Covert Operations Gear


These physical augmentations follow all standard rules for implants as given in the Eclipse Phase core rulebook. Polarization and ultraviolet vision are also available in cybernetic form for synthmorphs.

Characters capable of seeing polarized light can view an aspect of light most humans only see weakly. Polarization reveals visual characteristics much in the way that color does for normal vision: it enhances contrast, foils camouflage, and helps to detect patterns and objects, particularly in light that is reflected off a shiny surface or scattered through the atmosphere or water. One major use of polarization is easier orientation in relation to polarized light sources (such as navigating underwater by the direction of sunlight). It also allows better detection of water surfaces, reflective surfaces, and certain patterns made in the water or on skin (which can be created by chameleon skin). Polarization vision can discriminate watery surfaces from mirages and better detect transparent objects. In game terms, polarization vision allows the character to ignore negative visual Perception modifiers for camouflage, transparency, or viewing underwater. At the gamemaster’s discretion, it may provide a bonus modifier for Perception Tests to detect patterns and Navigation Tests where orientation to light sources is beneficial. Octomorphs have natural polarization vision by default. [Low]


These modifications follow all of the standard rules for cybernetic implants as given in the Eclipse Phase core rulebook.

Implant masking is not a separate implant, but a modification to an existing one. Masked cybernetic implants are composed of electromagnetic- and acoustic-absorbent smart materials that are less likely to be detected by surveillance and security systems using radar, x-rays, or ultrasound. Apply a -30 modifier to any attempts to detect the implant. [Increase the masked implant’s cost by one category]

This implant enables a character with a biological hyperspectral enhanced sense (enhanced hearing, smell, or vision) to filter out certain wavelengths and inputs like an equivalent technological sensor device. Normally a person with enhanced vision would experience terahertz, infrared, standard visual, ultraviolet, and gamma ray frequencies all at once. With this implant, however, they can tune out some wavelengths, ignoring them while still seeing the others. The same effect applies to audio or olfactory input, and the filter also allows the user to isolate specific noises or smells, canceling out sensory clutter or focusing on a specific source. This implant must be acquired separately for each sense. [Low]


These implanted nanosystems follows all of the standard rules for nanoware as given in the Eclipse Phase core rulebook.

Gait masking nanosystems alter the bone density, muscle tone, and shape of the user’s feet and legs in minute but effective ways, altering their gait pattern just enough to avoid detection. The process of reconfiguration takes 20 minutes. Gait masking is illegal in many habitats. Gait masking can also be used to mimic an existing gait profile; apply a +30 modifier on Disguise Tests to fool gait biometric scanners. [Expensive]

This highly illegal system is a programmable version of the nanotat ID. Any new (fake) ID may be programmed in, and the nanotat may be reconfigured in seconds (1 Action Turn) to switch to another ID pattern in storage. This nanoware may not be configured for legal IDs unless they are actually legal or their encryption has been cracked. [Expensive]

This implanted nanobot system is designed to disguise a subject’s skeletal structure and create false sensor readings, either to avoid identification or to mimic an existing skeletal pattern. An existing pattern can only be mimicked if the character is of equivalent body mass and size. Altering the skeletal signature takes 20 minutes. Apply a -30 modifier to the scanner system’s Perception Test. [Expensive]


These alterations follow all of the standard rules for robotic enhancements given in the Eclipse Phase core rulebook and are only available to synthmorphs, vehicles, and bots.

This enhancement works much like the invisibility cloak (p. 316, EP). The shell is completely sealed within a layer of metamaterials with a negative refractive index, making it invisible to the microwave and ultraviolet wavelengths and everything in between. This modification can only be applied to shells on which the entire outer surface can be coated (ionic, roller, snake, thrust vector, walker, wheeled, winged). At the gamemaster’s discretion, this enhancement may not be applied to certain shells due to their configuration. Shells with this enhancement are effectively blinded, as they cannot use visual sensors (though they can view via meshed remote sensors), though they can also create temporary “windows” as with invisibility cloaks. This mod is not compatible with the radar absorbent, reduced signature, or radar invisibility mods. [Expensive]

The shell is constructed with materials that either pass, absorb, or trap radar and terahertz waves, reducing its sensor signature. Though sensor processing has improved significantly, radar absorbent materials can still provide some protection from detection. Apply a -20 modifier to detect the shell with radar and terahertz frequencies. This mod is compatible with the reduced signature mod. [Moderate]

This shell has been structurally modified to provide a much smaller radar cross-section. Shells with this modification have a very obvious streamlined, rounded and/or angular look, with no bulky pods or modules. External engines are instead incorporated into the frame. This enhancement is normally only applied to winged, rotorcraft, ionic, or thrust vector shells; apply a -30 modifier to detect these shells with radar and terahertz frequencies. For all other shells, a -10 modifier is applied. This modifier may not be applied to hoppers, tracked shells, or walkers while they are moving, as their mobility systems negate the advantage. The modifier from this enhancement is cumulative with the radar absorbent enhancement. [High]

This shell is coated with a layer of radar-transparent metamaterials with a negative refractive index. It is effectively invisible to radar waves; they simply bend around the shell as if it were not there. The shell cannot be detected by radar, but is visible at other frequencies. This mod is not compatible with the invisibility, radar absorbent, or reduced signature mods, nor may it be used in conjunction with an invisibility cloak. Shells with this mod cannot detect radar themselves. [Expensive]


Two new communications tools are available.

This device allows the user to transmit audio in a beam, so that the directed sound is only audible at the targeted position. When pointed at a person, the target will hear the transmission as if the sound were in their own head. Used commonly for advertising, museum displays, art galleries, and similar purposes, portable hypersonic beam devices also enable people to communicate without fear of eavesdropping and without having to rely on insecure mesh transmissions. The drawback to hypersonic beams is that they are line of sight and will be disrupted by anyone or anything passing through them, so they are ideal for close quarters or non-busy environments. Hypersonic communicators are small devices. They do not work in vacuum, but in atmosphere the beam is unaffected by nearby loud noises. [Low]


These technologies include a number of countersurveillance tools employed by people who have something to hide or simply seek privacy, in addition to the usual spies, agents, and saboteurs.

This medium-sized but portable sensor system features an array of microphones and a swivel-mounted camera and laser rangefinder. When activated, the system detects the audio signature of kinetic weapons fire (or another programmed sound signature) and attempts to focus the camera and rangefinder on the source. In the case of standard firearms (or seekers or similar projectiles), the system detects the muzzle blast, the shock wave of the incoming bullets, and the difference in timing between them in order to triangulate the originating position. The location of the detected source, including the camera visual feed and range data, are fed into a meshed tacnet. The spotter’s AI has Perception 40 and receives a +10 modifier for detecting sounds, +30 in the case of firearms (but not railguns), seekers, etc. The system can hone in on a repeating audio source; apply a +10 cumulative modifier for each additional emission/attack. [Moderate]

This small device is quite similar to a splash grenade (p. 341, EP), and may in fact be equipped and thrown like one. Its contents consist of nothing more than a mass of skin flakes and similar biological debris sampled from a thousand different biomorphs. The intent is to spread this material thoroughly over an area, effectively contaminating it for any purposes of collecting forensic DNA evidence. [Moderate]

A gray box is a simple wireless interface with its own power supply. It is micro-sized, about the size of a grape, with a set of smart universal ports and a nondescript, matte-gray housing. When attached to an existing device, it allows that device to be interfaced via a wireless connection. Gray boxes are used by infiltration specialists to add wireless interfaces to air-gapped wired networks or to objects, such as airlocks, that are designed to operate without them. Installing a gray box is a Task Action with a timeframe of 2 minutes (in addition to any Hardware Tests required to gain access to the target object) and requires appropriate tools. Gray boxes normally operate in a passive mode, listening for signals from their operators but not emitting any signal of their own in order to avoid detection. Once a gray box has been activated, however, it will emit active signals until deactivated again. Gray boxes automatically stealth their signals (-30 on Interfacing Tests to detect them). How hard a gray box is to discover is left to the gamemaster’s discretion and possibly the ingenuity of the person who placed it. Normal maintenance routines will usually turn them up over the course of time. Perception or Hardware: Electronics Tests should be given to technicians who regularly check up on a piece of gear in which a gray box has been installed. The size of the gray box, however, makes it difficult to visually spot (-30 modifier). In passive mode, they are not normally subject to detection, but in active mode, they may be found with Interfacing Tests (p. 251, EP). It is also possible that a security AI or hacker who is watching over an object or network may detect a gray box if someone uses it to intrude on the system and triggers an alert or if they happen to be auditing the system and detect an anomalous port connection. [Moderate]

A more offensive version of the dazzler (p. 316, EP), the crazer does not simply dazzle and overload the cameras it detects. It attempts to crater, pit, and scratch their lenses, effectively ruining their optic systems. Once activated, the crazer takes one Action Turn to detect lenses, then begins systematically zapping them. Stationary cameras are targeted first. For combat situations, treat the crazer as if it has Beam Weapons 40, Initiative 5, and a Speed of 3. It will use its actions to aim; modifiers for laser sights and called shots cancel out. Its laser fires in SA mode. Though it only inflicts 2 DV with its attacks, targeted optics will suffer -30 on Perception Tests after the first hit and will be blind after the second hit. These effects last until repaired. [High]

The lens spotter is a less-intrusive version of the dazzler (p. 316, EP). It simply maps out all of the camera lenses in an area, noting their position and likely area of coverage, without blasting them with dazzling lasers. This system is used to unobtrusively detect the surveillance coverage in a given area so that a route map may be generated to avoid camera fields of view. It is also used by military and security forces to detect snipers or enemy spotters before they attack. [Low]

Privacy pods are portable self-assembling tent-like structures used to create secure rooms protected from eavesdropping. Privacy pods are effectively soundproofed Faraday cages, blocking all electromagnetic emissions. They feature a built-in guardian nanoswarm hive that watches for and counteracts any smart dust or other nanosurveillance systems. A privacy pod takes only 3 Action Turns to erect itself and supplies breathable air to the occupants. It features an airlock/ scanning chamber with a built-in bug zapper (p. 291, EP). A repair nanohive monitors the pod’s perimeter for any attempts to penetrate the walls. [High]

This cloak works like the invisibility cloak (p. 316, EP), except that it bends radar frequencies and makes the wearer invisible to radar sensors. [High]

Also known as a privacy cloak or a “Gabby Coat,” after the designer, Kalim Ghabil, a shroud is a whole-body smart-fabric covering, similar to a burkha, designed to provide as much anonymity as possible to the wearer. Electrostatic elements randomly stiffen, mold, and relax to mask gait analysis, foot covers change shape and redistribute weight to throw biometric analysis, and the entire garment emits randomly shifting heat patterns, pheromones, and odorants and broadcasts white noise to mask sounds and conversations from eavesdropping. The person inside cannot be detected with normal vision; the shroud blocks t-ray, x-ray, and infrared scanners (note that the shroud does not hide from view like an invisibility cloak; these scanners detect the shroud’s presence quite easily, but they cannot get a reading on what is underneath). Gait analysis will also fail to recognize the shrouded person. An electrical field may be activated in the shroud’s surface to block all wireless radio signals; this cuts the wearer off from the mesh, but also defeats any attempts to wirelessly track them and silences any bugs or tracking devices they may unknowingly carry. Shrouds are an acceptable form of personal privacy in some habitats, but are considered unusual or may even be illegal in others. [High]


This technology follows the rules for nanoswarms given on p. 328, EP.

This illegal nanoswarm treatment is specifically designed to penetrate the fingertips of morphs and eradicate all signs of the nanotat ID it carries. Erasing a nanotat ID takes about 5 minutes and itches like crazy. Though usually applied to a specific person as a treatment, criminals and terrorists have sometimes deployed nanotat-erasing nanoswarms in public areas, surreptitiously erasing the IDs from unsuspecting people as a means of confusing security forces engaged in an ego hunt. [Expensive]

Covert Operations Gear

Eclipse Phase | AUSTIN, TEXAS | 2015-2019 A.D. FireWall