Publisher: Sequestered Industries
Restricted Worlds and Enforcement Regimes is a generator for planets you are not meant to land on, and for the systems that ensure that judgement remains enforceable centuries after the original decision was made.
These are not merely dangerous worlds. They are administratively dangerous, procedurally hostile, and protected by regimes that do not need to hate you in order to ruin you.
Designed for hard science-fiction, frontier collapse, salvage campaigns, and institutional horror, this volume treats interdiction as an ecosystem rather than an encounter. A restricted world exists because someone once made a decision, built machinery and law around it, and then walked away. What remains still works.
The b...
Publisher: Sequestered Industries
Restricted Worlds and Enforcement Regimes is a generator for planets you are not meant to land on, and for the systems that ensure that judgement remains enforceable centuries after the original decision was made.
These are not merely dangerous worlds. They are administratively dangerous, procedurally hostile, and protected by regimes that do not need to hate you in order to ruin you.
Designed for hard science-fiction, frontier collapse, salvage campaigns, and institutional horror, this volume treats interdiction as an ecosystem rather than an encounter. A restricted world exists because someone once made a decision, built machinery and law around it, and then walked away. What remains still works.
The book is structured around four interconnected d66 tables, each providing one layer of the problem:
-
Table 1: Restriction Origin: Why the world was sealed, quarantined, treaty-locked, or declared off-limits, whether for ecological collapse, political crime, failed science, bureaucratic error, or reasons no longer remembered.
-
Table 2: Enforcement Regimes: How the restriction is maintained in practice, including legal interdiction, autonomous systems, orbital denial infrastructure, legacy weapons, and safety mechanisms repurposed into threats.
-
Table 3: Bypass Methods: How crews attempt entry anyway, by exploiting protocol gaps, legacy assumptions, sensor limits, social engineering, or by converting risk itself into a resource.
-
Table 4: Visitation Value: Why anyone would accept the cost, from evidence, medicine, data, and infrastructure to silence, routes, or objects that cannot be obtained lawfully.
Rolling once on each table produces a coherent restricted-world scenario with built-in tension, motive, and consequence. Contradictions are intentional and productive: a quarantine justified by biology but enforced by economics; a treaty world guarded by systems that outlived the treaty; a sealed planet whose most dangerous feature is the paperwork surrounding it.
Use this book when you want access itself to be the challenge, when enforcement feels indifferent rather than villainous, and when the most dangerous thing on a world is not what lives there, but who still claims the right to say no.