More actions
| Line 8: | Line 8: | ||
! style="background:#222222;" | Webbing | ! style="background:#222222;" | Webbing | ||
! style="background:#222222;" | Jamming | ! style="background:#222222;" | Jamming | ||
! style="background:#222222;" | Hacking | |||
|- | |- | ||
| | | | ||
| Line 33: | Line 34: | ||
[[image:icon_multispectral_ecm_ii.png|30px|Jamming]] | [[image:icon_multispectral_ecm_ii.png|30px|Jamming]] | ||
[[image:icon_multispectral_ecm_faction.png|30px|Jamming]] | [[image:icon_multispectral_ecm_faction.png|30px|Jamming]] | ||
| | |||
[[image:Icon_data_analyzer_i.png|30px|Hacking]] | |||
[[image:Icon_data_analyzer_ii.png|30px|Hacking]] | |||
|} | |} | ||