Chapter 6: Tools of the Trade
"Starfleet issues phasers set to stun. We prefer options."
Equipment for those who operate outside legal channels.
📖 Expands STA Core Rulebook, Chapter 6: Equipment and Combat Gear
Black Market Gear
Weapons, tools, and tech unavailable through legal means
Restricted Weapons
- Military-grade disruptors
- Plasma rifles and heavy weapons
- Explosive devices and grenades
- Assassination and stealth weapons
Availability: Varies by location and contacts Cost: Significant markup over legal equivalents Risk: Possession charges, tracking devices Quality: Variable, often lacks safety features
Surveillance Equipment
- Long-range listening devices
- Micro-cameras and recording systems
- Biometric scanners and analyzers
- Communication intercept gear
Legal Status: Restricted to law enforcement Detection: Advanced security systems may notice Power: Often requires specialized energy sources Training: Technical expertise needed for operation
Computer Systems
- High-capacity data storage
- Quantum encryption devices
- Hacking and intrusion tools
- AI-assisted analysis systems
Processing Power: Often exceeds civilian standards Security: Multiple layers of protection needed Compatibility: May not interface with legal systems Updates: Requires underground support networks
Medical Supplies
- Restricted pharmaceuticals
- Emergency surgical equipment
- Life support and stasis systems
- Genetic modification tools
Regulation: Controlled substances and procedures Effectiveness: Often superior to civilian alternatives Safety: May lack proper testing and certification Training: Medical expertise crucial for safe use
Illegal Modifications
Enhanced weapons, bypassed safety protocols
Weapon Modifications
- Power output enhancement
- Rate of fire increases
- Concealment improvements
- Specialized ammunition types
Performance: Significant capability increases Safety: Removal of protective systems Reliability: Higher malfunction chances Detection: Modified energy signatures
Equipment Enhancements
- Sensor range and sensitivity boosts
- Communication system improvements
- Computer processing upgrades
- Transportation device modifications
Effectiveness: Beyond manufacturer specifications Stability: Potential system failures Warranty: Voided by modifications Legal: Often violates safety regulations
Personal Gear Adaptations
- Environmental suit improvements
- Medical device enhancements
- Tool capability expansions
- Protective equipment upgrades
Functionality: Increased performance parameters Risk: Safety protocol bypasses Cost: Expensive specialized components Maintenance: Requires ongoing technical support
Forgery & Counterfeiting
Creating false identities and documents
Identity Documentation
- Personal identification cards
- Citizenship and residency papers
- Professional licenses and certifications
- Travel documents and permits
Quality Levels: From obvious fakes to perfect replicas Technology: Holographic and biometric security features Networks: Specialized forger organizations Validation: Database access and manipulation required
Financial Instruments
- Credit chips and account access
- Currency and precious metal certificates
- Corporate bonds and securities
- Insurance and warranty documents
Complexity: Advanced security measures Risk: Financial crime penalties severe Detection: Automated verification systems Profit: High value but difficult execution
Technical Specifications
- Equipment manuals and schematics
- Software licenses and access codes
- Research data and analysis reports
- Navigation charts and stellar cartography
Accuracy: Technical knowledge required Value: Information warfare applications Sources: Insider access often necessary Updates: Constant revision needed
Official Orders and Authorizations
- Government and military documents
- Corporate directives and permissions
- Legal warrants and court orders
- Diplomatic credentials and immunity
Authority: Highest risk and reward Verification: Multiple authentication layers Consequences: Treason and espionage charges Skills: Deep understanding of bureaucratic processes
Information Warfare
Hacking tools and data manipulation
Intrusion Software
- System penetration programs
- Security bypass utilities
- Data extraction tools
- Stealth and concealment applications
Sophistication: Varies from simple scripts to AI-assisted systems Targets: Government, corporate, and personal systems Countermeasures: Security system evolution and adaptation Ethics: Information theft vs. whistleblowing justifications
Data Manipulation Tools
- Record alteration software
- Database modification utilities
- Communication interception systems
- Surveillance and monitoring programs
Precision: Surgical changes vs. wholesale destruction Detection: Forensic analysis capabilities Verification: Backup system complications Scope: Local systems vs. network-wide operations
Communication Systems
- Encrypted messaging platforms
- Anonymous routing networks
- Secure meeting coordination
- Information dead-drop systems
Security: Encryption strength and key management Reliability: Network stability and availability Anonymity: Identity protection capabilities Access: User verification and invitation systems
Counter-Intelligence Equipment
- Bug detection and removal tools
- Communication jamming devices
- False information injection systems
- Surveillance countermeasure gear
Effectiveness: Arms race with surveillance technology Portability: Concealment and deployment considerations Power: Energy requirements and battery life Training: Technical expertise and operational security
Survival Gear
Equipment for hostile environments and situations
Emergency Equipment
- Portable life support systems
- Emergency beacon and communication
- First aid and medical supplies
- Shelter and protection gear
Reliability: Life-or-death functionality requirements Portability: Weight and size constraints Duration: Operational time limits Maintenance: Regular testing and replacement needs
Hostile Environment Gear
- Environmental suit enhancements
- Atmospheric processing equipment
- Radiation and toxin protection
- Temperature and pressure adaptation
Specialization: Specific environmental threats Integration: Compatibility with existing equipment Redundancy: Backup systems and fail-safes Training: Proper use and emergency procedures
Combat Survival Tools
- Personal defense weapons
- Concealment and camouflage equipment
- Escape and evasion gear
- Prisoner rescue tools
Effectiveness: Threat assessment and appropriate response Concealment: Avoiding detection by security Versatility: Multiple use applications Ethics: Lethal vs. non-lethal options
Acquisition Methods
How to obtain restricted equipment
Purchase Networks
- Black market dealers and suppliers
- Underground auction systems
- Specialist equipment brokers
- Bulk discount operations
Contacts: Reputation and relationship requirements Payment: Currency preferences and methods Quality: Reliability and warranty considerations Risk: Law enforcement infiltration possibilities
Theft and Acquisition
- Corporate and government facility infiltration
- Cargo hijacking and piracy operations
- Salvage and battlefield recovery
- Insider theft and embezzlement
Planning: Intelligence gathering and preparation Execution: Specialized skills and equipment needs Escape: Extraction and evidence elimination Consequences: Criminal penalties and pursuit
Trade and Barter
- Service exchange arrangements
- Information for equipment deals
- Skill sharing and training trades
- Mutual assistance agreements
Value: Establishing fair exchange rates Trust: Relationship building and reputation Timing: Coordination and scheduling challenges Networks: Community building and maintenance
Heat Generation
When your gear attracts unwanted attention
Detection Methods
- Automated security scanning systems
- Manual inspection procedures
- Energy signature analysis
- Behavioral pattern recognition
Risk Factors
- Equipment rarity and distinctiveness
- Usage patterns and frequency
- Location and context sensitivity
- Associated criminal activity
Mitigation Strategies
- Concealment and disguise techniques
- Legal alternative explanations
- Corruption and bribery options
- Disposal and replacement protocols
Consequences
- Investigation and surveillance escalation
- Asset seizure and confiscation
- Criminal charges and prosecution
- Network compromise and exposure