From the link kindly supplied by “getoffmylawn:”
Acknowledgment. I first read of the possibility of such a Trojan horse in an Air Force critique of the security of an early implementation of Multics. I cannot find more specific reference to this document. I would appreciate it if anyone who can supply this reference would let me know.
My vague memory seems more on the level of a direct interaction between the government operative and the tech guru, so maybe there’s another KT reference to it. But this covers the problem in detail. Thanks.