Data Miners

'Alpha' Data Analyzer I
A Hacking system used to override electronic security systems.
'Codex' Data Analyzer I
A Hacking system used to override electronic security systems.
'Daemon' Data Analyzer I
A Hacking system used to override electronic security systems.
'Libram' Data Analyzer I
A Hacking system used to override electronic security systems.
Civilian Data Analyzer
A Hacking system used to override electronic security systems. As this is a Civilian module, it will only work on the most basic system locks and should not be used in professional circumstances.
Civilian Relic Analyzer
A simple scanning device designed for analyzing both terran archaeological structures and ruins floating in space. As this is a Civilian module, it will only work on the most basic system locks and should not be used in professional circumstances.
Data Analyzer I
A Hacking system used to override electronic security systems, potentially providing access to valuable data or items. Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.
Data Analyzer II
A Hacking system used to override electronic security systems, potentially providing access to valuable data or items. Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.
Data Subverter I
A specialized computer and communications suite designed to assist attempts to subvert the control routines of orbital structures. "You fail to understand. This is our time now. Since prehistory, we have fought each other, first with clubs, then with guns and with beams of energy. Now we shall fight with our minds amidst the beautiful spinning streams of data interconnecting all life on all worlds. Resist, if you like. Your efforts will only hasten the time when we wrest control from you and all the rest of the old order." - Note left in Federal Intelligence Office mainframe by anonymous hacker
Frostline 'Clavicula' Integrated Analyzer
As this multi-use analyzer has both fully integrated archaeology and hacking systems, it can be used to both analyze ancient ruins and bypass electronic security systems. Whilst comparatively weaker than its more specialized counterparts, its combined functionality provides the user with an increased flexibility when it comes to fitting. Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.
Ligature Integrated Analyzer
As this multi-use analyzer has both fully integrated archaeology and hacking systems, it can be used to both analyze ancient ruins and bypass electronic security systems. Whilst comparatively weaker than its more specialized counterparts, its combined functionality provides the user with an increased flexibility when it comes to fitting. Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.
Purloined Sansha Data Analyzer
CONCORD has acquired untold numbers of these devices from destroyed Sansha vessels during recent raids. The modules have the appearance of standard data analyzers, but when connected to the systems of a suitably modified ship, they exhibit significantly enhanced capabilities.Official DED reports on the devices' internal workings cite "inconclusive results", but CONCORD has nevertheless opted to distribute these modules to capsuleers in the hope that they might be useful in the fight against Kuvakei's minions. Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.
Relic Analyzer I
An archaeology system used to analyze and search ancient ruins, potentially revealing valuable items for collection. Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.
Relic Analyzer II
An archaeology system used to analyze and search ancient ruins, potentially revealing valuable items for collection. Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.
Sleeper Data Analyzer I
A Hacking system used to override electronic security systems.
Talocan Data Analyzer I
A Hacking system used to override electronic security systems.
Terran Data Analyzer I
A Hacking system used to override electronic security systems.
Tetrimon Data Analyzer I
A Hacking system used to override electronic security systems.
Zeugma Integrated Analyzer
As this multi-use analyzer has both fully integrated archaeology and hacking systems, it can be used to both analyze ancient ruins and bypass electronic security systems. Whilst comparatively weaker than its more specialized counterparts, its combined functionality provides the user with an increased flexibility when it comes to fitting. Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.