information must suffice to ensure that any attempt to intercept the data will alter its state, making it virtually impossible for unauthorized users to get a result, if a direct search is not allowed.