The possibilities were endless. An attacker could gain “unauthorized access to classified data by exploiting a pre-programmed weakness due to careless design or implementation” or plant “a ‘trap door’ in the computer application or in the programming and operating systems supporting the application.”

