Skip to content

Tech Equipment & Tools

Tech Equipment & Tools

General-purpose gear. All [TECH] items require a power cell (℃80 each; lasts one session of normal use).

LGT Multi-Scanner | Restricted (℃6,000) [TECH]

The Signature Focus of the Asset Auditor (see AX.GIL.07.01). Handheld device combining standard technical scanning with Axiomatic resonance detection. +1D to Technical rolls for property assessment, security system analysis, and contract-violation evidence collection. Passively detects active Covenant presence in scanned area.

High-Spec NVS Smartphone | Standard (℃1,200) [TECH]

The Signature Focus of the NVS Syndicate Fixer (see AX.GIL.07.05). Current-gen consumer device with NVS-exclusive app stack: real-time market analytics, org-contact directories, Entropy Signature monitoring, and a licensed Hearth-Net bridge. +1D to Persuade rolls when used to provide real-time financial data, contact verification, or deal-closing evidence. Cannot access Dead Zones.

Hearth-Net Deck | Controlled (HIA Issue) [TECH]

The Signature Focus of the HIA Signal Scryer (see AX.GIL.07.04). Dedicated dark-signal monitoring device tuned to Halfling-standard encryption. +1D to Notice rolls targeting encrypted or air-gapped communications. Passively monitors all active signal traffic within Near range.

Axiom-Stress Gauge | Restricted (℃3,000) [TECH]

The Signature Focus of the NVS Kinetic Auditor (see AX.GIL.07.05). Reads localized Entropy levels and flags areas approaching Kinetic Debt threshold. +1D to Attunement rolls for environmental Entropy assessment. Alerts user when an area exceeds safe operational Entropy levels.

Field Medical Kit | Standard (℃400)

A comprehensive trauma kit with Axiomatic-stabilized coagulants and compound-Stim applicators. Functions as a Healer's Kit (+2D to Medicine rolls; degrades −1D per use; depleted at 0). Additionally contains one Stim-Pack (see Consumables).

Encrypted Comms Unit | Restricted (℃2,000) [TECH]

Standard-band encrypted radio and data terminal. Technical decryption requires Threshold 3; with NTC's cooperation, Threshold 2. HIA Comms-Jewelry (above) uses a superior encryption layer. Pairs with team members' units for encrypted voice and text at Far range.

Portable Signal Jammer | Restricted (℃3,500) [TECH]

Disrupts all electronic communications and NTC-network signals within Close range. Affects all parties equally, the operator's communications are also jammed. Requires Primary Action to activate; emits a detectable EM signature. Note: does not affect Harmonic Tradition use, which operates outside standard EM spectrum.

Long-Range Survey Drone | Restricted (℃8,000) [TECH]

The Signature Focus of the NVS Venture Scout (see AX.GIL.07.05). Autonomous aerial survey platform. +1D to Notice rolls for aerial reconnaissance. Transmits real-time video and Entropy-signature data at Far range. Detectable by NTC-registered sensor networks.

Silent-Running Drone / Vehicle Package | Controlled (HIA Issue) [TECH]

Marginal-Harmonics-shielded transport or drone package. The Signature Focus of the HIA Logistics Ghost (see AX.GIL.07.04). Vehicle/drone size varies. Passive: radar, sonar, and Axiomatic detection systems operate at Disadvantage to detect this vehicle. +1D to Pilot rolls for evasion and covert ingress.

The "Graft" Rig (Multi-Tool) | Restricted (℃5,500) [TECH]

The Signature Focus of the NVS Market Disruptor (see AX.GIL.07.05). A multi-function technical workstation in a hardened case: hardware reverse-engineering tools, Legal-IP stripping software, rapid-rebranding design suite. +1D to Technical rolls for reverse-engineering, rebranding, and mass-market adaptation of existing technology. Any device processed through the Graft Rig loses its NTC registration metadata, useful and highly illegal.

The Master-Compiler | Classified (NTC Issue)

The Signature Focus of the NTC Axiom Architect (see AX.GIL.07.03). A full-size terminal the Architect carries in a reinforced case, part compiler, part laboratory instrument, part legal filing system. Allows Axiom Architects to write and submit new Logic-Axiom proposals to the NTC governing mesh. +2D to Logic-Speak rolls for base-code creation (new Technomantic applications, not operational commands). Possession of a Master-Compiler outside NTC premises without explicit authorization is a serious institutional violation.

Encryption-Key Ring | Restricted (℃4,000)

The Signature Focus of the NTC Network Fixer (see AX.GIL.07.03). A physical keyring of biometrically-coded hardware tokens, each representing active SaaS contract authority with a different client org. +1D to Persuade rolls in contract negotiation contexts when the relevant client's token is present. The tokens are legally binding contract instruments, losing one creates a Juris-Axiomatic complication.