Skip to main content

How do Star Trek command codes secure anything?


Inspired by the answer to this question:


Are there instances of Starfleet officers using the same authorization codes in more than one episode?



I wondered how these command codes secure anything.


Two codes that can setup the self destruction of the ship and override security are:



  • Janeway Pi 1-1-0

  • Tuvok pi alpha


So the command codes of Starfleet officers that enable the destruction of the ship are merely the name of the officer, the word "pi" and 3 to 5 numbers or letters. Nothing that would be considered in today’s world as a remotely secure password. Even a pin (4 numbers) is more secure than Janeway’s 1-1-0.


And on the other hand, after the code is used (and spoken out loud) the first time it is compromised if anybody is nearby and heard it.


So how can this code be secure? I'm sure the computer has other secure options to identifiy who is using the code. Does the code work only if the correct person uses it? If Kim uses the Janeway code to initialize sef destruction, will he get an access denied?


This questions answer seem to imply it:



How do command authorization codes work in Star Trek?


If so, then why use seemingly-worthless codes at all? Against what and how do they secure anything?



Answer




There are essentially three different types of factors in authentication:



  • Something you know (eg. password)

  • Something you have (eg. key)

  • Something you are (eg. fingerprint)



Two factors are inherently stronger than one, and even if an individual factor may be weak on it's own, combining it with others can still be sufficiently strong.


In Star Trek, one factor that seems almost ubiquitous across the board is voice authentication. We see it used in every instance of self-destruct sequence initiation shown here:





So at the very least, you're going to need a voice match, which would be your vocal sound (something you are) produced by something capable of producing those sounds (something you have) and using your unique speech patterns (something you know). I imagine there's alternatives to this in the event a person is unable to speak (while we've not seen it used before to my knowledge, it would likely require other forms of verification in its place).


Besides voice, there are three other apparent types of verification we see as well (of which at least one is always in use):



  • Security code

  • Hand print verification


  • Additional user verification (more people verifying)


In addition to the above, we know location can also play a factor, as seen in the following video (Data locks command access to the bridge):





And lastly, we already know that combadges can track location of their owners to the ship (which on its own could help confirm a voice match). But per the following, they can also communicate identity to starfleet computers for logging purposes (acting at a "key" of sorts):



Starfleet combadges silently provided identification to starship computers. For example, when a person wearing a combadge accessed a certain console, the computer logged the individual's identification to that access. (TNG: "The Drumhead")




Combining all of the above, including implied measures like location tracking and combadge authentication, and it appears that we actually have pretty comprehensive security coverage. At this point, we can stop looking at the command code as the main barrier, and start looking at it as a small part to the whole, more akin to a pin code, to help avoid certain specific attack vectors.


Of all the other factors above, it is the only one that requires something you know. So if someone were to take over your body, clone you, etc, they would still be lacking in full control over the ship.


While the code may seem short in combating the above, consider that the ship itself may not be so forgiving to multiple wrong guesses. Likewise, a longer code is harder to memorize than a small 3-4 character code that changes periodically, and officers would be less likely to change it frequently. Longer codes are possible to designate as we see Data do in the second video, but at that point he's combating all the captain's other authentication abilities to override and potentially break Data's own elevated access.


All this to say, none of those factors on their own are sufficient to protect a starship. but together they are fairly robust against multiple vectors, and far beyond the level most present day security systems.


Comments

Popular posts from this blog

Did the gatekeeper and the keymaster get intimate in Ghostbusters?

According to TVTropes ( usual warning, don't follow the link or you'll waste half your life in a twisty maze of content ): In Ghostbusters, it's strongly implied that Dana Barret, while possessed by Zuul the Gatekeeper, had sex with Louis Tully, who was possessed by Vinz Clortho the Keymaster (key, gate, get it?), in order to free Big Bad Gozer. In fact, a deleted scene from the movie has Venkman explicitly asking Dana if she and Louis "did it". I turned the quote into a spoiler since it contains really poor-taste joke, but the gist of it is that it's implied that as part of freeing Gozer , the two characters possessed by the Keymaster and the Gatekeeper had sex. Is there any canon confirmation or denial of this theory (canon meaning something from creators' interviews, DVD commentary, script, delete scenes etc...)? Answer The Richard Mueller novelisation and both versions of the script strongly suggest that they didn't have sex (or at the very l...

Why didn't The Doctor or Clara recognize Missy right away?

So after it was established that Missy is actually both the Master, and the "woman in the shop" who gave Clara the TARDIS number... ...why didn't The Doctor or Clara recognize her right away? I remember the Tenth Doctor in The Sound of Drums stating that Timelords had a way of recognizing other Timelords no matter if they had regenerated. And Clara should have recognized her as well... I'm hoping for a better explanation than "Moffat screwed up", and that I actually missed something after two watchthroughs of the episode. Answer There seems to be a lot of in-canon uncertainty as to the extent to which Time Lords can recognise one another which far pre-dates Moffat's tenure. From the Time Lords page on Wikipedia : Whether or not Time Lords can recognise each other across regenerations is not made entirely clear: In The War Games, the War Chief recognises the Second Doctor despite his regeneration and it is implied that the Doctor knows him when they fir...

story identification - Animation: floating island, flying pests

At least 20 years ago I watched a short animated film which stuck in my mind. The whole thing was wordless, possibly European, and I'm pretty sure I didn't imagine it... It featured a flying island which was inhabited by some creatures who (in my memory) reminded me of the Moomins. The island was frequently bothered by large winged animals who swooped around, although I don't think they did any actual damage. At the end one of the moomin creatures suddenly gets a weird feeling, feels forced to climb to the top of the island and then plunges down a shaft right through the centre - only to emerge at the bottom as one of the flyers. Answer Skywhales from 1983. The story begins with a man warning the tribe of approaching skywhales. The drummers then warn everybody of the hunt as everyone get prepared to set "sail". Except one man is found in his home sleeping as the noise wake him up. He then gets ready and is about to take his weapon as he hesitates then decides ...

warhammer40k - What evidence supposedly supports Tau as related to the Necrontyr?

I've heard of rumours saying that the Tau from Warhammer 40K are in fact the Necrontyr. Is there anything that supports this statement, in WH40K canon? I just found this, on 1d4 chan 1 : Helping Necrons? Or are they Necrontyr descendants? An often overlooked issue is that Tau have no warp signatures, just like Necrons, hate Warpspawns and Warp in general, just like Necrons, have the exact same skull shape,stature and short lives, and the overwhelming need for Technology and beam weapons, JUST LIKE NECRONS. GW may have planned a race that simply prepares a pacified, multiracial galaxy for Necrons to feast upon, supported by Ethereals that have a C'tan phase blade. Then there is a reference of "dark seed in east" by the Deceiver, so the tricky C'tan might give Tzeentch the finger in the JUST AS PLANNED competition. Or maybe GW just has so little creativity that they simply made a new civ conforming to an Old One's standards without knowing it. Is this the connec...