NIF DESIGNS (CLASSIFIED)
Field use wristtop computer
This wrist-strapped chrono incorporates an advanced field use computer with comlink and numerous other gadgets useful for field agents. Restricted use.
EX-2 CCIS (Combat Cloak Infiltration Suit)
Highly effective stealth armor for use by Intelligence Commandos.
Cybernetic Infiltration Suit (CIS)
A more lightweight and flexible infiltration suit than the EX-2 CCIS.
LRR (Laser Re-Router)
Small device which effectively foils laser traps.
Shadow-class Stealth Shuttle
Highly stealthed transport for insertion/extraction of field agents on mission in enemy territory.
A comlink which transmissions are undetectable by subspace trancievers.
Orbital Insertion Pod (OIP)
Inexpensive one-way transport for stealth insertion of Intel Agents on mission on enemy planets.
Rapid Stealth Transport Shuttle S-TR1
Very fast cloaked modular shuttle for insertion/extraction operations of personnel or equipment in enemy territory.
STANDARD EQUIPMENT AND INFORMATION
This small device is used by individuals who wish to mask the fact that they are no longer in a given location. These drones can record and playback any number of subliminal and barely audible bodily functions, including breathing and heartbeat. When set near a recording device or other surveillance system, they provide audio signals that make it appear as if the individual is still in the room, even when they are not.
The Arakyd Hush-About AJP-400 is capable of lifting up to 300 kilogramms (total). It moves vertically 200 meters per charge, horizontally up to 500 meters per charge. A fully charged unit has 10 charges and can be run contiuous charge-feed. During normal operation this unit produces very little noise. Any attempt to locate a Hush-About using auditory pickups requires a succesful search roll at a +10 penalty to the difficulty. Jetpacks can only be used in an oxygen atmosphere. Rocket packs are more bulky but can operate in space.
Standard security items almost always include scanners and observation cameras. These cameras range from simple visual scanners such as the Merr-Sonn Munitions 17C to advanced holographic recorders such as the military issue Merr-Sonn Munitions 57C Holocamera commonly employed by the Empire. Most of the units have motion-sensor tracking programs that allow them to automatically follow the movements of individuals within the scanner's range. These security cameras normally feed all of their visual data to centralized guard stations and they often have automated functions to alert personel, and at military installations scanners often provide targeting data for automated blasters. Most of the security scanners are equipped with special magnification lenses or infared and ultraviolet spectrum optics, which makes them useful for nightime observation. There are long-range scanners on the market that can record the activities of individuals dozens of kilometers away, and can be equipped with audio sensors which use precisely focused unidirectional pickups which can record distant conversations. There are also on the market a wide variety of specilized short-range security scanners, which include weapons scanners which are commonly used in starport security systems.
A scanner that combines a sensitive broad-spectrum sensor suite with a very powerful analysis computer is what the Athakam/RSMA Bioscan unit is about. The bioscan's computer is one that is small enough to be carried in a briefcase and is also equipped with both a flat-screen monitor and a holographic projector. The sensor suite for the bioscan is small enough to be placed on an examination bed but is also capable of being hidden in side a ceiling pannel, below a deck plate, or monunted adjacent to a door frame. The only limitations on this unit is that it's 6 cenimeter wide scanning surface must be located within forty cenimeters of the subject and also the unit must be firmly secured due to the fact that the slightest vibration can foul up its sensor readings. This little 6 cenimeter scanner includes a full-range scanner, a vaprosampler, a doppraymagno scanner, and a medtox detector. The unit is capable of completing a comprehensive scan in less than 2 seconds, and when completed the results maybe compared to bioscan's data library, which has more than 86 thousand alien physiological templates. The scan results are amazingly comprehensive, listing the subject's species, sex, hearbeat and respiration rate, muscle-tone index, height, weight, and tempature. The bioscan also automatically highlights any anomalies in the subject's metabolism and chemical and hormone levels as well as diseases and viral infections. The unit also can be called upon for a more detailed report upon requesting it. The onboard data library is capable of storing a permanent record for a later reference. The bioscan's full-range and doppraymagno scanners are there to instantly detect cybernetic implants, energy cells, weapons, and even comm transmissions, which makes it virtually impossible for the subject to hide a transmitter. These sensors are also capable of detecting encoded chips or datadots that are less than a milimeter in diameter. The library of the bioscan is also programmed with the template specifications for thousands of diffrent types of droids. The bioscan's computer is equipped with standard data ports which are used to exchange data with computers, droids, and datapads. The unit is built with an internal power supply that will operate the unit for a full-year before requiring a recharge. This technology isn't cheep either, each bioscan unit costs 13,000 credits, but its level of detail pays for its self.
Electronic Lock Breaker
An electronic lock breaker is an antisecurity slicing system that has the ability to override alarms and open all but the most sophisticated computerized locks. Many times security systems use computer-controlled electronic locks that are supposed to be tamperproof. These doors and locks are usally reinforced with heavy-duty magnetically reinforced durasteel bolts (sometimes coupled with minature force fields), also the locks are usally secure against outside communications, alarms, and power supplies. Almost all electronic locks require a password or identity code, and then there are the most secure facilities which usally require a secondary identity verification method. Then there are the most advanced locks on the market which have computer-controlled systems that use rapidly changing code sequences to block slicing attempts by droids and portable computers. Most of the time those types of locks are used to protect items of immense value, and this will usally provided more than enough motivation for computer slicers to develop ways to nullify advanced security systems, the result being the electronic lock breaker. These portable electronic lock breakers have a high-capacity computer that has more processing power than most starship's navigation systems do. These lock breakers are only avalible through the blackmarket, and come with a price tag of 25,000 credits per unit. The way the lock breaker works is that the slicer takes the lock breakers keycode replicator input/output jack and plugs it into the lock. Then the lock breaker's primary programming spikes a complicated polynomial computation into the lock's security monitor programming to keep it occupied and to prevent it from noticing the secondary slicing program. The secondary slicing program then randomly flashes access code combinations in an attempt to match an authorized code and open the lock. There are disadvantages to using the electronic lock breaker like the fact that the slicer needs considerable privacy when using it since its electronic hum can be heard up to 10 meters away, and also the slicing can take hours unless the lock breaker is preprogrammed with the target lock's computer architecture and coding sequecing, which then it might only take a few minutes. The most secure facilities uses gene-code sequencer locks. New Republic programmers use a countermeasure system by adding "flagged" genetic codes to the locks' computers which means that if a lock breaker accidentally flashes one of these codes it would trip an alarm.
This is the model number of NeuroSaav's general-purpose sensor pack. This portable scanner could detect life forms, communications signals, energy, and motion. Its primary drawback was that it was so generalized in its use, that an experienced sensor operator was needed to interpret the data.
A bounty hunter's weapon, the Aural-Biological-Chemical scrambler. It was based on the design of an anti-ordnance electromagnetic probe, and emitted a full spectrum of ultrasonic waves, chemical agents, and biological irritants when fired. The spread of the scrambler's blast had a wide pattern, and disoriented its target with massive sensory overloads. This allowed the hunter to capture the target without having to fight them.
this is a compact device filled with highly-explosive material, and is used most often in mining operations. Alpha-plus charges are incredibly powerful, and are used only when other, more conventional methods of excavating rock prove futile.
Aorala Sensor 100
This is BlasTech's original motion sensor device.
Any automated defense system that uses remote sensors to detect the presence of an intruder. These systems are often employed around satellites and space stations, to allow them extra time to prepare for an attack.
This is the brand name of SoroSuub's droid-mounted global positioning system (GPS) module. The AutoTracker allowed a droid to monitor its position and generate an automatic map of its immediate surroundings, ensuring that the droid and its owner were never be lost.
This chemical weapon was produced by Xerithin Chemical Combinations, and was known as the Bio-Guard. This weapon employed a unique mixture of chemicals in order to repel an alien attacker. Rather than use a single chemical that only worked on certain species, the BGA-900 was effective in deterring a wide range of exotic species.
This synthetic material is used to cover and color the iris of a humanoid eye. They can be manufactured to exactly conform to the shape of the iris and pupil, and are used by undercover agents to disguise their true eye color and shape.
Developed by Brisallon Chemical Consolidated, this spray canister used a chemical compound to deter an attacker by soothing their nerves. This personal safety device was only good for use on specific races and species, since the chemicals required to induce the feeling of calm were specially mixed.
this was the name given to any tracking device which sent out a regular burst of information, rather than a continuous stream, to help avoid detection.
A mesh covering that protects a ground-based object from being detected. Often, the net has two parts: a baffle net of thin wire to shield electronics, and a photosensitive netting that mimics the surrounding terrain in color when activated.
This is the brand name of a series of field-use chemical sniffers produced by NeuroSaav.
An extremely lethal form of gas used in chemical warfare, Chemtrox produces an incredibly horrible death.
Class VI Laser Projector
Developed by BlasTech, this automate blaster was used to defend a specific location. Also known as a laser trap, the Class VI blaster was linked to a control computer and a sensor suite, allowing it to be remotely targetted on a specific object without human intervention. The Empire used these blasters to defend the prisoner cellblocks on the first Death Star.
The Empire devised the first working cloaking device just before the Battle of Endor. Note that this contradicts the Star Wars: Episode I - Incredible Cross-Sections book, which indicates that Darth Maul's Sith Infiltrator had a cloaking system which employed stygium crystals. However, its abilities were overshadowed by its cost, and it was never fully implemented. The one major drawback to the original cloaking device was that it was unstable during hyperspacial travel. This fact was not known to Admiral Zaarin, who attempted to steal a version for the Alliance. He took a cloaked CR90 corvette into hyperspace to escape Vice Admiral Thrawn but the cloaking device ruptured and destroyed the corvette as it entered hyperspace. Several years after the Battle of Endor, Grand Admiral Thrawn recovered the technology from Mount Tantiss and used it twice: once at the Battle of Sluis Van, to hide the contents of his false freighter Narsisstue; and again when he mounted them on asteroids and set them loose in orbit around Coruscant. Up until this point, the only feasible use of a cloaking device was on somewhat stationary objects. There were several limitations to using the device on a starship, the foremost of which was that the cloaked ship was as blind to the outside world as the ship was to observation. This presented a problem to early engineers and designers, but was overcome by the advent of the Imperial Computer Combat Predictor. It didn't alleviate the fact that the cloaked ship was blind, but tried allow it the opportunity to shoot down attacking craft.
A chemical used in battle, it can be launched in a canister-type projectile. When dispersed, it freezes on contact, incapacitating those affected.
Crystal Gravfield Trap Receptors (CGT)
These sensory devices use a synthetic crystal grid to detect fluctuations in the gravimetric plane. They are very effective, but can be inconclusive if used near a large spacial body, such as a planet. They can also be rigged to reflect sensor scans, and are operable from thousands of kilometers away.
this is a model of Mennotor electromagnetic projectile launcher. It is similar in design to the basic stormtrooper blaster, except that it fires projectiles instead of blaster bolts. The projectiles can be modified in many ways, to contain explosives or toxins.
This was a specialized form of explosive which found a wide market during the Galactic Civil War. D-tape (as it is referred to in the business) is a basic adhesive tape which has been impregnated with detonie gel. While not as destructive as a shaped charge, detonite tape was more flexible and adaptive to the shapes of doors, windows, and hatches.
Similar to detonite tape, this explosive tape is used to explode doors and panels.
Dedicated Energy Receptors
These sensory devices detect electromagnetic emissions in their surroundings. They are accurate and effective at locating Nav beacons, comlink transmissions, and lasers. They are often fitted on starships.
This personal defense field generator, manufactured by Palladia Electronics, was worn like a belt. Contained in the belt was a small proximity sensor and energy emitter, designed to protect a being's personal space. Whenever an unwanted intrusion occurred, the sensor picked up incoming pressure and rected by releasing a stun charge at the offender. The stun charge varied in strength, depending on the force with which the intruder approached the user.
This specialized form of personal protection uses a miniaturized, potable, three-dimensional holovideo recorder/projector and a specialized bodysuit. A being must allow itself to be recorded for an hour, during which time the doubler suit records the movements and physical dimensions of the being. The recording is then downloaded into a computer which turns the recording into raw data. When the wearer wants to go into the field in disguise, he or she wears a special bodysuit lined with thousands of microsensors. The raw data from the recording is fed to these microsensors, and allows the user to create a double of himself through the miniature projector.
This alloy is resistant to sensor scans, and is valued by smugglers for lining suitcases and small hiding areas.
Outlawed during the height of the Old Republic, disruptor beams were security devices which emitted a thin beam of coherent red light. The beam was capable of cutting a being in two without expending much energy.
a strengthened fiber rope used in netting. It is a good conductor of electricity, and was often used in stun nets.
A device which uses reflected sound waves to locate a target.
This device was developed for use by scouts and other galactic explorers. This compact, rectangular box held a number of sensors, including radiation detectors, spectrameters, temperature monitors, mineral spotters, and lifesign sensors.
While these devices provide the same kind of image enhancement functions as macrbinoculars, they differ from macrobinoculars in that electrobinoculars allow image enhancement features that macrobinoculars do not.
Similar in function to electrobinoculars, the electrotelescope has a much greater range and better image resolution.
This device allowed a being to move through an energy fence or screen by temporarily disrupting the energy field as the wearer passed through. These devices could also be used as weapons, delivering a burst of energy outward from the generator.
Developed by Illicit Electronics, this small device allowed the user to generate contact lenses and realistic facial masks to hide their true identity, or to assume another another identity. The computer which controlled the system was quite advanced, and required a programmer who was familiar with the system. This device could also generate identification cards for a given disguise.
A sensor package that are often called Universal Sensors because they can detect all sorts of objects, energies, and fields. These sensors use large receptor dishes to collect available sensory information. Thus, the larger the dish, the better quality information that can be gathered.
found only on the western coastline of Garos IV's main continent, this ore was discovered to have a natural ability to cloak other objects. Thus, when the Empire discovered it, Garos IV was garrisoned and the mining of the ore strictly regulated.
Any small, easily-concealed energy weapon, a holdout blaster has limited firepower. It can fire one or two full-intensity blasts before it is completely drained.
This device allows the user to manipulate a pre-recorded holo-transmission and create a false transmission. The generator first makes a holographic image of the desired subject, then runs it through a bit manipulation program to generate subsequent images. The complete set of images forms a smooth, seemingly real transmission.
Any small, nearly undetectable device which could be placed on a target for surveillance purposes. The holobug would return a real-time display of the target's surroundings, allowing trackers to better estimate the target's position.
Any full-duplex three-dimensional communication.
This form of recording device captured full-form, three-dimensional images as well as sound for later playback.
Hologram Projection Pod
Developed by SoroSuub, this circular device allowed the user to send a full-body, holographic communication to another being. It required that the receiving party have a holographic display unit.
Once the main vehicle for spreading news instantaneously thoroughout the galaxy, the Holonet used subspace relays to transmit three-dimensional images to various holonet receivers. This media distribution system allowed the Old Republic to have instant access to any inhabited location in the galaxy. It was created from hundreds of thousands of non-mass transceivers connected through an incredible matrix of coordinated SimuTunnels. Each endpoint was equippde with a huge computer system that decoded and sorted the transmitted information. Unfortunately, the HoloNet was incredibly expensive to maintain and operate. Thus, its use was usually restricted to purely governmental transmissions. After Palpatine assumed control of the galaxy, he limited the holonet to specific Imperial uses, in order to control the flow of information through the galaxy.
HoloNet Communications Unit
A Holocomm for short, these portable devices allow the user to transmit and receive messages over the HoloNet.
A device much like a data pad, except that it is capable of displaying holographic transmissions as well.
A device which takes input and displays a full, tri-D display above it. The holoprojector can manipulate the display based on the data input to it. They come in many shapes and sizes, from small, personal projectors to large, commercial versions used in theaters.
Holographic image disguiser
Such as the Correlidyne CQ-3.9X, which look like oversized belt buckles and which project a hologram that can temporarily confuse an enemy by making the wearer appear to be something he's not. The hologram obviously must be larger than the wearer for this effect to work, but it can supposedly fool the naked human eye. In theory, a device like this could be used as a camouflage device, to let soldiers pretend to be rocks, animals, or some other innocuous-looking non-combatant. However, like many real-life specialized devices, it has weaknesses: It has a finite battery capacity so it can't run for very long.
It cannot "sample" an object on its own and it can only hold one image at a time. Holoshrouds will be even more effective in a high ECM environment at night. Enemy soldiers will be limited to naked-eye sighting, so a large region of blackness could provide fairly effective camouflage for a squad of soldiers or even more effective camouflage for a swarm of combat remotes.
Gun of Command
Built on Charubah, this weapon releases an electromagnetic wave field that neutralizes the
enemy's voluntary thought processes. This leaves the target unable to defy any order they
are given, no matter how strange or deadly. The gun of command is used primarily by Hapan
troops, although a few eventually made their way beyond the Transitory Mists. The gun of
command resembles a gold-plated blaster, and though it is effective in taking out an
opponent without harming them, the guns are prohibitively expensive to produce. One of the
most unusual - and decidedly cruel - ways in which Hapan troops used the gun of command was
during an execution. While females couldn't be executed under any circumstances, males were
often put to death for crimes against the Hapes Consortium. In these situations, the Hapan
troops would shoot the criminal with a gun of command, then hand them a blaster and order
the criminal to shoot themselves in the head. This technique proved to be quite a deterrent
for most pirates and criminals. Imperial tacticians adopted this weapon for our own use
during the Imperial Resurgence.
This small, needle-like device is used to verify a being's identity. Most often used in the delivery of sensitive or confidential materials, the probe is held between the fingers and squeezed. The small needle then takes a sample of skin and body fluids for comparison with an encoded description of the recipient. If the samples match, a positive response is stored in the probe's inoxide tip. When the tip is inserted into a special reader, the package containing the materials is either opened (if the samples match) or destroyed (if they don't match). This ensures that sensitive or confidential deliveries make it to their intended destination without being intercepted. In extreme cases, the inoxide probe and signal a more devastating action in the result of a mismatch, such as an explosion which destroys the package as well as the offending party.
Imperial Anti-Security Device
A round probe droid used by Trioculus to penetrate Yavin 4's defense network and search for the Lost City of the Jedi. It is equipped with a holoprojector and a remote detonation system.
A lipstick that is impregnated with a poison that can stun a victim. The wearer must take the antidote before putting it on.
Developed by MicroThrust, this jamming unit provided a measure of protection against eavesdropping. It essentially emitted a wide range of background static in a localized area, preventing communications sensors from picking up any vocal or electronic communication. Originally designed for civilian use, the M39 was embraced by the Empire and redesigned to have a stronger power source and computer input tap.
Mark VII Inquisitor
This version of seeker remote was developed by Arakyd. Equipped with a variety of sensors, scanners, and communication equipment, the Mark VII carried a BXT-4 computer and an AA-1 verbobrain, all of which allowed the Mark VII to work independently of an organic operator. These small remote were armed with a pair of tiny yet powerful blasters, and could stun or kill a target if directed to do so.
This top-of-the-line BlasTech motion sensor is often regarded as too sophisticated for its own good. When installed in a tight pattern, the MoveSense 34 will trigger during a slight breeze. This is due to quiality components, but also to the fact that the MoveSense 34 monitors average air density surrounding it.
This small device is basically a passive field generator, used by smugglers and pirates to hide their actions. When a being needs to bypass a ship's security and safety systems, they can slice into the wiring and computer systems and use the no-show to generate an uninterrupted feed to the security systems. They can then cut through a hull or access panel without setting off the system's sensors.
This specialized hull plating material was developed to defeat sensors systems, allowing a ship to move about with relative stealth.
Any device which is used to slice into a remote computer. These devices take the place of an organic slicer working on the spot to crack into secure systems. Instead, they can tap into other computers - usually via tight-beam transmission - and obtain information. Many can also be programmed to cover their own tracks, but the time delay of remotely gathering information often means that they are discovered while still downloading information.
This was the designation of MerenData's espionage droid, manufactured during the height of the New Order. Built to intimidate rather than infiltrate, the RM-2020 was designed to gather information from the battlefield. Its primary mission profile was to spot enemy troop movements and analyze an emeny force's weaknesses, then relay the information back to its base. Measuring a meter in height and equipped with a repulsorlift engine, the RM-2020 was unarmed but sported a variety of sensory packages.
This form of sensor alarm was available in several different models. Type I SafeScreens were basic devices used to protect homes. Type VII SafeScreens were used by royalty and corporations to guard their riches and research.
Another term for running a starship without generating any emissions, in order to escape detection. This requires the ship to run on main battery power, and is extremely power-consuming. If the main generators are not put back online soon, the ship will be adrift without life support.
This full-spectrum transceiver was used in many droids, primarily the R2 series. It includes electro-photoreceptors, dedicated energy receptors, and heat and motion sensors. The sensorscope interfaces directly with the Intellex IV internal computer, which processes the data received.
This portable mine can be placed on the ground or near doors. Acitvated by time-delay or promixity sensors, the sequencer charge has much more destructive capability that a thermal detonator or IM mine.
This is the specialized form of lightweight, armored bodysuit produced for use by the Alliance's Infiltrators. It provided a variety of stealth and anti-sensor benefits, mainly derived from the use of specialized fabrics.
a portable sensor which can be mounted on high ground and used to monitor the approach of an enemy.
A small information chip which allows the holder to bypass certain computer-driven systems, based on the chip's programming. They can be used to bypass door locks and security fields, to name a couple of uses.
A machine which is programmed to infiltrate computer systems.
A belt which uses hologram technology to create a cloaking field which copies the background, rendering the user invisible even in plain sight. Different fabricates have varying quality. The user can still be detected by any other means than visual, such as by sound and touch. Certain more advanced stealth units can dampen sound as well.
This is the generic term for any small, undetectable device which can be used to overhear the conversations of another individual. The spy-mike is hidden on the target's body and can transmit for a limited distance.
This form of deep-space information-gathering probe is dispatched to its probe sites through hyperspace. Undetectable while in hyperspace, stasis probes drop back into realspace only long enough to gather sensor data, relay it to its control location, and receive its next instructions. Passive sensors are used to minimize the ability of conventional sensors to pick it up, and the probe stays in realspace for less than thirty seconds at a time. The New Republic used stasis probes extensively during the Black Fleet Crisis, gathering data on the Yevetha throughout the Koornacht Cluster.
Developed by Warlord Zsinj and Apwar Trigit shortly after the Battle of Thyferra, these small, parasite droids were distributed throughout the galaxy. They were designed to intercept signals from virtually any source and relay information about the source to their operators. The basic Morrt droid resembled a rectangular box, and could attach itself to virtually any surface. The project was initially successful, allowing Trigit to feed false information to the New Republic and allowed him to destroy Talon Squadron. The second hit came from Folor, but Trigit attacked the false beacons placed on the moon instead. When Gara Petothel discovered that the Morrts dispatched to Talasea where attaching themselves to ships which constantly moved in and out of the Morobe System, Apwar Trigit discovered that the intelligence of the Morrts was too limited to be useful. He canceled further development and abandoned the Morrts.
New Republic Intelligence
The New Republic's primary source of information throughout the galaxy, it is a vast network of spies and agents. They are very skilled in overt and covert operations.
This spindly droid was produced by the New Republic for use in slicing into the encrypted data cores of Imperial computers. Resembling a floating reptile, the NR 1100 was equipped with a repulsorlift engine and a pair of arms which housed a variety of computer interface probes and jacks. The NR 1100 was programmed with a variety of slicing routines, and was given enough intelligence to learn from known encryption routines to decrypt new ones.
Personal Data Assistant
Any computer device which stored physical and personal information. Any of the information can be displayed quickly, usually in a holographic, head's-up fashion. PDAs, as they are called, are found most often in soldier and commando gear, as well as in starpilot gear.
The PDV was an Imperial Intelligence Tech 4 message pod used by Sector Plexus. PDV stands for Plexus Droid Vessel, for these pods were manned only by droids. The standard "crew" consisted of a captain I2-AM3 (a modified R2 astromech droid), an I2-CG droid for storage and transceiving, and an analysis/encoding computer equipped with a TranLang III communications madule. These ships were designed to send and receive Sector Plexus messages in a system, then jump to the next system. They never had a jump longer than a day, due to their efficient routing algorithms.
Are high-powered handheld explosives that contain a proton core, a greatly reduced version of the warheads used in proton torpedoes. First developed for breaching ships' hulls during boarding actions, proton grenades such as Merr-Sonn's 7-PrG also are used for large demolitions projects.
Twisting the grenade's arming mechanism primes the battery to deliver a small electrical charge to the proton core; pressing the activation plunger starts the timer. This two-step process offers a fail-save to prevent accidental detonations; this is very helpful, since the proton core is almost as powerful as a thermal detonator. The timer can be set for up to twenty minutes, and the weapon can be disarmed at any time by pressing the twist plunger release. A proton grenade is much more effective than a standard detonite charge. The prestressed metal casing and shaped proton charge channel the explosion's force toward the magnetic plate that holds it to its target and the blast can punch through a meter and a half of permacite. Electromagnetic pulses disrupt any computers, droids, blasters, and other electronic devices within twenty meters.
When the grenade is used in boarding actions, the explosion instantly blasts away armour plating; this is much quicker than carving through the hull with fusion cutters. The explosion exposes the ship's outer corridors to vacuum, eliminating any opposition in the explosive decompression, while attacking troops are free to board with minimal resistance, Unless the defenders don space suits, their only choice is to fall back as the attackers advance, cutting through bulkheads and exposing more and more of the ship's interior to space. Teams of troops boarding from multiple locations often can secure a vessel within minutes. Attackers also can use proton grenades to damage a ship's sublight drives, shield generators, and weapons.
This substance is used by many commando groups to plate their armor suits. Reflec has the natural ability to absorb the energy waves emitted by most sensors, effectively removing the substance from a sensor sweep. When coated with a fine mesh of reflec, personal body armor is virtually undetectable, as are the life signs of the wearer. Imperial commandos were among the prime users of reflec plating.
a blanket made of a material which holds in bodyheat and helps hide a lifeform from sensors.
This Imperial Intelligence counterintelligence agency was an instrumental part of the Death-Hunter project. This was due mainly to the influence of Moff Jesco Comark, who took control of the agency after being ousted from the governorship of Chandrila. Comark redirected the funds which should have maintained Renik into his pet project, the Death-Hunter cyborg. Renik personnel were used to kidnapped the various human subjects required to create the lethal cyborgs.
a small, beetle-shaped droid developed for Emperor Palpatine by Sienar Intelligence Systems, a scarab droid could infiltrate most places like a normal insect. The Scarab was produced in order to avoid any legal hassle involved with hiring trained assassins to eliminate Palpatine's enemies. These palm-sized, arachnoid automatons could be programmed to seek out specific targets and deliver a venomous bite. There were some eighteen distinct versions of the Scarab Droid produced, with spines, claws, and shredders serving as the primary weapon on each version. Scarab Mark VI: this sixth version of Scarab Droid produced by Sienar Intelligence Systems, the Mark VI posted the best killratio among all eighteen versions of the Scarab. These droids had a pair of hard injection fangs mounted on their heads, which could delivery a wide range of poisons.
The official form of communication between Imperial Intelligence agents, a scandoc is intelligible upon receipt. Immediately following its receipt, a scandoc is coded to begin mutating some time later. The mutations begin with a few message packets out of every thousand. If the document is reproduced, further mutations occur until the document is no longer understandable.
The central point of flow for all information moving through Imperial Intelligence, Sector Plexus maintained a huge database of all Intelligence officers, their aliases, and the connections implied by those aliases.
This array of sensor jamming devices was developed as a form of cloaking system during the New Republic. It masked a ship's emissions while providing information about the ship's immediate location.
This form of automaton was developed by the New Republic and used as scavengers at battle sites. As directed by Operation Flotsam and the Historic Battle Site Preservation Act, these droids were used to recover any physical evidence from a battle site, for investigation by the New Republic Intelligence agency, prior to release for public viewing. These droids were often accompanied by DA-series analysis droids.
This model of Lovolan droid was originally designed to serve the aristocracy as a servant. The Supreme-class droid was elegantly shaped, giving it a pleasing appearance to most humanoid races. It could communicate in a wide range of languages, and was programmed to understand the high-society nuances of certain Core World dialects. The main drawback of the Supreme-class droid, especially those manufactured after its initial run, was that it was produced to quickly, and the craftmanship was poor. The later models tended to fall apart at the most inopportune times, embarrasing their owners and causing a backlash of bad publicity for Lovolan. Those droid which ended up in the possession of crimelords and other unscrupulous owners were so gracious and willing to please their owners, they would often alllow illicit modifications to their programming. These droids were used as eavesdroppers and money launderers, and the Supreme-class was later investigated for possible security breeches by the Imperial Intelligence agency.
Tech 4 PDV
An Imperial Intelligence Plexus Droid Vessel, the Tech 4 was used by Imperial Sector Plexus to quickly communicate important information between neighboring systems. The vessels were manned by two droids and a computer, and were equipped with advanced astrogation and hyperdrive capabilities.
An explosive material used by military commandos.
This is the name given to any device which jams local communications receivers, such as holocams and microphones. Intelligence agents and bounty hunters often use them whenever they know they will be entering a room which has been bugged. After they disable any obvious surveillance devices, they can use the universal jammer to render ineffective any they might have missed.
Vanish 2 Sensor Mask
Developed and manufactured by Fabritech, this device combined electromagnetic and holographic transmissions to "hide" a starship from most sensors. This device didn't absorb sensor beams but, rather, disrupted them by sending back information on the environment surrounding a starship. The Vanish 2 made a ship virtually disappear by sending back sensor data about the starfield around it.
A switchblade-like device that uses a vibrating blade. The blade is removable. Like all vibro-enhanced vibroweapons, the vibroknife uses an internal generator to create a rapid vibration. The vibration then motivates the peen of the hammer, allowing the user to quickly drive nails or crush stone, depending on the size of the peen.
This thin, metal needle vibrates rapidly, allowing it to pass through most materials with ease.
This form of fencing used a specialized, vibrating wire to keep beings and creatures from entering or exiting an area. The wire was attached to a remote power source, and vibrated in a tight cycle. This vibration made the wire cut through flesh, bone, and most dense materials with relative ease.
Produced by Saldalith Manufacturing, this device appeared to be a beautiful bracelet made from Falasian liquid crystal inlay. In reality, it was a complex sensor device which could interpret the biorhythms of an individual and determine the truth of their words and actions. The use of this type of device was outlawed in many systems during the height of the New Order, unless the being who was scanned had given their expressed permission.
This small explosive is form by taking a gram or less of detonite and wrapping it around a wire or cable with a wad of SlipSheet or a ration wrapper. The small charge doesn't cause much outward damage, but can be used to severe computer cables in remote locations.
Negatron Impact Charge
A form of explosive that uses a compressed, directed bundle of negatrons to cause massive amounts of damage. Doctor Arakkus used several of these charges to accelerate the gravity of a remote star by collapsing much of its core. Knowing that he was going to die of severe radiation poisoning, Arakkus set up a huge gravity well to draw in and kill others along with himself.
This substance is used by detonation experts. It ignites on impact, and can be used to trigger larger explosives.
Any explosive device which uses shock waves, instead of shrapnel, to cause damage. They are similar to pressure bombs.
Small detonation devices which use low-amplitude sound waves instead of explosives.
Thermite Boring Charge
This directed explosive is used to destroy specific targets, such as locking mechanisms. The charge is positioned to bore into its target, destroying everything it encounters along its path. Thermite charges burn with an intensely bright light.
This small explosive device used a tiny charge which could be detonated with a remote transmitter.
A chemical weapon, Fex-M3 is a potent nerve gas that causes death upon skin contact.
A later variation on the original Fex-M3 nerve gas, Fex-M3d was designed to bind to neuro-receptors as it passed through the bloodstream after being inhaled. This binding effect prevents the nerves from sending information to the brain. In small doses, it can cause involuntary muscles to become lax, making the heartbeat irregular and breathing difficult. In larger doses, the body's autonomous nervous system shuts down completely, stopping the lungs from breathing.
Also known as nano viruses, these microbes are created in laboratories to attack a certain genetic structure and dismantle it slowly. They are expesnive and time-consuming to develop and manufacture, due to their single-purpose use. They are beyond the means of most criminals, which is the only reason why their use isn't more widespread. The nano-destroyers enter the target's cells and slowly dismantle the cell's nucleus. Once the nucleus explodes, the nano-destroyers are distributed to neighboring cells to start the process again. They are very difficult to stop, even with the use of copious amounts of bacta, and will consume their target within a few months. They were originally developed by humans, and seem to work only on human and certain near-human species. The Caridan Ambassador Furgan used a group of self-replicating nano-destroyers to try and slowly debilitate Mon Mothma and bring about the fall of the New Republic, but his death occurred just prior to Cilghal's using the Force to remove the nanodestroyers from her body, one at a time.
A detonation device used to cripple a starship in deep space. It is attached to the ship's hull in such a way that it can continuously and innocuously drain power from the ship's core. When it reaches a certain power level, the bomb begins to draw an increasingly greater portion of the ship's power as it approaches detonation. With a shaped charge and the correct power level, the bomb explodes, ripping a hole in the ship's hull. The impending depressurization quickly and effectively kills the ship's crew and leaves her stranded in space.
A handheld device which is used to read written text or process vocal speech and provide the user with an understandable translation.
This was a term used to describe a device which could translate the speech of one race into that of another. These devices were often worn around the neck, and could be programmed to speak in a variety of voices and accents.
Holistic Data Transfer
A form of "information shorthand" that allows computers and droids to store large amounts of data in tiny amounts of memory. Known as HDT, this form of saving data means that a computer is able to do more with less active memory and storage space.
This hyperspace communications device was similar to a dedicated HoloNet terminal, but much less expensive. It allowed a starship to send and receive real-time audio and video transmissions while travelling through hyperspace.
A device which is used to alter droid programming.
A device which is used in hypno-imprinting, the transonic synthesizer allows a number of commands and triggers to be imprinted on a person's mind while the person is under hypnosis.
This is a generic term used to describe an form of handcuffs or binders which used magnetic energy to maintain a lock.
Modified handcuffs that produce an electric shock proportional to the force of the prisoner's struggling.
A conductive netting that can be deployed to ensnare a victim. Once ensnared, the victim was administered an electric shock of varying strength. The strength depends upon the strength of the victim's struggles.
Manufactured by Jer'N Weapons Systems, this device looked like a hold-out blaster. It fired a coherent blast of microwave energy at its target, which disrupted the neural systems and rendered the target immobilized.
A special cloak which is often used by bounty hunters. When draped around a victim, the stun cloak inflicts an electric charge across its area, incapacitating the victim.
A small, defensive weapons which is used to stun an opponent.
This Imperial target tracking construct is the lowest form of cyborg created. The bio-hound is a malleable blob of organic material which can change shape as the environment dictates. Impregnated in the flesh of the bio-hound are stimuli receptors which send data to a bio-comp interface. A bio-hound is "programmed" by providing it with a genetic clue from the intended target: skin cells and hair are the most common. The bio-hound is then let loose on the planet where the target exists, and it begins testing the environment for signs of the target. The bio-hound is semi-intelligent, and can change shape or solve simple puzzles to maintain its search. Once it finds its target, the bio-hound "tags" the target with a clear, odorless liquid tracer that can be easily detected by Imperial agents. Some bio-hounds are equipped with acidic poisons in place of the tracer liquid, making them deviously simple assassins.
Alliance Communications Encrypter
Developed for use by the Alliance, and known as the ACE, this device allowed Alliance field agents to communicate by heavily encoding their transmissions. They were used by those agents who were working with independent spacers or privateers, allowing them to use standard communications systems while maintaining their secrecy. Most ACE units were equipped with the Code Quasar protocol.
This eavesdropping device was used by criminals and spies during the height of the Galactic Civil War. Comprised of a button-sized listening device, a headset, and a receiver, the EAR-1 was a jet-black unit which stored away in an unobtrusive, small metal case. One of its major features was the use of a miniature damping unit, which prevented it from being detected. However, the EAR-1 had a very limited range, due in part of the damping unit, and the receiver had to be in a line-of-sight with the listening device.
This was the name used to describe the spies used the Old Republic Senate. Each No-Name was given an entirely new identity, complete with the appropriate text docs and security clearances. A casual investigation of a No-Name's identity revealed nothing unusual or incriminating. When an agent died, the identity wasoften retired from use.
this was a model of fifth-degree primary programming, low-intelligence labor droid produced by Arakyd for the Empire. They became known as "Death Star Droids" because huge numbers of RA-7 units were ordered as part of the droid pool for the first Death Star. Humanoid in shape, with insectile plating, they are commonly used by nobles and high-ranking officials. Despite the lack of capability, as exploited by Arakyd's competitors, the RA-7 nonetheless met every specification of the Empire, and was produced in huge numbers for the Empire. Many RA-7s were order by the Imperial Security Bureau, and reprogrammed to act as spies.