Security Technology: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
No edit summary
 
Line 1: Line 1:
{{SecDutyPost}}
{{Academy-Security}}
__NOTOC__
__NOTOC__
=== Communications ===
=== Communications ===
Line 17: Line 17:
* A communications filter changes the way the receiver sees and hears communications sent from the ship. For example, a filter might make the crew look like Cardassians, standing on the bridge of a Cardassian ship. This is a useful supplement to the other forms of deception. If a patrol ship's long range sensors tell them they are tracking a Cardassian freighter, and their communication with the ship shows a Cardassian crew on board, they're not likely to suspect that the vessel is really a Starfleet Nebula-class starship
* A communications filter changes the way the receiver sees and hears communications sent from the ship. For example, a filter might make the crew look like Cardassians, standing on the bridge of a Cardassian ship. This is a useful supplement to the other forms of deception. If a patrol ship's long range sensors tell them they are tracking a Cardassian freighter, and their communication with the ship shows a Cardassian crew on board, they're not likely to suspect that the vessel is really a Starfleet Nebula-class starship


{{Academy-Security}}
{{left|{{SecDutyPost}}}}
 
 
=== Computer Systems ===
=== Computer Systems ===
* The center of nearly every security system in the 24th century is a computer. Control the computer, and you control the security system. The computer is the "brain" of a starship or installation, making it one of the parts most vulnerable to subversion and attack. Since the computer controls many functions automatically, completely outside the control of its crew, damage or sabotage of a ship's computer can sometimes leave it helpless.
* The center of nearly every security system in the 24th century is a computer. Control the computer, and you control the security system. The computer is the "brain" of a starship or installation, making it one of the parts most vulnerable to subversion and attack. Since the computer controls many functions automatically, completely outside the control of its crew, damage or sabotage of a ship's computer can sometimes leave it helpless.

Navigation menu