Security (Duty Post): Difference between revisions

no edit summary
No edit summary
No edit summary
Line 120: Line 120:
==== Communications ====
==== Communications ====
One thing that can be difficult to secure is communications. A transmission can be overhead by anyone with a receiver tuned to the proper band, making communications vulnerable. A number of technological solutions have developed to keep communications private and prevent eavesdropping, but for every technique of covert communication, there is a way around it.
One thing that can be difficult to secure is communications. A transmission can be overhead by anyone with a receiver tuned to the proper band, making communications vulnerable. A number of technological solutions have developed to keep communications private and prevent eavesdropping, but for every technique of covert communication, there is a way around it.
===== Codes =====
* The simplest means of keeping a communication secret is by using some sort of pre-agreed code essentially an artificial language that conceals the true information of the message. Starfleet encodes high-priority messages and has coded communications channels for (relatively) secure communications through subspace. Species like the Ferengi routinely encode all their communications. In the age of isolinear computer processors, codes can be very complex. Fortunately, with the help of the same computers (and universal translation software) it is still possible to break most codes, given time.
* Starfleet maintains a variety of security codes for use during both peacetime and wartime. These codes are arranged by priority from 1 to 50. The function of the individual codes is summarised below.
** SSC's 1-10 are for normal peacetime transmissions of varying priorities, with routine transmissions between commercial planetary centres recieving a priority dispatch of 1 through 5, and levels 6 through 10 being used for Starfleet communications.
** SSC's 11-20 are used in conditions of hostilities between the Federation and a foreign power. These priorities are used to transmit orders regarding the disposition of vessels and ground troops, the relocation of civilian personnel, the assigning of Starfleet resources to different commands, operations orders for these commands and specific operations orders.
** SSC's 21-29 are for use by the Fedration Diplomatic Corps.
* Starfleet Codes 30-39 specify conditions of emergency, with variable priority levels given to specific problems or crisis conditions during peacetime operations.
** SSC 30 Transmission of a communication using SSC 30 indicates an emergency condition involving a planetary disasteror other unspecified emergency. Use of this code means that the sending station is not able to adequately respond to the emergency and requires immediate help at the scene. 
** SSC 31 is used for a medical emergency.
** SSC 32 indicates a planetary crisis of natural origin.
** SSC 33 is used for a bio-medical crisis requiring immediate evacuation of personnel.
** SSC 34 indicates a bio-medical crisis requiring immediate quarantine. 
** SSC 35 signals an ecological disaster or similar planetary crisis. 
** SSC's 36 through 38 are used for crises of unknown origin that require the immediate evacuation of a large segment of a planet's population.
** SSC 39 indicates an attack by unknown agents on Federation personnel or on civilian installations or residences.
* Starfleet codes 40-47 indicate classified material and restrict disemination of that material.
** SSC 40 communications are directed at a specific starship or starbase Chief Science Officer, for disclosure to ship or base command staff only.
** SSC 41 communications are directed at a specific starship or starbase Chief Science Officer, for disclosure to the senior officer present only. 
** SSC 42 communications are directed at a specific starship or starbase Chief Medical Officer, for disclosure to ship or base command staff only. 
** SSC 43 communications are directed at a specific starship or starbase Chief Medical Officer, for disclosure to the senior officer present only.
** SSC 44 communications are directed at a specific starship or starbase Chief of Security, for disclosure to ship or base command staff only. 
** SSC 45 communications are directed at a specific starship or starbase Chief of Security, for disclosure to the senior officer present only. 
** SSC 46 communications are directed to the Commanding Officer of a starship or starbase, for disclosure to ship or base command staff only.
** SSC 47 communications are directed to the Commanding Officer of a starship or starbase. They are not to be disclosed to ship or base command staff, and no acknowledgement or log entry of the communication is to be made.
* Starfleet codes 48-50 indicate high-level orgiins of the communication, and are restricted to specific individuals.
** SSC 48 communications are reserved for the CinC Starfleet. 
** SSC 49 communications are reserved for members of the Federation Council or their designated representatives.
** SSC 50 communications are reserved for the President of the Federation.
==== Security Access Codes ====
===== Departmental Access Codes =====
* Departmental Access Codes are general codes for use by members of a ship's department. Such a code might be used to access log entires or other routine files and programmes, or to issue orders to the computer. These codes consist of the ship's department, a Greek letter, and a numerical code. The higher the Greek letter in the alphabet, the greater the access. High-level access may require voiceprint confirmation, a Personal Access Code or authorisation from a superior officer. An example of a Departmental Access Code might be: Engineering Access Code: Gamma three one four two.
===== Personal Access Codes =====
* Personal Access Codes identify the person accessing a particular file or programme, or issuing an order. They are given in a similar format to Departmental Access Codes, substituting the person's surname for the department name. All Personal Access Codes are voiceprint confirmed, and higher level access may require handprint or retinal scans for confirmation. An example of a Personal Access Code might be: Access Code: Perrini Delta five one two seven.


===== Encryption =====
===== Encryption =====
Line 173: Line 132:
* With 24th century computer technology, it's a simple matter to modify the sounds and images transmitted in communications. A Shipboard Systems (Communications) Skill Test allows a character to modify a communication, altering its visual and audio components to present whatever image the character wishes. The Difficult of the test is based on the complexity of the change desired. Making the captain look like a Klingon, standing on a Klingon bridge, for example, might be Moderate, while making the captain appear as a Tholian or a Sheliak, speaking in their native language, is Challenging at least.
* With 24th century computer technology, it's a simple matter to modify the sounds and images transmitted in communications. A Shipboard Systems (Communications) Skill Test allows a character to modify a communication, altering its visual and audio components to present whatever image the character wishes. The Difficult of the test is based on the complexity of the change desired. Making the captain look like a Klingon, standing on a Klingon bridge, for example, might be Moderate, while making the captain appear as a Tholian or a Sheliak, speaking in their native language, is Challenging at least.


* A communications filter changes the way the receiver sees and hears communications sent from the ship. For example, a filter might make the crew look like Cardassians, standing on the bridge of a Cardassian ship. This is a useful supplement to the other forms of deception. If a patrol ship's long range sensors tell them they are tracking a Cardassian freighter, and their communication with the ship shows a Cardassian crew on board, they're not likely to suspect that the vessel is really a Starfleet Nebula-class starship.
* A communications filter changes the way the receiver sees and hears communications sent from the ship. For example, a filter might make the crew look like Cardassians, standing on the bridge of a Cardassian ship. This is a useful supplement to the other forms of deception. If a patrol ship's long range sensors tell them they are tracking a Cardassian freighter, and their communication with the ship shows a Cardassian crew on board, they're not likely to suspect that the vessel is really a Starfleet Nebula-class starship


==== '''Computer Systems''' ====
==== '''Computer Systems''' ====
Line 181: Line 140:


===== Passwords and Prefix Codes =====
===== Passwords and Prefix Codes =====
* The above rules assume the character does not have authorized access to the computer system. In some cases, however, the character may have access, in which case only a Routine Computer (Data Alteration or Programming) Skill Test is required to carry out the character's commands. This was the case in the Next Generation episode "Peak Performance," where Lt. Worf accessed the Enterprise's computer from the U.S.S. Hathaway and fed it false sensor data. When Data changed the security access codes, he blocked Worf's access.


* Part of an operation to penetrate a location's security may consist of getting the proper access codes for the location's computer, circumventing its security measures. This is not as simple a matter as finding out a password or a sequence of numbers. Computers in the 24th century are quite intelligent, and generally have voice-recognition capabilities as well, so a password or code may need to be delivered by a particular voice as well. Voice synthesizers may be able to get around this problem. If the computer requires an additional verification like a DNA scan further counter-measures are required.
* Starfleet gives each starship its own prefix code, providing outside access to the ship's computer to other Starfleet personnel. In the event of an emergency, or a takeover of the ship, another Starfleet vessel can use the prefix code to override the ship's computer system and take command of its key functions. In effect, a character on the other ship can operate the ship's computer as if it were an extension of his own ship's computer. Clever and knowledgeable hijackers will change a starship's prefix code as soon as possible to prevent other Starfleet vessels from simply overriding their command systems and, say, shutting down their shields or warp drive.


===== Command Codes =====
===== Command Codes =====
* Codes can also be used to limit computer access to certain authorized individuals or locations. This is routinely done on board Starfleet vessels and installations; computer users must give an authorization code (by voice, so their voiceprint can also be scanned) in order to access certain restricted information and functions. For example, only the captain and the first officer of a starship can access the ship's auto-destruct system, and only in tandem. The more limited the system's access, the harder it is to overcome its security protocols.
* Authorized characters can also oftentimes change the available access. For example, the captain of a Starfleet ship has the authority to localize command functions, preventing the ship's computer from accepting commands from any locations other than the one's specified. The captain can also lock out any or all of the computer's functions and place a code that unlocks them into the system. Until an authorized person inputs the code, those computer functions are no longer available.


* Finally, as an emergency measure, the ranking command officer can lock out all of a starship or starbase's command functions, preventing anyone from accessing the computer until those functions are restored. This is done to prevent an enemy for seizing control of a boarded ship, allowing the crew the opportunity to take counter-measures.


==== '''Locks''' ====
==== '''Locks''' ====
1,116

edits