
another 
frequent 
female 
companion 
of 
Stephens  met  an 
unfortunate 
fate 
--
one 
more 
fatal 
than 
Mrs.  Walden. 
Mrs.  Walden  Illegally 
Committed 
"She 
was 
found 
beaten 
to 
death 
in 
a 
vacant 
lot," 
Murphy 
said. 
Murphy, 
in 
a 
brief 
filed 
in 
the 
Circuit 
Court 
in 
Hardeman  County, 
Tenn., 
where  Western 
State 
Hospi-
tal 
is 
located, 
charged 
that 
members 
of 
the 
Shelby 
County 
Attorney 
General's 
office, 
the 
FBI,  and 
the 
Memphis 
police 
department 
illegally 
conspired 
to 
commit  Mrs.  Walden 
to 
a 
psychiatric 
institution 
for 
two 
reasons: 
First, 
to 
destroy 
her 
credibility 
as 
a 
witness 
in 
case 
she  gave 
testimony 
that 
conflicted 
with 
Stephens 
at 
Ray's 
trial; 
and, 
Second, 
to 
get 
her 
out 
of 
Memphis 
and 
away 
from 
newsmen 
who 
might 
tell 
her 
version 
of 
the 
events 
that 
occurred 
in 
the 
~ooming 
house 
on 
the 
night 
Dr. 
King 
was 
slain. 
Aftermath 
of 
King's  Assassination 
Dr.  Martin 
Luther 
King 
Jr., 
Nobel  Peace 
Prize 
recipient, 
preached 
non-violence, 
but 
on 
April 
4, 
1968,  Dr.  King  became  a 
victim 
of 
the 
very 
virulence 
he  preached 
against. 
A 
sniper 
killed 
him 
with 
a 
rifle 
as 
he 
stood 
on 
a 
Memphis 
motel 
balcony. 
Less 
than 
two 
hours 
later, 
the 
shot 
had  echoed 
around 
the 
world. 
Guerilla 
warfare 
erupted 
in 
the 
largest 
cities 
of 
the 
nation 
--
a 
pattern 
of 
vio-
lence 
unfolded 
in 
a  manner 
not 
entirely 
unlike 
the 
hi 
t  and  run 
tactics 
of 
the 
Viet 
Cong 
in 
South Vietnam. 
Less 
than 
a 
week 
before, 
President 
Lyndon  Johnson 
had 
virtually 
abdicated 
by 
announcing  he  would 
not 
run 
for 
a  second 
elected 
term,  and 
that 
he 
was 
going 
to 
wind 
down 
the 
Vietnam 
War 
--
a 
sharp 
and 
surpris-
ing 
reversal 
of 
the 
escalation 
policies 
he  had 
forced 
on 
the 
nation 
for 
the 
past 
three 
years. 
The 
more 
despairing 
right-wing 
columnists 
seethed. 
They  lamented 
that 
President 
Johnson 
--
once 
the 
hawk's 
hawk 
--
had 
capitulated 
to 
the 
subversive 
forces 
both 
domestically 
and 
abroad. 
The 
monolithic 
forces 
of 
international 
Communism 
had 
not 
only 
pene-
trated 
the 
perimeter 
of 
domestic  U.S. 
security, 
but 
had  deployed 
its 
insurgent 
forces 
in 
our 
city 
to 
break 
down 
law  and 
order. 
Only 
with 
this 
background 
in 
mind,  can  one 
effec-
tively 
evaluate 
the 
meaning  and 
significance 
of 
Dr. 
King's 
death. 
Also, 
the 
perspective 
would 
not 
be  complete 
unless 
one 
recalls 
that 
Dr.  King 
at 
this 
point 
of 
his 
career 
had  amassed  a 
formidable 
coalition 
of 
blacks, 
Chica-
nos,Indians 
and  poor 
whites 
for 
his 
Poor 
People's 
March 
on 
Washington,  D.C. 
It 
would 
begin 
in 
June 
--
less 
than 
two 
months  away. 
It 
would 
begin 
its 
long, 
hard 
trek 
in 
Memphis 
and 
points 
in 
North 
Mississippi. 
28 
This 
would  be 
during 
the 
first 
hot 
month 
of 
what 
many 
urbanologists 
predicted 
would  be 
another 
vola-
tile 
and 
violent 
summer.  Shock 
tremors 
were 
still 
in 
the 
air 
from 
the 
summer 
before 
when 
racial 
vio-
lence 
rocked 
Newark 
and 
Patterson, 
N.J., 
and 
Detroit, 
Mich. 
King's  Killer  a  Racist 
Dr.  King  had  done  more 
than 
any 
other 
man 
to 
break 
down 
the 
barriers 
of 
governmentally 
sanctioned 
segregation 
in 
the 
south. 
He 
had 
just 
then 
began 
to 
expand 
his 
civil 
rights 
movement  and 
mobilize 
the 
strength 
of 
his 
supporters 
in 
the 
Southern 
Christian 
Leadership 
Conference 
to 
uproot 
other 
social, 
eco-
nomic  and 
international 
injustices. 
But 
it 
was 
his 
effectiveness 
as  a 
civil 
rights 
leader 
breaking 
down 
the 
segregation 
barriers 
that 
made 
most 
persons 
--
including 
intellectuals 
on 
the 
right 
and 
the 
left 
--
assume 
that 
a 
conspiracy, 
if 
it 
did 
exist, 
must  have  been 
rooted 
in 
racism. 
Thus,  Dr. 
King's 
killer 
had 
to 
be  a 
racist.
l 
After 
all, 
why 
was 
King 
in 
Memphis 
at 
the 
time  he 
was 
killed? 
This 
was 
the 
question 
most 
often 
asked 
by 
those 
who 
suspected 
that 
racism 
alone 
provides 
the 
clues 
to 
explaining 
King's 
death. 
These 
people 
would 
argue 
that 
a 
two 
month 
old 
sanitation 
strike 
by 
black 
workers 
against 
the 
City 
of 
Memphis 
had 
released 
a 
latent 
racism 
among 
city 
political 
leaders 
--
a 
racism 
that 
had  been  assumed 
by 
more 
enlightened 
citizens 
to 
have  been 
sublimated, 
if 
not 
extirpated 
by 
its 
roots, 
by 
a 
prior 
liberal 
city 
administration 
that 
had 
integrated 
schools, 
restaurants, 
public 
parks 
and  had 
prevented 
violence 
in 
the 
tense 
summer 
of 
the 
year 
before. 
However, 
those 
who 
suspect 
racism 
alone 
provides 
an 
entire 
explanation 
as 
to 
why 
King 
was 
killed 
failed 
to 
perceive 
the 
more 
variegated 
social 
back-
ground  upon  which 
King's 
assassination 
had  impinged. 
By 
early 
1968,  Dr.  Martin 
Luther 
King  had 
evolved 
into 
something  more 
than 
a 
black 
civil 
rights 
leader. 
He 
led 
one 
of 
the 
most  dynamic 
coalitions 
in 
the 
nation 
--
a 
coalition 
that 
could 
bring 
its 
influence 
to 
bear 
on 
international 
as 
well 
as  domestic 
issues. 
The 
"paranoid 
patriots," 
a  term  used 
by 
Rev. 
James  Lawson,  had  begun 
to 
think 
of 
King 
as 
a 
"national 
security 
threat." 
Yet 
King's 
organization 
and 
other 
protest 
groups  had 
just 
succeeded 
in 
"turn-
ing 
President 
Johnson  around 
on 
the 
Vietnam  War". 
A  Grave  Domestic 
Situation 
If 
those 
who 
espoused 
the 
hard-line, 
cold 
war  men-
tality 
could 
regard 
a 
civil 
war 
in 
an  underdeveloped 
Southeast 
Asian 
nation 
less 
than 
20,000 
miles 
away 
as 
an 
immediate  and 
direct 
threat 
to 
America's 
national 
security, 
imagine 
how 
these 
cold 
warriers 
would 
evaluate 
the 
gravity 
of 
a  domestic 
crisis. 
They  would 
claim 
it 
was 
caused 
by 
the 
confrontation 
of 
protest 
groups, 
which  had 
just 
turned 
a  hawkish 
President 
around 
on 
the 
Vietnam 
War, 
marching 
to 
the 
nation's 
capital 
and  demanding 
reform 
legislation 
from 
Congress. 
Assembled 
in 
the 
nation's 
capital 
city, 
could 
not 
such  a 
formidable 
group 
force 
Con-
gress 
into 
shifting 
its 
priorities 
from  needs  of 
national 
defense 
to 
domestic 
reforms? 
If 
one 
put 
himself 
in 
the 
mind  of  one  of 
the 
"pnr-
anoid 
patriots", 
could 
not 
the 
Poor 
People's 
March 
in 
June  1968  be  viewed  as 
critical 
as 
the 
urban 
con-
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 

frontation 
in 
Moscow 
in 
1917? 
If 
the 
domino 
theory 
haunted 
these 
so-called 
paranoid 
patriots, 
think 
what 
terror 
may 
have 
flashed 
across 
their 
minds 
when 
they 
pondered 
the 
domestic 
effects 
of 
the 
Poor 
People's 
March 
and 
their 
demands 
on 
the 
U.S.  Govern-
ment 
in 
the 
nation's 
capital? 
Could 
not 
this 
be 
deemed  a 
surgical 
thrust 
at 
the 
nation's 
jugular 
vein'? 
As 
Sen. 
Ervin's 
subcommittee  would 
reveal 
two 
years 
later, 
the 
military 
reflected 
this 
frenetic 
fear 
and 
pathological 
preoccupation 
with 
the 
threat 
of 
domestic 
subversion 
when 
it 
launched 
its 
massive 
surveillance 
program 
against 
the 
civilian 
population 
of 
America. 
Conducted 
by 
the 
Army 
military 
intelligence, 
the 
program 
assigned 
military 
counter-intelligence 
agents 
to 
spy 
on 
civilians, 
to 
compile 
exhaustive 
dossiers 
on 
leading 
liberal 
leaders 
in 
Congress,  prominent 
judges, 
and 
active 
civil 
rights 
workers. 
The 
purpose 
of 
these 
investigations, 
according 
to 
the 
defenders 
of 
the 
system, 
was 
to 
produce 
intelligence 
needed 
in 
the 
event 
that 
disruptive, 
crippling, 
urban 
gue-
rilla 
warfare 
did 
break 
out 
in 
America. 
This 
cold 
war  atmosphere 
characterized 
by 
the 
"enemy 
within" 
syndrome  -had 
reached 
its 
apogee 
in 
the 
months 
shortly 
before 
King's 
death. 
Footnote 
1.  Huie  and  Frank 
both 
strongly 
contend 
that 
Ray 
killed 
King  because  he 
was 
a 
racist. 
Relatives 
and 
acquaintenances 
who 
knew 
Ray 
when 
he 
was 
grow-
ing 
up 
in 
East 
St. 
Louis, 
and 
Alton, 
Ill., 
said 
they 
never 
heard 
him 
express 
any 
racial 
animosity. 
Dr. 
McCarthy  DeMere,  a  prominent 
physician 
who 
is 
also 
a 
licensed 
attorney 
and 
professor 
of 
forensic 
law 
and 
medicine, 
spent 
almost 
six 
months 
with 
Ray 
at 
the 
Shelby  County 
jail. 
DeMere 
said 
he 
never 
heard 
Ray 
express 
any 
hostility 
toward 
blacks. 
An 
Establish-
ment 
figure, 
DeMere 
is 
a 
reserve 
deputy 
sheriff 
and 
a 
friend 
of 
the 
then 
sheriff, 
Bill 
Morris, 
who 
asked 
him 
to 
leave 
his 
medical 
practice 
and 
take 
on 
an 
assignment 
of 
protecting 
Ray's 
health 
on 
a 
daily 
basis, 
up 
to 
the 
time 
of 
the 
trial. 
Dr. 
DeMere 
and 
Sheriff 
Morris, 
unlike 
most 
members 
of 
the 
Memphis 
establishment, 
have 
expressed 
on 
occasions 
doubts 
that 
Ray 
acted 
alone 
in 
the 
King 
slaying. 
Also, 
probably 
no 
other 
two 
men 
spent 
as 
much 
time 
with 
Ray 
as 
DeMere 
and 
Morris. 
D 
Editorial 
Note: 
As 
is 
clear 
from 
the 
articles 
which 
we 
have 
published, 
the 
"true" 
story 
of 
the 
assassination 
of 
Martin 
Luther 
King 
and 
any 
conspiracy 
behind 
it, 
is 
not 
complete. 
. 
So 
these 
articles should 
be 
looked 
on 
as a 
preliminary 
report. 
For 
information 
in 
regard 
to 
the 
book 
on 
this 
subject 
by 
Wayne Chastain,  please 
write 
to 
him. 
Corrections: 
On  page  5 
of 
the 
July, 
August, 
September, 
October, 
and 
November  issues 
of 
Computers 
and 
People,  change 
the 
author's 
name 
"Wayne 
C. 
Chastain" 
to 
"Wayne 
Chastain". 
In  Part 
8, 
page 
27, 
left 
column, 
line 
10 
from 
the 
top, 
change 
"definitely 
the 
man" 
to 
read 
"definitely 
not 
the 
man". 
In  Part 9,  page 
26, 
left 
column, 
line  5 
from 
the 
top, 
and 
same page,  right 
column, 
line  7 
from 
the 
bottom, 
change 
"Willie O. 
Stephens" 
to 
"Charles 
O. 
Stephens". 
In  Part  10, first  paragraph,. 
delete 
the 
final 
remark 
in 
parentheses. 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 
MACDONALD  -Continued 
from 
page 
11 
Motor 
Vehicles. 
Take  a  look 
at 
your  Blue  Cross 
card 
••• 
chances 
are 
you'll 
find 
the 
same 
number. 
In 
the 
computer  age, 
the 
details 
of 
your 
personal 
life 
have  become  so 
accessible 
as 
to 
seriously 
threa-
ten  the 
entire 
idea 
of 
privacy. 
AND 
THERE 
IS 
NO 
PO-
LITICAL 
FREEDOM 
WITHOUT 
PRIVACY 
I 
Today, 
the 
"Social 
Security" 
number  has  been 
transformed 
into 
a 
Universal 
Identifier. 
Linked 
by 
computer 
tape 
from  one 
data 
bank 
to 
another, 
it 
po-
tentially 
allows 
anyone 
who 
has 
it 
to 
obtain 
infor-
mation  about  you  from  anyone 
else 
who 
has 
it. 
Consider 
just 
a  few  examples 
of 
how 
your 
life 
is 
recorded: 
-
The 
US 
Treasury 
Department 
now 
requires 
banks 
to 
keep  a 
microfilm 
record 
of 
every 
sizable 
check  you 
write. 
Most 
banks  simply 
record 
all 
your 
checks. 
Government 
agencies 
may 
then 
in-
spect 
these 
records 
without 
your  knowledge 
or 
permission. 
Your 
banking 
transactions 
are 
a 
mirror 
of 
your 
entire 
life 
••. 
the 
groups  you 
join, 
the 
doctors 
you 
consult, 
the 
causes 
you 
support. 
-
Private 
dossier 
companies, 
called 
credit 
bureaus, 
maintain 
secret 
files 
on 
over  50 
million 
Ameri-
cans, 
containing 
information 
not 
only 
on 
your 
finances, 
but 
personal 
information 
such 
as 
who 
your 
friends 
are, 
what  your 
habits 
are, 
what 
your 
neighbors 
or 
co-workers 
think 
of 
you. 
These 
credit 
bureaus 
are 
protected 
by 
federal 
law  from  your 
efforts 
to 
see 
your 
own 
file 
or 
adequately 
challenge 
its 
accuracy. 
Next  time 
you 
are 
mysteriously 
denied 
insurance, 
or 
cre-
dit, 
or 
a 
job, 
the 
chances 
are 
it's 
because 
of 
what's 
in 
your 
file. 
-
In 
Massachusetts, 
whenever  you 
receive 
in-pa-
tient 
psychiatric 
treatment, 
your 
name, 
Social 
Security 
number, 
diagnosis 
and 
course 
of 
treat-
ment 
are 
reported 
to 
the 
Department 
of 
Mental 
Health. 
Among 
the 
recipients 
of 
this 
informa-
tion 
are 
insurance 
companies, 
chiefs 
of 
police, 
the 
Registry 
of 
Motor 
Vehicles, 
and 
all 
other 
licensing 
authorities. 
The 
Department  has 
plans 
for 
extending 
this 
data 
bank 
to 
people 
getting 
out-patient 
services 
as 
well. 
WHAT 
CAN 
YOU 
DO? 
By 
yourself, 
not 
much.  But  you 
can 
join 
forces 
with 
275,000 
other 
Americans 
(9,000 
in 
Massachusetts) 
who 
are 
defending 
their 
rights 
through 
membership 
in 
the 
American 
Civil 
Liberties 
Union.  Right 
now 
the 
ACLU 
and 
its 
affiliate, 
the 
Civil 
Liberties 
Union 
of 
Massachusetts 
are 
pressing 
for 
urgently 
needed 
legislation 
that 
will 
help 
con-
trol 
government 
access 
to 
the 
intimate 
details 
of 
your 
life. 
Even 
more 
important, 
the 
ACLU 
can  be 
counted 
on 
to 
fight 
back  whenever 
individual 
rights 
are 
threat-
ened  by  abuses 
of 
government  power. 
If 
these 
rights 
are 
to 
be 
preserved, 
and  government 
is 
to 
be 
the 
servant 
rather 
than 
the 
master 
of 
its 
people, 
a 
strong 
Civil 
Liberties 
presence 
must  be 
maintained 
from 
the 
smallest 
hamlet, 
through 
state 
government, 
to 
Washington,  D.C. 
Be 
a 
part 
of 
that 
presence. 
Join 
the 
one 
organi-
zation 
whose 
sole 
purpose 
is 
to 
assure 
that 
our 
government  does 
not 
exceed 
its 
authority 
in 
the 
ex-
ercise 
of 
its 
power. 
29 

GAMES 
AND 
PUZZLES 
for 
Nimble 
Minds 
and 
Computers 
It 
is 
fun  to  use  one's  mind,  and  it 
is 
fun 
to 
use  the 
artificial  mind 
of 
a  computer. 
We 
publish  here  a variety 
of 
puzzles and problems, related  in  one way  or another to 
computer  game  playing  and  computer  puzzle  solving,  or 
SIXWORDO 
In this  puzzle,  the problem 
is 
to paraphrase  a passage (a 
series 
of 
connected sentences)  making every new  sentence 
no longer  than six  words, the meaning to be just the same. 
According 
to 
the dictionary, 
to 
paraphrase  means 
to 
re-
state a text  or passage 
giving 
the meaning in  another form; 
in  this case  there 
is 
no  requirement 
to 
change  or alter any 
word  -only the  requirement 
of 
producing sentences no 
longer than six  words. 
This  puzzle  has  a serious purpose.  Its purpose 
is 
to 
test 
the following  argument: 
1. 
A computer 
is 
to 
be programmed 
to 
understand ordi-
nary language. 
2.  Suppose an  agreement 
is 
made  that no  sentence shall 
be longer than n words. 
3. Then it should be  much easier  to program the 
computer. 
4. 
n  should be chosen 
so 
that it 
is 
not very difficult  for 
human beings 
to 
paraphrase  passages into sentences 
of 
not more  than n words. 
5.  A reasonable value  for  n 
is 
6. 
Note that it  may well  be  that n  should be 7 or 8; and 
if 
it 
should stay 
as 
small 
as 
6, then possibly the human  para-
phraser should  have  the option 
of 
defining terms about 
which assertions are  being  made  (which 
is 
a common option 
in  all 
of 
mathematics). 
SIXWORDO  PUZZLE  7412 
Problem:  Compare  the following  passage  a (SIXWORDO 
PUZZLE 7411) and  a proposed SIXWORDO  solution, 
b. 
What  ideas does  the paraphrase b  miss?  Can  you improve 
the paraphrase  still keeping 
to 
sentences 
of 
not 
more  than 
6 words?  Any comments? 
a  Consider the machines, equipment, and  supplies -the 
technology -for  informing people in general about what 
is 
going 
on 
in  the world.  That technology becomes more 
and more expensive,  more and  more  powerful.  Along the 
road 
of 
development and  progress 
of 
that technology, there 
is 
a place  where  all  that technology has  become 
so 
expen-
sive 
and 
so 
powerful that it 
is 
monopolized and controlled 
by the  establishment.  When  that place 
is 
reached, it pro-
duces  the predictable end 
of 
the rights 
of 
an  ordinary 
citizen  to be  informed, 
to 
know the truth, 
to 
hear  con-
flicting  sides  to the news and  to arguments.  (Hint:  One 
solution contains 
17 
sentences.) 
30 
Neil Macdonald 
Assistant Editor 
to 
the  programming 
of 
a  computer 
to 
understand  and 
use  free  and  unconstrained  natural  language. 
We 
hope  these  puzzles  will  entertain  and  challenge 
the  readers 
of 
Computers  and  People. 
b  Technology consists 
of 
machines,  equipment, supplies. 
Consider technology for informing people  generally.  The 
information deals  with news,  happenings.  The information 
deals with the world.  The  technology becomes ever  more 
expensive.  The  technology becomes ever  more  powerful. 
The technology steadily develops  and  progresses.  Finally 
it becomes extremely expensive.  And  extremely powerful. 
So 
the establishment monopolizes it.  And the establishment 
controls it.  Ordinary citizens are  no longer informed.  They 
no longer hear arguments.  They no longer hear  conflicting 
versions.  They no  longer know the truth.  Citizens' rights 
to know cease.  This 
is 
a predictable  end result. 
NAYMANDIJ 
In this kind 
of 
puzzle an array 
of 
random or pseudoran-
dom digits  ("produced by Nature") has  been subjected 
to 
a 
"definite systematic operation" (chosen 
by 
Nature") and 
the problem ("which 
Man 
is 
'faced with") 
is 
to 
figure 
out 
what was  Nature's operation. 
A "definite systematic operation" meets  the following 
requirements:  the operation must be performed on all the 
digits 
of 
a definite class which can be  designated; the result 
displays some kind 
of 
evident, systematic, rational order and 
completely removes some  kind 
of 
randomness; the operation 
must be  expressible in not more than four  English  words. 
(But 
Man 
can 
l,lse 
more words to express it and  still win.) 
NAYMANDIJ PUZZLE  7412 
6  7  8  8  1  0  1  0  0  9  0  0  4 
364 
6  4  2  9 
640 
604 
604 
0  8  8  6 
804 
886 
6 
2  4  8 
384 
0  6  9 
741 
444 
901 
5  8 
5  4  9  5 
270 
3  2  2  7  3  6  8  8  2 
267 
3 
6  7  3  8  7 
554 
7  7 
347 
899 
8  7  6  0 
9  1  3  5  5  9  1 
001 
454 
869 
2  5  7  0 
2  9  3 
601 
154 
1  8  1  6 
823 
2  3  9  9 
3  7  9  7  3 
664 
259 
1 
000 
334 
8  8 
2  9  9  7  6  1  4  8 
854 
9  5  7  7 
225 
5  7 
2  2  6  0 
495 
566 
1  0  8 
448 
794 
6 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 

e 
'S 
.S 
1m 
:; 
NUMBLES 
A "numble" 
is 
an  arithmetical problem in  which:  digits 
have  been replaced 
by 
capitallettersj and  there are  two 
messages,  one  which can  be  read  right  away and a second 
one 
in 
the  digit  cipher.  The problem 
is 
to solve  for  the 
digits.  Each  capital letter in  the arithmetical problem 
stands for  just  one  digit  0  to 9.  A digit  may  be  repre-
sented by more  than one letter.  The  second message, 
which 
is 
expressed in  numerical digits, 
is 
to be  translated 
(using the  same  key) into  letters 
sO 
that it  may be read; 
but the  spelling  uses  puns,  or deliberate  (but evident)  mis-
spellings,  or is  otherwise irregular, 
to 
discourage  cryptana-
lytic methods 
of 
deciphering. 
NUMBLE 7412 
T  H  E 
x  H  E  A  R  T 
R  I  L  S 
E  T  S  R 
OONT 
A 
ATI 
= E 
100 
L  L  R  S 
49190  16395  1 
MAXIMDIJ 
In  this kind 
of 
p~zzle, 
a maxim (common saying,  prov-
erb,  some  good advice, etc.) using  14  or fewer  different 
letters 
is 
enciphered (using  a simple  substitution cipher) in-
to the  10 decimal digits or equivalent  signs  for  them.  To 
compress any extra letters into the 10 digits,  the encipherer 
may 
use 
puns, minor misspellings,  equivalents like  CSor 
KS 
for X or 
'vice 
versa, etc. 
But 
the spaces  between words are 
kept. 
MAXIMDIJ 
PUZZLE 7412 
*7*1:j 
#1:)*+$ 
+0Q6) 
~(j* 
ax 
o*'* 
COMPUTERS 
and 
PEOPLE 
for 
December. 
1974 
GIZZMO 
The problem 
is 
to 
grasp relations between things 
that 
ar~ 
not identified in the usual way -their names cannot be 
looked  up in the dictionary -and then solve  a  problem 
involving  them. 
GIZZMO 7412 
GONDS  may be  roughly divided  into those  that are  based 
on ongoing ALUNS  and those that are  founded 
on 
some  ma-
terial ENGADS.  There are 
of 
course  other ways  in which 
GONDS 
may be  classified:  some  are  about devices 
to 
pre-
vent bad luck;  others are about devices 
to 
produce good 
luck.  Each class 
of 
GOND  may be divided  into those that 
are  generally believed, and  those that are  private and indi-
vidual.  The  second  class 
is 
more  interesting and  includes 
GONDS 
that are due  in general to no  outside influence; 
they come into the mind  privately, and hold  a place there 
that 
is 
usually unknown 
to 
anyone else.  These  originate 
from some  experience;  reasoning backwards, the individual 
tries 
to 
find  some ALUN  or  ENGAD which he  thinks 
is 
responsible  for  his  bad luck or good  luck. 
What 
is 
a GOND?  an ALUN?an  ENGAD? 
0*  8  <)  ";]  * 
t.> 
0  > 
0* 
X  e  X  0  if-
·l-
008)(* 
EX 
, 
-,. 
0¢X 
<:) 
EI 
-I-
We 
invite  our  readers  to  send  us  solutions.  Usually 
the  (or 
"a") 
solution 
is 
published  in  the  next  issue. 
SOLUTIONS 
MAXIMDIJ 
7411:  Work 
is 
the key 
to 
rest. 
NUMBLE 7411:  Money steals  the soul. 
NAYMANDIJ 7411:  Sequence  column 12. 
0  7  8  7  9  4  1  5  7  0  3  1  8  7  9  2  2  0  4 
4· 
8  3  4  7  0  8  4  4  9  2  0  2  0  1  6  9  3  6  5  4 
6  1  2  4  3  5  0  8  6  3  5  3  4  3  8  8  7  2  2  3 
9  0  4  7  5  3  0  7  6  4  5  3  0  2  7  5  9  1  2  3 
8  6  0  0  2  0  2  1  2  5  3  3  6  6  7  2  5  0  8  8 
5  6  3  7  8  5  5  4  7  6  5  4  1  1  7  5  3  7  1  1 
8  7  8  7  1  6  4  1  1  9  2  5  4  5  5  0  6  3  6  1 
0  3  9  5  5  7  4  5  9  5  9  5  2  9  8  1  5  8  7  5 
9  9  2  0  6  7  8  1  6  1  5  7  1  7  6  8  7  9  4  0 
8  0  0  4  9  9  8  3  0  4  8  8  3  5  8  1  6  2  4  9 
Our  thanks 
to 
the following  individuals for  sending 
us 
their .solutions to  -NA YMANDIJ 749:  John Waters,  At-
lanta, Ga.  -NUMBLE 7410:  Maj. 
G. 
A.  Strassburger, 
Ft. Meade, 
Md. 
31 

Computing 
and 
Data 
Processing 
Newsletter 
COMPUTER  GIVES  NEW  MEXICO  MUSEUM 
FULL 
ACCESS  TO  ITS 
MINERAL 
COLLECTION 
Jack 
B. 
Pearce 
New Mexico Institute 
of 
Mining and Technology 
Socorro, 
NM 
87801 
The 
prospector 
of 
years 
past 
learned 
to 
identify 
rocks 
and 
minerals 
by 
sight 
as 
he  probed 
for 
gold 
and 
silver 
in 
the 
rocky 
deserts 
of 
the 
Southwest. 
Today 
these 
same 
minerals 
are 
on 
display 
in 
a 
mu-
seum 
in 
Socorro, 
New 
Mexico  -and  a  computer 
iden-
tifies 
each  one 
by 
X-ray 
analysis. 
In 
addition, 
the 
computer  keeps  a  complete 
record 
of 
each 
of 
the 
9,200 
sepcimens 
at 
the 
New 
Mexico 
Bureau 
of 
Mines 
Mineralogical 
Museum. 
The 
collec-
tion, 
while 
emphasizing 
southwestern 
minerals, 
also 
displays 
other 
geological 
and 
mineral 
specimens 
from  around 
the 
world. 
--
Halite, 
crystallized 
on 
this 
bush  from 
Cal-
ifornia's 
Salton 
Sea, 
gets 
a 
careful 
dusting 
from 
Charles 
Grigsby, 
assistant 
curator 
of 
the 
New 
Mexico  Bureau 
of 
Mines 
Mineralogical 
Museum. 
The 
museum 
was 
begun 
in 
the 
early 
1900's. 
It 
was 
maintained 
by 
the 
Institute 
of 
Mining  and  Technology 
until 
1964, 
when 
it 
was 
turned 
over 
to 
the 
Bureau 
of 
Mines. 
"Much 
of 
the 
material 
had 
never 
been 
classi-
fied," 
explained 
Dr. 
Jacques 
Renault, 
a 
geologist 
who 
also 
teaches 
at 
the 
New 
Mexico 
Institute 
of 
Min-
ing 
and  Technology. 
"Some 
of 
it 
was 
in 
cardboard 
boxes  and 
desk 
drawers. 
Several 
people 
tackled 
the 
job, 
but 
it 
was 
an 
immense 
task. 
"Finally 
we 
decided 
a  computer 
could 
handle 
it 
better 
than 
any  team 
of 
individuals 
possibly 
could 
because 
of 
the 
tremendous  amount 
of 
statistical 
work 
involved. 
So 
in 
1969 
we 
began  working 
up 
a  computer 
file 
that 
recorded 
various 
information 
about  each 
specimen." 
Mineralogists 
punched  computer 
cards 
that 
cata-
logued 
the 
various 
minerals 
in 
each 
item, 
other 
ge-
ological 
details, 
its 
donor 
or 
source, 
when 
acquired 
and 
its 
location 
in 
the 
museum. 
Later 
they 
began 
using 
the 
computer 
to 
analyze 
the 
mineral 
content 
of 
each  sample. 
32 
"X-ray 
analysis 
enables 
us 
to 
identify 
any  un-
known 
minerals 
or 
chemical 
compositions 
in 
the 
spe-
cimen,  as 
well 
as  any 
crystalline 
structure," 
Dr. 
Renault 
said. 
"It's 
very 
much 
like 
a 
fingerprint." 
--
This 
delicate 
mineral 
specimen 
containing 
goethite 
and 
psilomelane 
was 
found 
in 
Socorro, 
N.M. 
It 
and 
9,200 
other 
samples  from  around 
the 
world  have  been 
catalogued 
and  X-ray 
an-
alyzed 
by 
computer. 
Every 
mineral 
diffracts 
X-rays 
in 
a 
characteris-
tic 
pattern 
because 
of 
the 
atomic 
spacing 
in 
the 
crystal. 
It 
is 
relatively 
simple 
to 
determine 
the 
diffraction 
patterns 
for 
all 
minerals 
commonly 
found 
in 
the 
Southwest  and  reduce 
these 
data 
to 
mathematical 
tables. 
Then, 
by 
comparing 
the 
results 
of 
any 
diffraction 
test 
with 
these 
standard 
tables, 
experts 
can 
identify 
the 
minerals 
present 
in 
the 
sample. 
"As 
a 
result 
we 
have 
everything 
at 
our 
finger-
tips," 
Dr.  RenaUlt 
said. 
"When 
we 
want  a 
list 
of 
every 
sample 
of 
--
for 
instance 
--
cerussite 
in 
the 
museum, 
we 
can 
get 
it 
back  from 
the 
computer 
in 
just 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 

'ion 
-
., 
a 
few 
seconds. 
Equally 
important, 
we 
can 
find 
it 
immediately  because 
the 
printout 
gives 
each 
sample's 
exact 
location." 
Similar 
speedy  computer 
search 
techniques 
can 
turn 
up 
all 
minerals 
from  any 
geographic 
area 
or 
from 
anyone 
donor. 
The 
computer 
is 
an 
IBM 
Sys-
tem/360-44. 
"Research 
is 
the 
reason 
for 
our 
existence," 
Dr. 
Renault 
said. 
"The  computer 
helps 
make 
this 
museum 
a 
living 
research 
facility." 
COMPUTER  SYSTEM  FOR  A  RACING  YACHT 
THAT 
WON 
Bob  Palmer 
Data  General Corporation 
Southboro, MA  01772 
In 
September  1974, 
the 
winner 
of 
the 
America  Cup, 
the 
yacht 
Courageous, 
carried 
a  minicomputer  aboard 
for 
navigational 
and 
tactical 
calculations. 
The 
computer 
was 
the 
heart 
of 
a 
special 
system 
devel-
oped  and 
built 
by 
Dick  McCurdy,  a 
consultant 
to 
the 
Courageous 
Syndicate. 
Halsey 
Herreshoff, 
navigator, 
used 
the 
system 
during 
the 
trials 
this 
summer 
and 
during 
the 
final 
four 
victories 
over 
the 
Australian 
challenger, 
Southern 
Cross. 
After 
the 
races, 
McCurdy 
stated: 
"Overall, 
the 
computer  system  exceeded 
my 
expec-
tations. 
In 
spite 
of 
the 
rough 
conditions, 
the 
com-
puter 
was 
operational 
over 
eighty 
percent 
of 
the 
time. 
It 
did 
everything 
we 
wanted 
it 
to, 
and 
more 
it 
was 
a 
great 
success. 
"The  most 
important 
task 
done 
by 
the 
computer 
was 
to 
predict 
the 
apparent 
wind 
in 
the 
next 
leg 
of 
the 
race. 
This 
information 
allowed  Courageous 
to 
select 
the 
right 
spinnaker 
every 
single 
time." 
The 
Navigator, 
Herreshoff, 
commented: 
"The  computer 
was 
a 
big 
help 
to 
us. 
It 
has  added 
a 
new 
dimension 
to 
sailing 
by 
giving 
us 
information 
never 
before 
available, 
like 
the 
predictions 
of 
ap-
parent 
wind. 
Especially 
valuable 
was 
the 
constant 
and 
rapid 
updating 
of 
information 
by 
the 
computer. 
For 
instance, 
when 
there 
was 
a  wind  change  as 
we 
approached 
the 
weather 
mark, 
we 
immediately 
knew 
what 
our 
revised 
apparent 
wind  would  be 
on 
the 
next 
leg. 
We 
were 
able 
to 
change 
our 
choice 
of 
spinnaker 
at 
the 
last 
minute, 
which 
was 
a 
real 
advantage." 
The 
computer  supplements 
the 
expertise 
of 
the 
skipper 
and  crew 
by 
doing 
navigation 
calculations 
that 
are 
needed 
to 
obtain 
the 
best 
speed  from 
the 
craft. 
There 
is 
not 
time 
available 
in 
a 
race 
to 
do 
all 
of 
the 
calculations 
manually. 
Most 
of 
the 
yacht's 
instruments 
are 
connected 
to 
the 
computer; 
they 
supply 
signals 
representing 
apparent 
wind  speed 
and 
direction, 
boat 
speed, 
heel 
angle, 
compass 
course 
and 
other 
variables. 
At 
any 
time, 
the 
navigator 
can 
"ask" 
the 
computer 
to 
display 
the 
true 
wind  speed  and 
direction, 
which 
are 
updated 
four 
times 
a  second.  Because 
true 
wind 
speed  and 
direction 
cannot  be  measured 
directly 
on 
a  moving 
vessel 
--
they 
can 
only 
be 
calculated 
from 
instrument 
readings 
-
this 
is 
an 
ideal 
computer 
task. 
Knowing 
true 
wind  speed  and 
direction 
enables 
the 
navigator 
and 
tactician 
to 
make 
decisions 
on 
how 
to 
race 
the 
course. 
Among 
the 
other 
tasks 
of 
the 
computer 
is 
the 
cal-
culation 
of 
a 
quantity 
called 
"speed 
made 
good 
to 
windward." 
This 
indicates 
actual 
forward 
progress 
COMPUTERS 
and 
PEOPLE 
for 
December. 
1974 
in 
a 
tacking 
situation. 
Tacking 
is 
the 
technique 
of 
sailing 
into 
the 
wind 
by 
a  back  and 
forth 
course, 
making 
some 
forward 
progress 
each 
time. 
The 
comput-
er 
can 
calculate 
this 
forward 
progress 
from 
the 
in-
strument 
inputs. 
The 
computer  can 
also 
compare 
tacking 
patterns 
and 
help 
establish 
the 
most 
effi-
cient 
system 
of 
tacking. 
While 
these 
calculations 
may 
seem 
routine, 
the 
computer's 
location 
certainly 
is 
not. 
The 
yacht's 
cockpit 
is 
open 
to 
the 
sea 
and 
air, 
and 
there 
is 
no 
110-volt 
power 
available. 
There 
is 
just 
enough 
room 
for 
the 
11 
crewmen 
to 
move 
around. 
The 
computer 
chosen 
was 
small  and 
light 
and 
the 
power  supply 
per-
mitted 
an 
easy 
conversion 
to 
36-volt 
dc 
operation. 
Three  automobile 
batteries 
would  keep 
the 
system 
running 
for 
10 
to 
12 
hours, 
and 
they 
could 
be 
re-
charged  each 
night. 
The 
computer 
was 
housed 
in 
a 
suitcase-sized, 
weatherproof 
metal  box 
that 
hung 
beneath 
the 
cockpit 
sole. 
The 
computer  and 
the 
box  weighed 
less 
than 
70 
pounds. 
The 
computer 
was 
cooled 
by 
a 
battery-
powered 
circulation 
system,  and 
coolant 
was 
bilge 
water. 
The 
computer 
was 
a 
NOVA 
1200  computer 
sup-
plied 
by 
Data 
General. 
Communication  between 
the 
navigator 
and 
the 
com-
puter 
system 
was 
handled 
by 
a  compact 
station 
mount-
ed 
at 
the 
chart 
table 
next 
to 
the 
helm.  A 
32-channel 
scheme  produced  a 
four-digit-plus-sign 
display. 
Manual 
inputs 
and 
commands 
were 
entered 
with 
a 
touch-
pad; 
the 
desired 
display 
is 
selected 
with 
a 
series 
of 
switches. 
All 
this 
takes 
but 
a 
few 
seconds, 
and 
the 
calculation 
result 
appears 
almost 
immediately. 
CAMERAS  AND  COMPUTERS  COMBINE 
TO 
ANALYZE 
ROCKET  FLIGHTS 
Kent  Roberts 
New Mexico  State  University 
Box 
3548 
Las 
Cruces, 
NM 
88001 
Rockets 
streaking 
across 
the 
skies 
at 
more 
than 
four 
times 
the 
speed 
of 
sound 
are 
being 
studied 
every 
second 
of 
the 
way 
by 
scientists 
at 
the 
Physi-
cal 
Science 
Laboratory, 
at 
New 
Mexico 
State 
Univ. 
Using  a  computer  and 
high-speed 
cameras, 
the 
scien-
tists 
collect 
and 
analyze 
information 
on 
rockets, 
missiles, 
and 
other 
aircraft 
tested 
at 
White  Sands 
Missile 
Range 
near 
here. 
The 
computer 
is 
used 
in 
many 
areas 
where 
precise 
measurements  and 
calculations 
are 
necessary 
includ-
ing: 
determining 
where 
to 
put 
cameras 
to 
obtain 
the 
best 
filming 
angles; 
analyzing 
measurements  from 
thousands 
of 
feet 
of 
film 
taken 
during 
flights; 
and 
compiling 
reports 
on 
flight 
performance. 
"The  computer 
reports 
enable 
engineers 
to 
deter-
mine 
if 
aircraft 
performed 
the 
way 
they 
were 
de-
signed 
to," 
said 
Keith 
Hennigh, 
data 
processing 
division 
manager 
of 
the 
laboratory. 
"If 
the 
flight 
didn't 
conform 
to 
plans 
or 
if 
a 
malfunction 
occurred, 
the 
computer 
analysis 
points 
out 
what  went  wrong. 
Modifications 
and 
design 
changes 
are 
made 
accordingly." 
Using 
information 
such 
as 
estimated 
speed  and 
intended 
path 
of 
the 
aircraft, 
the 
computer 
calcu-
lates 
ideal 
camera 
locations. 
As 
many 
as 
20  cam-
eras, 
some 
capable 
of 
taking 
5,000 
frames  a  second, 
can  be  used 
during 
tests. 
Following 
the 
flight, 
the 
film 
is 
processed 
and  frames 
not 
related 
to 
measurement 
data 
are 
edited 
out. 
33 

Film 
readers 
connected 
to 
a 
projector 
measure 
the 
position 
of 
the 
aircraft 
on 
each 
film 
frame. 
Reference 
points 
such  as  surveyed 
targets, 
poles 
or 
stars 
are 
used 
to 
determine 
camera 
orientation 
and 
to 
calibrate 
the 
camera 
lens. 
When 
no 
reference 
points 
are 
in 
the 
field 
of 
view,  cameras 
with 
pre-
calibrated 
lenses 
are 
used. 
As 
each  frame 
is 
measured, 
information 
enters 
a 
Serial 
Encoded  Data  Exchange 
(SENDEX), 
a 
device 
de-
signed 
and 
developed 
by 
PSL 
employees 
to 
convert 
measurements 
into 
computer 
readable 
form. 
A second  computer 
arranges 
film 
frames  from  each 
camera 
in 
their 
proper 
sequence. 
It 
is 
also 
pro-
grammed 
to 
analyze 
trends 
in 
the 
measurement 
read-
ings 
before 
it 
transfers 
the 
information 
to 
the 
first 
computer. 
The 
computer  combines 
film 
measurements 
with 
in-
formation 
collected 
by 
electronic 
equipment  aboard 
the 
aircraft 
to 
provide 
a 
highly 
detailed 
analysis 
of 
a 
flight. 
--
Flight 
patterns 
of 
rockets, 
such 
as 
the 
one 
being 
launched 
above, 
are 
being 
studied 
by 
sci-
entists 
at 
New 
Mexico 
State 
University 
using 
cameras  and  a  computer. 
The 
system 
is 
programmed 
to 
take 
into 
considera-
tion 
any 
factors 
which 
may 
affect 
the 
flight 
in-
cluding 
wind  and 
atmospheric 
conditions, 
and 
en-
ables 
engineers 
to 
study 
and 
analyze 
the 
flight 
from 
the 
instant 
it 
begins 
to 
completion. 
The 
com-
puter 
report 
provides 
information 
on 
a 
variety 
of 
34 
flight 
parameters 
including 
position, 
velocity, 
ac-
celeration, 
object 
attitude, 
roll 
rate, 
and 
other 
requested 
information. 
An 
entire 
flight 
mission 
can  be 
analyzed 
in 
24 
hours 
using 
the 
computer. 
"Before 
the 
computer  system 
was 
installed, 
many 
of 
our 
calculations 
would  have 
taken 
weeks,  " 
Mr. 
Hennigh 
said. 
The 
laboratory 
employs 
almost 
200 
New 
Mexico 
State 
students 
in 
its 
various 
~rojects. 
Many 
of 
them 
are 
involved 
in 
a 
variety 
of 
highly 
skilled 
jobs 
as 
film 
readers, 
computer 
operators, 
program-
mers,  and  keypunch 
operators. 
The 
Physical 
Science 
Laboratory 
is 
a 
non-profit 
organization 
providing 
support 
for 
military 
and 
federal 
agencies. 
The 
two 
computers 
are 
an 
IBM 
System/370, 
Model 
135,  and  an 
IBM 
System 
7. 
Antley 
-Continued 
from 
page 
25 
2. 
Slack 
W.V., 
VanCura  L. 
J.: 
Computer-based 
Patient 
Interviewi 
ng. 
Post-graduate 
Med 
43 
:68-76, 115-120, 
1968 
3. 
Grossman 
J. 
M., 
Barnett 
G. 
0., 
McGuire 
M. 
T., 
et 
al: 
Evaluation 
of 
computer-acquired 
patient 
his-
tories. 
JAMA 
215:1286-1291,  1971 
4. 
Mayne 
J. 
G., 
Weksel 
W., 
Shol 
tz 
P. 
N.:  Toward 
automating 
the 
medi 
cal 
hi 
story. 
Mayo 
Cli 
n Proc  43: 
1-25, 
1968 
5. 
Kanner 
I.F.: 
The 
programmed 
physical 
examination 
wi 
th 
orwi 
thout 
a computer. 
JAMA 
215:1281-1291,1971 
6. 
Diebold 
J.: 
"Man 
and 
the 
Computer," 
Avon 
Books, 
New 
York 
City, 
p. 
161-2, 
1969 
7.  Cadden  J. 
J.,: 
Flach 
F. 
F., 
Blakelee 
S. 
and 
Carl 
ton 
R.: 
Growth 
in 
medical 
students 
through 
group 
process. 
Amer 
J. 
Psychiat 
126:862-868,  1969 
8. 
Kubler-Ross 
E.: 
"On 
Death  and  Dying,"  The 
Mac-
Millan 
Company, 
New 
York 
City, 
1969 
U nsettl i ng,  Disturbi ng,  Critica I 
Compu 
ters 
and 
People 
(formerly 
Computers  and 
Automation), 
establi 
shed  1951  and 
therefore 
the 
oldest 
magazine 
in 
the 
field 
of 
computers and 
data 
processing, 
believes 
that 
the 
profession.of 
infor-
mation 
engineer 
includes 
not 
only 
competence 
in 
handling 
information 
using 
computers  and 
other 
means, 
but 
also 
a  broad 
responsibiiity, 
in 
a 
pro-
fessional 
and 
engineering 
sense, 
for: 
The 
reliability 
and 
social 
significance 
of 
pertinent 
input 
data; 
The 
social 
value 
and 
truth 
of 
the 
output 
results. 
In 
the 
same 
way,  a 
bridge 
engineer 
takes 
a 
pro-
fessional 
responsibi 
li 
ty 
for 
the 
reliabi 
li 
ty 
and 
significance 
of 
the 
data 
he 
uses, 
and 
the 
safety 
and 
efficiency 
of 
the 
bridge 
he 
builds, 
for 
human 
beings 
to 
risk 
their 
lives 
on. 
Accordingly, 
Computers and 
People 
publishes 
from 
time 
to 
time 
articles 
and 
other 
information 
related 
to 
socially 
useful 
input 
and 
output 
of 
data 
systems 
in 
a  broad 
sense. 
To 
this 
end 
we 
seek 
to 
publish 
what 
is 
unsettling, 
disturbing, 
critical 
--
but 
producti 
ve 
of 
thought 
and  an  improved  and 
safer 
"house" 
for 
all 
humanity,  an 
earth 
in 
which  our 
children 
and 
later 
generations 
may 
have  a 
future, 
instead 
of 
facing 
extinction. 
The 
professional 
information 
engineer 
needs 
to 
relate 
his 
engineering 
to 
the 
most 
important 
and 
most 
serious 
problems 
in 
the 
world 
today: 
war, 
nuclear 
weapons, 
pollution, 
the 
population 
explo-
sion, 
and 
many 
more. 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 

A  fabulous 
gift: 
18 
illustrations 
in 
pen 
and 
ink 
"RIDE 
THE 
EAST 
WIND: 
Parables 
of 
Yesterday 
and 
Today" 
by 
Edmund 
C. 
Berkeley, 
Author 
and 
Anthologist 
Published 
by 
Quadrangle/The New 
York 
Times 
Book Co.,  1974,  224 pp,  $6.95 
Table of Contents 
Part  1. 
The 
Condition 
of 
Man 
Pandora  and  the Mysterious Box /  H. 
A. 
Guerber 
The  Garden 
of 
Parad 
ise 
*  /  Hans  Christian  Andersen 
*to 
which 
the 
King's son was 
transported 
by 
the 
East Wind 
The 
History 
of 
the 
Doasyoulikes /  Charles  Kingsley 
The  Locksmith and  the Stranger /  Edmund 
C. 
Berkeley  (B) 
The  Elephant and 
the 
Donkey /  James  Reston 
Where 
that 
Superhighway  Runs,  There 
Used 
to 
be 
a 
Cornfield /  Robert  Redfield 
The  Fire  Squirrels /  B 
Part  2. 
On 
Flattery 
and 
Persuasion 
The 
Crow 
and  the 
Fox 
/  Jean 
de 
La 
Fontaine 
The 
Visitor 
who 
Got 
a 
Lot 
for 
Three  Dollars / 
George  Ade 
The Cuckoo and 
the 
Eagle  /  Ivan 
A. 
Kriloff 
The Wind  and 
the 
Sun  /  Aesop 
The  Lion  in Love /  Aesop 
The 
Crow 
and 
the 
Mussel/Aesop, 
B 
The 
Two 
Raccoons and  the 
Button 
/  B 
Part 
3. 
On 
Perseverance and Resourcefulness 
The  Crow and  the Pitcher  /  Aesop 
Robert Bruce and  the Spider /  Sir  Walter Scott 
Hannibal  Mouse and 
the 
Other 
End 
of 
the 
World  /  B 
The  Fly, the Spider, and 
the 
Hornet /  B 
Part  4. Behavior -Moral and Otherwise 
A  Small  Wharf 
of 
Stones /  Benjamin  Franklin 
The Three  Bricklayers /  Anonymous, B 
The Good  Samaritan  /  St.  Luke 
Much  Obliged,  Dear  Lord / 
Fulton 
Oursler 
The Fisherman, 
the 
Farmer, and 
the 
Peddler  /  B 
Part 
5. 
The 
Problem 
of 
Truth 
On  Being  a  Reasonable  Creature /  Benjamin 
Franklin 
The 
Monkey 
and  the Spectacles /  Ivan 
A. 
Kriloff 
The Golden Trumpets 
of 
Yap  Yap /  Mike Quin 
The Barrels and 
the 
Pittsburgh Manufacturer /  B 
The 
Empty 
Column /  William J.  Wiswesser 
The Differences in 
Two 
Strains 
of 
Corn  /  Edgar  Anderson 
The Six  Blind  Men 
of 
Nepal  /  B 
The Sighting 
of 
a Whale  /  B 
The Stars and  the  Young  Rabbit /  B 
The  Ocean 
of 
Truth 
/  Sir Isaac  Newton 
Part  6.  On  Common 
Sense 
The  Lark  and  her  Young Ones  /  Aesop 
The Bear  and  the  Young Dog /  B 
COMPUTERS 
and 
PEOPLE 
for 
December, 
1974 
The 
Fox 
of 
Mt. 
Etna  and 
the 
Grapes 
Once 
there 
was a 
Fox 
who 
lived 
on 
the 
lower slopes 
of 
Mt. 
Etna, 
the 
great volcano in  Sicily.  These slopes are ex-
tremely 
fertile; 
the 
grapes 
that 
grow 
there 
may well 
be 
the 
most delicious  in 
the 
world;  and 
of 
all 
the 
farmers 
there, 
Farmer Mario  was 
probably 
the 
best. 
And 
this 
Fox 
longed 
and 
longed 
for 
some 
of 
Farmer 
Mario's  grapes. 
But 
they 
grew  very  high 
on 
arbors, 
and 
all 
the 
arbors 
were 
inside a 
vineyard 
with 
high  walls, 
and 
the 
Fox 
had a 
problem. 
Of 
course, 
the 
Fox 
of 
Mt 
Etna 
had 
utterly 
no use 
for 
his fam-
ous 
ancestor, 
who 
leaping 
for 
grapes 
that 
he 
could 
not 
reach, 
called 
them 
sour, 
and 
went 
away. 
The 
Fox 
decided 
that 
what 
he  needed  was  Engineering 
Technology. 
So 
he 
went 
to 
a  retired  Engineer 
who 
lived 
on 
the 
slopes 
of 
Mt. 
Etna, 
because  he  liked 
the 
balmy 
climate 
and 
the 
view 
of 
the 
Mediterranean 
Sea 
and 
the 
excitement 
of 
watching 
his 
instruments 
that 
measured 
the 
degree 
of 
sleep-
ing 
or 
waking 
of 
Mt. 
Etna. 
The 
Fox 
put 
his 
problem 
be-
fore 
the 
Engineer. 
The Bear  and  the Young Calf /  B 
The Bear  and  the Young  Beaver  /  B 
The 
Wasps 
and  the Honey Pot /  Sir  Roger  l'Estrange 
The Six-Day 
War 
and 
the 
Gulf 
of 
Dong /  B 
The Deceived 
Eagle 
/  James  Northcote 
Missile 
Alarm 
from 
Grunelandt /  B 
The National Security 
of 
Adularia /  B 
Doomsday  in St.  Pierre, 
Martinique 
/  B 
Part  7. Problem Solving 
The 
Wolf 
and  the Dog 
of 
Sherwood /  Aesop,  B 
The Three  Earthworms /  B 
The Hippopotamus and 
the 
Bricks /  B 
The Cricket 
that 
Made  Music /  Jean  de 
La 
Fontaine, B 
The 
Fox 
of 
Mt. 
Etna  and 
the 
Grapes /  B 
The Mice 
of 
Cambridge 
in 
Council/Aesop, 
B 
Brer  Badger's Old 
Motor 
Car 
that 
Wouldn't 
Go  /  B 
The  First Climbing 
of 
the 
Highest  Mountain in 
the 
World  /  Sir John 
Hunt, 
B 
The Evening  Star and  the Princess  /  B 
Notes 
Some  Collections 
of 
Parables and Fables 
RETURNABLE 
IN  10 
DAYS 
FOR 
FULL 
REFUND 
IF 
NOT 
SATISFACTORY 
(You 
can 
read 
it 
all  in  10 days -and  keep 
it 
only 
if 
you 
think 
it 
is 
worth 
keeping.) 
HOW  CAN 
YOU 
LOSE? 
- - - - - - -
(may 
be 
copied 
on 
any 
piece 
of 
paper) 
- - - - - - - - - - . 
To: 
Berkeley  Enterprises,  Inc. 
815 
Washington  St.,  Dept. R 
12, 
Newtonville, 
MA 
02160 
Please send 
me 
___ 
copy(ies) 
of 
Ride the  East  Wind: 
I enclose 
$7.00 
per 
copy 
!includes handling). 
Total enclosed 
(Prepayment 
is 
necessary) 
My 
name 
and 
address are 
attached. 
35 

II 
Q; 
~ 
~ 
WILL 
YOU 
HELP? 
Yes,  you. 
It 
may come 
as 
a surprise 
that 
you'd 
be 
asked 
... 
but 
as 
a reader 
of 
Computers 
and 
People 
(formerly 
Computers 
and 
Automation) 
you  are  in a unique position 
to 
help 
us. 
NAMES 
... 
people, 
institutions, 
companies 
who 
should 
be 
interested  in  1)  the computer 
industry 
and/or 
2)  seek-
ing 
truth 
in 
information 
are  very much  needed 
to 
join 
you 
as 
readers 
of 
Computers 
and 
People. 
Will 
you 
tell 
us  who 
they 
are? 
And 
perhaps even  more, 
will 
you  let 
us 
use 
your 
name 
in 
writing 
to 
them? 
But 
with 
or 
without 
your 
name  (we'll 
only 
use 
it 
if 
you grant 
permission)  we  need 
to 
know 
those 
you 
think 
might 
be 
interested  in also  read ing  Computers 
and 
People. 
* 
*" 
* 
*" 
reprint 
from 
cornJ:!,~a~!!n!:~ 
Science and 
the 
Advanced Society, by  C.  P.  Snow, Ministry 
of 
Technology, 
London, 
England (April  1966) 
The 
Information 
Revolution and the  Bill 
of 
Rights, by 
Dr. Jerome 
B. 
Wiesner, M.LT. (May 
1971) 
Employment, 
Education, and the Industrial 
S~stem, 
by 
Prof. 
John 
Kenneth 
Galbraith, Harvard  Umv.  (Aug. 
1965) 
Computers and the Consumer, by  Ralph  Nader, 
Washington, D.C.  (Oct.  1970) 
Please 
give  us 
their 
names  and  addresses  on  the 
form 
below 
or 
add  another sheet 
of 
paper. 
Trim 
out 
the 
card 
with 
scissors  and 
drop 
it 
in 
the 
mail.  We'll gladly 
pay 
the 
postage 
to 
learn 
of 
possible new friends.  And many 
thanks 
for 
your 
help!  As a 
token 
of 
our 
appreciation 
we'll 
send 
you 
our 
****Reprint. 
P.S. 
If 
you 
like 
you 
may  mail 
your 
list separately 
to: 
R. 
A. 
Sykes,  Circulation Mgr. 
Computers 
and 
People 
815 Washington  Street 
Newtonville, 
MA 
02160 
cut 
here and 
tuck 
in 
flap 
r--------------------------, 
I 
TO: 
R. 
A. 
Sykes,  Circulation  Mgr.  \ 
I 
I  Computers 
and 
People  \ 
:  I suggest 
you 
send 
information 
on 
Computers 
and 
People  \ 
\ 
: 
to 
... 
(attach 
list 
if 
you 
like) 
\ 
I  \ 
I 
(1)Name_________________________________ 
\ 
I  \ 
I 
Address______________________ 
\ 
I 
\~ 
el 
\~ 
tVl 
City 
_________ 
State 
______ 
ZIP____ 
\~ 
~, 
\~ 
:; 
I 
,. 
u,  \ 
I  (2) 
Name'_____________________________________ 
\ 
I  \ 
I 
Address___________________ 
\ 
I  \ 
I 
I 
City 
State 
ZIP 
____ 
__ 
\ 
I  \ 
: 
May 
we 
use 
your 
name?  0  YES  0  NO  \ 
\ 
I  Please  give 
us 
your 
name 
and 
address 
on 
the 
form 
belo.w 
.so 
we 
can 
:  send 
you 
your 
****Reprint. 
Just 
cross 
out 
the 
subscription 
request 
\ 
\ 
\ 
I  -unless 
you 
also 
want 
to 
enter 
your 
new 
or 
renewal 
order. 
, 
---
cut 
here 
__ 
_ 
__ 
_ 
____________ 
Fold 
here  -
do 
not 
cut 
""" 
M 
en 
Ln 
M 
e/) 
~ 
M 
~ 
~ 
~ 
ci 
..J 
z· 
U  Z 
I-
0 
l-
e/) 
l-
e/) 
a: 
~ 
0 
L1. 
a: 
III 
U 
w  Z 
a.. 
vi 
VI  w 
e 
~ 
~ 
a: 
a.. 
en 
a: 
lJ 
w 
.~ 
I-
~ 
Z 
c  w 
2 
::J 
>-
OJ  OJ 
W 
:J 
{: 
...J 
c;, 
W 
0  c 
~ 
a: 
OJ 
lJ 
W 
Q. 
OJ 
en 
III 
co 
>-
1;; 
E 
en 
I 
.... 
0 
III 
..J 
~ 
> 
~ 
.... 
a.. 
~ 
~ 
w 
OJ 
en 
U 
...J 
>-
OJ 
..J 
C 
...J 
a.. 
c. 
3: 
w 
a: 
E  w 
~ 
<.:J 
(/) 
VI  « 
(/) 
OJ 
I-
w 
Cl 
en 
Z 
~ 
0 
Ci.j 
a.. 
c 
0 
'';:::; 
co 
w  E 
0 
-I 
+-' 
::l 
c.. 
c:x: 
0 
W 
"0 
0..  c  +'" 
co 
Cl) 
Q 
Vl 
Q,) 
10... 
~ 
OJ 
+'" 
Z 
+-' 
en 
« 
::l 
Q. 
c:: 
Cf.) 
E  0 
0  +'" 
0: 
u 
C) 
w 
c:: 
l-
t 
.J: 
en 
:::> 
CO 
0.. 
~ 
$: 
~ 
-E 
LO 
0  -
U 
CO 
:::J 
0 
III 
c. 
0 
Z 
0 
(0 
-
N 
0 
« 
~ 
!E." 
.:;; 
c:: 
0 
+'" 
:1: 
Cl) 
Z 
''0 
:] 
''0 
• 
1; 
· 
~ 
4l 
.~ 
''0 
·  c 
:1l 
YES, 
start 
my 
subscription 
to 
COMPUTERS 
AND 
PEOPLE 
according 
to 
the 
instructions 
checked 
below. 
One 
Year 
(including 
the 
Computer 
Directory 
and 
Buyers' 
Guide 
--
13 
issues) 
U.S. 
only. 
0 
$23.50· 
One 
Year 
(excluding 
the 
Computer 
Directory 
and 
Buyers' 
Guide 
--
12 
issues) 
U.S. 
only. 
0 
$11.50 
Name:~ 
_______ 
~ 
Title: 
___ 
~_ 
._~ 
__ 
_ 
Organization: 
_______ 
_ 
Add 
ress: 
__________________ 
. 
City: 
State: 
_________ 
Zip 
Country 
if 
not 
U.S.: 
_____ 
_ 
Signatu 
re: ___ 
~_ 
o 
Payment 
enclosed 
o 
Renewal 
o 
Bill 
me 
o 
New 
subscription' 
To 
SPEED 
the 
processing 
of 
your 
order, 
please 
check 
the 
one 
best 
desuiptor 
in 
eath 
of 
the 
two 
categories  below. 
(ThIs 
InformatIon 
\\ ill  be  used  for  statist 
ita 
I 
purposes 
only.) 
BUSINESS 
TYPE 
Ol-Computer 
Manufacturer 
02-Aerospace  ! Aircraft 
Manufacturer 
03-other 
Manufacturing 
04-Raw 
Materials 
Processing; 
(chemical, 
primary 
metal, 
petroleum, 
food. 
etc.) 
OS-Mining 
and 
Construction 
06-Computing  & 
Consulting 
07-Finance, 
Insurance, 
Pub!', 
and 
Service 
Organizations 
OB-Transportation 
Companies 
09 
-Public  Utilities 
, O-Research 
"-Wholesale, 
Retail, 
Sales, 
and 
Marketing 
Firms 
, 2-Educational; 
(College, 
University, 
or 
School) 
, 3-Government 
and 
Military 
, 4-Libraries 
JOB 
FUNCTION 
I-Technical 
Management; 
(computer 
installation 
management, 
program 
management, 
or 
engineering 
mgmU 
2-Computer 
Center 
Personnel; 
(methods 
& 
procedure 
analysts, 
and 
operators) 
J-Programming 
Personnel; 
(systems, 
application  & 
research 
programmers) 
4-Professional: 
(systems 
analysts, 
mathematicians, 
operations 
researc~ers, 
and 
professors) 
5-General 
Management 
Executives; 
(corporate 
o!l;cers, 
owners, 
and 
partners) 
6-E~gineering 
Personnel; 
(systems 
. 
engineers, 
research 
& 
development 
engineers) 
7-Research 
Personnel 
a-Students 
9-Library 
Subscription 
10-Subscription 
in 
Company 
Name 
Only 
aJ  I 
B  I 
OJ 
I 
:J 
c;, 
I 
~ 
0 
0> 
OJ 
I~ 
Q. 
::J 
III 
I u 
1;; 
I 
~ 
I 
\, 
\'i 
If 
I,