Skip to content

Chapter 6: Tools of the Trade

"Starfleet issues phasers set to stun. We prefer options."

Equipment for those who operate outside legal channels.

📖 Expands STA Core Rulebook, Chapter 6: Equipment and Combat Gear

Black Market Gear

Weapons, tools, and tech unavailable through legal means

Restricted Weapons

  • Military-grade disruptors
  • Plasma rifles and heavy weapons
  • Explosive devices and grenades
  • Assassination and stealth weapons

Availability: Varies by location and contacts Cost: Significant markup over legal equivalents Risk: Possession charges, tracking devices Quality: Variable, often lacks safety features

Surveillance Equipment

  • Long-range listening devices
  • Micro-cameras and recording systems
  • Biometric scanners and analyzers
  • Communication intercept gear

Legal Status: Restricted to law enforcement Detection: Advanced security systems may notice Power: Often requires specialized energy sources Training: Technical expertise needed for operation

Computer Systems

  • High-capacity data storage
  • Quantum encryption devices
  • Hacking and intrusion tools
  • AI-assisted analysis systems

Processing Power: Often exceeds civilian standards Security: Multiple layers of protection needed Compatibility: May not interface with legal systems Updates: Requires underground support networks

Medical Supplies

  • Restricted pharmaceuticals
  • Emergency surgical equipment
  • Life support and stasis systems
  • Genetic modification tools

Regulation: Controlled substances and procedures Effectiveness: Often superior to civilian alternatives Safety: May lack proper testing and certification Training: Medical expertise crucial for safe use

Illegal Modifications

Enhanced weapons, bypassed safety protocols

Weapon Modifications

  • Power output enhancement
  • Rate of fire increases
  • Concealment improvements
  • Specialized ammunition types

Performance: Significant capability increases Safety: Removal of protective systems Reliability: Higher malfunction chances Detection: Modified energy signatures

Equipment Enhancements

  • Sensor range and sensitivity boosts
  • Communication system improvements
  • Computer processing upgrades
  • Transportation device modifications

Effectiveness: Beyond manufacturer specifications Stability: Potential system failures Warranty: Voided by modifications Legal: Often violates safety regulations

Personal Gear Adaptations

  • Environmental suit improvements
  • Medical device enhancements
  • Tool capability expansions
  • Protective equipment upgrades

Functionality: Increased performance parameters Risk: Safety protocol bypasses Cost: Expensive specialized components Maintenance: Requires ongoing technical support

Forgery & Counterfeiting

Creating false identities and documents

Identity Documentation

  • Personal identification cards
  • Citizenship and residency papers
  • Professional licenses and certifications
  • Travel documents and permits

Quality Levels: From obvious fakes to perfect replicas Technology: Holographic and biometric security features Networks: Specialized forger organizations Validation: Database access and manipulation required

Financial Instruments

  • Credit chips and account access
  • Currency and precious metal certificates
  • Corporate bonds and securities
  • Insurance and warranty documents

Complexity: Advanced security measures Risk: Financial crime penalties severe Detection: Automated verification systems Profit: High value but difficult execution

Technical Specifications

  • Equipment manuals and schematics
  • Software licenses and access codes
  • Research data and analysis reports
  • Navigation charts and stellar cartography

Accuracy: Technical knowledge required Value: Information warfare applications Sources: Insider access often necessary Updates: Constant revision needed

Official Orders and Authorizations

  • Government and military documents
  • Corporate directives and permissions
  • Legal warrants and court orders
  • Diplomatic credentials and immunity

Authority: Highest risk and reward Verification: Multiple authentication layers Consequences: Treason and espionage charges Skills: Deep understanding of bureaucratic processes

Information Warfare

Hacking tools and data manipulation

Intrusion Software

  • System penetration programs
  • Security bypass utilities
  • Data extraction tools
  • Stealth and concealment applications

Sophistication: Varies from simple scripts to AI-assisted systems Targets: Government, corporate, and personal systems Countermeasures: Security system evolution and adaptation Ethics: Information theft vs. whistleblowing justifications

Data Manipulation Tools

  • Record alteration software
  • Database modification utilities
  • Communication interception systems
  • Surveillance and monitoring programs

Precision: Surgical changes vs. wholesale destruction Detection: Forensic analysis capabilities Verification: Backup system complications Scope: Local systems vs. network-wide operations

Communication Systems

  • Encrypted messaging platforms
  • Anonymous routing networks
  • Secure meeting coordination
  • Information dead-drop systems

Security: Encryption strength and key management Reliability: Network stability and availability Anonymity: Identity protection capabilities Access: User verification and invitation systems

Counter-Intelligence Equipment

  • Bug detection and removal tools
  • Communication jamming devices
  • False information injection systems
  • Surveillance countermeasure gear

Effectiveness: Arms race with surveillance technology Portability: Concealment and deployment considerations Power: Energy requirements and battery life Training: Technical expertise and operational security

Survival Gear

Equipment for hostile environments and situations

Emergency Equipment

  • Portable life support systems
  • Emergency beacon and communication
  • First aid and medical supplies
  • Shelter and protection gear

Reliability: Life-or-death functionality requirements Portability: Weight and size constraints Duration: Operational time limits Maintenance: Regular testing and replacement needs

Hostile Environment Gear

  • Environmental suit enhancements
  • Atmospheric processing equipment
  • Radiation and toxin protection
  • Temperature and pressure adaptation

Specialization: Specific environmental threats Integration: Compatibility with existing equipment Redundancy: Backup systems and fail-safes Training: Proper use and emergency procedures

Combat Survival Tools

  • Personal defense weapons
  • Concealment and camouflage equipment
  • Escape and evasion gear
  • Prisoner rescue tools

Effectiveness: Threat assessment and appropriate response Concealment: Avoiding detection by security Versatility: Multiple use applications Ethics: Lethal vs. non-lethal options

Acquisition Methods

How to obtain restricted equipment

Purchase Networks

  • Black market dealers and suppliers
  • Underground auction systems
  • Specialist equipment brokers
  • Bulk discount operations

Contacts: Reputation and relationship requirements Payment: Currency preferences and methods Quality: Reliability and warranty considerations Risk: Law enforcement infiltration possibilities

Theft and Acquisition

  • Corporate and government facility infiltration
  • Cargo hijacking and piracy operations
  • Salvage and battlefield recovery
  • Insider theft and embezzlement

Planning: Intelligence gathering and preparation Execution: Specialized skills and equipment needs Escape: Extraction and evidence elimination Consequences: Criminal penalties and pursuit

Trade and Barter

  • Service exchange arrangements
  • Information for equipment deals
  • Skill sharing and training trades
  • Mutual assistance agreements

Value: Establishing fair exchange rates Trust: Relationship building and reputation Timing: Coordination and scheduling challenges Networks: Community building and maintenance

Heat Generation

When your gear attracts unwanted attention

Detection Methods

  • Automated security scanning systems
  • Manual inspection procedures
  • Energy signature analysis
  • Behavioral pattern recognition

Risk Factors

  • Equipment rarity and distinctiveness
  • Usage patterns and frequency
  • Location and context sensitivity
  • Associated criminal activity

Mitigation Strategies

  • Concealment and disguise techniques
  • Legal alternative explanations
  • Corruption and bribery options
  • Disposal and replacement protocols

Consequences

  • Investigation and surveillance escalation
  • Asset seizure and confiscation
  • Criminal charges and prosecution
  • Network compromise and exposure