FREE BOOKS

Author's List




PREV.   NEXT  
|<   10   11   12   13   14   15   16   17   18   19   20   21   22   23   24   25   26   27   28   29   30   31   32   33   34  
35   36   37   38   39   40   41   42   >>  
rkin brief you on it already?" "Yeah. Before I could get my hat off. Funny set-up, all right. I punched for basic data before you got in. Hardly any." "Maybe that means something in itself. Maybe somebody saw to it that the information never got into the central banks." The C.I.B. computers could be hooked into the central banks which stored information on nearly everything and everybody. If you incorporated, filed for a patent, paid taxes, voted, or just were born, the central banks had an electronic record of it. Kronski jerked his thumb toward the computer room. "I punched for names of Supremist members coupla minutes ago. Thought maybe we could start in that way." Pell followed, his mind not really on the job yet. He wasn't at his best working with the computers, and yet operating them was ninety per cent of investigation. He supposed he'd get used to it sometime. Three walls of the big computer room were lined with control racks, consisting mostly of keyboard setups. Code symbols and index cards were placed in handy positions. The C.I.B. circuits, of course, were adapted to the specialized work of investigation. In the memory banks of tubes and relays there was a master file of all names--aliases and nicknames included--with which the organization had ever been concerned. Criminals, witnesses, complaints, everyone. Code numbers linked to the names showed where data on their owner could be found. A name picked at random might show that person to have data in the suspect file, the arrest file, the psychological file, the modus operandi file, and so forth. Any of the data in these files could be checked, conversely, against the names. Kronski walked over to where letter sized cards were flipping from a slot into a small bin. He said, "Didn't even have to dial in Central Data for these. Seems we got a lot of Supremist members right in our own little collection." Pell picked up one of the cards and examined it idly. Vertical columns were inscribed along the card, each with a heading, and with further sub-headed columns. Under the column marked _Modus Operandi_, for instance, there were subcolumns titled _Person Attacked_, _Property Attacked_, _How Attacked_, _Means of Attack_, _Object of Attack_, and _Trademark_. Columns of digits, one to nine, were under each item. If the digits 3 and 2 were punched under _Trademark_ the number 32 could be fed into the Operational Data machine and this machine would th
PREV.   NEXT  
|<   10   11   12   13   14   15   16   17   18   19   20   21   22   23   24   25   26   27   28   29   30   31   32   33   34  
35   36   37   38   39   40   41   42   >>  



Top keywords:

Attacked

 

central

 

punched

 

computer

 

columns

 

machine

 
Kronski
 

picked

 

Supremist

 
investigation

members

 

Attack

 

computers

 

information

 
digits
 

Trademark

 
linked
 

witnesses

 

conversely

 

complaints


checked
 

letter

 

flipping

 

walked

 

numbers

 
person
 

suspect

 

random

 

arrest

 

showed


psychological

 

operandi

 

instance

 

subcolumns

 

titled

 
Operandi
 

column

 
marked
 

Person

 

number


Object

 
Columns
 

Property

 

headed

 

Central

 

collection

 
examined
 

Operational

 
heading
 
Criminals