Outlines the configuration of a typical remote-access, multi-user resource-sharing computer system and identifies some of its vulnerabilities to unauthorized divulgence of information. In military terms, this is the computer security problem; in civilian terms, the computer privacy problem. The latter is less clearly structured from both legal and practical viewpoints. There are vulnerabilities of personnel, hardware, software, and especially communications. Eavesdropping, wiretapping, copying, or outright theft of files are possible. Could reasons of national interest lead the professional intelligence effort of a foreign government to focus on a computer network? This paper presents terminology, outlines the problem, and suggests design considerations; detailed technological countermeasures are given in P-3504, [System Implications of Information Privacy]. (Presented at the Spring Joint Computer Conference, Atlantic City, April 17-19, 1967.) 32 pp.
This report is part of the RAND Corporation paper series. The paper was a product of the RAND Corporation from 1948 to 2003 that captured speeches, memorials, and derivative research, usually prepared on authors' own time and meant to be the scholarly or scientific contribution of individual authors to their professional fields. Papers were less formal than reports and did not require rigorous peer review.
Permission is given to duplicate this electronic document for personal use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. For information on reprint and linking permissions, please visit the RAND Permissions page.
The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.