Miscellaneous

A Lot of Money
This is a lot of money.
Acceleration Gate Authentication Matrix
This device handles timestamps and user ID validation for acceleration gates. If this part is missing or otherwise broke, the gate will refuse to activate.
Accounting Records
It appears as if the only thing designed to survive the explosion of Rayle Melania's vessel was his accounting log, perhaps so it could later be recovered by his Serpentis colleagues. Although heavily encrypted, fragments of data are decipherable. Even from what little is readable, it is clear that Melania handles the shifting of his narcotic goods personally. According to one transaction log, he made almost 300 individual deliveries across seven regions of New Eden, all in the space of a single day.
Address #298 Audio Fragment
Unmistakably the voice of Sansha Kuvakei, this audio fragment captures a brief glimpse of a low-key speech he made over a century ago. Dating from the height of his fame, Kuvakei's speech is riddled with self-indulgent rhetoric and delusions of grandeur. As the speech's intensity reaches its peak, his final line “I am the answer” loops repeatedly for a few minutes before the process begins all over again.
Advisory Notes
Found among the wreckage of Serpentis Lieutenant Rautte Viriette's vessel, these notes offer a glimpse into her recent scientific pursuits. From what little is decipherable, Viriette seems to be advising Serpentis Inquest scientists on various methods of production efficiency, all of which appear to be applied to the manufacture of Drop boosters. Although there is no evidence directly linking any of her previous Poteque research to her current work with the Serpentis, it is clear that the methods she has learned in the last few decades are being put to good use.
AEGIS Covert Operations Reports
This ultra-heavily encrypted database contains information pertaining to ongoing covert operations being run by AEGIS special forces and infiltration agents. The remit of AEGIS is broad and still gives it wide latitude to investigate threats to interstellar shipping, space infrastructure and planetary defenses. The organization would certainly wish to keep completely secret its various covert commando units and espionage agents. The encryption on this database may never be broken but such is the value of the information contained within it many criminal organizations would pay a hefty price simply to have the opportunity of cracking it.
AEGIS Fortification Schematics
These are heavily encrypted databases that contain all the necessary data for virtual simulation of various AEGIS fortification designs. These designs are in use on many planets and orbital installations in various configurations as a result of EDENCOM fortification program that AEGIS took a lead in planning and implementing during the Triglavian Invasions. Although encrypted in such a way that pirates and criminals would need to devote significant resources to extracting the data, the value of these schematics is rather high.
AEGIS Personnel File Backups
These are backups of various AEGIS personnel files and are not particularly heavily encrypted. Outlaws and criminals can put accurate personnel data to many uses. Even the small details are potentially highly relevant to those who are interested in spoofing identities or simply putting pressure on select personnel. Standard encryption is being used but pirate organizations will be happy to devote resources to extracting data that has many uses. These backups will likely fetch a decent price on the black market.
AEGIS Security Patrol Reports
These databases contain encrypted patrol reports describing the day-to-day activities of various AEGIS security patrol units. While the amount of information is quite high, much of it is likely to be tedious routine patrol logs, with precious view truly valuable nuggets of information included. As the data is encrypted it is also of less value to outlaws who will need to go to the effort of decrypting without knowing if there's anything here other than the banal musings of AEGIS security officers. Still, all such data has some use so pirates will probably buy this.
Aerogel Counteragent
Refrigerated secure cargo containers containing aerogel infused with dormant prototype anti-nanites. These containers have been specially modified with the latest security encryption protocols, to better ensure that any Gallente saboteurs will be unable to access and tamper with this critical cargo.
Aidonis Honorary Fellow Medallion
The Aidonis Honorary Fellow Medallion is a companion prize to the Aidonis Peace Prize. Ten of these medallions are given out over the course of each year, each time to individuals who have made significant strides in promoting peace and fairness in intergalactic relations.
AIMEDs
On most stations, robotic AI Medical Doctors (AIMEDs, more commonly known as "AI Docs" or just "AIDs") are much more common than human medical practitioners, and much more affordable.
Air Show Entrance Badge
This badge signifies that the owner is qualified to participate in an air show.
Alliance Tournament Bronze Medal
The great Alliance Tournament bronze medal. No capsuleer aims for it, and no one glorifies in it. Some call its holders the worst of the best, but there are victories to be gained even in loss. While glory may elude the holder, honor and respect do not.
Alliance Tournament Cup
Passed on to the winners after every tournament, the magnificent Alliance Tournament cup is perhaps the most coveted prize in New Eden. Glory and fame await the holders, who had to defeat the competition posed by the elite combat teams of their opponents in the one of the most gruelling, bloody and exciting tournaments in existence. Band of Brothers Year 107 - 1st Alliance Tournament Winners Band of Brothers Year 107 - 2nd Alliance Tournament Winners Band of Brothers Year 108 - 3rd Alliance Tournament Winners HUN Reloaded Year 109 - 4th Alliance Tournament Winners Ev0ke Year 110 - 5th Alliance Tournament Winners Pandemic Legion Year 111 - 6th Alliance Tournament Winners Pandemic Legion Year 111 - 7th Alliance Tournament Winners Pandemic Legion Year 112 - 8th Alliance Tournament Winners HYDRA RELOADED Year 113 - 9th Alliance Tournament Winners Verge of Collapse Year 114 - 10th Alliance Tournament Winners Pandemic Legion Year 115 - 11th Alliance Tournament Winners The Camel Empire Year 116 - 12th Alliance Tournament Winners Pandemic Legion Year 117 - 13th Alliance Tournament Winners The Tuskers Co. Year 118 - 14th Alliance Tournament Winners VYDRA RELOLDED Year 119 - 15th Alliance Tournament Winners VYDRA RELOLDED Year 120 - 16th Alliance Tournament Winners
Alliance Tournament Gold Medal
Awarded to the capsuleers who fought and defeated their opponents in a series of gruelling and murderous fights to claim their place as winners of the great Alliance Tournament. The holder of this Alliance Tournament medal can truly claim to be among the true elite, the best of the best.
Alliance Tournament Silver Medal
The great Alliance Tournament silver medal. So close, and yet so far. Second place in the Alliance Tournament signifies many things to many people. It does, however, stand for one undeniable truth: the holder kicked several metric tons of arse to get it.
Alpha EGDLI3 Boosters Tier 1
Alpha EGDLI3 Boosters Tier 2
Alpha EGDLI3 Boosters Tier 3
Alpha EGDLI3 Boosters Tier 4
Alpha EGDLI3 Filaments Tier 1
Alpha EGDLI3 Filaments Tier 2
Alpha EGDLI3 Filaments Tier 3
Alpha EGDLI3 Skillpoints Tier 1
Alpha EGDLI3 Skillpoints Tier 2
Alpha EGDLI3 Skillpoints Tier 3
Alpha EGDLI3 Skillpoints Tier 4
Alpha EGDLI3 Skins Tier 1
Alpha EGDLI3 Skins Tier 2
Alpha EGDLI3 Skins Tier 3
Alpha EGDLI3 Skins Tier 4
Altered Datacore - Mechanical Engineering
This datacore has been altered and thus rendered useless for manufacturing purposes. It has value only as a reference tool.
Amarr Empire Transaction And Salary Logs
These reports hold information on recent transaction and salary logs from a corporation within the Amarr Empire. They are very sought after by pirates, who use the often sensitive information held within for various purposes.
Amarr KIU-1 Nexus Chip
This small data chip stores the key elements of a ship's artificial intelligence system, and is used primarily for controlling the vessel's autonomous functions. This particular chip has been modified by top Viziam scientists for the Imperial Navy, made to be of better quality than what is available on the open market. The KIU-1 chip is designed for cruiser class vessels.
Amarr Loyalty Token
These tokens are given to capsuleers who have contributed to the security and prosperity of the Amarr Empire. They can be traded on the market for ISK in most Amarr stations.
Amarr MIY-1 Nexus Chip
This small data chip stores the key elements of a ship's artificial intelligence system, and is used primarily for controlling the vessel's autonomous functions. This particular chip has been modified by top Viziam scientists for the Imperial Navy, made to be of better quality than what is available on the open market. The MIY-1 chip is designed for frigate class vessels.
Amarr Religious Holoreels
These holoreels contain a recent speech by a regional governor, which provides her views on the state of the Empire as well as other important religious discussions.
Amarr TIL-1 Nexus Chip
This small data chip stores the key elements of a ship's artificial intelligence system, and is used primarily for controlling the vessel's autonomous functions. This particular chip has been modified by top Viziam scientists for the Imperial Navy, made to be of better quality than what is available on the open market. The TIL-1 chip is designed for battleship class vessels.
Amarr TIL-1A Nexus Chips
The Amarr TIL-1A Nexus Chip was once used to store the key elements of a ship's artificial intelligence system, as well as for controlling some of the vessel's autonomous functions. In addition, the TIL-1A series chip had been modified by top Viziam scientists for the Imperial Navy, making it far more resilient to damage and harsh environmental conditions than standard chips of its kind. The TIL-1A chip, specifically, was designed for front-line Amarr battleship-class vessels where it saw widespread use for almost a decade before being replaced by newer technologies. As a result, very few examples of this remain outside Amarr military historical archives, where they are often highly valued for the data they contain on early naval operations.
Amarr Training Certification Results
These complicated data sheets may mean little to the layman's eye, but can prove valuable in the right hands.
Amarrian Wheat
Cereal grasses have been localized on hundreds of worlds. The grains of the wheat plant make a solid foundation for the production of foodstuffs within empire space. Amarrian Wheat is known for its purity, and has reputedly never been tampered with by genetic engineering.
Ammatar Transaction and salary logs
These reports hold information on recent transaction and salary logs from an Ammatar corporation. They are very sought after by pirates, who use the often sensitive information held within for various purposes.
Amphere 9
A synthetic drug long banned by the Empires, Amphere 9 can still be found in the border regions and outlawed territories of New Eden. The drug contains bits of nitrazepam, amphetamine, sodium pentothal, and synthetically rendered dopamine, plus a number of other potentially lethal substances. There is still a thriving black market for the pill, which many consider to be a dirtier version of Vitoc, keeping workers sedate and stable yet remarkably open to suggestion by others. The drug is especially effective on children under the age of twelve with no serious physical side effects, though no conclusive medical study has been conducted to support this claim.
Ancient Amarrian Relic
This relic from Old Amarr is of great value to Lord Horowan, patriarch of one of the oldest noble families in the Empire and liegeman of House Tash-Murkon.
Ancient Painblade
This antique weapon is the traditional precursor to the modern day's Painblade. In ancient times, Jin-Mei soldiers riding to the field used to plunge their swords into filth, in the well-founded expectation that the wounds they inflicted would cause infection and rot. This nasty tactic was given new life when royal technicians (in those days referred to as Nuyin, something akin to "wizards") developed a blade whose surface, when unsheathed, swiftly attracted and encouraged bacterial growth, giving life to all kinds of deadly filth. Nowadays, these items are mostly used in theatrical plays, and anyone who gets within a hand's reach of their swinging blades usually spends half an act wailing about it before finally dropping dead.
Angel Cargo Concealment Unit Remains
This appears to be the remains of a piece of high-tech black market smuggling equipment, the design of which is thought to have originated from the Satori-Horigu Epistemics corporation. It can electronically conceal contraband items stored within and digitally alter their signatures making them appear as regular, mundane, legal cargo - rendering the illicit contents undetectable by even the most powerful ship and cargo scanners employed by customs and law enforcement agencies in the cluster. Attempting to reverse engineer this item could lead to several clues as to what was smuggled within and how the device operates, although the high-level of encryption and damage means that only a specialized facility is likely to find any value or success in accomplishing this. The Amarr Empire will reward Capsuleers who bring this item to their Imperial Counter-Insurgency Outpost located in the Mehatoor solarsystem. The Minmatar Republic will reward Capsuleers who bring this item to their Republic Counter-Insurgency Outpost located in the Amo solarsystem.
Angel Cartel 'Salvage' Ledger
This "Salvage" Ledger includes a list of locations and targets of interest to the Angel Cartel's ruthless "salvage gangs". The Cartel definition of "salvage" is extremely loose and the list could be of immense value if it can be analyzed quickly, allowing law enforcement to know where in advance the Angels might strike. However, such ledgers often feature several decoy entries and it is written almost entirely in a cryptolect understood by very few outside the specific Cartel salvage gang assigned to the targets it details, as such, only a specialized facility is likely to find useful intelligence from this before the acts are carried out. The Amarr Empire will reward Capsuleers who bring this item to their Imperial Counter-Insurgency Outpost located in the Mehatoor solarsystem. The Minmatar Republic will reward Capsuleers who bring this item to their Republic Counter-Insurgency Outpost located in the Amo solarsystem.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Data Fragment
This fragmentary data has been recovered from an Angel Cartel communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Angel Cartel Plans
Angel Insurgency Data Sequence
This data sequence recovered from an Angel Pirate ship could be host to a whole trove of valuable information that would be of interest to the Amarr Empire or Minmatar Republic in securing their borders and launching counter-attacks against the pirate insurgents. The data is in fragmentary form and hundreds, if not thousands, of sequences would be required to break the code, as such, only a specialized facility is likely to find any value or success in decrypting this. The Amarr Empire will reward Capsuleers who bring this item to their Imperial Counter-Insurgency Outpost located in the Mehatoor solarsystem. The Minmatar Republic will reward Capsuleers who bring this item to their Republic Counter-Insurgency Outpost located in the Amo solarsystem.
Antique Vheriokor Statue
This statue represents a serpentine figure from ancient Vheriokor mythology; whether it bodes good or ill depends on its origin and the mindset of its viewer. Regardless, originals are increasingly rare these days.
Antiviral Drugs
Antiviral Drugs are in constant demand everywhere and new, more potent versions, are always made available to counter new viral strains.
Archives Passkey
These electronic devices are commonly used as long-range digital passkeys, allowing access to secure facilities directly from space.
Ardorele Heirloom
Found drifting in a container amongst the wreckage of her ship, Guristas Captain Isoryn Ardorele's personal possessions tell a tale of devastating loss. Federation Navy medals rewarding long years of service, hand paintings made by her late daughter, a wedding ring – all mementos of a past destroyed by Caldari thugs. With such a constant and effective reminder of her painful history, it is little wonder that Ardorele manages to sustain her murderous rage towards the Caldari.
Arms Cache
Personal weapons and armaments, used both for warfare and personal security.
Assault on Caldari Prime Ribbon
This ribbon was awarded to the righteous capsuleers who most ably answered the call of duty and assaulted the Titan in orbit of Caldari Prime in YC115. Your efforts to safeguard the lives of Federal citizens will always be remembered. "The savages have murdered the only ones with any sense among them. They lit the fire, now they will burn in it." - Senator Fronte Belliare, Morning of Reasoning. CE 23155.2.10
Autrech Voucher
This is a candidate voucher for Eman Autrech, used to determine the biggest supporters of this particular candidate for selecting candidate emissaries.
Badge of Prophet Kuria
The Badge of Prophet Kuria is given to those who show dedication and loyalty to the Amarr Empire. In recent years it has been given to capsuleers who assist the Empire in tasks of great importance. “Though dissuaded, I came. Though perilous, I served. Though beset, I persevered. Though denied, I believed.” - The Scriptures, Prophet Kuria 12:18
Badly Mangled Components
This rather large pile of obviously-broken components stands testament to the follies of reprocessing an item without really understanding how it fits together.
Barrels of Fertilizer
Fertilizer is particularly valued on agricultural worlds, where there is constant supply for all commodities that boost export value.
Barrels of Soil
Fertile soil rich with nutrients is very sought after by agricultural corporations and colonists on worlds with short biological history.
Barrels of Water
Water is one of the basic conditional elements of human survival. Most worlds have this compound in relative short supply and hence must rely on starship freight.
Battery Cartridge
This battery cartridge carries a heavy charge of electric power, intended as a spare pool of energy in distress.
Biomechanical Interface Data
This recovered data appears to provide a framework for a novel biomechanical interface involving mutagenic adaptation of disparate sets of genetic data to establish a neural lace using fine control of nanites guided by the user's own genetic structure.
Blaque Voucher
This is a candidate voucher for Mentas Blaque, used to determine the biggest supporters of this particular candidate for selecting candidate emissaries.
Blood Drop
Tiny drop of oxygen-rich blood, red and juicy.
Blood Obsidian Orb
The Church of the Obsidian has kept this relic for nearly four hundred years, though its original meaning was never truly discovered. The orb is carved from blood obsidian, the same material found in the head of the Wildfire Khumaak. The orb's surface is completely smooth, though it is lighter than it appears.
Blue Paradise
Blue Paradise, also known as “Beep,” is a mild narcotic engineered by Amarr pharmaceutical scientists specifically for use by slave laborers within the Empire. Users of Blue Paradise report feelings of mild euphoria, contentment, relaxation, and generalize pleasure as the primary effects of this drug. These effects typically last between three to five hours, after which the user can be expected to fall into a sound sleep, if taken prior to that user's normal sleep cycle. Furthermore, there have been no significant side effects reported from repeat and prolonged use, making Blue Paradise an extremely promising “reward” for slave laborers. Recreational use of Blue Paradise has not yet been reported, given the limited nature of its distribution only to select Amarr slave labor operations, and no evidence yet exists of addiction to this drug, if administered in a controlled environment.
Bone Splinter
Tiny fragment of a bone, too small to be easily discernable as to what part of the body it belongs to. Razor-sharp.
Book of St. Arzad
This book is in tatters, and some of its page are worn or missing, but much of its contents is still readable. The book describes the life of Arzad Hamri, an Amarr Holder on Starkman Prime. It is supposedly a relic from the Starkmanir Rebellion.
Boundless Creations Security Codes
Boundless Creations Security Codes.
Broken Broadcast Node
By integrating transcranial microcontrollers into a circuit made from synthetic synapses, the broadcast node is able to communicate directly with various station functions and with negligible signal loss and latency. The addition of computerized guidance systems, each running independent navigation system software routines, allows a single node to coordinate starship docking procedures, drone operations, and even station defenses.
Broken Integrity Response Drones
Hull breaches are a constant, serious threat during space travel, as well as a dangerous reality to orbital stations, which are too massive to avoid incoming objects. Integrity response drones help mitigate that threat by providing the automated, immediate application of sealants to any detected impact or pressure fracture in the structure they patrol.
Broken Mining Equipment
This large container is fitted with a password-protected security lock. It is filled with broken parts needed to rebuild manual surface-mining drills.
Broken Nano-Factory
Only the highly advanced Ukomi superconductor can be rendered small enough for use in nano-factories, microscopic devices programmed to absorb and recycle ambient material into useful matter. Each factory is built from reactive metals, ensuring that they interact properly – or not at all – with their environment, while a mote of industrial explosive automatically destroys them when they have completed their task.
Broken Organic Mortar Applicators
While nanites are ideal for many forms of construction, sealing joints between large structural bulkheads is a job best left to organic mortar, a thick gel that actively permeates every microscopic gap between two parts. Due to the aggressive nature of the genetically engineered bacteria that intelligently guides into place the hardening condensate material, this paste is extremely hazardous to humans and must be applied by robots.
Broken Recursive Computing Module
Not all automated functions are delicate or complicated enough to warrant advanced computer hardware; relatively mundane tasks are best when assigned to an RCM bank. These sturdy, reliable processing units are able to effectively handle most of the day-to-day operations of stations, starships, and stargates.
Broken Self-Harmonizing Power Core
With camera drones diligently monitoring the temperature, radioactivity, and electrical output of these advanced nuclear reactors, instant adjustments can be made to a dynamic, adaptive layer of hermetic membranes, which keeps the power core functioning safely at maximum capacity, with no human attention required whatsoever.
Broken Sterile Conduits
Sustaining diverse populations of station inhabitants – many of whom come from different worlds with different ecologies – was a medical nightmare until the development of sterile conduits. Each length of flexible, self-repairing tube is powered by breaking down the chemical energy in the water they convey, which itself is laced with smart vaccines able to identify and destroy almost any known antigen.
Broken Wetware Mainframe
So advanced and energy-demanding are wetware mainframes that they require vehicle-scale power cores and the constant attention of maintenance personnel. When operating at peak performance levels, nothing in New Eden can match the raw computing power of these machines, from calculating warp coordinates to administrating the core functions of an entire space station.
Bronze Order of the Mountain
The Bronze Order of the Mountain is an ancient Caldari establishment, dating back to the Raata Empire. Those who did great service were inducted into its ranks and initiated into the rites of Mountain Wind. While it has lost the mystic aspects over the centuries, it remains a high honor to be inducted into its ranks. “Only I can make myself fail.” - Caldari proverb
Bronze Sculpture
Bronze Sculpture of president Souro Foiritan.
Brutor Tribe Roster
These data logs, precious to any Minmatar but especially to a member of the Brutor Tribe, hold information on the history and lineage of that tribe's members from over a century ago.
Caldari AZ-1 Nexus Chip
This small data chip stores the key elements of a ship's artificial intelligence system, and is used primarily for controlling the vessel's autonomous functions. This particular chip has been modified by top Kaalakiota scientists for the Caldari Navy, made to be of better quality than what is available on the open market. The AZ-1 chip is designed for battleship class vessels.
Caldari BY-1 Nexus Chip
This small data chip stores the key elements of a ship's artificial intelligence system, and is used primarily for controlling the vessel's autonomous functions. This particular chip has been modified by top Kaalakiota scientists for the Caldari Navy, made to be of better quality than what is available on the open market. The BY-1 chip is designed for frigate class vessels.
Caldari CU-1 Nexus Chip
This small data chip stores the key elements of a ship's artificial intelligence system, and is used primarily for controlling the vessel's autonomous functions. This particular chip has been modified by top Kaalakiota scientists for the Caldari Navy, made to be of better quality than what is available on the open market. The CU-1 chip is designed for cruiser class vessels.
Caldari Loyalty Token
These tokens are given to capsuleers who have contributed to the security and prosperity of the Caldari State. They can be traded on the market for ISK in most Caldari stations.
Caldari Navy Overlay Transponder
This transponder, taken from Kori's operative, is your ticket to the rendezvous with the Navy. Barely functional after the destruction of the operative's ship, it contains identification data that will scramble security frequencies, tricking them into identifying your ship as Eroma's.
Caldari State Transaction And Salary Logs
These reports hold information on recent transaction and salary logs from a corporation within the Caldari State. They are very sought after by pirates, who use the often sensitive information held within for various purposes.
Caldari Traitor's DNA
DNA samples are any of various nucleic acids that are usually the molecular basis of heredity, are localized especially in cell nuclei, and are constructed of a double helix held together by hydrogen bonds between purine and pyrimidine bases which project inward from two chains containing alternate links of deoxyribose and phosphate.
Capital Ship Design - "Dictator"
The Caldari Navy have purportedly worked on this project for the past decade, but lack of funding has kept this new type of capital ship from reaching the pre-production stage. These designs are deemed highly classified and have been kept under wraps in this remote station.
Capsule Subsystem Holostorage EH-CN-J44-001
Although battered and scorched by the destruction of the capsule it was installed in, this subsystem holostorage device seems to retain some recoverable and relatively easily decrypted data: "–ide note: picked up some more chatter on ancillary projects other than Firebird. The general idea seems to be setting up even more decentralized design groups. State got fat and slow in the last decade but seems they're finally getting their heads out of their arses. This guy Saraki is no fool. We'd do well to keep a close ey–"
Capsule Subsystem Holostorage EH-CN-J44-002
Although battered and scorched by the destruction of the capsule it was installed in, this subsystem holostorage device seems to retain some recoverable and relatively easily decrypted data: "–ntry to previous drop. Anyway, I also heard from the Peacock. He wants to meet again. That's the second time this week. I don't mind that he changes up the routine. It's good opsec but most of the time he just wants to bloody well gossip about side stuff. Mind you, this dirt on that SARO, guy, Ov–"
Capsule Subsystem Holostorage EH-CN-J44-003
Although battered and scorched by the destruction of the capsule it was installed in, this subsystem holostorage device seems to retain some recoverable and relatively easily decrypted data: "–eard from one of the cell members based in the Amarr Trade Registry offices. Passed on some information about EDENCOM spending priorities during the invasion he'd dug up while sifting some secure archives. Crazy those Amarr. They document everything. Three times over. And then another agency does it all over again. I mean the information doesn't really surprise me. We all knew that EDENCOM is an Amarr pl–"
Capsule Subsystem Holostorage EH-CN-J44-004
Although battered and scorched by the destruction of the capsule it was installed in, this subsystem holostorage device seems to retain some recoverable and relatively easily decrypted data: "–ade a new connect with a Serpentis subcontractor operating in 4-4 undercroft sector 97. I hate going down there. It's worse than the docks district. Worse even than the engineering subcore residences. It's pretty much a sump for everything filthy and completely messed up on this damned station. Had to wear a pseudoface and combat rig, of course. Serp guy was packing a bloody nanowire pistol. Don't really blam–"
Capsule Subsystem Holostorage EH-CN-J44-005
Although battered and scorched by the destruction of the capsule it was installed in, this subsystem holostorage device seems to retain some recoverable and relatively easily decrypted data: "–ound another monitoring routine installed in the block's subnet. Sniffer and heuristics engine almost ignored it. Pretty sophisticated camo for general residence block monitoring but could be they don't want to piss off all the brass and tech-heads living in this dump. Don't think this indicates a problem with cell opsec. Standard CalNav paranoia I think. The navy factions are still tearing at one another over the invas –"
Capsule Subsystem Holostorage EH-CN-J44-006
Although battered and scorched by the destruction of the capsule it was installed in, this subsystem holostorage device seems to retain some recoverable and relatively easily decrypted data: "–erp contact came through with something interesting but it's got nothing to do with Firebird. Seems Upwell and PKN might be playing a double game behind the scenes when it comes to the Intaki. Hard to believe that old man Mordu would put up with something like that but word is he's got new obsessions these days. I believe anything of the Forest Faction and Upwell's so distributed and murky any number of the players could be up to something. Could be useful info down the lin–"
Capsule Subsystem Holostorage EH-CN-J44-007
Although battered and scorched by the destruction of the capsule it was installed in, this subsystem holostorage device seems to retain some recoverable and relatively easily decrypted data: "–eems the monitoring routine wasn't CalNav after all. Sparks took a look at the data I'd sniffed off the thing and she reckons it's Archive K. That's all we need. Maybe the Autaris raid riled them up. Maybe they've got their hooks into Saraki already. Hell, maybe Saraki's their man. We need to be ca–"
Capsule Subsystem Holostorage EH-CN-J44-008
Although battered and scorched by the destruction of the capsule it was installed in, this subsystem holostorage device seems to retain some recoverable and relatively easily decrypted data: "–he Peacock told me he'd requested another operation against the Autaris. I think it's a mistake. I told him as much but he laughed it off. I think he was drunk or high actually but you never know with him. I don't like that a merc like him is running this op but Rabbit made him the connect back to the nest. Sparks told me he pulled off a job against the Feds that the Black Eagles don't even know happened. Hard to bel–"
Capsule Subsystem Holostorage EH-CN-J44-009
Although battered and scorched by the destruction of the capsule it was installed in, this subsystem holostorage device seems to retain some recoverable and relatively easily decrypted data: "–afterwards met the Peacock at the usual place. I don't know why he insists on using that bar. He'll get us all caught sooner or later. I passed on the latest news on Firebird. As usual he tried to get some data out of me there and then. Does he think I carry it around on me? I don't know what the Rabbit sees in him but I'm saddled with the guy as a handler. I'll just keep making a record of these security lapses so I don–"
Capsule Subsystem Holostorage EH-CN-J44-010
Although battered and scorched by the destruction of the capsule it was installed in, this subsystem holostorage device seems to retain some recoverable and relatively easily decrypted data: "–ime to lose. Distributing data to all redundancies. Activated Contingency Omelette. All cell members dispersing until the Eggfarm is secured. This went to hell sooner than I'd have liked but we got most of what we wanted. I won't be sorry to get out of this gods and spirits damned uniform at last. Let's hope the Rabbit is hap–"
Cargo Manifest
These complicated data sheets may mean little to the layman's eye, but they contain a great deal of information about trade routes, taxes, and other arcane business data.
Cartel Holovids
Encapsulated in a surprisingly sturdy metal casing, this holovid collection appears to have survived the explosion of Serpentis drug lord Amiette Barcier's vessel. It seems that each of the numerous holovids involve a different depiction of the Angel Cartel from amateur documentaries theorizing about secretive research projects to underground films glorifying the Cartel's highly violent raids.
Central Data Core
This bulky component is the substratal databank for all information transferred via computers linked to a station's dataweb.
Cerebral Slice
A slice of the cerebral cortex, part of the outer layers of the brain, which controls for instance sensations, reasoning and memory.
Certification Results
These complicated certification results may mean little to the layman's eye, but can prove valuable in the right hands.
Cipher Router
This heavily damaged fluid router appears to offer a low-profile backdoor into classified FIO networks. In a more functional state this unit could have shed some light on whether or not Serpentis Captain Scane Essyn truly defected. Without a way to bypass the various built-in encryption systems, however, it will be impossible to make sense of any recoverable data. This could be proof of Essyn using old knowledge to his advantage in a new career, or simply his link back to one he never abandoned in the first place.
Civilian Workers and Dependents
Civilian workers and their dependents, including men, women, and children.
Classified Caldari Databank
Heavily encrypted and partially fried by some kind of security failsafe installed over the standard firmware, this databank is clearly the property of the Caldari Navy, if the dire warnings of imprisonment and asset seizure issuing from the flickering holointerface are any indication. The device was recovered from the debris of a capsule apparently hijacked by a Guristas agent, and even considering the layers of encryption and massive data corruption, there's no doubt the Caldari Navy would like this item returned and will compensate anyone doing so. Of course, many empires and "independent" quasi-state actors have access to the kind of expertise that would be required to make anything of this burned and encrypted holostorage device. Perhaps somebody else might be interested in offering a "finder's fee" for the item.
Classified Prototype Blueprint
This blueprint appears to be for a prototype of a new piece of equipment or infrastructure developed by corporate designers. In the cut-throat world of business in New Eden such a prized piece of loot will find ready buyers on the black market. Unscrupulous rival corporations and manufacturers are likely to pay well in order to replicate the design, or even beat the original developers to the market with a competing product. The Guristas Pirates will reward capsuleers who bring this item to their laundering centers.
Classified Report - Station Defenses
These encoded reports may mean little to the untrained eye, but can prove valuable to the relevant institution.
Clearance Documents
These documents clear the holder from numerous by-laws and responsibilities within the Caldari State and abroad. They are issued to capsuleers, who typically operate above the law and are accountable to few people. All this document does is formalize that reality, and as such, is entirely redundant and pointless. The hypercapitalist corporate state of the Caldari is awash with these sorts of documents, however, and the tendency towards needless bureaucracy is simply a part of corporate life.
Clearance Papers
These clearance papers allow the bearer access to the cluster's most expert career training advisors.
Cloistered Rich Asteroid Survey
This deep space asteroid survey contains the location and surveyed contents of a particular rare and secluded mining location in the contested space of the Amarr and Minmatar warzone. Such surveys would fetch a high price from unregulated mining outfits looking to make a fortune and pirate groups seeking a great location to set up a self-sufficient outpost - or an ambush. The Angel Cartel will reward capsuleers who bring this item to their laundering centers.
Colossal Sealed Cargo Containers
These colossal containers are fitted with a password-protected security lock.
Communications Logs
A stack of encrypted communications logs. Valuable intelligence data in the right hands.
Complex Fullerene Shard
Fullerene is a molecule composed entirely of carbon. It is usually spherical in shape and can be harmful to living organisms. Basic Fullerene is used as superconductors and in the biotech industry. Complex Fullerene is an advanced version of basic fullerene that only the Jovians know how to produce. It is much harder than basic fullerene and is indestructible by all conventional methods used by the other races and thus useless in the current technological environment. The force involved in breaking it into shards must have been staggering.
Compressed Dense Polycrase
This dense variant of Polycrase ore is especially prized by engineers for use in large-scale construction projects. Recent advances in system-wide ore scanning technology has enabled the interested parties such as the Caldari State and Outer Ring Excavations to detect hidden asteroid clusters containing this ore. This material is compressed and a much more compact form of the original material. Polycrase requires extremely specialized equipment to reprocess and is therefore generally not useful for capsuleer industry, however rumors have suggested that Deathless Custodians corporation is willing to purchase this compressed ore in their Zarzakh stronghold.
CONCORD MTAC
The Mechanized Torso-Actuated Chassis (MTAC) is used throughout the New Eden cluster for all types of industrial and military work. The robotic arms can be configured in countless ways, from hydraulics for heavy lifting to enormous weapon-mounted battlefield applications.
Confidential Prototype Blueprint
This blueprint appears to be for a prototype of a new piece of equipment or infrastructure developed by corporate designers. In the cut-throat world of business in New Eden such a prized piece of loot will find ready buyers on the black market. Unscrupulous rival corporations and manufacturers are likely to pay well in order to replicate the design, or even beat the original developers to the market with a competing product. The Angel Cartel will reward capsuleers who bring this item to their laundering centers.
Confiscated Vitoc
The Vitoc booster has become more than a simple strategy by the Amarrians in controlling their slaves. With the Vitoc method, slaves are injected with a toxic chemical substance that is fatal unless the recipient receives a constant supply of an antidote.
Consolidated Holdings Commander Access Key
This Commander key has the information needed to unlock the acceleration gate in the Checkpoint which it was found.
Construction Materials
Metal girders, plasteel concrete and fiber blocks are all very common construction material used around the universe.
Corporate Defense Briefing
This briefing contains an outline prepared by corporate defense forces of the measures in place to protect corporate assets at a facility operating in low-security space. This would be of particular interest to raiders and thieves seeking to strike at such a target. The briefing will no doubt help to exploit potential blindspots, attack when security is at its weakest, or help avoid security measures altogether. The Angel Cartel will reward capsuleers who bring this item to their laundering centers.
Corporate Digital Bearer Bonds
These corporation issued digital bonds entitle the bearer to a large sum of credits. Although they require a digital key, due to the nature of bearer bonds, they are of high interest to criminals and unscrupulous entrepreneurs who wish to remain anonymous, evade taxes or launder money. Those with the ability to reverse-engineer the key, such as powerful criminal and pirate networks, can make good use of these bonds. The Guristas Pirates will reward capsuleers who bring this item to their laundering centers.
Corporate Encrypted Credit Orders
These corporation issued encrypted credit orders can be used against general corporate accounts to acquire a large sum of credits. Although they require an encrypted key, due to the ease of cashing these credit orders, they are of high interest to criminals and unscrupulous entrepreneurs who wish to remain anonymous, evade taxes or launder money. Those with the ability to reverse-engineer the key, such as powerful criminal and pirate networks, can make good use of these credit orders. The Angel Cartel will reward capsuleers who bring this item to their laundering centers.
Corporate Security Briefing
This briefing contains an outline prepared by corporate security forces of the measures in place to protect corporate assets at a facility operating in low-security space. This would be of particular interest to raiders and thieves seeking to strike at such a target. The briefing will no doubt help to exploit potential blindspots, attack when security is at its weakest, or help avoid security measures altogether. The Guristas Pirates will reward capsuleers who bring this item to their laundering centers.
Corporations for the Rest of Us
This book appears similar in design to the educational manuals (skill books) popular among capsuleers. This book is a collection of half-hearted aphorisms and childish business-sense to a capsuleer, but then maybe it would be helpful to the plebes of the universe.
Correspondence Log KL-513
A collection of datacores, holoreels, dossiers, and assorted recordings logging the interactions between Kori Latamaki and the Caldari Navy. This information is vital in establishing a treason case against Kori for his dealings with the Navy, with which he has forsaken his brethren in the Guristas.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Drone Components
These components were gathered from obviously malfunctioning drones.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Fragment
This standardized trinary data storage device is heavily corrupted but some fragmentary data remains accessible. With just the right approach it may be possible to decode what remains and access a coherent data stream. It wouldn't hurt to give it a try and see if something clicks.
Corrupted Trinary Relics
A varied collection of relics found close by the wreckage of Drifter ships seemingly destroyed in a fierce fight with parties unknown. These items appear to be trinary data repositories of many different designs, seemingly for use with different data systems and perhaps even of varied age. The relics are apparently corrupted and recovery drones located them in a stasis vault that was evidently hastily abandoned for some reason. Albeit these items are ancient technology and heavily corrupted they would perhaps be of interest to a collector. Possibly someone gathering enough of this kind of relic could even make something out of the data they contain.
Counterfeit Minmatar Faction Ammo
Crafted in illicit child labor factories, this counterfeit ammo is designed to mirror the ammo utilized in the Minmatar Navy in look, feel, and power. Because of its black market creation, though, the ammo is highly unstable, and not suitable for use in any ship. Black marketers make a modest fortune selling this ammo to unsuspecting customers with no eye for high-powered munitions.
Counterfeit Voluval Tattoo Chemicals
A complex chemical formula for use in a traditional Minmatar ceremony. This batch is labeled with Amarr markings.
Covert Recording Device
When planted in the mainframe of any structure, this device will record all communications, no matter how encrypted they may be.
Covert Research Tools
These tools seem to have been prepared for use in low-level experiments of a highly cryptic nature. What exactly will be done with them is an open question, but they appear to be intended for some manner of data gathering under adverse and possibly explosive conditions...
CPF.HYA LogInt Facility POI-26: Data Cache
Found amongst the rubble of the Hyasyoda Logistics Center, this heavily encrypted data cache reveals very little. There is however, one dysfunctional and damaged data partition that can be easily read. Although much of the information is banal and uninteresting administrative jargon, there is one small report included that touches upon the Serpentis facility. Strangely enough, according to the official documentation here, the last time any Hyasyoda personnel visited the area was almost a year ago.
Crate of Aerogel Counteragent
Refrigerated secure cargo containers containing aerogel infused with dormant prototype anti-nanites. These containers have been specially modified with the latest security encryption protocols, to better ensure that any Gallente saboteurs will be unable to access and tamper with this critical cargo.
Crate of Amarr Religious Holoreels
These holoreels contain a recent speech by a regional governor, which provides her views on the state of the Empire as well as other important religious discussions.
Crate of Amarr Scripture Educational Study Packages (Matari translation)
These study materials provide a guide through the structure and meanings of Amarr holy texts in a way that school-age children can easily understand. Education, like every other aspect of daily life in the Empire, is closely tied into religion, and by the time they leave school, Amarr children are expected to have a working and in-depth understanding of their way of life. These particular copies have been carefully translated by experts into painfully precise Matari for distribution in the Republic.
Crate of Amarr TIL-1A Nexus Chips
The Amarr TIL-1A Nexus Chip was once used to store the key elements of a ship's artificial intelligence system, as well as for controlling some of the vessel's autonomous functions. In addition, the TIL-1A series chip had been modified by top Viziam scientists for the Imperial Navy, making it far more resilient to damage and harsh environmental conditions than standard chips of its kind. The TIL-1A chip, specifically, was designed for front-line Amarr battleship-class vessels where it saw widespread use for almost a decade before being replaced by newer technologies. As a result, very few examples of this remain outside Amarr military historical archives, where they are often highly valued for the data they contain on early naval operations.
Crate of Archaeological Lot GV87-426-D Artifacts
This looks like little more than half a starship modified into ground-based living quarters. Several panels are inscribed with decorative symbols. A series of large rectangular cases contain corroded circuit boards with rows of finger-sized crystalline vials anchored to one face; some of the vials are still intact and contain a foggy gaseous substance. A section from what appears to have been a hydroponics lab contains trays of organic matter, fossilised from exposure to the moon's arid conditions and thin, nitrogen-argon atmosphere.
Crate of Architectural-Quality Plagioclase Paneling
Minmatar architecture traditionally favors modular geometric structures and open spaces which allow breezes to flow from room to room. There is a traditional preference for working with exposed natural stone and wood, though recent trends have leaned towards natural surfaces bonded to structural reinforced concrete, stretching resources while still allowing for an attractive appearance. Compressed asteroid ore interior panels are becoming more popular for higher-class residences and for buildings constructed on mineral-poor worlds.
Crate of Blue Paradise
Blue Paradise, also known as “Beep,” is a mild narcotic engineered by Amarr pharmaceutical scientists specifically for use by slave laborers within the Empire. Users of Blue Paradise report feelings of mild euphoria, contentment, relaxation, and generalize pleasure as the primary effects of this drug. These effects typically last between three to five hours, after which the user can be expected to fall into a sound sleep, if taken prior to that user's normal sleep cycle. Furthermore, there have been no significant side effects reported from repeat and prolonged use, making Blue Paradise an extremely promising “reward” for slave laborers. Recreational use of Blue Paradise has not yet been reported, given the limited nature of its distribution only to select Amarr slave labor operations, and no evidence yet exists of addiction to this drug, if administered in a controlled environment.
Crate of Bootleg Holoreels
There doesn't appear to be any particular organization here. Dozens of identical copies of everything from period dramas to last week's boxing finals, in cases with obviously home-printed labels. When played, the holos' quality is shabby and rimmed with static, occasionally deteriorating to basic 2-D images. The sound is unreliable and fades at times. Hopefully, the people who buy these copies aren't paying as much as the supplier did for the originals.
Crate of Contained Cerrocentite
A slick-looking, translucent amber mineral with a hexagonal crystalline structure. Its radioactive properties require the material to be stored in special containment units; handling by anyone other than a trained engineer is strongly discouraged. Cerrocentite is used primarily in stationside security networks, mostly in the systems which detect unbalance in the atmosphere mix.
Crate of Cryo-Stored Luminaire Skippers
These large, indigo-hued amphibians are commonly used in laboratory work. Each weighs roughly two kilograms, and in their natural environment in the marshlands of Gallente Prime are the dominant aquatic predator. To prevent the stresses of space travel from affecting the frogs' physiology, it is necessary to transport them in a cold-case which drops their body temperature and induces a state of hibernation.
Crate of Decoy Prototype Cloaking Devices
This decoy prototype cloaking device appears to be a working model; however, closer scrutiny reveals that it is nothing more than a useless hunk of metal and wires.
Crate of Environmentally-friendly Mining Equipment
The latest generation of environmentally-friendly mining drills reduces airborne pollutants by 75% when compared to the most popular drills on the market. This is accomplished through a revolutionary “dust recapture” system that essentially vacuums the air around the drill head. The collected dust is captured in large, on-site filtration systems which then compacts the dust into blocks. These blocks can either be refined along with the extracted ores, or simply placed back into the mine as backfill once drilling operations are complete. While more than five times as expensive as normal drills, the efficiency of these new models provides an entirely new level of environmental protection.
Crate of Exclusive Simo Reshar Fitness Holoreels
Fitness guru Simo Reshar is iconic less for the effectiveness of his workout routines than for the questionable nature of the visuals and extremely cheesy rhythmic music. The covers depict the skinny workout instructor with his anthropomorphic cartoon assistants, dressed in worryingly skintight shiny outfits. Though clearly intended for a younger audience, adults have professed to discover deeper philosophical meanings within the holos' content if watched whilst under the influence of certain substances. Reshar's assistants, particularly the feline Leeta and avian Yanis, have gained a cult following among certain fetish scenes across the cluster.
Crate of Experimental ECM Hybrid Rounds
These modified tungsten hybrid rounds send out an ECM pulse through the hull of any ship they strike, momentarily baffling the ship's target-locking mechanisms and affording the formerly-targeted ship a few precious moments to gain an advantage or escape. Efforts are being made to develop this into purely friend-or-foe munitions, effectively counteracting the effects of enemy ECM, but adaptation of the missile-based tracking technology to hybrid shell systems has proven difficult.
Crate of Feille d'Marnne Champagne
This champagne originates from Egghelende III, the planet's major product for export. Shipping it out of the pirate-heavy system makes it pricey enough, but the grapes have proven impossible to cultivate anywhere else in the Federation. Each case is worth a couple hundred thousand ISK. Each bottle would bring enough planetary cred for a civilian to live comfortably for a year or ten. A bottle or three would definitely be missed.
Crate of Harvester Components
Agricultural technology, like everything else, is constantly advancing, with developments in irrigation techniques and automated systems to do the work of several farm-hands at a fraction of the overall cost. Most parts are produced on stations rather than planetside in order to reduce the cost of shipping. It also makes disposing of the more hazardous byproducts much safer, reducing the risk of planetary pollution.
Crate of Industrial-Grade Tritanium-Alloy Scraps
Not all scrap-metal is of good enough quality to be reused in the shipbuilding industry. These are the highest quality to be found in the scrap-heaps and abandoned battlegrounds of New Eden. Some pieces still bear signs of what they were once a part of: a sheet of tinted plating here, a painted logo there. Some pieces are still recognizable, others are half-slagged and warped.
Crate of Manportable Electromagnetic Pulse Weapons
These EM beam weapons have been custom fitted to detect and eradicate specific nanotechnologies. Normally, these EMP devices are used by special operations personnel during covert operations. They are placed in proximity to the enemy's defense grid and used to “short out” any nearby electronics, thus creating a hole in the defense grid such that conventional forces can then move through unimpeded by sentry grids, security bots, and other lethal defensive systems. The devices themselves are approximately the size of a large rucksack and can be both emplaced and operated by a single trained individual.
Crate of Portable Emergency Heating Units
These heating units are compact, and light enough to carry in one hand. Each comes with two 10-hour rechargeable batteries, to be used one at a time while the spare charges. The amount of energy one unit puts off would be enough to warm a space of 20 cubic meters, roughly the interior space of a stationside apartment's main room, to an average of 10 degrees Celsius. Not particularly cosy, but better than freezing.
Crate of Prototype Body Armor Fabric
This energy and force-absorbing fabric could represent a generational advancement in light body armor technology. What makes this remarkable fabric unique is that it contains microscopically thin layers of an advanced polymer containing nanites programmed for self-repair. In short, when a suit of body armor made form this material is impacted by any significant force, the nanites instantly begin to repair any damage done, which protects the wearer from further harm. Most importantly, during the manufacturing phase, if the fabric is properly pre-stressed, the nanites are forced to bond thus creating stronger and stronger material, without any increase in weight or decrease in flexibility. For these reasons, this prototype body armor fabric will undoubtedly become the most sought-after material for those groups able to afford its exorbitant price.
Crate of Refined C-86 Epoxy Resin
This substance, an improved version of the C-86 epoxy applied to propulsion systems and engine housings, helps to keep the systems' temperature down, enabling more efficient operation and reduced risk of shipboard fires from overheated systems.
Crate of Refurbished Mining Drones
There are hints of rusty and damaged surfaces beneath the shiny new paint-job. These may not work as efficiently as the client wishes.
Crate of Special Forces Weapons and Equipment
The weapons and equipment containers hold a wide variety of small arms and other equipment currently in use by the Caldari Navy Special Forces, much of it designed specifically for use in maritime environments. Some of the items that can be found in a typical container are long range sniper rifles, target designation lasers, silenced pistols, high tech diving equipment, limpet mines, covert communications gear, and individual diver propulsion devices. This equipment, as you might guess, is extremely valuable and cannot be found outside the armories of the Caldari Navy, with the exception of the very small quantities that have found their way onto the black market.
Crate of Target Painter Deflection Plating
These hull plates are coated with a layer of crystalline structures under a protective transparent enamel. The crystalline layer shimmers reflectively and creates mirage halos around the plate when spot lights are directed at it.
Crate of Unidentified Ancient Technology
These pieces appear to all be some form of polyhedral from truncated pyramids that can be gripped in the hand to barrel-sized fullerene-faceted globes. Each is shaped as if in one complete piece from bluish or steely-gray material, all edges beveled and smoothed. When rapped with a knuckle, the pieces ring like a bell, but the material feels more like ceramic. Every item bears a sort of dim, inner glow that pulses irregularly, like a dying light bulb. A tingle like electricity can be felt just above their surfaces, though preliminary examinations have dismissed the presence of any electrical activity. There is some speculation that the pieces form some sort of modular information annex, with contact between matching faces forming the necessary connections. No amount of fitting has yielded any results, however, so the disparate parts sit in their individually labeled crates like the pieces of several puzzles mixed together.
Crate of Unidentified Fibrous Compound
These pieces of blue-green compound feel slick and oily to the touch and leave a tingle in your fingers. Fine crystalline filaments within crisscross and refract the light so that each piece seems to glow from within.
Crates of Clothing
It's not the latest fashion, or even the rugged survival gear colonists wear on developing worlds, but this basic, mass-produced clothing is better than nothing.
Crates of Command Reports
Despite the fact that these datachips really only contain logistical information, promotion notifications, and other mundane military records, they are nonetheless classified.
Crates of Construction Blocks
Metal girders, plasteel concrete and fiber blocks are all very common construction material used around the universe.
Crates of Consumer Electronics
Consumer electronics encompass a wide variety of individual goods, from entertainment media and personal computers to slave collars and children's toys.
Crates of Coolant
This specially blended fluid is ideal for transferring thermal energy away from sensitive machinery or computer components, rerouting it to heat sinks so it can be eliminated from the system.
Crates of Corporate Documents
These datadisks are absolutely filled with endless databases of market knowledge, sales figures, salary ranges, production estimates, and all kinds of other corporate information.
Crates of Data Sheets
These complicated data sheets may mean little to the layman's eye, but can prove valuable in the right hands.
Crates of Drill Parts
These large containers are fitted with a password-protected security lock. These particular containers are filled with spare parts needed to build a drill used for drilling through rock and ice sheets.
Crates of Electronic Parts
These basic elements of all electronic hardware are sought out by those who require spare parts in their hardware. Factories and manufacturers take these parts and assemble them into finished products, which are then sold on the market.
Crates of Enriched Uranium
Enriched Uranium is used in many kinds of manufacturing and as a fuel, making it a steady trade commodity. Enriched Uranium is generally manufactured by combining standard semiconductor PVD methods with ionic separation by means of mass spectrometry.
Crates of Fertilizer
Fertilizer is particularly valued on agricultural worlds, where there is constant supply for all commodities that boost export value.
Crates of Frozen Food
Frozen food is in high demand in many regions, especially on stations orbiting a non-habitable planet and a long way from an agricultural world.
Crates of Frozen Plant Seeds
Frozen plant seeds are in high demand in many regions, especially on stations orbiting a non-habitable planet.
Crates of Garbage
Production waste can mean garbage to some but valuable resource material to others.
Crates of Guidance Systems
An electrical device used in targeting systems and tracking computers.
Crates of Harroule Dryweed
Grown on a terrestrial world in the Harroule system, the Dryweed plant has fragile, yellowish leaves that burn very slowly, giving off a pleasant vapor that is known to have a soothing effect when inhaled.
Crates of High-Tech Small Arms
These weapons are of superior quality to those normally found on the public market, although more expensive as well. They are implemented with a safety net which prevents them from being used illegally in stations where most types of small arms are prohibited. Therefore many regions do not apply the small arms ban on these weapons.
Crates of Holoreels
Holo-Vid reels are the most common type of personal entertainment there is. From interactive gaming to erotic motion pictures, these reels can contain hundreds of titles each.
Crates of Liparer Cheese
Due to the unique properties of the Liparer system's terrestrial worlds, animals raised there have very low body fat, resulting in relatively bland but far healthier dairy products.
Crates of Listening Post Recordings
After diligently recording information on astral phenomena or military maneuvers, listening post data is embedded on encrypted chips, which must be carefully transported by hand.
Crates of Long-limb Roes
The eggs of the Hanging Long-limb are among the most sought after delicacies in fancy restaurants. The main reason why the roe of the Hanging Long-limb is so rare is because no one has succeeded in breeding the species outside their natural habitat.
Crates of Mechanical Parts
These basic elements of all mechanical hardware can come in virtually any shape and size, although composite or modular functionality is highly advantageous in today's competitive market. Factories and manufacturers take these parts and assemble them into finished products, which are then sold on the market.
Crates of Missile Guidance Systems
Guidance systems allow both atmospheric and vacuum launched missiles to find targets using sophisticated electronics and specially calibrated sensors.
Crates of Mono-Cell Batteries
Although they're a relatively old design, mono-cell batteries are still a reliable method of storing electricity in bulk, specifically designed for long-term use in stations or planetary vehicles.
Crates of Odd Data Crystals
Whatever is recorded on these datacrystals, the encryption is far beyond normal methods of deciphering, and requires expert attention to crack.
Crates of OP Insecticide
Organophosphates, similar to nerve gases, have long been used as insecticides, and as bugs evolve, so too must the methods for dealing with them. This particular insecticide is perhaps the most lethal known to humankind, and can kill nearly anything exposed to it.
Crates of Oxygen
Oxygen is a commodity in constant demand. While most stations have their own supply units, smaller depots and space crafts rely on imports.
Crates of Planetary Vehicles
Tracked, wheeled and hover vehicles used within planetary atmosphere for personal and business use.
Crates of Protein Delicacies
Protein Delicacies are cheap and nutritious food products manufactured by one of the Caldari mega corporations, Sukuuvestaa. It comes in many flavors and tastes delicious. Despite its cheap price and abundance it is favored by many gourmet chefs in some of the finest restaurants around for its rich, earthy flavor and fragrance.
Crates of Raggy Dolls
Known across New Eden for their anatomical correctness and temperature sensitive, dynamic hair coloration, Raggy dolls are always in demand during gift-giving holidays.
Crates of Repair Parts
Despite the enormous diversity of size and complexity of machinery across the cluster, there are numerous common elements shared by all people, such as high tension wiring, locking fasteners, and thermal shielding.
Crates of Replacement Parts
Replacement parts include anything from machined components, such as plastic casings and metal brackets, to more basic pieces like nuts and bolts.
Crates of Reports
These encoded reports may mean little to the untrained eye, but can prove valuable to the relevant institution.
Crates of Robotics
These pre-programmed or remote control mechanical tools are commonly used in mass production facilities, hazardous material handling, or dangerous front line military duties such as bomb disarming and disposal.
Crates of Rocket Fuel
Augmented and concentrated fuel used primarily for missile production.
Crates of Silicate Glass
Silicate glass is a common construction material, in constant demand throughout New Eden, whether in planetary structures or reinforced for use in space vessels.
Crates of Silicon
As one of the most common elements in the universe, it's no surprise that silicon has found its way into almost every aspect of manufacturing, resulting in a steady price and perpetual mining operations on most solid planets.
Crates of Small Arms
Personal weapons and armaments, used both for warfare and personal security.
Crates of Soil
Fertile soil rich with nutrients is very sought after by agricultural corporations and colonists on worlds with short biological history.
Crates of Spiced Wine
Luxury goods are always solid commodities for inter-stellar trading. Spiced wine is not the rarest of luxury goods, but it can still be sold at small outposts and bases that don't manufacture any themselves.
Crates of Spirits
Alcoholic beverages made by distilling a fermented mash of grains.
Crates of Synthetic Oil
Since original oil can be harvested only from a world with a long biological history, synthetic oil has become frequently produced in laboratories all over known space.
Crates of Tobacco
Tubular rolls of tobacco designed for smoking. The tube consists of finely shredded tobacco enclosed in a paper wrapper and is generally outfitted with a filter tip at the end.
Crates of Transmitters
An electronic device that generates and amplifies a carrier wave, modulates it with a meaningful signal derived from speech or other sources, and radiates the resulting signal from an antenna.
Crates of Vaccine Injectors
These single-use syringes contain a predetermined dose of adaptive vaccines designed to counteract almost any known virus.
Crates of Viral Agent
The causative agent of an infectious disease, the viral agent is a parasite with a noncellular structure composed mainly of nucleic acid within a protein coat.
Crates of Vitoc
The Vitoc booster has become more than a simple strategy by the Amarrians in controling their slaves. With the Vitoc method, slaves are injected with a toxic chemical substance that is fatal unless the recipient receives a constant supply of an antidote. The method first appeared a few centuries ago when the Amarrians started manning some of their space ships with slaves. As space crew the slaves had to be cajoled into doing complex, often independent work, making older methods of slave control undesirable. Although the more conventional ways of subduing slaves with force (actual or threat of) are still widely used in other forced labor areas, the Vitoc method has proven itself admirably for the fleet.
Crates of Water
Water is one of the basic conditional elements of human survival. Most worlds have this compound in relative short supply and hence must rely on starship freight.
Crates of Zemnar
Zemnar is an uncommon type of antibiotic specifically used to combat rare bacterial infections. Originally discovered by the late Gallente biologist, Lameur Zemnar, the drug is now frequently kept in stock in the more wealthy quarters of the galaxy, in case of a bacterial outbreak.
Criminal DNA
Identification tags such as these may prove valuable if handed to the proper organization.
Criminal Dog Tag
Identification tags such as these may prove valuable if handed to the proper organization.
Cross of the Sacred Throne Order
The Cross of the Sacred Throne Order was created during the Moral Reforms to reward those who display undying loyalty to the Emperor and eternal faith in God through exceptional service and sacrifice in the name of the Empire. There is no higher capsuleer honor in the Empire. “To serve, unshakably, is to reach greatness.” - The Scriptures, Amash Akura, 25:16
Cryogenic Stasis Capsule
This cryo capsule is fitted with a password-protected security lock to protect its occupant.
Custom Circuitry
While drone AI is easily replicated, certain behaviors require custom programming. These units seem to have been designed for generally poor combat performance.
Customs Patrol Schedule
Found among the wreckage of Angel Captain Artey Vinck's vessel, this innocuous looking data core actually holds a wealth of information about previous Federation Customs patrol routes, now probably a little outdated. The level of detail is staggering: including locations of almost every single Customs vessel in operation across the entire Sinq Laison region. With information like this, a smuggler could pass undetected anywhere they pleased with complete impunity. Attached to the information is a brief note bearing the logo of Serpentis Corporation that reads “Fly safe Artey, times change. As ever, I.C.”
Dagger of Coricia
Representing those who have gone through hardship and persevered, the Dagger of Coricia is awarded to individuals who do great service to the Minmatar people. While normally awarded to civil servants, it has been extended to others who fight and suffer on behalf of the Republic as well. “From the Sobaki Sands a man came with but rags and a dagger. Yet he lived still.” - Excerpt from Vherokior Oral History
Damning Evidence
This document could get a lot of people into a lot of trouble.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
This standardized data storage device is heavily corrupted but some fragmentary data remains accessible. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Data Fragment
Encoded with identifiers of the elusive "Deathless Circle", this fragmentary data has been recovered from a pirate commander's ship communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Valuable data provided by the network of smugglers, mercenaries and criminals set up by "The Deathless" has been rumored to be spreading through the Angel Cartel and Guristas Pirates organizations in the months since the Turnur Incident. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Deathless Circle Insurgents Loyalty Token
This electronic token is encoded with a set reward value by the Deathless Circle, and can be exchanged at The Fulcrum, Angel Cartel or Guristas Pirates stations for an ISK reward.
Deathless Circle Reward Token
This electronic token is encoded with a set reward value by the Deathless Circle, and can be exchanged at Angel Cartel or Guristas Pirates loyalty point stores for special access to their latest destroyer-class designs.
Decoy Prototype Cloaking Devices
This decoy prototype cloaking device appears to be a working model; however, closer scrutiny reveals that it is nothing more than a useless hunk of metal and wires.
Defense of Caldari Prime Ribbon
This ribbon was awarded to the brave patriots who aided the most against the unprovoked assault against the Titan in orbit of Caldari Prime by the Gallente Federation in YC115. Your bravery and courage will not go unforgotten. "We will not permit you to tell us how to be Caldari, and so you leave us with no choice." - Excerpt from the Caldari Proclamation of Secession. CE 23154.11.22
Defiled Relics
Sacred objects from the Tal-Romon Cathedral that have become tainted through touch with the elements. Though once proud pieces worthy of reverence and penance, they are now nothing more than debris cluttering space.
Defunct Drone Sensor Module
These sensors are an old subsystem once used in drone prototypes.
Dem's Galactical Botanical
This book is unprecedented in the depth of analysis offered by Ukraris Dem, easily the most noted morpho-botanist of the latter past century.
Demographic Analyses
Moments before the destruction of his ship Rodani Mihra attempted to destroy these files. The formatting procedure didn't fully complete before his ship was downed, however, and fragments of data remain, including one important-looking document. Highly convoluted and riddled with economic terminology, it appears to be a comprehensive report on various regions. Each and every system has been broken down into demographic sub-groups that clearly outline where the demand for illegal boosters is currently greatest and where it is mostly likely to grow in the coming weeks and months.
Design Documents
These complicated data sheets may mean little to the layman's eye, but can prove valuable in the right hands.
Deteis Family
A normal, if somewhat familiar-looking Deteis family.
DisX Stash
Encapsulated in a resilient Mexallon alloy container, this drug stash was clearly intended to survive the explosion of Angel Lieutenant Thora Faband's vessel, most likely so it could be recovered by her Cartel associates. A cursory analysis of the contents reveals them to be a modified version of an X-Instinct variant known as “DisX” which possesses greatly increased dissociative elements that serve to heighten sensory deprivation. Strangely enough, these drugs are most popular among the Matari tribes that she cheated to make them. They value DisX as a catalyst for self-exploration and spiritual insight.
Ditanium Metal Plates
Refrigerated secure cargo containers containing aerogel infused with dormant prototype anti-nanites. These containers have been specially modified with the latest security encryption protocols, to better ensure that any Gallente saboteurs will be unable to access and tamper with this critical cargo.
DNA Sample
DNA samples are any of various nucleic acids that are usually the molecular basis of heredity, are localized especially in cell nuclei, and are constructed of a double helix held together by hydrogen bonds between purine and pyrimidine bases which project inward from two chains containing alternate links of deoxyribose and phosphate.
Dossier - Author Unknown
This dossier appears to be an excerpt of internal employee profiling done by Nugoeihuvi Corporation.“…Isha is something of an enigma, even to the few of us who know him. Apparently he's spent over 30 years here at NOH. Nobody has many details since he doesn't seem to keep any staff. I've heard he makes use of pod pilots whenever he needs anything done but I've no idea where the funds for that come from, perhaps the NOH directorate. “My House of Records contacts tell me he started work here in the Internal Security division of NOH. He now works in another department, unofficially titled as “Advisory”. It's anyone's guess when he moved across or what his work entails. In situations like these nobody asks questions.”
Dr. Castille's Data Core (Property of CreoDron)
This data core contains Dr. Aspasia Castille's notes on the corrupted drone problem, but it's heavily encrypted.
Drezin's DNA
DNA samples are any of various nucleic acids that are usually the molecular basis of heredity, are localized especially in cell nuclei, and are constructed of a double helix held together by hydrogen bonds between purine and pyrimidine bases which project inward from two chains containing alternate links of deoxyribose and phosphate. This is a DNA sample taken from the infamous pirate Drezin.
Drill Parts
These large containers are fitted with a password-protected security lock. These particular containers are filled with spare parts needed to build a drill used for drilling through rock and ice sheets.
Drive Cluster EDF-285
This is a cluster of drives, each of which contains several exabytes worth of encoded data. Somewhere in here is vital information on the Wildfire Khumaak.
Drone Tracking Data
An analysis of this data may help to uncover the mysteries of that evasive rogue drone.
Drug Contact List
Contact list of people involved in drug manufacturing and distribution.
Dysfunctional Fluid Router
The backbones of communication across New Eden, fluid routers play a crucial role in all faster than light (FTL) transmissions. The locator and identification subsystems on this particular model appear to have been removed entirely, most likely as part of an attempt to avoid CONCORD interference. Although the unit is heavily damaged from the explosion of Saira Katori's ship, fragments of data have survived in its cache. Most interesting among them is an unsent mail to Vepas Minimala which reveals a certain degree of familiarity between them.
EDENCOM Secure Buffer Data
This fragmentary data has been extracted from an EDENCOM Secure Buffer used to hold data before being relayed to a remote location via fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
EDENCOM Secure Buffer Data
This fragmentary data has been extracted from an EDENCOM Secure Buffer used to hold data before being relayed to a remote location via fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
EDENCOM Secure Buffer Data
This fragmentary data has been extracted from an EDENCOM Secure Buffer used to hold data before being relayed to a remote location via fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
EDENCOM Secure Buffer Data
This fragmentary data has been extracted from an EDENCOM Secure Buffer used to hold data before being relayed to a remote location via fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
EDENCOM Secure Buffer Data
This fragmentary data has been extracted from an EDENCOM Secure Buffer used to hold data before being relayed to a remote location via fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
EDENCOM Secure Buffer Data
This fragmentary data has been extracted from an EDENCOM Secure Buffer used to hold data before being relayed to a remote location via fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
EDENCOM Secure Buffer Data
This fragmentary data has been extracted from an EDENCOM Secure Buffer used to hold data before being relayed to a remote location via fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
EDENCOM Secure Buffer Data
This fragmentary data has been extracted from an EDENCOM Secure Buffer used to hold data before being relayed to a remote location via fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
EDENCOM Secure Buffer Data
This fragmentary data has been extracted from an EDENCOM Secure Buffer used to hold data before being relayed to a remote location via fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
EGDLI (2) Abyssal Tier 1 (Omega)
EGDLI (2) Abyssal Tier 2 (Omega)
EGDLI (2) Abyssal Tier 4 (Alpha)
EGDLI (2) Boosters Tier 1 (Alpha)
EGDLI (2) Boosters Tier 1 (Omega)
EGDLI (2) Boosters Tier 2 (Alpha)
EGDLI (2) Boosters Tier 2 (Omega)
EGDLI (2) Boosters Tier 3 (Alpha)
EGDLI (2) Boosters Tier 3 (Omega)
EGDLI (2) BPC Tier 1 (Alpha)
EGDLI (2) BPC Tier 1 (Omega)
EGDLI (2) BPC Tier 2 (Alpha)
EGDLI (2) BPC Tier 2 (Omega)
EGDLI (2) BPC Tier 3 (Alpha)
EGDLI (2) BPC Tier 3 (Omega)
EGDLI (2) Skin Tier 1 (Alpha)
EGDLI (2) Skin Tier 1 (Omega)
EGDLI (2) Skin Tier 2 (Alpha)
EGDLI (2) Skin Tier 2 (Omega)
EGDLI (2) Skin Tier 3 (Alpha)
EGDLI (2) Skin Tier 3 (Omega)
EGDLI Loot Crate Special 1 (Omega)
EGDLI Loot Crate Tier 1 Boosters 1 (Alpha)
EGDLI Loot Crate Tier 1 Boosters 1 (Omega)
EGDLI Loot Crate Tier 1 BPCs 1 (Alpha)
EGDLI Loot Crate Tier 1 BPCs 1 (Omega)
EGDLI Loot Crate Tier 1 Frigate Skins 1 (Alpha)
Can be used for Alpha or Omega tracks
EGDLI Loot Crate Tier 1 Frigate Skins 1 (Omega)
Omega Campaigns Only.
EGDLI Loot Crate Tier 1 Frigate Skins 2 (Alpha)
Can be used for Alpha or Omega tracks
EGDLI Loot Crate Tier 1 Frigate Skins 2 (Omega)
EGDLI Loot Crate Tier 2 Battleship Skins 1 (Alpha)
Can be used for Alpha or Omega tracks
EGDLI Loot Crate Tier 2 Battleship Skins 1 (Omega)
Omega campaigns only
EGDLI Loot Crate Tier 2 Battleship Skins 2 (Alpha)
EGDLI Loot Crate Tier 2 Battleship Skins 2 (Omega)
EGDLI Loot Crate Tier 2 Boosters 1 (Alpha)
EGDLI Loot Crate Tier 2 Boosters 1 (Omega)
EGDLI Loot Crate Tier 2 BPCs 1 (Alpha)
EGDLI Loot Crate Tier 2 BPCs 1 (Omega)
EGDLI Loot Crate Tier 2 Frigate Skins 1 (Alpha)
Can be used for Alpha or Omega tracks
EGDLI Loot Crate Tier 2 Frigate Skins 1 (Omega)
Omega campaigns only
EGDLI Loot Crate Tier 2 Frigate Skins 2 (Omega)
Omega campaigns only
EGDLI Loot Crate Tier 3 Battleship Skins 1 (Alpha)
Can be used for Alpha or Omega tracks
EGDLI Loot Crate Tier 3 Battleship Skins 1 (Omega)
Omega campaigns only
EGDLI Loot Crate Tier 3 Boosters 1 (Alpha)
EGDLI Loot Crate Tier 3 Boosters 1 (Omega)
EGDLI Loot Crate Tier 3 BPCs 1 (Alpha)
EGDLI Loot Crate Tier 3 BPCs 1 (Omega)
Ekala's Design Documents
Heavily damaged from the explosion of his vessel, Guristas Captain Onoki Ekala's private designs fail to offer any significant insights into what his brilliant mind is currently working toward. Careful analysis of the reconstructed diagrams reveals various bio-chemical refining array designs, but many crucial details are missing. Presumably this facility has something to do with the processing of cytoserocin, the material harvested from gas clouds as part of booster production. Without access to more information, the designs alone offer no real clue as to what Ekala is up to save for the obvious; producing Crash boosters.
Elena Gazky's DNA
DNA samples are any of various nucleic acids that are usually the molecular basis of heredity, are localized especially in cell nuclei, and are constructed of a double helix held together by hydrogen bonds between purine and pyrimidine bases which project inward from two chains containing alternate links of deoxyribose and phosphate. This is a DNA sample taken from a member of the infamous pirate gang 'The Seven'.
Empire Diplomatic Documents
This missive is a sternly worded diplomatic request from the Amarr Empire, asking that CONCORD seriously reconsider its planned coupling of communicative technology between capsuleers and other, non-celestial soldiers of fortune. The request is encased in protective sheathing, giving it a marginally higher chance of surviving the travails of celestial transportation than a piece of paper might usually enjoy.
Empire Emissary Medallion
This medal was awarded to those who aided the Amarr Empire emissaries in their mission to bring sensitive diplomatic documents, concerning the coupling of interstellar communication relays between capsuleers and other non-celestial soldiers of fortune, to CONCORD in Yulai.
Encoded Corporate Investment Plans
This data packet contains the future investment plans for a corporation division. If it could be decrypted, then the sensitive data contained within would fetch a high price on the black market among rival corporations and rogue stock traders looking for insider information. The Angel Cartel and Guristas Pirates will reward capsuleers who bring this item to their laundering centers.
Encoded Data Chip
This small, portable disk is only about two centimeters in diameter, yet it is capable of holding a vast amount of information. A durable outer casing made from plasteel rotates away to reveal the raw data surface when the device is inserted into a reader.
Encoded Lai Dai Reports
If decoded correctly, these reports will show the locations of ancient monuments and relics.
Encoded Message
This message is encoded in a familiar hybrid cipher. Only those who are already in the know about the arrangements in Black Rise will be able to make sense of it.
Encrypted Angel Transction Logs
These transaction logs recovered from an Angel Cartel ship could provide vital intelligence to interested parties as to what the Cartel is buying or selling, and perhaps who may be on the Cartel's extensive payroll. The logs are heavily encrypted and were almost entirely wiped when the ship was destroyed, as such, only a specialized facility is likely to find any value or success in decrypting this. The Amarr Empire will reward Capsuleers who bring this item to their Imperial Counter-Insurgency Outpost located in the Mehatoor solarsystem. The Minmatar Republic will reward Capsuleers who bring this item to their Republic Counter-Insurgency Outpost located in the Amo solarsystem.
Encrypted Data Crystals
These crystals contain data of some sort, but have apparently been encrypted using advanced methods, making the information inaccessible to all but the most skilled hackers.
Encrypted Data Fragment
This data node guards its secrets with a powerful encryption cipher. The unique design of the encryption is clearly proprietary and not something used elsewhere. The security software driving the protection represents a strange mixture of Gallente and Caldari designs.
Encrypted Guristas Transction Logs
These transaction logs recovered from a Guristas Pirates ship could provide vital intelligence to interested parties as to what the Guristas are buying or selling, and perhaps who may be on the take from Guristas Pirates agents. The logs are heavily encrypted and were almost entirely wiped when the ship was destroyed, as such, only a specialized facility is likely to find any value or success in decrypting this. The Caldari State will reward Capsuleers who bring this item to their State Counter-Insurgency Outpost located in the Onnamon solarsystem. The Gallente Federation will reward Capsuleers who bring this item to their Federation Counter-Insurgency Outpost located in the Intaki solarsystem.
Encrypted Stellar Research Data
This packet of encrypted data contains sensitive readings taken from observation of a nearby star. Authorities within both the Amarr Empire and Minmatar Republic have requested loyal capsuleers bring them these data packets to assist with their classified research projects. Capsuleers can assist the Amarr Empire by depositing this data into the Imperial Stellar Transmuter Research Laboratory at the Imperial Research Facility within the Mehatoor system. Capsuleers can assist the Minmatar Republic by depositing this data into the Republic Stellar Transmuter Research Laboratory at the Republic Research Facility within the Amo system.
Encrypted Transmission
This is an encrypted transmission from the RSS agent's Ammatar spy. It is a wholly incomprehensible string of 1s and 0s.
Encrypted Upwell Consortium Data Cache
This data cache recovered from an Upwell Consortium ship could be host to a whole trove of valuable information that would be of interest to the Angel Cartel and Guristas Pirates. Such examples are corporate investment plans, security briefings, corporate bearer bonds, local currency, asteroid surveys and prototype blueprints. The device is damaged and the data in fragmentary form. Hundreds, if not thousands, of sequences would be required to break the code, as such, only a specialized facility is likely to find any value or success in analyzing this object. The Angel Cartel and Guristas Pirates will reward capsuleers who bring this item to their laundering centers.
Engraved Blood Obsidian tablet
A small tablet, made entirely of blood obsidian, engraved with writing. The words on the tablet are not entirely clear, and the dialect is familiar, though unreadable.
Enigmatic Reports
Completely unharmed from the destruction of Angel Captain Appakir Tarvia's vessel, this data storage unit appears to contain a wealth of information, although every last byte is encrypted in an unknown cipher that looks leagues above current data protection technology. Every attempt made to crack the code returns nothing more than a list of strange errors, none of which are typical for decryption fault analysis. More ominously still, each attempt at decryption seems to activate an internal uplink to a remote system in the Heaven constellation, with no apparent way to stop what must be outbound transmissions. Despite the impenetrability of the data, one small image juts out among the garbled text, offering an explanation as menacing as the fact that it was clearly excluded from the encryption as some kind of warning.
Enlightened Soul Silver Shield
One of the oldest award around, the Silver Shield dates back to First Jovian Empire. Initially created to award inventors and discoverers it later evolved to include those responsible for gathering and storing great amounts of knowledge. Today it is awarded to those that show great service to the Jovian Empire, such as bridging the communication gap between the Jovians and the other races.
Environmentally-friendly Mining Equipment
The latest generation of environmentally-friendly mining drills reduces airborne pollutants by 75% when compared to the most popular drills on the market. This is accomplished through a revolutionary “dust recapture” system that essentially vacuums the air around the drill head. The collected dust is captured in large, on-site filtration systems which then compacts the dust into blocks. These blocks can either be refined along with the extracted ores, or simply placed back into the mine as backfill once drilling operations are complete. While more than five times as expensive as normal drills, the efficiency of these new models provides an entirely new level of environmental protection.
Epidermis Sliver
Sliver of the upper layer of the skin, the largest organ that provides insulation, sensation and temperature control among other things.
Farming Supplies
This huge freight container is loaded with all sorts of agricultural equipment. Almost anything a farm could need has been packed away inside, from seeds and plant samples to tractors and ploughs.
Faulty Suntendi Virtu-Real Implant
This implant has proven unreliable at best. Due to an unforeseen complication, the implant can cause some hosts to emit erratic and intense bio-electric pulses capable of damaging nearby audiovisual technology.
Federal Star of Justice
The Federal Star of Justice is a golden medallion, awarded by the Gallente Federation to individuals who have displayed exceptional bravery, self-sacrifice and wisdom in promoting the causes of liberty and democracy across the universe.
Federation Court Logs
These reports hold data of utmost importance to Federation Judicial Services.
Federation Diplomatic Documents
This missive is a sternly worded diplomatic request from the Gallente Federation, asking that CONCORD seriously reconsider its planned coupling of communicative technology between capsuleers and other, non-celestial soldiers of fortune. The request is encased in protective sheathing, giving it a marginally higher chance of surviving the travails of celestial transportation than a piece of paper might usually enjoy.
Federation Emissary Medallion
This medal was awarded to those who aided the Gallente Federation emissaries in their mission to bring sensitive diplomatic documents, concerning the coupling of interstellar communication relays between capsuleers and other non-celestial soldiers of fortune, to CONCORD in Yulai.
Festival-only 'Longbow' Energy Turrets Dose Crate
This crate is only designed for and available on Serenity.
Festival-only 'Longbow' HybridTurrets Dose Crate
This crate is only designed for and available on Serenity.
Festival-only 'Longbow' Missile Dose Crate
This crate is only designed for and available on Serenity.
Festival-only 'Longbow' Projectile Turrets Dose Crate
This crate is only designed for and available on Serenity.
Foiritan Sculpture
Foiritan Voucher
This is a candidate voucher for Souro Foiritan, used to determine the biggest supporters of this particular candidate for selecting candidate emissaries.
Folkloric Painting
The Intaki have a long and glorious tradition of three-color paintings that depict scenes from both history and mythology, often melding the two into a highly symbolic rendition of their people's presence and purpose in the world of New Eden. In recent decades, the traditional Intaki painting style has been adopted by painters of the abstract "Reticular school," an anti-factionalist, neo-traditional movement made famous by Suri Naatha and the Circle of Nineteen.
Food-Borne Toxin
This virulent toxin, when placed into many kinds of food or drink, is virtually undetectable save by the most advanced microbiological scanning technology... which is generally available only to the very wealthy.
Foundation Stone
Fraudulent Pax Amarria
This Pax Amarria binding hides a heretical manuscript.
Freedom of Operation License
This document is issued to all graduate capsuleers, regardless of their ethnicity or background. In the document, various fundamental human rights are outlined and defended, including the freedom to travel, freedom to work for a corporation of one's choosing, and freedom of speech within Gallente Federation borders. The document is somewhat redundant for capsuleers, who enjoy these freedoms and others even greater. Despite this obvious fact, the Federation authorities have chosen to issue the license all the same, viewing it as a symbolic gesture, and a reminder of the Federation's core values.
Galeptos Medicine
Galeptos is a rare type of medicine developed by the famous Gallentean scientist, Darven Galeptos. It is produced from a blend of organic and chemical material, used to cure a rare and deadly viral infection which has been creeping up more frequently as of late. Rumor has it that Galeptos manufactured the virus himself, then sold the cure for billions of ISK. Of course his corporation, Galeptos Medicines, steadfastly denies any such "unfounded" accusations and has threatened legal action to anyone who mentions it in public.
Gallente 106 Election Holoreel
This holoreel contains most of the advertisements used in the Gallente propoganda machine for each of the candidates vying for the presidency, as well as a detailed biography of each person.
Gallente Alpha Nexus Chip
This small data chip stores the key elements of a ship's artificial intelligence system, and is used primarily for controlling the vessel's autonomous functions. This particular chip has been modified by top Duvolle scientists for the Gallente Navy, made to be of better quality than what is available on the open market. The Alpha chip is designed for battleship class vessels.
Gallente Beta Nexus Chip
This small data chip stores the key elements of a ship's artificial intelligence system, and is used primarily for controlling the vessel's autonomous functions. This particular chip has been modified by top Duvolle scientists for the Gallente Navy, made to be of better quality than what is available on the open market. The Beta chip is designed for cruiser class vessels.
Gallente Federation Transaction And Salary Logs
These reports hold information on recent transaction and salary logs from a corporation within the Gallente Federation. They are very sought after by pirates, who use the often sensitive information held within for various purposes.
Gallente Gamma Nexus Chip
This small data chip stores the key elements of a ship's artificial intelligence system, and is used primarily for controlling the vessel's autonomous functions. This particular chip has been modified by top Duvolle scientists for the Gallente Navy, made to be of better quality than what is available on the open market. The Gamma chip is designed for frigate class vessels.
Gallente Loyalty Token
These tokens are given to capsuleers who have contributed to the security and prosperity of the Gallente Federation. They can be traded on the market for ISK in most Gallente stations.
Gallentean Planetary Vehicles
Tracked, wheeled and hover vehicles used within planetary atmosphere for personal and business use. Gallentean vehicles (or the 'luxury edition' as they are sometimes called) have been specially modified with numerous gadgets to make the ride more comfortable, and enjoyable. A high-tech personal entertainment system has been put in all of the passenger seats, the seats have been made far more comfy, etc.
Gallentean Viral Agent
The causative agent of an infectious disease, the viral agent is a parasite with a noncellular structure composed mainly of nucleic acid within a protein coat.
Gamma Ray Modulate Disc
This disc of crystals is specially constructed to modulate gamma rays in a Solray Gamma Alignment Unit.
Gas Passkey
This electronic passkey is provided by tutorial agents as part of a capsuleer training programming. It is used to unlock an acceleration gate inside the Gas site training area, where the “Proof of Discovery” documents can be found stored inside containers. The “Proof of Discovery” documents serve as physical evidence that the capsuleer was able to discover a particular type of site. This passkey is used to unlock Acceleration gates found inside Gas sites only.
Giant Sealed Cargo Containers
These giant containers are fitted with a password-protected security lock.
Gold Medallion of Liberty
The Federation has long encouraged its citizens to stand up against oppression, plight, and wrongdoing. For those capsuleers who, at promise of no gain to themselves, stand brave against tyranny, the Gold Medallion of Liberty is a small acknowledgment of the Federation's gratitude. “It is our duty to spread justice. We cannot allow anyone to oppose that.” - President Arlette Villers
Gold Sculpture
Gold sculpture of president Souro Foiritan.
Group of Angel Cartel VIPs
These thugs and pirates look more like slick businessmen... with lots of armed bodyguards. Despite openly hostile relations, the empires must sometimes shake the hand of the devil in order to get things done. Much of that business is not intended to reach the light of day, or the eyes of the news agencies of New Eden.
Group of Coriault Couture Collective Display Employees
Across the broad sweep of New Eden, there is no constellation closer to the forefront of fashion than Coriault. The Crux constellation, which includes Luminaire and Oursulaert, may be the heart of the Federation's consumer culture, but Coriault is home to the fashion-houses of Auvergne and Vylade, and in particular the Dodixie-based Maison Nephére which has provided finery exclusively for the Federation presidents and their partners for well over a century. In order to improve their visibility in the glare of the Federation's heart, dozens of Coriault houses merged under the Coriault Couture Collective label. Each school operates independently, and the styles can vary wildly, but open competition between institutions only occurs when particular contracts are opened to the highest bidder.. The designers frequently model their own work, operating under the philosophy that if they wouldn't be seen in public in their own work, nobody else should, either.
Group of Haakar's Striking Hawks
Haakar is a small, unassuming woman in her 40s who wields discipline like a whip. The men and women who follow her command – her Striking Hawks mercenary group – all served with or under her in the Republic Infantry's 203rd Tactical Recon before the company was made redundant by policy changes fifteen years ago. Haakar bears a grudge against bureaucracy for cutting short her career, but says her work now gives her professional satisfaction and an autonomy she enjoys.
Guristas 'Dirty' Explosive System
A rudimentary, though effective, explosion matrix, used specifically for Guristas special operation tactical strikes. Once inside a ship's cargo bay, this “dirty” bomb will, upon detonation, cause massive damage to any ship, structure, or starship base. It's volatility, however, is also a liability: Getting the bomb to its destination is more dangerous than actually utilizing the explosion system.
Guristas Cargo Concealment Unit Remains
This appears to be the remains of a piece of high-tech black market smuggling equipment, the design of which is thought to have originated from the Satori-Horigu Epistemics corporation. It can electronically conceal contraband items stored within and digitally alter their signatures making them appear as regular, mundane, legal cargo - rendering the illicit contents undetectable by even the most powerful ship and cargo scanners employed by customs and law enforcement agencies in the cluster. Attempting to reverse engineer this item could lead to several clues as to what was smuggled within and how the device operates, although the high-level of encryption and damage means that only a specialized facility is likely to find any value or success in accomplishing this. The Caldari State will reward Capsuleers who bring this item to their State Counter-Insurgency Outpost located in the Onnamon solarsystem. The Gallente Federation will reward Capsuleers who bring this item to their Federation Counter-Insurgency Outpost located in the Intaki solarsystem.
Guristas Insurgency Data Sequence
This data sequence recovered from a Guristas Pirate ship could be host to a whole trove of valuable information that would be of interest to the Caldari State or Gallente Federation in securing their borders and launching counter-attacks against the pirate insurgents. The data is in fragmentary form and hundreds, if not thousands, of sequences would be required to break the code, as such, only a specialized facility is likely to find any value or success in decrypting this. The Caldari State will reward Capsuleers who bring this item to their State Counter-Insurgency Outpost located in the Onnamon solarsystem. The Gallente Federation will reward Capsuleers who bring this item to their Federation Counter-Insurgency Outpost located in the Intaki solarsystem.
Guristas Pirates 'Prize' Ledger
This "Prize" Ledger includes a list of locations and targets of interest to the Guristas Pirates and their heist crews. The Guristas are apt to consider anything they can put their hands on as a "prize" and the list could be of immense value if it can be analyzed quickly, allowing law enforcement to know where in advance the Guristas might strike. However, such ledgers often feature several decoy entries and it is written almost entirely in a cryptolect understood by very few outside the specific Guristas heist crew assigned to the targets it details, as such, only a specialized facility is likely to find useful intelligence from this before the acts are carried out. The Caldari State will reward Capsuleers who bring this item to their State Counter-Insurgency Outpost located in the Onnamon solarsystem. The Gallente Federation will reward Capsuleers who bring this item to their Federation Counter-Insurgency Outpost located in the Intaki solarsystem.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Pirates Data Fragment
This fragmentary data has been recovered from a Guristas Pirates communications storage buffer, a device typically used to hold data relayed to and from a spaceship and remote locations via secured fluid router networks. Although partial and somewhat corrupted, with the right approach it should be possible to decode the data stream and assemble something coherent from the intact data. It wouldn't hurt to give it a try and see if something clicks.
Guristas Research Data
These documents contain valuable technical data on Gurista ship technology.
Guristas War Plans
Guristas War Plans
Hand of Arzad
A tattered document, presumably a part of a larger manuscript. The text is written neatly, though much of it is faded. An excerpt from this piece, titled “Chapter 20 – Hand of Arzad” reads as follows: “The Hand of Arzad grew to become the most popular festival on Starkman Prime, so beloved was this day of rest granted by Arzad Hamri. On this day, Hamri presided acted as pastor of religious services, in which most of the Starkmanir attended. His sermons from these festivals were collected and distributed among the tribe, often used by the elders to educate the young people of the importance of benevolence and good grace to people of all stations. The theme of Arzad's sermons was almost always of the inherent dignity of the Starkmanir, their precious qualities, and the hope of salvation through servitude. This message did not fall on deaf ears, and many ambitious, young Starkmanir took his words as inspiration for independence and rebellion against the greater Amarr Empire, though Arzad was always able to quell the burgeoning pride and self-esteem of the slaves. ‘Salvation comes through servitude, the grace of your masters, the dignity of your being,' was Arzad's common response, his refrain found throughout his sermons.”
Hauteker Memoirs
Painstakingly written by hand in an antiquated Nefantar script, these memoirs outline the short-lived fortunes of an Ammatar clan known as the Hauteker – long since lost to time. The memoir's focus seems to be on the preservation of family tradition; the highly detailed passages document everything from the way the Hauteker family dressed to where they were all buried.
Havatiah's Ship Database
This tiny, glassy data chip holds information from the database of a ship formerly in the possession of Havatiah Kiin. Information stored within here could be anything from the ship's logs.
Heap-Load of Garbage
Production waste can mean garbage to some but valuable resource material to others.
Heart Stone
These religious artifacts are highly decorated and carry an air of something ancient and beyond grasp.
Hidden Data Sheets
Secret documents.
High-Tech Data Chip
A small wafer of semiconductor material that forms the base for an integrated circuit. High-Tech Data Chips have more capacity than their lower tech counter-parts.
High-Tech Manufacturing Tools
Tools used in various construction projects, such as ship, module or ground vehicle manufacturing. High-Tech tools are of better quality than the more common prototypes, and are more expensive.
High-Tech Scanner
A device for sensing recorded data or transmission signals.
High-Tech Small Arms
These weapons are of superior quality to those normally found on the public market, although more expensive as well. They are implemented with a safety net which prevents them from being used illegally in stations where most types of small arms are prohibited. Therefore many regions do not apply the small arms ban on these weapons.
Hive Mind CPU
This cumbersome, alien-looking device, throbbing with light and humming faintly, apparently contains the mind of Professor Kajurei Delainen, somehow fused with the AI of his rogue drone nanites.
Holoreel - Torture Log I15B
The grainy footage on this holoreel depicts a young man standing in a small room, his arms bound and his legs chained to the ground, spread apart as far as they can go. His face cannot be seen. The man is bleeding from cuts all across his body. A woman's voice asks him an inaudible question. He answers, “No.” The voice asks another question, also inaudible. The man gives the same response. This repeats for a few more questions. After the last question, a woman dressed in a Gallente Federation uniform appears. She approaches the man. The man lifts his head, showing his face: It is Irichi. The woman holds his face in his hands, kisses him softly on the lips, and turns to the holoprojector: It is Cilis. She reaches off camera for something. Behind her, Irichi's head drops, tears streaming down his face. Cilis returns, holding a remote in her hands. She pushes a button. Mechanical noises reverberate throughout the room. A panel opens beneath Irichi's feet. He winces, screams in pain. Loud sawing noises interrupt the scene. The footage goes blank.
Holoreel: Wanted for Love
A low-quality holoreel titled “Wanted for Love.” The description on the back of the shoddy packaging reads: “A Gallente women, recently divorced and fired from her high-paying job at Combined Harvest, is framed for murdering her ex-husband. On the run from CONCORD, she delves deep into the heart of New Eden's underworld, where she discovers what she's truly made of. Hot on her trails is her ex-lover, a deputy officer in the Directive Enforcement Department. Inspired by love, he goes undercover in search of his one and only soulmate, who is truly wanted for love. This sultry, uncensored journey of self-discovery and the limits of romance stimulates mind, body, and soul. Starring Elois Ottin in her most scintillating performance yet.”
Honorary Brigadier of Engineers Insignia
This service insignia is inscribed on the reverse with the name of the capsuleer TorDog and indicates his honorary rank as a Caldari Brigadier of Engineers. This award was given in recognition of exemplary service as the top supplier of Sleeper components for the Caldari Navy’s research program in late YC 116.
Honorary Fabricator-General Baton
This baton of command is inscribed with the name of the capsuleer Ascentior and signifies his honorary rank as a Fabricator-General of the Imperial Navy. This award was given in recognition of exemplary service as the top supplier of Sleeper components for the Imperial Navy’s research program in late YC 116.
Honorary Federal Harbormaster Pennon
This naval pennon has the name of the capsuleer Shipstorm woven into its fabric and displays his honorary rank as a Federal Harbormaster. This award was given in recognition of exemplary service as the top supplier of Sleeper components for the Federation Navy’s research program in late YC 116.
Honorary Fleet Architect Badge
This military badge carries the name of the capsuleer Lotrec Emetin and is a mark of his honorary rank as a Republic Fleet Architect. This award was given in recognition of exemplary service as the top supplier of Sleeper components for the Republic Fleet’s research program in late YC 116.
Hyasyoda Captain
Recovered from a battered security compound, this Hyasyoda captain met an untimely end. His demise suggests that perhaps Hyasyoda wasn't in total agreement with Serpentis about the arrangements made in Onirvura.
Hybrid Slaver Hounds
Hybrid slaver hounds have been genetically engineered by Amarr veterinary scientists as variants of the original breed. These animals are designed specifically to live and work in the harshest environments, including deserts, swamps, mountains, frozen tundra, and other extreme locations. These variations are typically easy to differentiate from the original breed, in that they can be much larger and have fur colorations that are genetically tailored to blend in to their environments.
Incriminating Evidence
This evidence proves beyond the shadow of a doubt that foul play was involved.
Infrared Ray Modulate Disc
This disc of crystals is specially constructed to modulate infrared rays in a Solray Infrared Alignment Unit.
Inquest Drone
Hundreds of these tiny devices were released momentarily before the explosion of Irrie Carlan's vessel. Motionless upon launch, they began to spring to life shortly afterwards, flitting around the ruins of the ship as they assessed the damage. Most curiously, they appeared to perform some kind of in-space surgical procedure on Carlan's corpse once it had been located amongst the wreckage. Now removed from the rest of its swarm, this particular drone has powered down entirely and seemingly erased its own subroutines. Any chance at reverse-engineering it in this state would be slim.
Insorum
Insorum (Insorzapine bisulfate) is a reactive mutagen binder, a compound whose active chemical responds dynamically to mutagens in the body. This gives it tremendous healing properties for those afflicted with specific diseases, but, it is believed, also makes it an extremely dangerous genetic toxin for those in otherwise good health.
Insorum Booster Prototype
The only known cure for the infamous Vitoc method that Amarrians use to control their massive slave contingents, Insorum is the answer to every loyal Minmatar's desire to see their people freed from its insidious grip. How Angel Lieutenant Kaura Triat even came into possession of such a rare and highly-valued Insorum sample is anyone's guess. More intriguing, however, is the fact that it seems to have been heavily modified by scientists, perhaps those working for Serpentis Inquest. Encased in a resilient tamper-proof case that will destroy the contents within if opened by anyone but its owner, this sample seems to have been integrated with the Sooth Sayer booster. What purpose this process might have served remains entirely unclear.
Insta-Lock
A new type of construction component, the Insta-Lock fuses structural components together almost instantaneously.
Intaki Clackers
A traditional Intaki musical instrument, the clacker consists of two flat pieces of lightweight material, loosely bound at one edge. When that end is held and the other end swung forward, the instrument produces a sharp clashing sound. Given the scarcity of wood in space, the instrument today is often made from plastic or other polymer variants. More complex variants have lights or chemicals inset in the material that can make the clackers do anything from reflecting light to taking on an eerie glow, or even emitting sparks. It's not at all uncommon for older siblings to frighten their younger relatives by sneaking up at them in the dark of night, rattling their clackers like some red-eyed beast of myth snapping its jaws.
Intercepted Rogue Drone Communications Fragment 0KQC
01100100011011100110010111000101101000010110111011000011101011010110100001101111001000000110010001101110011001010010000001101111011000100110101001100101011101100110100101101100001011100010000000100010010100001100010110011001110000111010110101110010011011110110010001100001001000000110111001100001110001011010000101101100011000010010000001101010011001010110010001100101011011100010000001111010011100001100010110101111011100110110111101100010001011000010000001101010011000010110101100100000011011110111001001100111011000010110111001101001011110100110111101110110011000010111010000100000110001011011111001101001011101100110111101110101001000000110100001101101011011110111010001110101001011100010000001001010011001010010000001110110110001011010000101100001011010110010000001101010011010010110111011000011101111010010000001111010011100001100010110101111011100110110111101100010001011000010000001101010011001010110010001101110011011110110010001110101110001011010000111000101101000011100001110101101001011000010000001110100011101101100001110100001011100100110111011000100100110110110101011000101101000011100001110101101001000000110000100100000011100100111100101100011011010000110110001100101011010101100010110100001110000111010110100101100001000000110111001100001001000000110111011000100100110110110101011000101101111100010000001110000110001011001100111000011101011010111001001101111011001000110000100100000011101101100010110101111011000100110010101100011001000000110111001100101011011100110000101110010011000010111101001101001011011000110000100101110001000000101010001110101011101000110111100100000011001000111001001110101011010000110111101110101001000000110001101100101011100110111010001110101001011000010000001110000011011110010000001101011011101000110010101110010110000111010100100100000011100110110010100100000011011010110111101101000011011000010000001100010011100101100001110100001011101000010000001110110110000111011110101110110011011110110101000100000
Intercepted Rogue Drone Communications Fragment 52B7
01000001001110100010000001000001011010000010110000100000011010100110010111000101101000010111010011000100100110110010000001100011011101100110100111000100100011011100001110101101001111110000101001000111001110100010000001010000011011110111001101101100011110011100010110100001011101000110010100101100001000000100010001101111011011010110100101101110011001010010110000100000011101010110010011000100100110110110110001100001011011000110100100100000011010100111001101101101011001010010000001110010011011110111101001101000011011110110010001101110110001001001101100100000011000110110100001111001011000100111010100101110000010100100010000111010001000000010100001111010011000010111001101110100011000010111011011000011101011010010000001110011011001010010100100100000010010100110000101101011011011110111010100111111
Intercepted Rogue Drone Communications Fragment 55EG
010010000011101000100000010010100110010100100000011100110110111001100001011001000010000001101001001000000111010001100001001011100010111000101110001000000110111001100101011011101100001110100001011101100110100101110011011101000010000001110000011011110110010001101111011000100110111011000100100110110110101011000101101000011100001110101101001000000110110001101001011001000110010101101101001111110000101001000111001110100010000000101000011010110111001011000100100011011100001110101101001000000111001001100001011011010110010101101110011110010010100100100000010010010010000001110100011000010010000001101010011001010010000001110000011011110110101101110010011011110110101100101110
Intercepted Rogue Drone Communications Fragment GQ35
0100100000111010001000000100111001100101001011000010000001001101011000010111001001101001011101010111001100100000011000010010000001010011011101010110110001101100011000010010000001100010011110010110110001101001001000000111011001101111011010100110010101110110110001011010111101100100011000110110100100100000011000010010000001100010011011110110101001101111011101100110000101101100011010010010000001110000011100100110111101110100011010010010000001110011011011110110001011000100100110110010000001110010011011110110101101110101001011010010110100001010001000000010000000100000001000000111001001101111011010110111010100101101001011010100111001100101011101101100001110101101011011010010000001110101110001011011111000101110
Intercepted Rogue Drone Communications Fragment JQH0
010000010011101000100000110000111001001100101101001011011100001110110011001011010010110111000011101100110010110000100000011100000111001001101111110001001000110100100000011010100111001101110100011001010010000001101010011001010010000001111010011000010110100001110101011000100110100101101100011010010010000100001010010100100010000000110010001110100010000001000011011010000111010011000100100110110110110001101001001000000110101001110011011011010110010100100000011000101100001110111101011101000010000001101010011000010110101101101111001000000110110001101001011001001100001110101001001011100010000001000011011010000111010011000100100110110110110001101001001000000110101001110011011011010110010100100000011100110110010100100000011100110111010011000011101000010111010000100000011011000110100101100100011011010110100100101110000010100101001000111010001000000100001101101000011101001100010010011011011011000110100100100000011010100111001101101101011001010010000011000101101111101100001110101101011101000010111000100000010010100111001101101101011001010010000001110011011000110110100001101111011100000110111011000100100110110110101011000101101000011100001110101101001011100010000001001110011000010111010111000100100011010110100101101100011010010010000001101010011100110110110101100101001000000111001101100101001000000111011011000101101000010110010101101101011101010010111000100000010001000110111101110110011001010110010001100101011011010110010100100000011101101100010110100001011001010110001101101000011011100110111100101110000010100101001000100000001100110011101000100000010001000110000101101100011010010010000001101010011100110111010001100101001000000110111011000011101000010110110100100000011110100110001001110010011000010110111011000100100110110010111000100000010011010111010101110011011001010110110001101001001000000110101001110011011011010110010100100000011100110110010100100000011100110111010011000011101000010111010000100000011100001100001110100001011011100111100100101110
Intermediate Medal
A medal awarded to those that have completed the Intermediate Trial of the Legends Trials.
Intravenous Oscillation Fluid
This thick liquid is used by the Central Archive Cerebrum to operate its intricate machinery.
Iron Order of the Storm
Made up of those Caldari who stand resolute in the face of great hardship, the Iron Order of the Storm is considered one of the greatest awards the State can bestow. It draws on the imagery of Storm Wind, whose ferocity cannot be stopped, no matter how many stand against him. “I shall not stand aside. I must hold; not for my own sake, but for the sake of others.” – Yakiya Tovil-Toba
Ishukone Corporate Records
These encoded reports hold extremely sensitive information regarding Ishukone Corporation holdings and infrastructure.
Ishukone Operational Reports
Bluechip devices like these serve a similar role to the "black boxes" used aboard planetary aircraft. They are capable of storing vast amounts of information, and protecting it in a secure shell that can withstand immense destructive forces. Due to their resilience, they are also the favored data storage unit of military companies who need vital operational data to be safeguarded from attack. This particular bluechip has been modified to protect the contents in even more ways. A distinctively unique hybrid cipher has reduced the contents of each report to a series of 1's and 0's.
Jovian Delegates
This is a list of the Jovian science delegates assigned to the Crielere research facility. They handle all correspondence between the Jovians and the Gallente/Caldari: Nida Liko Tarazin Ulio Fabor
Kennel of Hybrid Slaver Hounds
Hybrid slaver hounds have been genetically engineered by Amarr veterinary scientists as variants of the original breed. These animals are designed specifically to live and work in the harshest environments, including deserts, swamps, mountains, frozen tundra, and other extreme locations. These variations are typically easy to differentiate from the original breed, in that they can be much larger and have fur colorations that are genetically tailored to blend in to their environments.
Keron's Head
Keron Vandafelt's Head. Preserved in a vat of Liquid.
Khumaak
The Khumaak (literally "Hand of Maak") is a replica of an ancient Amarrian relic used nearly 400 years ago by a Minmatar slave to kill his master, thereby sparking a revolt on Arzad II (also known as Starkman Prime). This revolt, while precipitating the almost total annihilation of the Starkmanir Minmatar tribe, has in historical retrospect come to be credited as one of the seminal events leading to the later Minmatar uprising. The weapon itself is a three-foot rod with a spiked solar disc on the top, the design of the original relic believed to date back to the pre-Reclaiming era of Amarrian prophet Dano Geinok. It isn't believed to have been intended as a weapon originally, but as a rod of command for high-ranking members of the Amarrian Conformist clergy.
Kidnapping Evidence
Veine Coructie has collected the evidence you collected from the Pator 6, as well as some of the data found from the bug you planted. With this in hand, they're ready to smoke the kid out by causing a big media stir. There's no hiding when an entire population is out to get you. Sure, you should probably take this to the FIO, but who knows how effective this will be?
Komni History (1 of 2)
The Komni corporation was founded by the multi-billionaire Kaimo Nayen, who had garnered his fortune by building up a real estate empire on Caldari Prime. The purpose of the company was to give his firstborn son, Shojin Nayen, a chance to receive experience as a CEO, before the time came for him to take over the reigns of his father's mega-corporation. Komni dealt in simple garbage hauling tasks, employing a few dozen washed up pilots to do the sordid task of transporting unrecyclable material to remote locations within the Caldari solarsystems.Unfortunately Shojin had been inexcusably spoiled as a child, and lacked all of his fathers virtues which had helped him become so successful. The Komni corporation quickly began losing money, bad deals were made and the daily affairs were generally ignored by Shojin who spent most of his time dating beautiful women and staying out late at night at popular Caldari bars. But when his father learned of the state of things, and that the Komni corporation had slid to the verge of bankruptcy, he became furious. He demanded that his son straighten things out, or all of his shares within the mega-real-estate corporation would go to his other son, Akimo.Shojin became terrified at these grim tidings, and was especially worried that his father would also strip him of access to his bank account which he so much relied on to live his extravagant lifestyle. So he turned to the underworld for aid, secretly contacting an agent employed by the Guristas Pirates, Drako Minai, to manage his corporate affairs. At first this worked out perfectly, the Komni stock rose considerably and money came streaming in. Better pilots and maintainance on the old company haulers were finally affordable, without any intervention from Kaimo.
Komni History (2 of 2)
But soon the old man became suspicious. He couldn't believe the incredibly good fortune his son was suddenly blessed with was simply due to hard, honest work. So he hired an expensive private detective, Asamura, to investigate the internal affairs within Komni, to better understand exactly what had changed since disaster loomed over the corporation. Asamura, being an ex-elite agent within the Caldari State special forces, quickly discovered who was behind this turn of events; that the Guristas had been using the garbage haulers as a means to smuggle drugs and other illegal goods into Caldari high security space for enormous profits. Due to Kaimos's close relationship with many members of the Caldari State government, the garbage haulers received far less attention from local security forces than other, more suspcious craft.When Kaimo heard of these tidings he became furious. If the news surfaced about Komni being under the influence of the Guristas Pirates and committing illegal acts within the Caldari State borders, his status and even his life might be forfeit. He immediately confronted his son and ordered him to cut all ties with the Guristas, as well as letting him know that he had just blown any chance he had of acquiring the family fortune. But there was one single flaw in Kaimos plan, and that was his underestimating of his sons determination to remain wealthy. Threatening to expose Komnis illegal dealings to the media, Shojin played the only card he had. Either his father leave his corporation alone and give it a large credit "donation", or both of their reputations would be ruined. In return Shojin would severe all ties with the Guristas. His father reluctantly accepted his sons terms.Shortly thereafter Shojin held a secret meeting with his contact within the Guristas. He demanded that Drako stop the illegal activity the Guristas had been conducting behind his back, and remove all ties they had with Komni. But the wry, finely dressed agent simply laughed, they had played Shojin for a fool all along. While Shojin had been endulging himself with the finer things in life, Drako had been busily hoarding the company stocks in preparation for a takeover. He knew about Asamuras involvement, and expected this very conversation. As Shojin looked in horror, two burly, brown-skinned men entered the room where he stood next to Drako. With a simple move of his right hand, Drako ordered his guards to execute his unfortunate client. And as he left the room, followed by high-pitched screams which were quickly silenced, the smiling, middle-aged man dressed in a shiny black tuxedo thought of how happy he was that the Komni stock had risen drastically upon the news of the takeover. No longer would he need to answer to his less-than-trustworthy superiors within the Guristas, from this day forward he would own his very own branch within the vast Caldari criminal network.
Korim Kor-Azor
This is a member of the House Kor-Azor, accused of being a traitor of the Empire by the Sarum. He vehemently denies this accusation.
Korrani's DNA
Once a member of the elite ranks within the Mordu's Legion Command, Korrani was a popular role model for young and aspiring pilots within the mercenary organization. Because of this it was even more surprising that such a talented and well known fighter pilot would be caught up in a murder trial... of his own brother, who stood to inherit most of the real estate empire previously in possession of his Caldari grandfather. Korrani's tale, although sad, is currently used by mentors within the Mordus Legion to teach new recruits a valuable lesson on life. But meanwhile, Korrani has made quite a name for himself within the underworld, choosing to live the life of a rogue freelancer rather than face trial in his nation of birth for murder. Korrani operates a powerfull Mordu ship fitted with top notch equipment, a worthy adversary for any decent fighter pilot.
Kruul's DNA
DNA samples are any of various nucleic acids that are usually the molecular basis of heredity, are localized especially in cell nuclei, and are constructed of a double helix held together by hydrogen bonds between purine and pyrimidine bases which project inward from two chains containing alternate links of deoxyribose and phosphate. This is a DNA sample taken from the hapless pirate marauder, Kruul.
Large 'Fortizar' Citadel BPC Token
This reward token signifies that its owner will be gifted a 1 run blueprint copy for a large sized Fortizar Citadel structure for services rendered to the Upwell Consortium.
Large Crate of Amarr Scripture Educational Study Packages (Matari translation)
These study materials provide a guide through the structure and meanings of Amarr holy texts in a way that school-age children can easily understand. Education, like every other aspect of daily life in the Empire, is closely tied into religion, and by the time they leave school, Amarr children are expected to have a working and in-depth understanding of their way of life. These particular copies have been carefully translated by experts into painfully precise Matari for distribution in the Republic.
Large Crate of Archaeological Lot GV87-426-E Artifacts
This looks like little more than half a starship, perhaps one which was modified into ground-based living quarters. Several panels are inscribed with decorative symbols, possibly writing. The carefully-dismantled panels are accompanied by several crates filled with pieces of what appear to be small-industry mining tools, encrusted with moon-dust. The oxygen-free lunar atmosphere prevented rust from forming on the metal, and writing etched into the flat surfaces is clearly visible. Another crate is filled with core samples and geodes. A note accompanying the find indicates that the minerals have no known industrial property in any part of the present-day Federation, and further research will be needed to determine the purpose of the pre-Federation miners.
Large Crate of Architectural-Quality Plagioclase Paneling
Minmatar architecture traditionally favors modular geometric structures and open spaces which allow breezes to flow from room to room. There is a traditional preference for working with exposed natural stone and wood, though recent trends have leaned towards natural surfaces bonded to structural reinforced concrete, stretching resources while still allowing for an attractive appearance. Compressed asteroid ore interior panels are becoming more popular for higher-class residences and for buildings constructed on mineral-poor worlds.
Large Crate of Contained Mesarchonite
A coarse-looking, dark red mineral with a geodic structure containing translucent crystals of the same color. Its radioactive properties require the material to be stored in special containment units; handling by anyone other than a trained engineer is strongly discouraged. Mesarchonite is used primarily in stationside security networks, mostly in the systems which detect interference or tampering along the audio-visual lines.
Large Crate of Cryo-Stored Luminaire Skippers
These large, indigo-hued amphibians are commonly used in laboratory work. Each weighs roughly two kilograms, and in their natural environment in the marshlands of Gallente Prime are the dominant aquatic predator. To prevent the stresses of space travel from affecting the frogs' physiology, it is necessary to transport them in a cold-case which drops their body temperature and induces a state of hibernation.
Large Crate of Exclusive Simo Reshar Fitness Holoreels
Fitness guru Simo Reshar is iconic less for the effectiveness of his workout routines than for the questionable nature of the visuals and extremely cheesy rhythmic music. The covers depict the skinny workout instructor with his anthropomorphic cartoon assistants, dressed in worryingly skintight shiny outfits. Though clearly intended for a younger audience, adults have professed to discover deeper philosophical meanings within the holos' content if watched whilst under the influence of certain substances. Reshar's assistants, particularly the feline Leeta and avian Yanis, have gained a cult following among certain fetish scenes across the cluster.
Large Crate of Experimental ECM Hybrid Rounds
These modified tungsten hybrid rounds send out an ECM pulse through the hull of any ship they strike, momentarily baffling the ship's target-locking mechanisms and affording the formerly-targeted ship a few precious moments to gain an advantage or escape. Efforts are being made to develop this into purely friend-or-foe munitions, effectively counteracting the effects of enemy ECM, but adaptation of the missile-based tracking technology to hybrid shell systems has proven difficult.
Large Crate of Feille d'Marnne Champagne
This champagne originates from Egghelende III, the planet's major product for export. Shipping it out of the pirate-heavy system makes it pricey enough, but the grapes have proven impossible to cultivate anywhere else in the Federation. Each case is worth a couple hundred thousand ISK. Each bottle would bring enough planetary cred for a civilian to live comfortably for a year or ten. A bottle or three would definitely be missed.
Large Crate of Harvester Components
Agricultural technology, like everything else, is constantly advancing, with developments in irrigation techniques and automated systems to do the work of several farm-hands at a fraction of the overall cost. Most parts are produced on stations rather than planetside in order to reduce the cost of shipping. It also makes disposing of the more hazardous byproducts much safer, reducing the risk of planetary pollution.
Large Crate of Improved Inertial Compensation Systems
The internal components of smaller Minmatar ships are constructed largely of nanofiber mesh which is low-cost, low-mass, and has a lower heat-conduction threshold than most solid industrial sheeting. Unfortunately, the lightweight structures are also susceptible to stress from the high-velocity maneuvers performed by frigate and interceptor pilots, and require added inertial compensation systems and routine inspections.
Large Crate of Industrial-Grade Tritanium-Alloy Scraps
Not all scrap-metal is of good enough quality to be reused in the shipbuilding industry. These are the highest quality to be found in the scrap-heaps and abandoned battlegrounds of New Eden. Some pieces still bear signs of what they were once a part of: a sheet of tinted plating here, a painted logo there. Some pieces are still recognizable, others are half-slagged and warped.
Large Crate of Portable Emergency Heating Units
These heating units are compact, and light enough to carry in one hand. Each comes with two 10-hour rechargeable batteries, to be used one at a time while the spare charges. The amount of energy one unit puts off would be enough to warm a space of 20 cubic meters, roughly the interior space of a stationside apartment's main room, to an average of 10 degrees Celsius. Not particularly cosy, but better than freezing.
Large Crate of Refurbished Mining Drones
There are hints of rusty and damaged surfaces beneath the shiny new paint-job. These may not work as efficiently as the client wishes.
Large Crate of Suspicious Holoreels
There doesn't appear to be any particular organization here. Dozens of identical copies of everything from period dramas to last week's boxing finals, in original cases. Nothing that would raise any eyebrows. The actual contents of the holoreels are far less innocuous. After a token menu page and a few minutes of whatever program the case displays, they switch to more interesting material. Entire corporate internal presentations clearly never intended for the public eye. Snoop footage of important officials talking and even exchanging money with known competitors. A series of compromising stills of a prominent politician. These will be worth a lot of money to someone.
Large Crate of Talocan Station Life-Support Cores
These pieces appear to all be some form of polyhedral from truncated pyramids that can be gripped in the hand to barrel-sized fullerene-faceted globes. Each is shaped as if in one complete piece from bluish or steely-gray material, all edges beveled and smoothed. When rapped with a knuckle, the pieces ring like a bell, but the material feels more like ceramic. Every item bears a sort of dim, inner glow that pulses irregularly, like a dying light bulb. A tingle like electricity can be felt just above their surfaces, though preliminary examinations have dismissed the presence of any electrical activity. Each piece fits face to face with another piece; when linked correctly, they form series of twisted fractal-like branches.
Large Crate of Target Painter Deflection Plating
These hull plates are coated with a layer of crystalline structures under a protective transparent enamel. The crystalline layer shimmers reflectively and creates mirage halos around the plate when spot lights are directed at it.
Large Crate of Unidentified Fibrous Compound
These pieces of blue-green compound feel slick and oily to the touch and leave a tingle in your fingers. Fine crystalline filaments within crisscross and refract the light so that each piece seems to glow from within.
Large Crates of Construction Blocks
Metal girders, plasteel concrete and fiber blocks are all very common construction material used around the universe.
Large Crates of Coolant
This specially blended fluid is ideal for transferring thermal energy away from sensitive machinery or computer components, rerouting it to heat sinks so it can be eliminated from the system.
Large Crates of Data Sheets
These complicated data sheets may mean little to the layman's eye, but can prove valuable in the right hands.
Large Crates of Drill Parts
These large containers are fitted with a password-protected security lock. These particular containers are filled with spare parts needed to build a drill used for drilling through rock and ice sheets.
Large Crates of Electronic Parts
These basic elements of all electronic hardware are sought out by those who require spare parts in their hardware. Factories and manufacturers take these parts and assemble them into finished products, which are then sold on the market.
Large Crates of Fertilizer
Fertilizer is particularly valued on agricultural worlds, where there is constant supply for all commodities that boost export value.
Large Crates of Frozen Food
Frozen food is in high demand in many regions, especially on stations orbiting a non-habitable planet and a long way from an agricultural world.
Large Crates of Frozen Plant Seeds
Frozen plant seeds are in high demand in many regions, especially on stations orbiting a non-habitable planet.
Large Crates of Galeptos Medicine
Galeptos is a rare type of medicine developed by the famous Gallentean scientist, Darven Galeptos. It is produced from a blend of organic and chemical material, used to cure a rare and deadly viral infection which has been creeping up more frequently as of late. Rumor has it that Galeptos manufactured the virus himself, then sold the cure for billions of ISK. Of course his corporation, Galeptos Medicines, steadfastly denies any such "unfounded" accusations and has threatened legal action to anyone who mentions it in public.
Large Crates of Garbage
Production waste can mean garbage to some but valuable resource material to others.
Large Crates of Guidance Systems
An electrical device used in targeting systems and tracking computers.
Large Crates of Harroule Dryweed
Grown on a terrestrial world in the Harroule system, the Dryweed plant has fragile, yellowish leaves that burn very slowly, giving off a pleasant vapor that is known to have a soothing effect when inhaled.
Large Crates of Holoreels
Holo-Vid reels are the most common type of personal entertainment there is. From interactive gaming to erotic motion pictures, these reels can contain hundreds of titles each.
Large Crates of Liparer Cheese
Due to the unique properties of the Liparer system's terrestrial worlds, animals raised there have very low body fat, resulting in relatively bland but far healthier dairy products.
Large Crates of Long-limb Roes
The eggs of the Hanging Long-limb are among the most sought after delicacies in fancy restaurants. The main reason why the roe of the Hanging Long-limb is so rare is because no one has succeeded in breeding the species outside their natural habitat.
Large Crates of Mechanical Parts
These basic elements of all mechanical hardware can come in virtually any shape and size, although composite or modular functionality is highly advantageous in today's competitive market. Factories and manufacturers take these parts and assemble them into finished products, which are then sold on the market.
Large Crates of Mono-Cell Batteries
Although they're a relatively old design, mono-cell batteries are still a reliable method of storing electricity in bulk, specifically designed for long-term use in stations or planetary vehicles.
Large Crates of Oxygen
Oxygen is a commodity in constant demand. While most stations have their own supply units, smaller depots and space crafts rely on imports.
Large Crates of Planetary Vehicles
Tracked, wheeled and hover vehicles used within planetary atmosphere for personal and business use.
Large Crates of Polytextiles
This synthetic fabric is used for clothing as well as makeshift shelters on hard-climate colonies.
Large Crates of Protein Delicacies
Protein Delicacies are cheap and nutritious food products manufactured by one of the Caldari mega corporations, Sukuuvestaa. It comes in many flavors and tastes delicious. Despite its cheap price and abundance it is favored by many gourmet chefs in some of the finest restaurants around for its rich, earthy flavor and fragrance.
Large Crates of Raggy Dolls
Known across New Eden for their anatomical correctness and temperature sensitive, dynamic hair coloration, Raggy dolls are always in demand during gift-giving holidays.
Large Crates of Reports
These encoded reports may mean little to the untrained eye, but can prove valuable to the relevant institution.
Large Crates of Rocket Fuel
Augmented and concentrated fuel used primarily for missile production.
Large Crates of Small Arms
Personal weapons and armaments, used both for warfare and personal security.
Large Crates of Soil
Fertile soil rich with nutrients is very sought after by agricultural corporations and colonists on worlds with short biological history.
Large Crates of Spirits
Alcoholic beverages made by distilling a fermented mash of grains.
Large Crates of Synthetic Oil
Since original oil can be harvested only from a world with a long biological history, synthetic oil has become frequently produced in laboratories all over known space.
Large Crates of Tobacco
Tubular rolls of tobacco designed for smoking. The tube consists of finely shredded tobacco enclosed in a paper wrapper and is generally outfitted with a filter tip at the end.
Large Crates of Transmitters
An electronic device that generates and amplifies a carrier wave, modulates it with a meaningful signal derived from speech or other sources, and radiates the resulting signal from an antenna.
Large Crates of Viral Agent
The causative agent of an infectious disease, the viral agent is a parasite with a noncellular structure composed mainly of nucleic acid within a protein coat.
Large Crates of Vitoc
The Vitoc booster has become more than a simple strategy by the Amarrians in controling their slaves. With the Vitoc method, slaves are injected with a toxic chemical substance that is fatal unless the recipient receives a constant supply of an antidote. The method first appeared a few centuries ago when the Amarrians started manning some of their space ships with slaves. As space crew the slaves had to be cajoled into doing complex, often independent work, making older methods of slave control undesirable. Although the more conventional ways of subduing slaves with force (actual or threat of) are still widely used in other forced labor areas, the Vitoc method has proven itself admirably for the fleet.
Large Crates of Water
Water is one of the basic conditional elements of human survival. Most worlds have this compound in relative short supply and hence must rely on starship freight.
Large Group of Angel Cartel VIPs
These thugs and pirates look more like slick businessmen... with lots of armed bodyguards. Despite openly hostile relations, the empires must sometimes shake the hand of the devil in order to get things done. Much of that business is not intended to reach the light of day, or the eyes of the news agencies of New Eden.
Large Group of Civilian Workers and Dependents
Civilian workers and their dependents, including men, women, and children.
Large Group of Mannar Textile Institute International Representatives
Mannar, one of the oldest members of the Federation, has always had a strong influence on Gallente style and trendsetting. Much of the eccentric tailoring favored by society's elite and decried as immodest and inappropriate by the other empires has its roots in pre-Federation Mannar culture, which included different concepts of modesty and etiquette. Massive hairstyles and elaborate body- and face-painting still feature prominently in addition to semi-opaque fabrics which respond to a variety of programmable stimuli.
Large Group of The Hooded Men
Unlike most pro-Minmatar mercenary companies, members of The Hooded Men come from every empire and any background; they are selected for their convictions and skills rather than any sense of patriotism they might possess. Even Amarr are permitted to join, provided they can prove that the company means more to them than their religion. The Hooded Men's founder, Jolmiar Maritak, the grandson of former slaves who fled to the Gallente Federation, places emphasis on getting their work done quietly and with a minimum of fuss.
Large Sealed Cargo Containers
These large containers are fitted with a password-protected security lock.
Large Special Delivery
This box may contain personal items or commodities intended only for the delivery's recipient. This container is rather large and cumbersome.
Legends Medal
A medal awarded to those that have completed the final trial of the Legends Trials. Only the greatest combat pilots of the Eve universe can claim to have accomplished this great feat.
Letters of Bishop Dalamaid
The letters of Bishop Dalamaid have been the subject of volumes of intellectual discourse. The primary contention of the letters, that true saintly martyrdom is an impossibility for anyone even aware of the concept of sainthood, has gone through various levels of favor over the generations. Letters XIII through XV include a few juicy morsels about a prostitution ring that was run illegally from a monastery of one of the more prestigious orders in Dalamaid's time.
Liberation Games Reward Token
This token can be found within some sites related to the Minmatar Liberation Games event and may be sold in many Minmatar stations for an ISK reward.
Liberty Tattoo of the Minmatar Nation
Created during the Minmatar Rebellion to honor those fighting the Amarrians. At first it was only awarded posthumously to those that died heroic deaths during the rebellion, today it is often given to those that show great sacrifice and dedication to the Republic.
Liver Bile
Alkaline fluid secreted by the liver and stored in the gall bladder, it aids digestion and hemoglobin breakdown.
Luther Veron's Head
This is the head of Gallente General Luther Veron in all its flabby, balding glory. As it is not connected to his body at present it quite lacks the prestige it has grown accustomed to and, judging by the expression on its face, it's not at all content with this fact.
Major Effects
The effects of a Major.
Manchura's Logs
A small wafer of semiconductor material that forms the base for an integrated circuit.
Mangled Sansha Data Analyzer
This is still nearly recognizable as a Purloined Sansha Data Analyzer, but attempting to reprocess it has left it broken yet still more-or-less intact. It's possible that running it through the reprocessor a second time will yield better results.
Manportable Electromagnetic Pulse Weapons
These EM beam weapons have been custom fitted to detect and eradicate specific nanotechnologies. Normally, these EMP devices are used by special operations personnel during covert operations. They are placed in proximity to the enemy's defense grid and used to “short out” any nearby electronics, thus creating a hole in the defense grid such that conventional forces can then move through unimpeded by sentry grids, security bots, and other lethal defensive systems. The devices themselves are approximately the size of a large rucksack and can be both emplaced and operated by a single trained individual.
Manufacturing Tools
Tools used in various construction projects, such as ship, module or ground vehicle manufacturing.
Massive Sealed Cargo Containers
These colossal containers are fitted with a password-protected security lock.
Medical Supplies
Does what it says on the tin.
Medium 'Astrahus' Citadel BPC Token
This reward token signifies that its owner will be gifted a 1 run blueprint copy for a medium sized Astrahus Citadel structure for services rendered to the Upwell Consortium.
Medium Sized Sealed Cargo Containers
These containers are fitted with a password-protected security lock.
Message from the Governor
This message is sealed with the personal emblem of the Governor himself.
Military Navigation Telemetry
Military navigation telemetry is routinely collected from and distributed to fleets in the warzones from the operations centers of the empires. The data is often collated and combined with other information to provide reports to higher command authorities. While not necessarily the most critical intelligence, particular after some time has elapsed, this kind of data can be of great value for analyzing military traffic movements across the warzone. Once authenticated this telemetry will generally be purchased, no questions asked, by the navies and militia forces of the empires.
Minmatar DNA
This DNA sample was extracted from the remains of a Matari individual who died as a result of a severe allergic reaction to Augumene ore refined using an experimental method. Further research into this particular refining method has been terminated.
Minmatar Loyalty Token
These tokens are given to capsuleers who have contributed to the security and prosperity of the Minmatar Republic. They can be traded on the market for ISK in most Minmatar stations.
Minmatar Republic Transaction And Salary Logs
These reports hold information on recent transaction and salary logs from a corporation within the Minmatar Republic. They are very sought after by pirates, who use the often sensitive information held within for various purposes.
Minmatar Training Certification Results
These complicated data sheets may mean little to the layman's eye, but can prove valuable in the right hands.
Minmatar UUA Nexus Chip
This small data chip stores the key elements of a ship's artificial intelligence system, and is used primarily for controlling the vessel's autonomous functions. This particular chip has been modified by top Boundless Creation scientists for the Minmatar Fleet, made to be of better quality than what is available on the open market. The UUA chip is designed for frigate class vessels.
Minmatar UUB Nexus Chip
This small data chip stores the key elements of a ship's artificial intelligence system, and is used primarily for controlling the vessel's autonomous functions. This particular chip has been modified by top Boundless Creation scientists for the Minmatar Fleet, made to be of better quality than what is available on the open market. The UUB chip is designed for cruiser class vessels.
Minmatar UUC Nexus Chip
This small data chip stores the key elements of a ship's artificial intelligence system, and is used primarily for controlling the vessel's autonomous functions. This particular chip has been modified by top Boundless Creation scientists for the Minmatar Fleet, made to be of better quality than what is available on the open market. The UUC chip is designed for battleship class vessels.
Mizara's Doll
This doll is old and well-worn. It still smells faintly of brown sugar.
Modified Augumene Antidote
This serum alters the DNA of any Matari so that he or she becomes immune to the deleterious effects of modified Augumene.
Modified G-67 Nexus Chip
This small data chip stores the key elements of a ship's artificial intelligence system, and is used primarily for controlling the vessel's autonomous functions. This particular chip has been heavily modified by outlaw scientists, using technology that appears to have been salvaged from derelict Jove outposts. Advanced starship technology of this kind may be valuable to the right buyers. Rumors spreading through New Eden's underworld suggest that brokers operating out of the dangerous N-K4Q0 constellation have been inquiring about nexus chips matching this description.
Mordur's DNA
DNA samples are any of various nucleic acids that are usually the molecular basis of heredity, are localized especially in cell nuclei, and are constructed of a double helix held together by hydrogen bonds between purine and pyrimidine bases which project inward from two chains containing alternate links of deoxyribose and phosphate.
Mutadaptive Construction Component
Apparently a general purpose construction component, this Triglavian mutadaptive device appears to be designed to work in concert with others of its type, and more specialized components, in order to build structures of various sizes and purposes. Its applications are presumably limited only by its inherent properties and the designs it is programmed to execute. Large numbers of these devices are constructed in Triglavian space-industrial sites, including a number apparently farmed out to subverted drones by the Triglavians at locations with the designation "Vila Allopoiesis Nexus".
Mysterious Statuette
This ancient, faintly engraved statuette looks like just the kind of thing Canius was after.
Nanoplastic Membrane Patch
This length of super-thin nanoplastic is used by the Central Archive Cerebrum to operate its intricate machinery.
Native Freshfood Special
The Native Freshfood Special is a meat-heavy meal which is sought after all throughout the Minmatar Republic. The recipe has been handed down through countless generations, and is considered part of the Minmatar heritage.
Neophite
This priceless mineral was discovered by a band of Gallente explorers during the Caldari-Gallente war over a century ago. Closely related to morphite, its composition is only slightly different yet enough so that it has not been able to serve the same function. Only a few samples of it are known to remain intact, in the possession of some of the most wealthy collectors in the known universe.
Network Decryption Analyzer
This strange-looking piece of equipment was discovered unharmed amid the shattered hull of Guristas Lieutenant Sukkenen Fusura's vessel. Although baffling in its complexity, it is clearly used as a tool to breach secure networks. All the software appears to be proprietary, however. Without some way to understand even the basic functionality or system design there is little chance of using the device, let alone reverse-engineering it.
Neurowave Pattern Scanner
This scanner will track the brainwaves of any living creatures within a ship.
New Eden Genome Amalgam
This peculiar object was extracted from a device intended to build a neural lace in the brain of any given subject from the various races of New Eden. While it is now inert, the structure of the object suggests that it is a nanite amalgam containing the necessary material and encoding to establish and adapt a unique neural lace according to the genetic makeup of the subject. It does appear to lack a source of energy and a control framework. This must have been provided by the device it was extracted from. This object and its novel use of nanotechnology raises many questions.
New Eden Open Bronze Medal
Awarded to the third place team in the New Eden Open.
New Eden Open Fourth Place Medal
Because in the game of self respect, everyone's a winner!
New Eden Open Gold Medal
Awarded to the first place team in the New Eden Open.
New Eden Open Silver Medal
Awarded to the second place team in the New Eden Open.
Nidupadian Yorak Eggs
The eggs of the Yorak Fish are prized delicacies of the Amarrian Emperor and its house. Only those of royal blood are allowed to consume these rare eggs. Transportation of these eggs is only given to highly trusted employees and associates of Imperial Shipments. With the complete control on the consumption of these eggs controlled by the Emperor's House the processing plants are often a target of raiding factions to gain a few portions of these true delicacies.
Novice Medal
A medal awarded to those that have completed the Novice Trial of the Legends Trials.
Nugoeihuvi Data Chip
A data chip containing the ship logs of a Nugoeihuvi secret agent.
Number Box
This construction, consisting of rows of pellets set onto colorful pins, once allowed Ni-Kunni mathematicians and natural philosophers to perform highly complex calculations. Its use faded into memory, as most things do, only to be rediscovered as a tool with which to teach students the particulars of certain highly abstract three-dimensional calculations required for space flight. The number box's pins are placed both horizontally and vertically, so the pellets can be slid along a triple axis; the box is also, to the relief of some teachers, heavy and solid enough to hit a student firmly over the head if he still can't grasp the math.
Obsidian Datacore
Found inside the Blood Obsidian Orb, this datacore is supposed to reveal the location of the lost Book of St. Arzad.
Octomet Dog Tags
These dog tags are crudely constructed and chipped at the edges. The words are scrawled across the metal in a rough fashion, which feel hasty in their inscription. The name on the dog tag appears to be Caldari, though it is difficult to tell. A serial number also appears, as well as the acronym “D-IDS/IS.”
Old Map
This is an old map.
Olfei Medallion
What this medallion represents is unclear. A small passage has been engraved on the underside. It reads: “Many had come to this war, hardened warriors looking for a quick kredit and some front line combat experience. Then they had seen, and they had stayed.”
Olufami's DNA
DNA samples are any of various nucleic acids that are usually the molecular basis of heredity, are localized especially in cell nuclei, and are constructed of a double helix held together by hydrogen bonds between purine and pyrimidine bases which project inward from two chains containing alternate links of deoxyribose and phosphate. This is a DNA sample taken from a member of the infamous pirate gang 'The Seven', who goes by the name of Olufami.
Omega EGDLI3 Boosters Tier 1
Omega EGDLI3 Boosters Tier 2
Omega EGDLI3 Boosters Tier 3
Omega EGDLI3 Boosters Tier 4
Omega EGDLI3 Filaments Tier 1
Omega EGDLI3 Filaments Tier 2
Omega EGDLI3 Filaments Tier 3
Omega EGDLI3 Skillpoints Tier 1
Omega EGDLI3 Skillpoints Tier 2
Omega EGDLI3 Skillpoints Tier 3
Omega EGDLI3 Skillpoints Tier 4
Omega EGDLI3 Skins Tier 1
Omega EGDLI3 Skins Tier 2
Omega EGDLI3 Skins Tier 3
Omega EGDLI3 Skins Tier 4
Onyx Heart of Valor
Dating back to the Gallente-Caldari War, the Onyx Heart was created in memory of those brave souls that stayed behind on Caldari Prime to fight the Gallenteans when the rest of the population fled. Awarded only a few dozen times for the duration of the war, the Onyx Heart is only awarded when the well being of the State takes precedence over one's personal welfare.
Operation Center Reward Token
This token can be found within some sites related to the Caldari Union Day event and may be sold in many Caldari stations for an ISK reward.
Operation Stillwater: Synopsis
This small data storage unit contains a swathe of operational information, offering insights into an ongoing RSS investigation known as “Stillwater”. Although the report logs number in the hundreds of pages, a few key details become immediately apparent. The name of a highly-ranked Ammatar Consulate official recurs frequently, and references to her as “sister” reveal a secret loyalty to the Republic. Despite the prominence of this Ammatar defector in the reports, her name and any other identifying details have been omitted. Page after page of the synopsis is filled with meticulous documentation of the agent's daily life; every meeting they had, every stakeout they sat through, and every other lead they chased up – it is all here. The problem isn't the lack of detail, more the overwhelming amount of it. It will take some time to make sense of it all.
Ore Passkey
This electronic passkey is provided by tutorial agents as part of a capsuleer training program. It is used to unlock an acceleration gate inside the Ore site training area, where the “Proof of Discovery” documents can be found stored inside containers. The “Proof of Discovery” documents serve as physical evidence that the capsuleer was able to discover a particular type of site. This passkey is used to unlock Acceleration gates found inside Ore sites only.
ORE Research Data Fragment
This is a fragment of stolen Outer Ring Excavations (ORE) materials compression research data retrieved from pirate databanks. The ORE corporation is keenly interested in recovering any stolen research data and is willing to share some of its findings with those who return sufficient fragments. ORE Research Data Fragments can be turned in at ORE loyalty point stores for early access to compression technology skillbooks.
Ornamental Necklace
Often given as a wedding gift.
Ottin Holoreels Case
Kept safe from the explosion of her vessel, this Holoreel collection is a meticulous document of Serpentis Lieutenant Elois Ottin's entire acting career. A large Impetus logo is emblazoned on the outside of the container, suggesting that perhaps the case was a gift from the corporation. Although Ottin rarely managed to snare contracts with Impetus to produce her works, they did manage and fund her two most successful acting ventures. At one point she had a third lined up, but when her drug dependency became public knowledge Impetus dropped the contract amid the scandal.
Pallet of Ditanium Metal Plates
Refrigerated secure cargo containers containing aerogel infused with dormant prototype anti-nanites. These containers have been specially modified with the latest security encryption protocols, to better ensure that any Gallente saboteurs will be unable to access and tamper with this critical cargo.
Paragon Gift Crate
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Partially Corrupted Cryschip
This advanced cryschip is configured to store holographic data but has been heavily corrupted and partially wiped by a security protocol. In this instance the protocol was violently interrupted and some fragmentary data may remain accessible amongst the vast quantity of randomized information on this cryschip. With just the right approach it may be possible to track down and decode what remains, thereby accessing a coherent data stream. Curious capsuleers may profit by trying data retrieval and seeing if something clicks.
Pax Amarria
Written by Heideran VII, the Amarr Emperor himself, Pax Amarria is the most remarkable book published in the last century. In it the Emperor writes about his hopes and dreams for peace throughout the galaxy; a vision that has propelled him into becoming the champion of improved interstellar relations. His relentless strive for these goals has brought unparalleled harmony in the relationship between the empires; his constant search for peaceful solutions to any problem having many times becalmed brewing storms of hostilities on the horizon. His determination and powers of persuasion have compelled his own people and others to sacrifice many things they thought sacred to ensure that tranquillity will prevail, now and forever.
Pax Ammaria
This book has a history.
PDW-09FX Data Shell
This data storage unit must have contained invaluable insights into ongoing Sansha's Nation operations. However, it is encased within a neodymium trigger mechanism which caused it to auto-delete every single file in its database the moment it was exposed to the cold vacuum of space. A design utilizing the atmospheric reactivity of neodymium lies at the cutting edge of technology, requiring a level of ingenuity and craftsmanship well outside a True Slave's capabilities and indeed even beyond that of its former owner, Sansha's Nation Captain Toriiko Aanai. Stranger still, however, is the fact that this shell was also clearly designed to survive the explosion of her ship.
PDW-09FX Tactical Subroutines
This appears to be the logical nexus of the Phantasm-class cruiser once piloted by what was most probably a True Slave. Although heavily damaged following the explosion that freed it from the vessel, there are several semi-functional tactical subroutines still in operation now, seemingly unaware of their disconnection. The circuitry appears to have at one point been integrated into the pilot in some way, forming a frighteningly efficient harmony of mind and machine. Most disconcerting however, is the fact that various aspects of the software technology could only be a few years old.
Personal Information Data
This is a stack of data chips holding personal information about a station's general population. Although information on wealthy or important citizens is rarely kept on these disks, they are still quite valuable for criminals. Accessing this information without consent is illegal in most parts of the galaxy.
Phenod's DNA
Identification tags such as these may prove valuable if handed to the proper organization.
Physical Samples
A sampling of various types of organic matter that has been exposed to some unusual cosmic radiation.
Platinum Medallion of Freedom
Freedom is the highest ideal of the Gallente Federation and the Platinum Medallion of Freedom is bestowed only on those selected by the President himself. To be awarded this prestigious honor requires the potential for extreme personal harm in order to advance the Federation's values throughout New Eden. “If we do not stand up for peace, how can anyone else?” - President Aidonis Elabon
Primordial Biomass
This vat of biomass is slightly soupier than most.
Privateer Commander's Head
It's... well, it's a head. In a jar. And it once belonged to a privateer commander. (The head, not the jar. The jar was yours. Or, well, it was given to you, so it was kind of yours. Anyway, you put the head in it.)
Pro-Trade Pamphlets
Propaganda prose by supporters of Eman Autrech, singing the praise of free trade and universal love.
Proof of Discovery: Anomalies
This document has been placed inside a Cosmic Anomaly secured by Empire agents. It serves as physical proof that a capsuleer-in-training has been able to locate the anomaly through the use of On-Board Scanning.
Proof of Discovery: Data
This document has been placed inside a Data site secured by Empire agents. It serves as physical proof that a capsuleer-in-training has been able to locate the signature and successfully perform a hacking attempt inside the area.
Proof of Discovery: Gas
This document has been placed inside a Gas site secured by Empire agents. It serves as physical proof that a capsuleer-in-training has been able to locate the signature through the use of Core Scanner Probes.
Proof of Discovery: Ore
This document has been placed inside a Ore site secured by Empire agents. It serves as physical proof that a capsuleer-in-training has been able to locate the signature through the use of Core Scanner Probes.
Proof of Discovery: Relic
This document has been placed inside a Relic site secured by Empire agents. It serves as physical proof that a capsuleer-in-training has been able to locate the signature and properly performed analysis in the area.
Prototype Body Armor Fabric
This energy and force-absorbing fabric could represent a generational advancement in light body armor technology. What makes this remarkable fabric unique is that it contains microscopically thin layers of an advanced polymer containing nanites programmed for self-repair. In short, when a suit of body armor made form this material is impacted by any significant force, the nanites instantly begin to repair any damage done, which protects the wearer from further harm. Most importantly, during the manufacturing phase, if the fabric is properly pre-stressed, the nanites are forced to bond thus creating stronger and stronger material, without any increase in weight or decrease in flexibility. For these reasons, this prototype body armor fabric will undoubtedly become the most sought-after material for those groups able to afford its exorbitant price.
Quafe Ultra Special Edition
Quafe Ultra is the new energy drink from the Quafe Company, the largest manufacturer of soft drinks in the universe. A delightful promuform-and-guarana mix with just a hint of mango and a dash of passion fruit, this party-in-a-can will give you all the energy you can handle and then some! Quafe Ultra special edition is spiked with a "secret ingredient" to make the experience more thrilling and exciting for all those who want more from life. Not recommended for children under 5 and people with high blood pressure, uncontrolled diabetes or epilepsy. Quafe accepts no responsibility for injuries inflicted under the influence of Quafe Ultra.
Quafe Unleashed formula
These encoded reports contain highly sensitive information from the Quafe corporation regarding the chemical makeup of their new product, Quafe Unleashed.
Quantrium Wiring
While the universe is full of metals of all shapes, sizes, and compositions, there are some metals that are of such rarity and quality that they command prices far beyond those of the more easily accessible metals, such as tritanium. Amongst these, the very small quantities of a rare metal called quantrium are among the most valuable. This metal can only be found in the polar regions of certain moons, and these only in systems that meet very specific astrogeological conditions. So rare is this metal that, to date, only two known moons have quantities of this metal sufficient to warrant the very expensive mining and refining equipment required to extract it. Both of these moons are in Caldari space, giving the State a monopoly on its production and sale. Currently, all processed quantrium is on long-term contract to Kaalakiota Corporation. While rumors occasionally surface that one or more of the other three races have discovered quantrium, this has not been verified.
Quantum Entanglement
This heavy metal rock opera band was made famous by their first album's cover, which depicted two naked individuals engaging in sexual intercourse while floating in space without spacesuits. Gallente politicians tried to have the album, called "Unprotected," banned. Not because of the adult content, they claimed, but because it promoted unsafe extravehicular activities.
Questionable Cargo
This small container has been welded shut and then covered in a thin red film of hardened fullerene alloys. Gaining access would require a plethora of specialized scientific equipment. Why an entertainment company like Nugoeihuvi would be interested in such an item is anyone's guess.
Radio Ray Modulate Disc
This disc of crystals is specially constructed to modulate radio rays in a Solray Radio Alignment Unit.
Ralie Ardanne's Belongings
Though only a teenager, Ralie Ardanne has quite a few endorsement deals with major clothing labels. This jacket is part of his signature look. Based on your file on him, you know that Ralie goes nowhere without his jacket. The bloodstains and other marks on the fabric do not bode well, but at least this will provide evidence that the authorities can track.
Rebellion Cache
Locked away inside a secure container, this mass stockpile of small arms has somehow managed not to detonate following the explosion of Angel Lieutenant Orien Hakk's vessel. There must be tens of thousands of rifles and pistols here, all of them fully loaded and ready for immediate use. The weapons are supplemented by a deadly assortment of explosives and blunt weapons. Emblazoned on the cover of the container is what appears to be a parachute mechanism and the words “Rebel Cache.”
Recovered Data Core
This starship data core contains a detailed log of all the vessel's activities.
Recovered Navigation Telemetry
This recovered data stream is incomplete but appears to be part of a navigation telemetry dataset. Perhaps something can be made of it with a bit of ingenuity. ...#=!!!EF///S0.1//0.3//0.2//0.4//0.4//0.6//R0.7//0.7//0.5//0.6//0.6//0.8//0.9//R0.7//0.7//0.8//R0.5//0.6//0.9//1.0//R0.9//0.6//0.7//R0.7//0.7//0.7//D0.7///D-RE!!!=#...
Recovered Radioactive Materials
This mildly radioactive material was recovered from a concealed laboratory compartment with the aid of novel scanning methods and exhibits some unusual properties. It could be useful in a controlled mutagenic process.
Red
This is the corpse of a man wearing a red shirt. It looks like he was a pretty tough guy just a few hours ago.
Religious Artifact
This religious artifact is highly decorated. It looks old, and it feels heavier than such a small thing should.
Report R:081-9560
This data fragment was pulled from an RSS Radio Telescope. It appears to be just one part of a larger intelligence dossier. “The Consulate is able to, of course, but I'm confident that the current situation won't escalate. Even still, we need to keep pushing for the location of the [unidentified encryption – string undecipherable] … the Angels have smelled Jovian involvement and are now throwing all kinds of ISK around to catch up to us. They will, eventually. Don't doubt it. I almost wish Boufin sold us out to them in the end, they'd realize there is nothing of value to them there and screw off. But then I guess anything we value, they'll want to lord over us too. I've noticed a few people of theirs are assigned to me too. I'll be taking slightly longer to get to our meetings as a result; I don't want to be leading them anywhere we don't want. She asked to meet Boufin again today by the way, and again I had to explain the risks and make her promise to lie low. I'm not completely trusting that she will let me handle things. She needs to keep up her public appearances in court, not go off meeting Gallentean historians in secret. Her career would be over in a second if we got made, and I'd have serious problems of my own. She's growing increasingly frustrated though, so we may have to look into some kind of arrangement. Surely we can set up a secure FTL line for them both? I know how to do it myself; I just need your clearance to proceed.”
Report R:081-9568
This data fragment was pulled from an RSS Radio Telescope. It appears to be just one part of a larger communication. The intended recipient is unknown, but is presumably someone within the upper echelons of the Republic Security Services. “…you dare try and cut me out of the loop again. If you wanted to run operations without me knowing or caring then you should've brought in someone with half my skill. I've given six years of my life to this. Try that shit again and I'll be out of here. The last thing you'll see before the sip of Pator Whiskey you keep in the 2nd drawer kills you will be me waving a Wildfire Khumaak on The Scope news.”
Republic Diplomatic Documents
This missive is a sternly worded diplomatic request from the Minmatar Republic, asking that CONCORD seriously reconsider its planned coupling of communicative technology between capsuleers and other, non-celestial soldiers of fortune. The request is encased in protective sheathing, giving it a marginally higher chance of surviving the travails of celestial transportation than a piece of paper might usually enjoy.
Republic Emissary Medallion
This medal was awarded to those who aided the Minmatar Republic emissaries in their mission to bring sensitive diplomatic documents, concerning the coupling of interstellar communication relays between capsuleers and other non-celestial soldiers of fortune, to CONCORD in Yulai.
Research Component
This component was once used to help construct the first Citadel structures in New Eden.
Research Data Fragment
Barely intact as it lies among the wreckage of his ship, this data terminal offers a rare insight into the likely research interests of the enigmatic and reclusive pirate Asitei Ohkunen. Huge amounts of data have been compiled on the neurological states of test subjects, all of them under the effects of various boosters. The reasoning behind these tests remains uncertain, although the narrow focus on electrical impulses inside the brain might suggest an attempt at some kind of digitally-produced emulation.
Research Tools
This sealed container contains a heap of tools used in all sorts of scientific research.
Riot Interdiction Team
Riot Interdiction Teams, or RITs, are the primary Amarrian response forces for incidents involving slave riots and uprisings. These forces are equipped with the latest generations of body armor, stun sticks, flash-bang grenades, and other less-lethal technologies. In those cases where less-lethal force is insufficient, the teams are fully trained and equipped to use lethal force to resolve any such threat. For example, the RITs are often called in to resolve hostage situations in which one or more of the captives has been killed, thus eliminating the need for a phased operation and then transitioning to lethal force contingency operations (i.e., shoot to kill). Therefore, it is of little surprise that they are among the most highly trained Amarr ground forces in hostage rescue operations, and are sometimes called on to act in situations unrelated to slave-based scenarios.
Riot Interdiction Teams
Riot Interdiction Teams, or RITs, are the primary Amarrian response forces for incidents involving slave riots and uprisings. These forces are equipped with the latest generations of body armor, stun sticks, flash-bang grenades, and other less-lethal technologies. In those cases where less-lethal force is insufficient, the teams are fully trained and equipped to use lethal force to resolve any such threat. For example, the RITs are often called in to resolve hostage situations in which one or more of the captives has been killed, thus eliminating the need for a phased operation and then transitioning to lethal force contingency operations (i.e., shoot to kill). Therefore, it is of little surprise that they are among the most highly trained Amarr ground forces in hostage rescue operations, and are sometimes called on to act in situations unrelated to slave-based scenarios.
Rogue Drone 42-X Nexus Chip
This chip is part of little-understood evolved rogue drone technology. It apparently connects both to the drones' propulsion systems and to their sensory equipment, and thus plays a part in allowing them to detect and pursue objects, sites, or victims of interest. Unfortunately, it is extremely fragile and doesn't react well to being forced into any machinery other than its native habitat, meaning that its uses as a research object are strongly limited by its availability. Some organizations in New Eden, particularly those interested in exploration and dark sciences, are rumored to pay well for this kind of item. The 42-X chip is designed for battleship class vessels.
Rogue Drone 43-X Nexus Chip
This chip is part of little-understood evolved rogue drone technology. It apparently connects both to the drones' propulsion systems and to their sensory equipment, and thus plays a part in allowing them to detect and pursue objects, sites, or victims of interest. Unfortunately, it is extremely fragile and doesn't react well to being forced into any machinery other than its native habitat, meaning that its uses as a research object are strongly limited by its availability. Some organizations in New Eden, particularly those interested in exploration and dark sciences, are rumored to pay well for this kind of item. The 43-X chip is designed for cruiser class vessels.
Rogue Drone 46-X Nexus Chip
This chip is part of little-understood evolved rogue drone technology. It apparently connects both to the drones' propulsion systems and to their sensory equipment, and thus plays a part in allowing them to detect and pursue objects, sites, or victims of interest. Unfortunately, it is extremely fragile and doesn't react well to being forced into any machinery other than its native habitat, meaning that its uses as a research object are strongly limited by its availability. Some organizations in New Eden, particularly those interested in exploration and dark sciences, are rumored to pay well for this kind of item. The 46-X chip is designed for frigate class vessels.
Rogue Drone A.I. Core
A tiny chip with a modified silicon-extract wafer forming the base for an integrated circuit. The chip stores the code for the drone's bizarre artificial intelligence.
Router Encryption Key
This datacore looks harmless. You find it hard to believe that such a small thing holds the secret to controlling what so many people believe.
Runaway Daughter
She's gone into suspended animation. It's probably for the best.
S.I Formula Sheet
Nothing in this file is decipherable, only the name. Serpentis could be using any one of a million different decryption methods. The good news is that a brute force attack could take as little as a few days, the bad news is that it could also take as long as a few decades. It all depends on how esoteric the cipher is, or if it's even a known, documented one. If it's a hybrid cipher, then it depends on how unique or distinctive both - assuming it's only two, of course - original parent ciphers were. A hybrid decryption analysis alone can take weeks, assuming that an original identifier for one single method is found.It's probably best to just take this back to Isha.
Sacred Bricks
Bricks from the Tal-Romon Cathedral, dedicated to the famous saint said to have been clairvoyant. Every brick was blessed by an Apostle, even the mortar was mixed with holy water, ensuring the whole building reeked of divinity. Being in the vicinity of even one of these bricks brings you this much closer to God, so behave now.
Salvaged Electronics
These ship parts are old but functional.
Sansha Command Signal Receiver
This device can boost the incoming or outgoing signals to a Sansha device.
Sansha Data Sheets
Secrent documents used by the Sansha's Nation.
Sareko's Capsule
The self-destruct unit on this capsule has had the safety timer removed, a unique Crimson Hand modification that ensures military officers are rarely captured alive. The corpse also appears to have been liquefied in some way during the process, adding a dark ruby hue to the capsule fluid within.
SARO Emblem
Bizarrely enough, it seems that Angel Cartel Lieutenant Tolan Akochi has been carrying around a CONCORD dog tag, even going to the trouble of protecting it against the rigors of exposure in space. A database query on the ID number offers a grim explanation as to why, revealing that it belongs to an ex-SARO Commander. Although nothing about him is listed on the CONCORD public network, third party news articles related to his name detail how he once lead an offensive on Serpentis Inquest Headquarters. Initially thought to be a success, later pieces tell the story of what eventually amounted to a large-scale operational failure in the face of unexpected resistance. The final article available outlines a particularly gruesome death suffered by him, his entire family and a swathe of known associates.
Scorched Angel Navigation Logs
These navigation logs recovered from an Angel Cartel ship could provide vital intelligence as to the location of hidden pirate bases and supply caches in the contested Amarr-Minmatar Warzone. Unfortunately, the logs appear to have been almost completely destroyed and what data remains is heavily encrypted, as such, only a specialized facility is likely to find any success in recovering any information of value from this. The Amarr Empire will reward Capsuleers who bring this item to their Imperial Counter-Insurgency Outpost located in the Mehatoor solarsystem. The Minmatar Republic will reward Capsuleers who bring this item to their Republic Counter-Insurgency Outpost located in the Amo solarsystem.
Scorched Guristas Navigation Logs
These navigation logs recovered from a Guristas Pirates ship could provide vital intelligence as to the location of hidden pirate bases and supply caches in the contested Caldari-Gallente Warzone. Unfortunately, the logs appear to have been almost completely destroyed and what data remains is heavily encrypted, as such, only a specialized facility is likely to find any success in recovering any information of value from this. The Caldari State will reward Capsuleers who bring this item to their State Counter-Insurgency Outpost located in the Onnamon solarsystem. The Gallente Federation will reward Capsuleers who bring this item to their Federation Counter-Insurgency Outpost located in the Intaki solarsystem.
Sealed Research Cache
The contents of this container remain sealed behind some kind of proprietary Cartel technology. A thin, red film of hardened fullerene alloys forms a perfect, unbreakable seal around the contents. As if that wasn't enough to deter attackers, the surface underneath the film is covered in tiny nanite-plasma explosives. Any attempt at forced entry past the film would produce enough explosive power to level a small town.
Secluded Rich Asteroid Survey
This deep space asteroid survey contains the location and surveyed contents of a particular rare and secluded mining location in the contested space of the Caldari and Gallente warzone. Such surveys would fetch a high price from unregulated mining outfits looking to make a fortune and pirate groups seeking a great location to set up a self-sufficient outpost - or an ambush. The Guristas Pirates will reward capsuleers who bring this item to their laundering centers.
Self-regulating Machine Gears
These complex set of gears are used by the Central Archive Cerebrum to operate its intricate machinery.
Senatorial Silver Star
Traditionally, the Senatorial Silver Star was awarded only to those who passed a special vote of the entire Senate. In recent decades, however, a special committee was formed to award it to any capsuleer who toiled to spread and encourage the ideals of the Gallente Federation. “Never falter in your ideals.” - Senator Fronte Belliare
Serenity 618 Event Crate
This crate is only designed for and available on Serenity.
Serenity Anniversary Crate
This crate is only designed for and available on Serenity.
Serenity Anniversary SKIN Box
This crate is only designed for and available on Serenity.
Serenity Autumn Event Crate
This crate is only designed for and available on Serenity.
Serenity Autumn Zakura Shumyu SKIN Crate
This crate is only designed for and available on Serenity.
Serenity Cold Iron SKINs Crate L
This crate is only designed for and available on Serenity.
Serenity Cold Iron SKINs Crate S/M
This crate is only designed for and available on Serenity.
Serenity Festival Copper Crate
Mystery reward awaits.
Serenity Festival Gold Crate
Mystery reward awaits.
Serenity Festival Silver Crate
Mystery reward awaits.
Serenity Imp/Whiptail Crate
This crate is only designed for and available on Serenity.
Serenity July Season Reward Crate
This crate is only designed for and available on Serenity.
Serenity Rookie DLI Day 1 Crate
This is for internal test only.
Serenity Rookie DLI Day 2 Crate
This is for internal test only.
Serenity Rookie DLI Day 3 Crate
This is for internal test only.
Serenity Rookie DLI Day 4 Crate
This is for internal test only.
Serenity Ship Crate
This crate is only designed for and available on Serenity.
Serenity YC123.10 DLI Firework Crate
This crate is only designed for and available on Serenity.
Serenity YC123.7 Event Crate
This crate is only designed for and available on Serenity.
Serenity YC123.7 Event Manufacturing Booster Crate
This crate is only designed for and available on Serenity.
Serenity YC123.7 Event Skill Booster Crate
This crate is only designed for and available on Serenity.
Serenity YC123.7 Event SKIN Crate
This crate is only designed for and available on Serenity.
Serenity YC123.7 PotT SKIN Crate Large
This crate is only designed for and available on Serenity.
Serenity YC123.7 PotT SKIN Crate Small
This crate is only designed for and available on Serenity.
Serenity YC123.7 Triglavian Recon Crate
This crate is only designed for and available on Serenity.
Serenity YC123.8 Season Reward Crate
This crate is only designed for and available on Serenity.
Serenity YC123.8 Season Ship Crate
This crate is only designed for and available on Serenity.
Serenity YC123.9 Season Reward Crate
This crate is only designed for and available on Serenity.
Serenity YC123.9 Season Ship Crate
This crate is only designed for and available on Serenity.
Shiez Kuzaks Ship Database
This tiny, glassy data chip holds information from the database of a ship formerly in the possession of Shiez Kozak. Information stored within here could be anything from the ship's logs.
Signed Copy of Pax Amarria
Written by the Heideran VII, the Amarr Emperor himself, Pax Amarria is the most remarkable book published in the last century. In it the Emperor writes about his hopes and dreams for peace throughout the galaxy; a vision that has propelled him into becoming the champion of improved international relations. His relentless strive for these goals has brought unparalleled harmony in the relationship between the empires; his constant search for peaceful solutions to any problem having many times becalmed brewing storm. This is a signed copy, with Heideran's signature at the front: "Semper Pax. Heideran VII".
Silver Sculpture
Silver Sculpture of president Souro Foiritan.
Singed Datapad
This barely-functioning piece of personal electronics turns out to contain ledger upon ledger of financial statements, high-level meeting transcripts and company rosters from several public and private Minmatar organizations. A large portion of the data is encoded in some sort of advanced cipher, leaving it completely unintelligible.
Singing Staff
A traditional musical instrument of the Vheriokor peoples, the singing staff is made from a few tightly-wound strings attached to a small staff. It is today played only ceremonially, and those proficient in its use are rare. The instrument is fitted over a pole, strings on one side and staff on the other, and then drawn diagonally across the pole's surface, eliciting soft monotones. The staffs themselves are usually made from ivory or some other type of bone. Some of these latter types are preferred, for it is said that they have an extra tone that can be heard only when one plays a song of sadness and loss. While there exist plenty of poles specifically designed for this instrument, technically just about anything will do: a metal stand, a chair leg, or even, if the strings are wound tightly enough, a human appendage.
Skeleton EGDLI Loot Crate Tier 1
For internal testing only
Skeleton EGDLI Loot Crate Tier 2
For internal testing only
Skeleton EGDLI Loot Crate Tier 3
For testing and internal use only
Small Sealed Cargo Containers
These small containers are fitted with a password-protected security lock.
Small Warded Container
This small sealed container has been modified with state-of-the-art security measures to prevent ship-to-ship scanning of its contents.
Smuggler Lockbox
This crate is equipped with an advanced quantum-encoded locking mechanism, layered plating that prevents penetration by scanners, and an explosive anti-tampering device that triggers if anyone other than the original creators attempt to open it. It was recovered from wreckage belonging to a network of underworld smugglers, and is clearly used to transport valuable smuggled items and/or data. Safely accessing the contents of this lockbox is beyond the ability of capsuleer-accessible technology. The major empires and pirate factions however would be willing to purchase these lockboxes for 1 million ISK per unit under the assumption that they will eventually be able to crack the security using their massive resources.
Smuggler's Warning About Sister Alitura
Good news from Kirus. Remember that Sisters of EVE agent, Alitura, who nearly caught our trail? The boss called in some favors and got her reassigned to Arnon IX in Essence. The good Sister Alitura may be resourceful, but she'd need a capsuleer with clearance to all four empires to be any threat, and we know how much the Sisters love capsuleers.
Smurgleblaster
A drink like having your brains smashed out by a slice of lemon wrapped round a large gold brick.
Spear of Matar
It is a rare combination of courage and dedication that earns an individual the Spear of Matar. It is awarded to any person a tribal elder considers worthy of great respect and reverence for their duties to the tribes or the Minmatar people. “When the day was dark, it was the million flickers of firelight off the spearheads that gave us courage.” - Excerpt from Krusual Oral History
Special Delivery
This box may contain personal items or commodities intended only for the delivery's recipient.
Special Forces Weapons and Equipment
The weapons and equipment containers hold a wide variety of small arms and other equipment currently in use by the Caldari Navy Special Forces, much of it designed specifically for use in maritime environments. Some of the items that can be found in a typical container are long range sniper rifles, target designation lasers, silenced pistols, high tech diving equipment, limpet mines, covert communications gear, and individual diver propulsion devices. This equipment, as you might guess, is extremely valuable and cannot be found outside the armories of the Caldari Navy, with the exception of the very small quantities that have found their way onto the black market.
Spintric Coin
A curious feature of The Spintrix is their admission system. The men and women working at this establishment do not accept ISK or any other sort of planetary currency. Rather, these workers accept only Spintrix coins, specially designed and highly desirable copper coins purchased through the agents of the Spintrix's owners.
Spintrixiate Rewards Coin
Special customers to the Spintrix are often rewarded with this unique coin, dubbed the “Spintrixiate.” Little is known about the benefits of this rewards token, though rumors among former clients circulate that the coin allows access to the mysterious “Room B.”
Splinter Bodyguard
Although the explosion of Anton Rideux's ship has scrambled the electronics, the intentions behind this Rogue Drone redesign remain clear. In typical Crimson Hand style, the violent and unpredictable Splinter variant has been captured and reprogrammed to protect its host ship. The fact that Rideux didn't launch it suggests perhaps the job hadn't quite been finished yet.
Spools of Quantrium Wiring
While the universe is full of metals of all shapes, sizes, and compositions, there are some metals that are of such rarity and quality that they command prices far beyond those of the more easily accessible metals, such as tritanium. Amongst these, the very small quantities of a rare metal called quantrium are among the most valuable. This metal can only be found in the polar regions of certain moons, and these only in systems that meet very specific astrogeological conditions. So rare is this metal that, to date, only two known moons have quantities of this metal sufficient to warrant the very expensive mining and refining equipment required to extract it. Both of these moons are in Caldari space, giving the State a monopoly on its production and sale. Currently, all processed quantrium is on long-term contract to Kaalakiota Corporation. While rumors occasionally surface that one or more of the other three races have discovered quantrium, this has not been verified.
Spring Festival Mystery Box
This crate is only designed for and available on Serenity.
Spring Festival SKIN Box
This crate is only designed for and available on Serenity.
Spring Festival ZhenPin Box
This crate is only designed for and available on Serenity.
St. Arzad
A tattered document, presumably a part of a larger manuscript. The text is written neatly, though much of it is faded. An excerpt from this piece, titled “Chapter 1 – St. Arzad” reads as follows: “And so it was that Arzad Hamri, son of Ezzara Hamri, grandson of Yuzier Hamri, ascended to the title of Holder of the most holy grounds on Starkman Prime. Though only a young man, Arzad held the wisdom of the ages, granted to him by the celestial Maker, and carried with him the burden of creation. “His first act as Holder was to grant a day of celebration to all his slaves, calling that day holy by the Amarr religion. The slaves, members of the Starkmanir tribe, referred to that day as the “Hand of Solace” or “Khu-arzad.” Unlike his father before him, Arzad was instantly loved by his slaves, and his benevolence sowed the seeds of righteous love between Holder and slave.”
Standard Decoding Device
A standard decoding device, used to decode valuable transmissions often sent via non-FTL transport.
Star Charts
A vast number of travel and trade routes are marked on these sheets, which are called Star Charts. Although most veteran travelers have their travel routes stored in their ships computer, it's always handy to carry some hardcopies just in case.
Star of the Sefrim
The Star of the Sefrim is awarded to those who go above and beyond the call of duty in service to the Empire, particularly those whose actions place them into mortal danger. While capsuleers rarely risk permanent death, the Empire sometimes acknowledges the loss of body regardless. “From on high, they came with wisdom and mercy. They delivered greatness to the people. But when provoked, their wroth was immutable.”- The Scriptures, Book of Missions, 45:3
State Diplomatic Documents
This missive is a sternly worded diplomatic request from the Caldari State, asking that CONCORD seriously reconsider its planned coupling of communicative technology between capsuleers and other, non-celestial soldiers of fortune. The request is encased in protective sheathing, giving it a marginally higher chance of surviving the travails of celestial transportation than a piece of paper might usually enjoy.
State Emissary Medallion
This medal was awarded to those who aided the Caldari State emissaries in their mission to bring sensitive diplomatic documents, concerning the coupling of interstellar communication relays between capsuleers and other non-celestial soldiers of fortune, to CONCORD in Yulai.
Steel Order of the Cold
Created in the early days of the Caldari-Gallente War, the Steel Order of the Cold was awarded to those brave men and women who sacrificed themselves for the Caldari people. It is the greatest capsuleer honor that can be awarded in the State, being given to those who stand resolute and persevere despite all risk. “Does it matter if we are remembered? Our sacrifice matters.” - Admiral Yakiya Tovil-Toba's last speech
Stellar Transmuter Datacore
This datacore contains a reconstructed portion of the accumulated research and technical data gathered by those empires with a comprehensive understanding of the means to construct and control Stellar Transmuters. The specific energy needs of Interstellar Shipcasters are such that the resources available from Stellar Transmuters are required to make such a device operational.
Stellar Transmuter Research Data Fragment
This Stellar Transmuter Research Data Fragment can be used as an input with a Stellar Transmuter Datacore Blueprint in order to reconstruct a portion of the accumulated research and technical data gathered by those empires with a comprehensive understanding of the means to construct and control Stellar Transmuters. To reconstruct such data it will also be necessary to acquire Stellar Transmuter Research Encryption Keys and Index Files.
Stellar Transmuter Research Encryption Key
This Stellar Transmuter Research Encryption Key can be used as an input with a Stellar Transmuter Datacore Blueprint in order to reconstruct a portion of the accumulated research and technical data gathered by those empires with a comprehensive understanding of the means to construct and control Stellar Transmuters. To reconstruct such data it will also be necessary to acquire Stellar Transmuter Research Data Fragments and Index Files.
Stellar Transmuter Research Index File
This Stellar Transmuter Research Index File can be used as an input with a Stellar Transmuter Datacore Blueprint in order to reconstruct a portion of the accumulated research and technical data gathered by those empires with a comprehensive understanding of the means to construct and control Stellar Transmuters. To reconstruct such data it will also be necessary to acquire Stellar Transmuter Research Data Fragments and Encryption Keys.
Strange Coded Document
This document would look like gibberish if it weren't for Dagan's signature at the bottom. Perhaps Canius can decipher it.
Strange Datacore
This item, clearly salvaged from one of the wrecked ships, is recognizable as a datacore, but has a foreign interface that doesn't quite look like it came from any empire you're familiar with.
Strange Mechanical Device
A strange mechanical device, with a fading Gallente symbol painted on its side.
Subcompact TEBS Interface
This portable Transneural Echo Burn Scanner interface appears to be a high-gain, short range version of the TEBS interface used in capsule cloning technology. Scaled down in size from hardware used in the Capsule, this device appears to have been engineered to be installed on a much smaller craft. This interface allows the TEBS to communicate with a burst transmitter in order to relay neural data to a remote location. Given the nature of this technology, it may prove incredibly valuable if turned in to the correct organization.
Subcranial Nanocontrollers
The Subcranial Nanocontroller is an advanced component from Lai Dai intended for use in biomechanical and neurocybernetic implants in a similar fashion to the older Transcranial Controller technology owned and licensed by Ishukone. Implants using Subcranial Nanocontrollers are being marketed as cheaper, more flexible and less intrusive. Lai Dai is believed to have made some key breakthroughs in its development of this technology after acquiring medical research and technology in the course of asset recovery operations carried out by Lai Dai Protection Services. It is believed that the Khanid Kingdom and Tash-Murkon Family are eager to incorporate the new technology in more advanced, efficient and pervasive slave control devices with the aim being the elimination of the Vitoc method of enforcing slavery obedience. Many believe the Vitoc method is fatally vulnerable to chemical and biological subversion vectors, and several attacks using Insorum and Deathglow to provoke slave uprisings have reinforced this view in the Amarr Empire. The future of the Subcranial Nanocontroller technology, and Lai Dai's profit margins looks bright as a consequence.
Survivor
This rattled individual moves with a languid motion due to emotional distress. They are extremely important to the Sisters of EVE corporation and should be looked after with the utmost care. No doubt that finding and rescuing this individual will be extremely beneficial for you in the long run.
Survivors
These rattled individuals move with languid motions. It looks like some of them have gone weeks without food.
Sword of Pator
Only recently created by act of Sanmatar Shakor, the Sword of Pator is the highest honor that can be awarded capsuleers for service to the Republic. At least four of the seven tribes must be in agreement before it can be awarded, making its conferment a rare and auspicious occasion. “Tribe, clan, and family. Together, they are our home. And when they are taken, we will stop at nothing to reclaim them.” - Excerpt from Starkmanir Oral History
Synthetic Coffee
This stimulating aromatic drink, made out of dried, roasted and ground seeds, is a particular favorite among scientists and software engineers.
Tattered Doll
Formerly belonging to a young child, this doll has been through rough times. Tattered and worn, the synthetic material is stained with odd markings, presumably blood or tears from the doll's former owner.
Temple Stone
This stone is from a sacred temple, valued both by the minmatar and the amarr.
Test crate 1
This is for internal test only.
Test crate 2
This is for internal test only.
Test Dummies
These plastic dummies are used for the testing process of various products, including biopods, personal vehicles and gravimetric compressors.
Testing EGDLI3 Skins Limited Selection
The Benevolent
A tattered document, presumably a part of a larger manuscript. The text is written neatly, though much of it is faded. An excerpt from this piece, titled “Chapter 6 – The Benevolent” reads as follows: “The fields and hills of Starkman Prime are harsh and demanding, especially for those working indentured servants tied directly to the land by the holy bonds of slavery. Arzad Hamri understood their plight and pitied them. As a boy, he would often work alongside the Starkmanir in the fields, immersing himself with the tribe to better understand their customs and traditions, much to the chagrin of his father and elders. “As a Holder, Arzad offered many forms of restitution and bereavement for the Starkmanir during their often long and difficult days. Regular rest periods were common during his rule, as well as days of parlay and rest, including high holy days and other Amarr religious festivals, deeming these occasions to be too holy. The Starkmanir loved him for these decisions, often working extra hours when necessary because they respected Arzad and wished for him to be pleased with their efforts.”
The Education of the Starkmanir
A tattered document, presumably a part of a larger manuscript. The text is written neatly, though much of it is faded. An excerpt from this piece, titled “Chapter 12 – The Education of the Starkmanir” reads as follows: “By the end of his tenth year as Holder on Starkman Prime, Arzad had finished the educational infrastructure for the Starkmanir with the establishment of the final slave college on his continent. The focus of these education centers, aimed at young members of the Starkmanir tribes, was in assimilating the slaves into the greater Amarr society. The focus was primarily in basic business matters, science and technology, and all aspects of the Amarr religion. Attendance at this school was not entirely elective, and slaves were given time to study, though they would often have to make up for lost time in the fields. Despite this, many Starkmanir entered into the slave colleges in order to better their station in life, especially with respect to the high, holy Amarr religion. “The Starkmanir also educated their beloved Holder in kind, as well as other members of the Hamri family. The tradeoff in education was often mutual between the tribal leaders and Arzad. When the slave colleges began teaching business matters, the Holder learned ancient Starkmanir woodworking; astronomy education led to the Starkmanir martial arts; and the teaching of the Amarr religion initiated Arzad's own edification of the Starkmanir's tribal spiritualism.”
The Fire in Our Hearts
A tattered document, presumably a part of a larger manuscript. The text is written neatly, though much of it is faded. An excerpt from this piece, titled “Chapter 37 – The Fire in Our Hearts” reads as follows: “Lord Arkon Ardishapur, though a longtime friend of Arzad, oversaw the popular Holder's execution for treason and blasphemy. Arzad had requisitioned an Amarr symbol of authority, a scepter, as a symbol for lowly slaves. Arzad's granted the scepter to his slaves as a symbol for enlightenment and salvation. Ardishapur ordered that all copies of this scepter – dubbed Wildfire scepters for its blood obsidian orb, a rock native to Starkman Prime – be destroyed. The Starkmanir were angry at his execution. Arzad's book of sermons inspired the troubled tribe. “Three months after his death, Arzad appeared to Drupar Maak while the slave was alone in the fields. The Starkmanir youth was afraid at first, though once he saw the shimmering eyes of his former Holder, he was at peace. Arzad handed a Wildfire scepter to Maak, telling him, ‘The fire in our hearts burns for salvation, redemption, and grace. May the Word of God grant you the courage to save yourself and your people.' With those words, Arzad disappeared, but the scepter was still with Maak. Years later, he would wield a similar item and avenge the death of his beloved Holder on the day of Khu-arzad. After that day, the scepter would be forever known as Khumaak.”
Token of Submission
A document representing submission to the authority of the Amarrian Empress, Jamyl Sarum. Notably, the language surrounding capsuleer fealty has been significantly watered down, revealing that even the Amarr Empire is willing to acknowledge the reality of capsuleer freedom and autonomy.
Top-Secret Design Documents
These top-secret Design Documents are hidden in a large, sealed container. A stamp has been placed on the container with the words "DO NOT OPEN" written in big, red letters.
Traditional Board Game
An ancient board game said to have been devised by the Ni-Kunni, this game was reputedly used for anything from entertainment on long ship hauls to deciding the fates of battles. Pieces in ancient times were made of wood or bone, but now most often consist of polymer compounds cast into intricate shapes. The game is easy to learn, hard to master, and really stupid to bet on.
Training Certificate
Turn this in at your starting school station to get a small reward.
Transaction And Salary Logs
These reports hold information on recent transactions and salary logs of a corporation. They are very sought after by pirates, who use the often sensitive information held within for various purposes.
Transport Relay Datacore
This datacore contains a reconstructed portion of the accumulated research and technical data gathered by those empires with a comprehensive understanding of the means to build and operate the Transport Relay technology at the heart of Interstellar Shipcasters. An understanding of Triglavian Transport Relay technology is required to make such a device operational. In order to catch up to the Caldari, loyalists of the Amarr Empire should deposit such datacores at the Imperial Research Facility in Mehatoor. Capsuleers of the Minmatar Republic should deposit their datacores at the Republic Research Facility in Amo, while pilots loyal to the Gallente Federation can deposit their datacores at the Federal Relay Research Center in Intaki.
Transport Relay Research Data Fragment
This Transport Relay Research Data Fragment can be used as an input with a Transport Relay Datacore Blueprint in order to reconstruct a portion of the accumulated research and technical data gathered by those empires with a comprehensive understanding of the means to build and operate the Transport Relay technology at the heart of Interstellar Shipcasters. To reconstruct such data it will also be necessary to acquire Transport Relay Research Encryption Keys and Index Files.
Transport Relay Research Encryption Key
This Transport Relay Research Encryption Key can be used as an input with a Transport Relay Datacore Blueprint in order to reconstruct a portion of the accumulated research and technical data gathered by those empires with a comprehensive understanding of the means to build and operate the Transport Relay technology at the heart of Interstellar Shipcasters. To reconstruct such data it will also be necessary to acquire Transport Relay Research Data Fragments and Index Files.
Transport Relay Research Index File
This Transport Relay Research Index File can be used as an input with a Transport Relay Datacore Blueprint in order to reconstruct a portion of the accumulated research and technical data gathered by those empires with a comprehensive understanding of the means to build and operate the Transport Relay technology at the heart of Interstellar Shipcasters. To reconstruct such data it will also be necessary to acquire Transport Relay Research Data Fragments and Encryption Keys.
Tribal Sponsorship
Tribal sponsorship is a longstanding tradition within the Minmatar Republic. Typically sponsorship is sought by an individual before embarking on a journey away from their tribe, or as part of a corporation's employment process. After a sometimes lengthy approval process, a Minmatar is then able to proceed with the full support of their tribal peers. Typically, a citizen of the Republic will seek sponsorship from only their family tribe, and this is usually sufficient to last their lifetime, barring any dramatic changes. In some rare circumstances, sponsorship is granted from all of the seven tribes to particularly promising individuals. In the unique case of the capsuleers, the seven tribes of the Republic have agreed to blanket-issue sponsorships as an attempt to encourage loyalty and cooperation.
Triglavian Encrypted Relay Data
This Triglavian data storage device is highly encrypted and loaded with a variety of counter-intrusion programs and defensive security devices that would probably scramble and erase the contents beyond all possibility of retrieval, if not forensically and carefully decrypted and accessed by a specialized facility. The extreme interest and efforts that Caldari State and Gallente Federation have directed towards recovering technology from the Triglavian Relay facilities in Athounon would suggest that a reward will be available to any capsuleer handing this data in to their choice of empire. Capsuleers can assist the Caldari State by depositing this data into the State Relay Research Laboratory at the Caldari Relay Research Center within the Samanuni system. Capsuleers can assist the Gallente Federation by depositing this data into the Federation Relay Research Laboratory at the Gallente Relay Research Center within the Amygnon system.
Trinary Data
This complicated stream of data seems to be in trinary language. It appears to be of Jovian origin.
True Slave Decryption Node
Functionally, this piece of hardware - obviously of Sansha origin - is an extremely sophisticated parallel processing unit. Connecting it to a standard interface bus and running a few diagnostics reveals that it has been configured to act as the master node for a quasi-distributed decryption system, and its response rate suggests that it's exceptionally efficient at this task.It is, however, difficult to ignore the fact that it's also a head in a jar - particularly when it opens its eyes briefly, looks around, and frowns.
Ulamon's Data Chip
Ulamon's Data Chip.
Ultra! Promotional Holoreel
This holoreel is a promotional reel from Quafe Corp, produced to advertise QuafeUltra. The reel has been universally panned by critics for what is perceived by many as intensely lurid subject matter. One scene that's caused an uproar among various fundamentalist factions involves two of the main characters, Amarr girl Nadira and Brutor male Okar, engaging in a bout of severely salty reparteé immediately followed by quite obviously-hinted-at sexual activity. In another, the Gallente protagonist, a comely young female, enjoys a sultry dance with two other girls, culminating in a show of half-naked flesh that sent mothers everywhere lunging for their children's eyes. Mentions and displays of Quafe Ultra during the reel's 89-minute running time number around 110, resulting in an average of 1.23 not-so-hidden advertisements per minute of the film's running time - another reason, critics say, to throw this reel into the jettison canister where it belongs.
Unassembled Energy Weapons
Energy weapon parts waiting to be assembled into fully functional equipment.
Unknown Dead
This contingent of Federation pilots and soldier went missing during the first Caldari Gallente war. They've been preserved by the cold but they are still in a delicate state, and must be handled with care.
Verification Key
These keys are used by many corporations in the Caldari State to more easily and efficiently identify the bearer as a trusted employee, often granting them access to exclusive or classified information.
Victor Emblem
This is an expensive replica of an old Imperial Navy medal once given to soldiers on their 20th year of service. Crimson Hand lieutenant Kannen Sumas has embedded a data file underneath the resilient metal alloy exterior. The file's sole contents are a few selected verses of the Amarrian Scriptures, all of them celebrating the virtues of humility in the face of a superior foe.
Virgin Forest Pulp
Tree pulp used to produce paper.
Warclone Blanks
These human clones have been engineered for infantry combat and are waiting in reserve for the transfer of consciousness from a clone soldier. Warclone blanks are valuable pieces of biological equipment, and they are in particularly high demand within the territory of the Blood Raider Covenant, as Omir Sarikusa's infamous sect of Sani Sabik cultists consider the blood of clones to be the 'purest' possible sacramental for use in their sanguine rituals.
Whelan Machorin's Head
This is the head of the Caldari Agent, Whelan Machorin, in all its flabby, balding glory. As it is not connected to his body at present it quite lacks the prestige it has grown accustomed to and, judging by the expression on its face, it's not at all content with this fact.
Wildfire Khumaak
This fragile Khumaak appears to be several centuries old, and could perhaps date back to the Starkmanir rebellion itself. There are unique markings along the side; tiny holes that appear to have fastened the scepter to a wall at one point. In the centre of the flared orb there is another unique distinguishing mark, the visage of an Amarrian man draped in the robes of a Saint. His name, Torus Arzad, is not mentioned in any contemporary history, Amarrian or otherwise. Below his face a single line of text reads:“Understand His mercy, and you will know enough.”
Wolf Burgan's Body Double
This slab of biomass was once a blank slate waiting to be turned into a functioning clone for some capsuleer. With the help of an engineered virus and the sample you provided, the slab is now a DNA-perfect replication of Wolf Burgan. Sure, it only looks like him if you squint really hard, but that is what explosions are for.
Wolf Burgan's DNA
The genetic material of Wolf Burgan, taken from a local law enforcement agency. Mercenary life has one major drawback: For every client, there's a victim…another mercenary available to make you their target.
X-Axis Calibration Coordinate
This is one of three coordinate plots required to correctly align the nearby rift to make it functional. All three coordinate plots need to be placed into either the low power or the high power Remote Calibration Device.
X-Rated Holoreel
X-Rated Holo-Vid reels are a popular type of personal entertainment, especially in Gallente territories. These type of Holoreels are strictly forbidden in the Amarr Empire and Khanid Kingdom.
Y-Axis Calibration Coordinate
This is one of three coordinate plots required to correctly align the nearby rift to make it functional. All three coordinate plots need to be placed into either the low power or the high power Remote Calibration Device.
YC123 New Year Event Medal
This Cerebral Accelerator is only designed for and available on Serenity. YC123 New Year Event Medal
YC123.4 Serenity Season Medal - Amarr
This Cerebral Accelerator is only designed for and available on Serenity. YC123.4 Serenity Season Medal - Amarr
YC123.4 Serenity Season Medal - Caldari
This Cerebral Accelerator is only designed for and available on Serenity. YC123.4 Serenity Season Medal - Caldari
YC123.4 Serenity Season Medal - Gallente
This Cerebral Accelerator is only designed for and available on Serenity. YC123.4 Serenity Season Medal - Gallente
YC123.4 Serenity Season Medal - Minmatar
This Cerebral Accelerator is only designed for and available on Serenity. YC123.4 Serenity Season Medal - Minmatar
YC123.4 Serenity Season Medal - New Eden
This Cerebral Accelerator is only designed for and available on Serenity. YC123.4 Serenity Season Medal - New Eden
Z-Axis Calibration Coordinate
This is one of three coordinate plots required to correctly align the nearby rift to make it functional. All three coordinate plots need to be placed into either the low power or the high power Remote Calibration Device.
Zazzmatazz
Zazzmatazz's DNA
Zemnar
Zemnar is an uncommon type of antibiotic specifically used to combat rare bacterial infections. Originally discovered by the late Gallente biologist, Lameur Zemnar, the drug is now frequently kept in stock in the more wealthy quarters of the galaxy, in case of a bacterial outbreak.
Zor's DNA
DNA samples are any of various nucleic acids that are usually the molecular basis of heredity, are localized especially in cell nuclei, and are constructed of a double helix held together by hydrogen bonds between purine and pyrimidine bases which project inward from two chains containing alternate links of deoxyribose and phosphate.