A detailed account of ways to protect computer systems, especially remotely accessible online time-sharing systems, from invasions of privacy. Communication links cannot be physically secured (see RM-3765); the only broadly effective countermeasure against wiretapping methods is privacy transformations (secret codes), which may require additional hardware. Other countermeasures include once-only passwords; electromagnetic shielding to prevent radiation pickup; systematic verification of the integrity of hardware, software, and personnel; checking up on accidental interference and overlong computer session. Hardware breakdowns and the shielding of processors to prevent "tuning in" present unsolved problems. It appears possible to engineer information systems so that the cost of privacy protection is proportional to the amount desired. (Prepared for presentation at the Spring Joint Computer Conference, Atlantic City, April 1967.) 44 pp. Ref.
This report is part of the RAND Corporation Paper series. The paper was a product of the RAND Corporation from 1948 to 2003 that captured speeches, memorials, and derivative research, usually prepared on authors' own time and meant to be the scholarly or scientific contribution of individual authors to their professional fields. Papers were less formal than reports and did not require rigorous peer review.
This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.
The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.