Difference between revisions of "Command code"
m |
|||
Line 9: | Line 9: | ||
In TNG "Hero Worship" [[Data]], [[Jean-Luc Picard|Picard]] and [[Deanna Troi|Troi]] tell Timothy it was impossible for him to cause the ship's destruction when he slammed into a console, suggesting that Starfleet officers require command codes to use consoles. However, in TNG "The Neutral Zone" a civilian used a communications panel without a command code. | In TNG "Hero Worship" [[Data]], [[Jean-Luc Picard|Picard]] and [[Deanna Troi|Troi]] tell Timothy it was impossible for him to cause the ship's destruction when he slammed into a console, suggesting that Starfleet officers require command codes to use consoles. However, in TNG "The Neutral Zone" a civilian used a communications panel without a command code. | ||
Command codes were deemed insufficient to protect the | Command codes were deemed insufficient to protect the main computer in ''[[Star Trek: First Contact]]''. Picard ordered Data to encrypt the computer with a custom key to prevent [[Borg]] infiltration. | ||
==Vulnerabilities== | ==Vulnerabilities== |
Revision as of 20:15, 11 August 2008
Command codes are personal passwords Starfleet officers use to access ship functions.
Command codes generally take the form of several words and numbers spoken by the officer. The words are usually Greek letters. If spoken by the Captain, this allows complete control of the vessel such as in TNG "Ship in a Bottle". Routine and critical ship functions can be accessed with command codes.
In Star Trek III: The Search for Spock, Captain Kirk used a code to initiate self destruct. It is not clear whether this was a command code. However, Kirk has never accessed vital ship systems such as shields or weapons with that code, so it is likely the code was specific to the auto-destruct system.
In TNG "Gambit", Riker uses his command code in a ruse. Troi remarks that as soon as personnel are missing or captured, their command codes are invalidated. However, command codes can apparently be remotely utilized much in the same fashion as prefix codes.
In TNG "Hero Worship" Data, Picard and Troi tell Timothy it was impossible for him to cause the ship's destruction when he slammed into a console, suggesting that Starfleet officers require command codes to use consoles. However, in TNG "The Neutral Zone" a civilian used a communications panel without a command code.
Command codes were deemed insufficient to protect the main computer in Star Trek: First Contact. Picard ordered Data to encrypt the computer with a custom key to prevent Borg infiltration.
Vulnerabilities
If a Starfleet Officer is captured, his command codes may be used to remotely control a Starfleet vessel, assuming the code is not changed. The voice can be simulated to fool the computer. The code itself is weak, prone to dictionary attack.
The most likely method of attack is to lure the Captain on an away mission, obtain the command codes to his vessel, and commandeer it. Countermeasures depend highly on the competence of the bridge crew in either overriding the Captain's command codes, if this is possible as with the prefix code, or the Captain himself in not allowing himself to be placed in extreme danger.
Related information
In TNG "Sins of the Father", Duras says that a traitor on Khitomer sent "defense access codes" to Romulan attackers that allowed them to remotely disable the outposts shields.