Narrative Web
Interpersonal Conflict
View Graph

Picard wrestles with the moral implications of the Enterprise's mission to destroy Lysian Central Command, suspecting a deeper deception and potential war crimes.

Picard wrestles with the moral implications of the Enterprise's mission to destroy Lysian Central Command, suspecting a deeper deception and potential war crimes.

6 events in this arc

Events in This Arc

S5E14 · Conundrum
Enterprise detects silent alien vessel

On the bridge of the Enterprise, Worf detects an unfamiliar spacecraft on long-range sensors, prompting Geordi to confirm its unmatched configuration. Picard orders the vessel displayed on screen, revealing a …

S5E14 · Conundrum
Picard refuses genocidal order

Picard’s moral crisis reaches its breaking point as the Enterprise approaches the Lysian Central Command—a defenseless station housing 15,000 civilians. Data’s scans confirm the station’s minimal defenses, while Troi’s empathic …

S5E14 · Conundrum
Picard reveals MacDuff’s Satarran betrayal

In the ready room, Picard delivers a measured but devastating revelation to Riker: Commander MacDuff—a trusted officer and apparent mediator—was a Satarran sleeper agent embedded aboard the Enterprise for decades. …

S5E15 · Power Play
Picard dismisses the ghost ship signal

On the Enterprise bridge, Captain Picard and his senior officers investigate an anomalous distress signal originating from a derelict Daedalus-class starship—the U.S.S. Essex—lost centuries ago. Data confirms the signal’s authenticity …

S5E15 · Power Play
Riker authorizes lethal containment of possessed crew

With the possessed crew—Data, O’Brien, and Troi—preparing to hijack the Enterprise via the transporter, Riker assumes command and faces an impossible moral choice. Geordi La Forge confirms he’s isolated Cargo …

S5E15 · Power Play
Restoring the Rings and Reuniting Families

The Enterprise crew successfully neutralizes the Ux-Mal energy rings, trapping them in the cargo bay and ending the alien threat. Picard, with Dr. Crusher’s containment field, exploits the entities’ vulnerability, …