Lt. Haukea-Willow: Coding.

17 views
Skip to first unread message

Aly Drolet

unread,
May 22, 2025, 6:16:02 PM5/22/25
to sb11...@googlegroups.com

((Deck 5, Sickbay, USS Narendra))


On her own PADD, as a notable guide to their operations, was the famous list of Lessons in Security, as follows:

  1. Lesson 1: "A Rigelian tiger pounces with no warning"

  2. Lesson 2: "There are no breaks in security because threats never take breaks"

  3. Lesson 3: "Let your tricorder do the investigating"

  4. Lesson 6: "Know when to bend the rules"

  5. Lesson 7: "Leave no stone unturned"


The main moral to follow was lesson 7: “Leave no stone unturned,” which could be applied to the systems they were validating. 


Furthermore, Haukea, PADD ready, had a spreadsheet prepared, courtesy of swiping some medical leaflets from Marsh, that contained each system, biobed and item of equipment to be reviewed. It was her goal, as if a nurse in an operation, to mark each item off as it was deemed suitable. Past that, she had no obligation to understand whether an item was in fact valid. That was for the others to figure. Unless the objective was to be modified, and her more useful skills came in handy


Willow: And another one bites the dust.


She pressed her palms, fingers filed, into the bed beneath her, hopping down and heading towards Foster and Kel and soon the others. 


Foster: Thank you everyone for gathering. I know on paper we start out with what looks like a cakewalk – just get the Narendra facilities ready in case something happens. But if you’ve ever been on an exploration mission before, you’ll probably agree with me when I say a ‘cakewalk’ usually turns into anything but.


Willow: To note, we are following lesson 7: “Leave no stone unturned.” I want no surprises later on when I have to do an ‘I told you so’ on the fact my medical knowledge is basic at best. However, both medically and for security purposes, please do follow lesson 7.


Stendhal: Ok that make sense to me. But personally I prefer the lesson number 1, the one about the Rigelian tiger pouncing around! 


Stendhal provided a poor imitation of a cat’s paw attacking, one hand curving as if using the claws to strike. Haukea, herself, found the movement endearing, providing a slight quick laugh. 


Wethern: Ah the seven lessons in security. A must on the ship's induction. It's worthwhile mentioning most of the medical team are still adjusting to the upgrades on board. Additionally there have been new systems installed in response to Starfleet Medical's new protocols regarding Borg technology. 


Kel: Response


Foster: At base we want to test everything – make sure the medical equipment is up to snuff and ::he looked directly at Haukea-Willow:: Also make sure our security and containment systems are good to go. They upgraded almost everything since Frontier Day. And yes we’ve tested everything but this is our first real field test.


Willow: I have a spreadsheet, courtesy of medical documents provided by Marsh, ::She left off the fact the sheet had been pieced together from “borrowed” documents:: That categorizes all systems and items to be marked off. Easier to keep track physically than mentally. I’ll share with everyone as a collaborative document.


Stendhal: (smiling) Spreadsheets, checklists and log analysis, my favs! What I would do without you!  


Corey could be seen minutely frowning at the implication, vision boring a hole in the present PADD clutched tight in his hand. 


Wethern: I've also taken to presume any cakewalk missions is likely to end in some kind of disaster. So probably need to follow the rule of two is one and one is none. Although Cmdr I'm sure you are going to correct me and say we are all going to get a nice bit of holodeck time. ::The statement was punctuated with a smile::


Kel: Response


Foster, motioning his antennae forward, appeared to find agreement in the use of the spreadsheet, the humor following suit, without verbal acknowledgement. Haukea herself merely shifted her weight slightly, placing the majority on her right. 


Foster: Good question. At base I wish I could tell you if this mission was going to be safe or if we are expecting hostility. The truth is – information was covered up, encrypted and classified; and several ships disappeared all in the same small area. With that in mind there is certainly a potential for this to become dangerous. So, we’re not being paranoid, but we are preparing. No harm in being over prepared.


What Foster was describing, in security terms, was Lesson 1: "A Rigelian tiger pounces with no warning": Emphasizing the importance of being vigilant and anticipating potential threats, as unexpected dangers could arise. Which, for Haukea, as a security officer, was the entirety of her duty position. From the moment a mission hit the ground running she paid close attention to lesson 1. 


Willow: “A Rigelian tiger pounces with no warning,” lesson 1. Keep an eye on and anticipate potential threats. Any of the systems appear suspicious, report straight to me.


Stendhal: That's my favourite one indeed! ::She smiled at that lesson confirmation!:: Better to be ready and aware of potential dangers!


Wethern: We haven't had to use most of the equipment yet thankfully. If a patient is being treated and a system seems abnormal just grab me, Kel or Foster and we can safely transfer the treatment to another biobed space. 


Kel: Response


Foster: Doctor Wethern, I want you to lead up the medical testing with Ensign Kel and Counselor Stendhal. I’ll work with Lieutenant Willow to ensure our containment and security systems are doing what we need them to do.


For half a second a pang ran through the middle of Haukea’s chest. The emotional intelligence was lost. The sensation came and went before any intellectual thought could be provided towards it. Haukea only shifted her weight once more, sensitive to the stiffness of her left side. To distract, Haukea did a quick scan of her sheet, highlighting the relevant security and containment systems in security yellow. Her and Foster would focus on these. 

  • Privacy field

  • Sickbay Overhead Sensor Cluster

  • Stasis Field Generator

  • Transporter biofilter


With the relevant items highlighted in yellow, the Chief took that as an opportunity to officially share the sheet with each officer present


Willow: I have provided each of you a collaborative copy of the relevant spreadsheet. Grab a PADD and log in. Security relevant items are highlighted in yellow. However, If I missed something please feel free to mark it similarly for my attention.


Stendhal: (Thankful) Thank you! Really appreciated. I'm sure the spreadsheet will help a lot our work!


Wethern: ::Corey nodded:: You got it boss. ::Corey looked at Kel and Stendhal:: hope you both have read the manual for the new biobed systems.


Kel/Foster: Response


Willow: Tapping next to each item will generate a tick mark, indicating the validity of each item. If an item requires additional checking, wait to mark it.


Stendhal: Awesome!


Wethern: We should probably start with the critical care systems and response equipment that will be what we will need if all things does go wrong. 


Kel/Foster: Response


Turning, now, towards Foster, if not the others, Haukea indicated with a nod, the necessity to begin their respective individual tasks. Even so, her eagerness leaned heavily towards field work, restlessness from her nearly healed injury at play. Nevertheless, it was the mundane tasks, paperwork, stocking, meetings and others such, that held the backbone of their entire operations. In such cases, Lesson 2: "There are no breaks in security because threats never take breaks,” found itself partaking in the conversation. Even when sat behind the stone surface of a desk, every report counted. 


Willow: Shall we?


Stendhal: Let's Hit it! ::She confirmed::


Wethern: ::smiling:: Maybe tap rather than hit. Otherwise there might be Lesson Number 8: Raging CMO with a lack of coffee and broken sickbay. 


Haukea made note to place a pin within lesson 8. While it held the spirit of the previous seven, the moral message was lost completely within the spontaneity of it all. Nevertheless, Haukea found comical pleasure from Corey’s usual antics. 


Kel/Foster/Stendhal: Response. 


Weight shifted, - Kel, Stendhal and Wethern mobile in the other direction - balance stumbling briefly, before the chief limped, approaching the nurses station or rather the sizable computer bay, centrally located within the medical center, pinpointing a chair and computer. 


For a slight moment, the older woman hesitated, hands hovering over the access pad. The particulars of the medical computer system were, naturally, largely foreign to her. Yet, it was her first port of call to access them, running through the onboard security systems that protected patient files and other requesent doctoral data. 


Willow: While not particularly highlighted within my chart, I believe it relevant to inspect the computer systems. The data sharing of patient files is of course confidential between the doctor and naturally, the patient themselves. I can access the back end of the security protocols for the checking it twice part before we venture on to the medical equipment. 


Foster: Response 


Willow: Unless you have some deep seeded need to do otherwise. 


Foster: Response 


Haukea on her end, despite the desperation to be out gallivanting across the universe, was, in some respect, attempting to delay the larger heavy hitter items of medical equipment that function towards some semblance of security functioning. Her personal knowledge regarding the hardware, if not software, components of their design was outside of her typical scope. Normally, on a daily shift, a member of the crisis response team - an officer with a natural blend of security and medical talents, though with particular knowledge - would be sent to conduct such maintenance. 


Willow: By all means go right ahead. 


Foster: Response 


(And) Somewhere within the scope of security was an unnamed rule dictating the essential task of delegation. Assign tasks to those with the relevant knowledge, skill and experience. While lesson 6 on bending rules could be applied, it allowed for efficiency when a knowledgeable individual provided input towards their specific circumstances; which went further in aiding lessons 1 & 2. 


Eventually Foster, former CMO and all around macgyver - an individual with a variety of skills - gained entry into the computer systems. Taking over, Haukea entered the systems back end, streams of systems operations and security coding filing past, one line at a time. 


Willow: The coding appears intact, no obvious tampering. 


Foster: Response 


OOC: IRL I know next to nothing regarding computer programing, coding or computer security. I’m making it up as I go. If someone with knowledge finds something off about it, please feel free to provide feedback. 

Lt. Haukea-Willow

Chief of Security - Crisis Response

Starbase 118 Ops

M239512BG0


Reply all
Reply to author
Forward
0 new messages