• Welcome! The TrekBBS is the number one place to chat about Star Trek with like-minded fans.
    If you are not already a member then please register an account and join in the discussion!

Security codes

Rom's Sehlat

Fleet Captain
Fleet Captain
Here are a few of my observations about security codes:
1. It is very easy to delete your security code. Tuvok did when he was going bonkers in one episode, probably "Meld."
2. Whenever you use one, it's usually verbal and is possible for someone to hear/record/replay it...
3. All you have to do is record an Admiral transferring command codes to somebody, do a little tape editing, and voila- you've got your own Galaxy-class starship!
4. Apparently other people can identify your codes. In the Voyager episode "State of Flux" we learn you can see the code that accessed what files. (So they're finally using "files" in Trek!) And they determine it is Seska's. So if Tuvok did go berserk, for example, he could just use one of his flunky's security codes and pin it all on them!
 
I thought it was a case that Data was the only person who could duplicate voiceprints.

But then, I don't think there's any such thing as a 100% secure system. It might be harder for a non-Starfleet person to get into but it isn't totally impossible to get into, IMO.
 
We know that Trek has also used retinal scans (TWoK) and finger-scans (I think in the Bynar episode) for identification. And of course it's rare that a single person can order a ship to self-destruct.
 
The thing that stands out the most to me about this, is that the command-codes for Federation starships during the 23rd century were (at least in the only known case of their use) short 5-digit numerical sequences that could be transmitted from other starships.

Most of my personal passwords are more secure than that.
 
It's one of those things that will seem increasingly antiquated as time goes on.

Security in our own world is accelerating fast... so I don't give it long until we laugh how it "only" took a hand print and a voice to secure something in Trek and how it all seemed so innocent.
 
Reliant's command-codes were transmitted from another Starfleet vessel, using Starfleet communications protocols, also likely with the Enterprise's own identity codes included. Would the exact same codes transmitted from a Klingon ship achieve the same results?
 
Why couldn't all the codes used by Starfleet be like the one Data used in Brothers....

1 - 7 - 3 - 4 - 6 - 7 - 3 - 2 - 1 - 4 -7 - 6 - Charlie - 3 - 2 - 7 - 8 - 9 - 7 - 7 - 7 - 6 - 4 - 3 - Tango - 7 - 3 - 2 - Victor - 7 - 3 - 1 - 1 - 7 - 8 - 8 - 8 - 7 - 3 - 2 - 4 - 7 - 6 - 7 - 8 - 9 - 7 - 6 - 4 - 3 - 7 - 6 - Lock.
 
That'd just stop everybody from ever using the computers. Ther sixteen-digit passwords some systems require today are too difficult to memorize already, without using security-compromising memorization aids; a poorly designed security system that doesn't meet the requirements of the user.

I thought it was a case that Data was the only person who could duplicate voiceprints.

The Cardassian agent in "Tribunal" uses a simple clandestine recording of a few random words by O'Brien (which happen to include O'Brien's name) to defeat DS9 security. No special skill required, apparently.

Of course, that's a Starfleet DS9 system he defeats. Getting through one of the original Cardassian systems would be much more difficult, what with their DNA comparison scans and all - if it weren't for the fact that he's a Cardassian agent to begin with, and probably has all the backdoor authority he needs.

Timo Saloniemi
 
Reliant's command-codes were transmitted from another Starfleet vessel, using Starfleet communications protocols, also likely with the Enterprise's own identity codes included. Would the exact same codes transmitted from a Klingon ship achieve the same results?

It would depend on how cagey the Klingons in question are. We simply don't have enough information for how the tech actually works. But, Lursa and B'Etor pulled off essentially the same feat against the Enterprise-D in Generations.

This just says to me there are would be various teenage kids and young adults that would be capable of pulling off the same feat using tech that they have cobbled together through various means. I imagine only the fact that everybody is shiny and happy in the Federation stops that sort of rebellion.

As far as the code Data used in 'Brothers' I would think there would be some sort of happy medium between to the two examples.
 
I thought it was a case that Data was the only person who could duplicate voiceprints.

The Cardassian agent in "Tribunal" uses a simple clandestine recording of a few random words by O'Brien (which happen to include O'Brien's name) to defeat DS9 security. No special skill required, apparently.
Doubtful that same trick would work on the Enterprise. IIRC, DS9 had a number of security issues even after Starfleet took over the station--issues that Odo probably felt could have easily been resolved if he truly had his way.
Of course, that's a Starfleet DS9 system he defeats. Getting through one of the original Cardassian systems would be much more difficult, what with their DNA comparison scans and all - if it weren't for the fact that he's a Cardassian agent to begin with, and probably has all the backdoor authority he needs.
Getting around the Starfleet voiceprint system was probably fairly easy that way.
 
The cases of seemingly simple passwords in ST I envision to be the latter part of a much larger security system.

I imagine there's more to Reliant's prefix code than just a five digit code. Perhaps an authorized user code (login) must be established before even attempting the prefix code (some sort of IFF signal). Then another security code of 27 alphanumeric symbols user-specific to the Enterprise, and then a final five digit prefix code to override Reliant's command. Something like that. We only saw that last part of a larger security system.

And TNG with the "Omicron-Blue-6-4-7" code must be similarly more complex. It's more than just that password. There's a voiceprint behind it. There's LCARS sensor verification that the user is correctly ID'd and already logged in aboard ship ("Captain Picard is not in his quarters") and probably more stuff behind the scenes going on. We only see the final sequences of much larger security procedures.

In my real world example...
I login to my PC at work with a six symbol password.
That's not the whole process.
Before that, I need security keycard access to the building. Then I need keycard access to my department.
Then I need a password to bring up the computer network. And then another password to access my program, and so on.

So ST only shows us the last part of a larger unseen security system in place. Right?
 
^Yet, in "The Neutral Zone" not only are people from 3 centuries previous with zero knowledge of how 24th century technology works are able to simply activate the comm system in their room and one of them makes it all the way to the Bridge (the second most sensititve area on the ship) during a extremely tense situtation and a yellow alert.

This is played off during the episode by Picard saying that the people of the 24th century don't need to restrain themselves, they seek only to better themselves... so, the comm systems don't need an executive key or anyother form of security.
 
Why couldn't all the codes used by Starfleet be like the one Data used in Brothers....

1 - 7 - 3 - 4 - 6 - 7 - 3 - 2 - 1 - 4 -7 - 6 - Charlie - 3 - 2 - 7 - 8 - 9 - 7 - 7 - 7 - 6 - 4 - 3 - Tango - 7 - 3 - 2 - Victor - 7 - 3 - 1 - 1 - 7 - 8 - 8 - 8 - 7 - 3 - 2 - 4 - 7 - 6 - 7 - 8 - 9 - 7 - 6 - 4 - 3 - 7 - 6 - Lock.

I find it humorous you took the time to re-watch that episode! (Or else you just copied it from your notes or Memory Alpha or something, which impressive still!)

Now about the Reliant's security code thing, it's possible that was an old trick that wasn't utilizing the best security. Don't forget they were Starfleet people using what they've used for years. Khan was a renegade with at best a 30-year-old memory of whatever he memorized in "Space Seed." I don't remember that remote-shields-lower command being in the TOS command-codes guidelines... ;)
 
^Accoring to dialogue, only 15 years seperate "Space Seed" and TWoK, but yeah. I'm not saying it's an old trick I'm just saying the code itself is too simplistic.
 
...It's even simpler than it appears, because you can't reuse a number - each digit is entered by flipping an appropriate number switch.

So probably the series of numbers serves no encrypting purpose whatsoever, but is simply a ship ID; Spock could have typed in "USS Reliant" or "NCC-1864", but he typed "16309" instead. Why the console would need a series of special switches for that is unknown, but perhaps each switch activates a series of very complex encrypting/decrypting operations that are hardwired to that particular console and inaccessible from anywhere else in the ship or the universe?

Timo Saloniemi
 
A shame prefix codes either weren't in use or nobody thought to use them during "The Ultimate Computer".

Or "Equinox".
 
If you are not already a member then please register an account and join in the discussion!

Sign up / Register


Back
Top