Difference between revisions of "Command code"

From Imperial Wiki
Jump to navigation Jump to search
m
m
Line 1: Line 1:
'''Command Codes''' are personal passwords Starfleet Officers use to access ship functions.
'''Command Codes''' are personal passwords Starfleet Officers use to access ship functions.
----


Command codes generally take the form of several words and numbers spoken by the officer. The words are usually Greek letters. If spoken by the Captain, this allows complete control of the vessel such as in TNG ''Ship in a Bottle.'' Routine and critical ship functions can be accessed with commmand codes.
Command codes generally take the form of several words and numbers spoken by the officer. The words are usually Greek letters. If spoken by the Captain, this allows complete control of the vessel such as in TNG ''Ship in a Bottle.'' Routine and critical ship functions can be accessed with commmand codes.
Line 16: Line 12:


==Vulnerabilities==
==Vulnerabilities==
If a Starfleet Officer is captured, his command codes may be used to remotely control a Starfleet vessel, assuming the code is not changed. The voice can be simulated to fool the computer. The code itself is weak, prone to dictionary attack.
If a Starfleet Officer is captured, his command codes may be used to remotely control a Starfleet vessel, assuming the code is not changed. The voice can be simulated to fool the computer. The code itself is weak, prone to dictionary attack.


Line 22: Line 17:


==See Also==
==See Also==
* [[Prefix code]]
* [[Prefix code]]


[[Category:ST Starship Other]]
[[Category:ST Starship Other]]

Revision as of 21:37, 28 February 2008

Command Codes are personal passwords Starfleet Officers use to access ship functions.

Command codes generally take the form of several words and numbers spoken by the officer. The words are usually Greek letters. If spoken by the Captain, this allows complete control of the vessel such as in TNG Ship in a Bottle. Routine and critical ship functions can be accessed with commmand codes.

In The Search for Spock, Captain Kirk used a code to initiate self destruct. It is not clear whether this was a command code. However, Kirk has never accessed vital ship systems such as shields or weapons with that code, so it is likely the code was specific to the auto-destruct system.

In TNG Gambit, Riker uses the command code in a ruse. Troi remarks that as soon as personnel are missing or captured, command codes are altered. However, command codes can apparently be remotely utilized much in the same fashion as prefix codes.

In TNG Hero Worship Data, Picard and Troi tell Timothy it was impossible for him to cause the ship's destruction when he slammed the console, suggesting Starfleet officers require command codes to use consoles. However, in TNG The Neutral Zone a civilian used a communications panel without a command code.

Command codes were deemed insufficient in Star Trek: First Conact to protect the Main Computer. Picard ordered Data to encrypt the computer with a custom key to prevent Borg infiltration.

Vulnerabilities

If a Starfleet Officer is captured, his command codes may be used to remotely control a Starfleet vessel, assuming the code is not changed. The voice can be simulated to fool the computer. The code itself is weak, prone to dictionary attack.

The most likely method of attack is to lure the Captain on an away mission, obtain the command codes to his vessel, and commandeer it. Countermeasures depend highly on the competence of the bridge crew in either overriding the Captain's command codes, if this is possible as with the prefix code, or the Captain himself in not allowing himself to be placed in extreme danger.

See Also