Is that a theory you've had since you first viewed the episode or did you develop it more recently?
I ask because computer security in the 60s was nonexistent. I mean, there'd be physical security around the machines, maybe, but once you were inside, forget it. LOGONs didn't even have passwords (I discovered this building Journeyvac, the virtual IBM 360 mainframe that, technically, is available for folks to play with)
So the folks writing Trek wouldn't have assumed any kind of security on the files themselves. The only security we've ever seen is actual locks on documents (e.g. Pike's report on Talos IV). Khan was given the keys to the kingdom.
I base my Star Trek theories, generally, on the realities of developing a science fiction show in the 60s set in the future that was also subject to the clearly expansive imagination of the writers and production team. It was likely not difficult to imagine computer security in the late 60s whether it actually existed or not, just as it was apparently possible to envision (with eerie prescience) handheld communicators. To take one example regarding computer security that comes to mind immediately, Kirk directs the computer in Mirror, Mirror to classify the security research "under my voice print or Mr. Scott's." And indeed, we see later that this successfully stymies Mirror Spock from accessing it.
Last edited: