Character
AUTHORITY IMPOUND TOWER AUREK-SEVEN
Nar Shaddaa Sector Docking Authority Seizure Vault and Compliance Fortress
Nar Shaddaa Sector Docking Authority Seizure Vault and Compliance Fortress
OUT OF CHARACTER INFORMATION
- Intent: To create a heavily fortified impound tower operated under the Nar Shaddaa Sector Docking Authority name, serving as a major storage, processing, enforcement, and recovery site for seized vehicles, impounded vessels, confiscated cargo, disputed dock property, unpaid compliance claims, and criminal assets caught beneath legally convenient paperwork. The tower is meant to function as a threadable corporate fortress: part garage, part evidence vault, part customs office, part bureaucratic trap.
- Image Credit: N/A
- Canon: N/A
- Permissions: N/A
- Links:
- Port Authority Core
- Authority Personnel Gear
- RP Threads
- Additional Chaos Equipment and Vehicles
- Wookieepedia: Authority, Customs, and Identity
- Wookieepedia: Locations and Infrastructure
- Wookieepedia: Security and Containment
- Wookieepedia: Surveillance and Droids
- 57C Holocam
- AC1 Surveillance Droid
- DRK-1 Dark Eye Probe Droid
- ID9 Seeker Droid
- Microdroid
- Microdroid Listener
- Moon Moth Espionage Droid
- MSE-6 Mouse Droid
- Prowler 1000 Seeker Droid
- Seeker Droid
- Sensor Beacon
- Spy Droid
- Spysprite Mini-Holocam
- Surveillance Droid
- Surveillance Tagger
- Tagger / MicroTagger
- Tracking Fob
- Wookieepedia: Weapons, Hazards, and Recovery Tools
- Wookieepedia: Tug Craft
SETTING INFORMATION
- Structure Name: Authority Impound Tower Aurek-Seven
- Classification: Corporate Impound Tower / Seizure Vault / Parking Hangar / Evidence Storage Facility / Dockside Compliance Fortress
- Location: Nar Shaddaa
- Affiliation: Nar Shaddaa Sector Docking Authority, Port Authority
- Accessibility: Public-facing but heavily restricted.
The lower administrative levels are accessible to pilots, haulers, dockworkers, lawyers, bounty hunters, customs officers, and furious citizens attempting to pay fines, dispute seizures, recover vehicles, retrieve cargo, or file appeals. These areas are watched, scanned, and controlled by holocams, biometric checkpoints, weapon detectors, security gates, polite kiosks, and armed droid patrols. Visitors are welcome in the same way debt is welcome: documented, sorted, slowed, priced, and kept under observation.
The middle levels are accessible only with case authorization, escort approval, or a valid work order. These include vehicle inspection lanes, tow intake ramps, public-facing recovery windows, auction preparation bays, and supervised viewing corridors where claimants may view seized property through glass under escort. The tower is generous with visibility and stingy with access.
The upper storage decks, sealed impound vaults, evidence cages, seized-vessel berths, security command rooms, customs archives, detention cells, and Red Lane breach corridors are restricted. Access requires staff credentials, biometric confirmation, code cylinder clearance, escort authorization, or direct approval from Authority command. Most doors require more than one form of permission; some require permissions from systems that communicate only through logged requests.
Unauthorized entry may trigger lockdown, denial fields, droid response, ion suppression, tractor-lock immobilization, seizure escalation, emergency response charges, and lethal countermeasures in the most secure zones. Even failed intrusions can leave a claimant worse off than before, with new evidence attached to their file and new fees attached to their property. - Description: Authority Impound Tower Aurek-Seven rises from Nar Shaddaa's dockside clutter like a black durasteel nail driven through layers of traffic, smog, neon, and unpaid debt.
It functions as courthouse, prison, and garage at once: clerks work behind glass, detainees wait behind locked doors, and entire levels groan beneath the weight of seized speeders, cargo haulers, courier craft, loader droids, repulsor vans, and small vessels whose owners learned too late that a "temporary holding fee" meant ongoing leverage.
The tower is a vertical impound fortress built to store what the Nar Shaddaa Sector Docking Authority takes: vehicles with forged access codes, ships grounded for unpaid docking rights, cargo sleds seized during spice inspections, droids caught moving contraband, wrecks dragged in by tow crews, and expensive transports trapped in legal disputes sharp enough to cut paint from their hulls.
At street level, the tower looks almost civil. Kiosks glow behind reinforced transparisteel. Polite droids ask for case numbers. Tired clerks slide forms beneath security glass. Above them, the building narrows into stacked garage decks, sealed vault levels, turret housings, scanner rings, heavy blast shutters, and impound cages lit by cold strips of white light.
Every lift has a camera. Every gate has a lock. Every lock has another lock watching it.
Aurek-Seven was built on the Authority's favorite principle: a criminal should meet twelve properly labeled obstacles before reaching anything worth stealing.
The tower also listens. Often through small things instead of obvious cameras or uniformed guards: a tiny holocam tucked inside a sign frame, a seeker droid drifting near a ceiling seam, a micro-listener clinging beneath a claim counter, a tracking tag hidden against the underside of a cargo sled. The Authority can let a lie walk away, follow it, and invoice the truth later.
The joke is that all of it is lawful. The fees are printed. The notices are filed. The doors are marked for safety compliance. The appeal windows exist. The payment kiosks are cheerful. Criminals who once ruled the garages by threat and habit now find themselves arguing with a terminal that has already added a storage surcharge, an access correction fee, and a mandatory security-retrofit assessment.
The tower is built to look correct instead of heroic. Its floors are waxed where the public can see them and scarred where tow hooks drag seized metal through intake. Its air tastes of coolant, hot circuitry, recycled caf, machine oil, and the thin acid of panic from people realizing the receipt in their hand is another billable notice. Every counter has a sign. Every sign has a clause. Every clause has a fee schedule.
Aurek-Seven is what happens when a corporate compliance office learns how to lock doors like a prison and smile like a bank.
POINTS OF INTEREST
- Public Recovery Hall - The tower's lower lobby, where citizens, pilots, dockworkers, smugglers pretending to be merchants, and hired attorneys attempt to recover seized property. The hall contains payment kiosks, records counters, claim booths, complaint terminals, security glass, reinforced waiting areas, and scrolling boards listing case numbers in cold administrative order. Most people leave this room poorer, louder, or both.
- Compliance Court Counters - Small legal offices where Authority clerks process fines, docking disputes, seizure claims, insurance holds, cargo liens, impound release orders, and ownership challenges. The counters are open to the public, expensive to use, and almost always slower than the claimant wants. Lawyers love them. Smugglers hate them. Clerks survive them with dead eyes and excellent stamp discipline.
- The Payment Chapel - A long chamber of glowing kiosks, locked benches, and quiet security droids. Locals gave it the name after realizing people came here to pray their credits cleared before their vehicle was auctioned. Each kiosk speaks with soft courtesy while offering payment plans, appeal fees, administrative reviews, and warnings that delay may result in further storage charges.
- Tow Intake Ramp - A reinforced vehicle ramp where impound crews drag in seized speeders, disabled craft, cargo sleds, loader droids, and wrecked machinery. The ramp includes scanner arches, ion suppression nodes, tractor-lock clamps, armored gates, heavy blast shutters, washdown drains, and painted lanes marked with intake priority codes. Vehicles enter dirty, smoking, stolen, or disputed; they leave only after the paperwork agrees.
- Stacked Speeder Vaults - Dozens of vertical storage decks filled with parked, chained, clamped, or suspended vehicles. Some are ordinary speeders with unpaid fees. Others are armored courier craft, gang transports, spice-haulers, or luxury vehicles seized from people with more enemies than receipts.
- Seized Vessel Berths - Reinforced hangar cells for small starships, shuttles, patrol craft, and landing-capable vessels. Each berth includes docking clamps, tractor-lock projectors, fuel-line locks, transponder cages, launch-denial controls, and emergency blast doors.
- Contraband Evidence Cages - Ray-shielded and blast-doored storage rooms used for confiscated weapons, spice canisters, forged permits, fake transponders, slicer rigs, stolen droid parts, and questionable cargo awaiting legal processing.
- Customs Autopsy Bays - Inspection rooms where cargo containers, smuggling compartments, vehicle panels, droid chassis, and ship components are opened, scanned, catalogued, and stripped for hidden compartments.
- Security Command Spine - A hardened vertical command column running through the tower, tying together holocams, lockdown gates, scanner data, droid patrol routes, turret permissions, impound alarms, breach response, and distress calls from nearby Authority nodes.
- Temporary Brig Level - A compact holding area used for violent trespassers, captured smugglers, prisoner transfers, customs detainees, and suspects waiting for handoff to other authorities or private claimants.
- Auction Cage Level - A sealed showroom for property legally cleared for sale, transfer, salvage, or corporate repossession. It smells of oil, old upholstery, hot circuitry, and desperation. The paperwork is immaculate.
- The Red Lanes - Fortified breach corridors around the highest-risk impound vaults. These narrow vehicle lanes contain ray shields, blast doors, tractor locks, ion suppression nodes, kill-switch gates, and restricted disruptor emplacements intended to stop dangerous seized craft from escaping. They are painted in dull red warning bands and built with brutal angles, leaving intruders little cover and vehicles even less room to turn.
- Dead Lift Rooms - Decoy lift exits and false service access pockets built to catch slicers, thieves, and crews trying to bypass public checkpoints. Some appear to lead toward storage decks, but instead open into monitored lockboxes with release controls reserved for staff.
- Legal Mirror Archive - A secured records floor where claim histories, breach logs, ownership disputes, release attempts, payment records, and camera captures are mirrored off-site. Destroying a local terminal leaves the debt intact.
- The Compliance Gallery - A narrow observation deck above the tow intake lanes where supervisors watch impounded vehicles enter the tower. It is also where high-value claimants are sometimes allowed to see their property locked behind glass before being handed another form.
- Lien Processing Office - A quiet suite of desks where unpaid storage fees become liens, liens become seizure authority, and seizure authority becomes auction eligibility. Criminals often fear this room more than the turrets, because accounting shrugs off blaster fire.
- Mandatory Retrofit Bay - A secured maintenance floor where seized vehicles may be fitted with tracking markers, release locks, transponder cages, disabled launch systems, or temporary compliance hardware before storage. Owners are often billed for the inconvenience.
- Credential Quarantine Room - A small interrogation-adjacent office where suspicious badges, forged access chips, false titles, compromised code cylinders, and questionable droid ownership proofs are examined under camera and scanner coverage.
- Clerk Shield Alcoves - Recessed workstations surrounded by reinforced transparisteel and fast-closing shutters, allowing staff to retreat behind sealed counters while still continuing the denial process remotely.
- Surcharge Wall - A public board listing common fees in tiny immaculate text: towing, hazard storage, inspection delay, armed response, gate damage, sensor recalibration, emergency lockdown, hostile claimant behavior, droid deployment, and premature argument escalation.
- Audit-Mote Roosts - Small charging alcoves and maintenance nests for future Authority spy remotes, seeker droids, tiny flying cameras, listening droids, and tagger units. Most are hidden in vent mouths, sign housings, ceiling seams, lift corners, and service ducts.
- Listening Ducts - Older maintenance shafts retrofitted with audio pickups, microdroid docking contacts, and sensor pucks. They are cheap to overlook and expensive to ignore.
- Tagger Armory - A secure cabinet of tracking tags, transmitter darts, magnetic vehicle markers, impound beacons, and sealed evidence labels used by tow crews and enforcement officers.
- Remote Evidence Review Booths - Small enclosed stations where supervisors review spy-droid footage, holocam records, tagger pings, forged claim attempts, and suspicious customer-service interactions.
- Enforcement Muster Lockers - Armored storage rooms reserved for future Authority enforcement NPC teams, including binders, stunners, portable scanners, restraining bolts, riot shields, droid callers, and sealed compliance coats.
OPERATIONAL PROCESS
- Intake - Vehicles, cargo, droids, or small craft enter through tow ramps, secured berths, or sealed garage lanes. Each item is scanned, photographed, tagged, assigned a case number, and connected to any known docking disputes, unpaid fees, criminal alerts, or open claims.
- Assessment - Authority staff review ownership records, manifests, transponder logs, parking history, security footage, debt status, and any prior access arrangements. Old favors and dockside threats mean little unless they can be made to look like valid paperwork.
- Containment - Property is moved into an appropriate storage tier: public recovery hold, ordinary impound, legal dispute vault, contraband cage, seized-vessel berth, or Red Lane custody. Higher-value items receive more locks, more cameras, and fewer excuses for release.
- Claim and Appeal - Owners may pay, dispute, file appeal, produce documents, hire counsel, or attempt to prove that their suspiciously unregistered cargo hauler is absolutely legitimate. The process exists. It even functions. It simply costs time, credits, and personal exposure.
- Escalation - Threats, bribes, slicing attempts, forged documents, violent retrieval attempts, or sudden "clerical corrections" can move a case into higher security review. This usually adds fees, freezes release, and alerts more people than the claimant intended.
- Disposition - Unclaimed, unrecoverable, illegally held, or debt-buried property may proceed toward auction, salvage, transfer, evidence retention, private claim settlement, or continued storage. The tower is patient. The daily fee is patient too.
CONTROL DOCTRINE
- Observe Before Enforcing - The tower studies each confrontation before committing force. Suspicious claimants, forged identities, odd route choices, and attempted bribes may be watched quietly until the Authority can identify partners, property, vehicles, and escape routes.
- Tag Before Chasing - If an immediate arrest would cause more trouble than it solves, the Authority may mark a suspect, vehicle, cargo crate, droid, or false document with a surveillance tag and allow it to move. The larger network matters more than the lobby argument.
- Delay as Pressure - Every hour inside the process increases cost. Storage fees grow. Release windows close. Nearby lots fill. Lawyers become necessary. Criminal owners may find themselves choosing between losing property, exposing themselves, or attempting a very recorded crime.
- Escalate Through Courtesy - The tower remains polite while making the situation worse. A warning becomes a hold. A hold becomes a review. A review becomes a lien. A lien becomes an auction notice. The terminal apologizes for the inconvenience every step of the way.
- Make Alternatives Worse - Aurek-Seven operates inside a larger Authority net. Nearby Authority nodes, affiliated lots, and controlled garages can adjust rates, change codes, deny temporary storage, and flag suspicious reroutes, making "just park somewhere else" a less useful plan.
- Turn Breaches into Assets - A failed break-in becomes more than a security event. It is evidence, a billing opportunity, a justification for further hardening, and a map of what the criminals wanted badly enough to risk recovering.
SECURITY
Rating: Maximum
Authority Impound Tower Aurek-Seven is a civilian corporate structure with Maximum security relative to its role as a major impound, seizure, evidence, and port-compliance facility. Its defenses operate as a series of overlapping inconveniences, each one designed to slow, identify, isolate, charge, fine, trap, or legally expose anyone trying to reclaim property through unauthorized means.
The tower makes incorrect entry expensive, departure harder, argument slower, and violence costly, recorded, and billable.
LAYER ONE: PUBLIC ACCESS AND ADMINISTRATIVE CHOKEPOINTS
- Claimant Verification Desks - Public recovery begins with identity, ownership, docking records, cargo manifests, title chains, impound numbers, and payment history. Criminal claimants often discover the first locked door is a clerk asking them to prove they own the stolen thing they want back.
- Polite Delay Architecture - The public halls are arranged to slow movement through queues, kiosks, locked benches, scanner arches, security glass, turnstiles, and controlled waiting zones. Everyone may appeal. Everyone may submit forms. Every form creates another record.
- Fee-Gated Access Terminals - Kiosks can deny release until docking fees, parking fees, storage charges, tow charges, inspection costs, hazard surcharges, administrative review costs, and emergency security assessments are paid or contested through formal channels.
- Case-Number Dependency - Doors, counters, claim windows, lift access, and release terminals require valid case numbers. A missing case trail leaves even a bribed clerk with nothing useful to open.
- Customer Service Blackbox Logs - Every complaint, threat, attempted bribe, false claim, forged signature, and suspicious recovery request is logged, copied, timestamped, and attached to the property file. The tower weaponizes paperwork before it weaponizes turrets.
- Visitor Segmentation - Claimants, lawyers, contractors, bounty hunters, staff, and detainees are routed through different lanes. The wrong lane delays access and creates a reason to ask why the visitor tried it.
- Paperwork Honeypots - Certain forms and terminal options appear to offer faster release, but actually require claimants to identify associates, provide chain-of-ownership details, or submit signatures that can later be challenged.
- Courtesy Hold Notices - The system issues gentle reminders that property may remain safe in Authority custody while a dispute is reviewed. Each courtesy notice also confirms another day of billable storage.
LAYER TWO: IDENTITY, SCREENING, AND SURVEILLANCE
- Biometric Access Scanners - Retinal, palm, voiceprint, and biosignature scanners secure staff entrances, evidence cages, command rooms, brig access, high-value vaults, seized-vessel berths, and release terminals.
- Walkthrough Identification Scanners - Archway scanners verify authorized personnel, flag suspicious droids, identify known offenders, detect concealed tags, and compare visitors against active impound disputes.
- Weapon Detectors - Scanner systems placed throughout public halls, intake lanes, claim counters, brig access points, auction levels, and inspection corridors detect hidden weapons, power cells, blaster-gas residue, suspicious alloys, and concealed tool packs.
- Holocam Surveillance Grid - High-resolution cameras, motion sensors, thermal readers, audio pickups, plate scanners, hull-mark readers, and tamper alarms monitor public areas, storage decks, impound vaults, exterior approaches, roof access, service shafts, and lift interiors.
- Behavioral Flagging Suite - Local systems mark unusual movement patterns, repeated false claims, route probing, loitering near staff doors, unscheduled maintenance access, and visitors who keep looking at cameras instead of counters.
- Chain-of-Custody Tracking - Every seized vehicle, cargo crate, droid, weapon, and suspicious component receives a claim marker, custody file, location tag, and release lock. Moving property outside the custody chain triggers alarms before the item reaches an exit.
- Biometric Drift Alerts - Repeated scans that almost match a known identity can be flagged for staff review, catching crude disguises, partial biometric spoofs, cloned access attempts, or altered records.
- Visitor Shadow Profiles - The tower builds temporary movement profiles for visitors while they are inside, noting which doors they approach, which cameras they avoid, which cases they ask about, and which exits they test.
- Droid Identity Scrutiny - Droids entering the tower may be checked against ownership claims, restraining bolt status, caller compatibility, memory wipe suspicion, and known smuggling modifications.
LAYER THREE: COVERT MICRO-SURVEILLANCE AND TRACKING
- Spy Droid Coverage - Small surveillance droids support the tower's fixed holocams by drifting through garage decks, service ducts, claim halls, exterior ledges, tow ramps, and blind corners where a wall-mounted camera would be obvious or easy to destroy.
- Seeker Droid Patrols - Small flying spy droids perform scouting, route checks, suspicious behavior monitoring, and quiet pursuit of marked claimants. They are serviceable, trackable, replaceable droids: larger than nanobots, small enough to hide where criminals forget to look.
- ID9-Style Hover-Crawler Monitors - Multi-limbed surveillance droids inspired by ID9 seeker designs can hover through open areas or crawl into tighter service spaces, recording audio, tracking movement, and transmitting alerts to command nodes.
- Dark Eye-Style Recon Remotes - Tiny probe-inspired remotes may be used in high-risk storage decks and Red Lane approaches, where quiet scouting is preferable to sending living staff into ambush corridors.
- Prowler-Style Local Surveillance - Compact hovering patrol droids sweep public recovery lanes, parking vaults, and auction corridors, filling gaps between fixed cameras and larger droid patrols.
- Mobile Spy-Eye Remotes - Semi-intelligent surveillance remotes function as moving holocams, following persons of interest until larger droids, clerks, or security teams can respond.
- Mouse Droid Screen Movement - Small service droids move through ordinary corridors, maintenance lanes, and public areas with little notice, carrying messages, scanner pings, and quiet observation reports.
- Microdroid Listener Bugs - Tiny spiderlike audio droids may be deployed in waiting rooms, claim counters, public recovery areas, staff corridors, and disputed vehicle bays to catch threats, bribes, case-number leaks, or attempts to coordinate illegal retrieval.
- Moon-Moth Style Espionage Droids - Insectlike spy droids may be used in grimy garage levels, ductwork, exterior ledges, and trash-cluttered dock areas where a small fluttering shape is easy to dismiss as a pest.
- Mini-Holocam Pucks - Small holocam devices may be hidden in signage, toll kiosks, ceiling seams, clerk alcoves, lift housings, impound tags, and public waiting areas to widen visual coverage.
- Surveillance Taggers - Small tracking tags may be placed on suspect vehicles, cargo crates, staff badges, counterfeit claim documents, or high-risk visitors so the Authority can follow movement after release, transfer, or attempted theft.
- MicroTagger Darts - Tiny transmitter darts may be fired, planted, or magnetically attached during breach events, allowing security teams to track fleeing suspects, escaping vehicles, or removed cargo through the surrounding dock district.
- Sensor Beacon Mesh - Small alarm and sensor beacons are scattered through ramps, roof approaches, service tunnels, exterior walkways, tow yards, and blind corners, feeding movement alerts back to local command stations.
- Fob-Linked Custody Pings - High-value cases may be tied to tracking-fob style pings, allowing authorized enforcement staff to follow marked property, suspect droids, or escaping vehicles after a breach.
- Audit-Mote Swarm Protocol - The Authority's planned micro-surveillance droids are larger than nanobots: small, maintainable spy remotes large enough to repair, track, replace, and destroy, yet small enough to hide in vents, light housings, sign frames, cargo shelves, and the underside of parked vehicles.
LAYER FOUR: PHYSICAL HARDENING AND EXIT DENIAL
- Heavy Blast Doors and Automated Blast Gates - Reinforced durasteel doors, armored shutters, and garage gates isolate public halls, tow ramps, parking decks, lift shafts, impound vaults, seized-vessel berths, customs bays, and breached corridors.
- Redundant Mechanical Locking Bolts - Key doors include physical locking bolts beneath the powered systems, so slicing the panel leaves the barrier locked. The door may accept the command and hold its bolts anyway.
- Armored Toll Teeth - Retractable durasteel barriers rise from the floor at vehicle exits, ramp mouths, lift thresholds, and tow lanes, preventing speeders or cargo haulers from simply ramming through a gate.
- Compartmentalized Garage Decks - Each parking level can be sealed into smaller zones. A breach on one ramp seals that section into a smaller cage with better camera angles.
- False Service Corridors - Some maintenance routes end in sealed inspection pockets, decoy panels, dead lifts, or monitored choke rooms. They look useful to intruders because they are designed to look useful.
- Armored Lift Control - Freight lifts, vehicle elevators, staff lifts, and prisoner transfer lifts can be frozen between levels, rerouted to security intake, sealed behind blast doors, or used as temporary holding cells.
- Anti-Ram Ramp Geometry - Vehicle ramps include hard turns, rising barriers, reinforced posts, and angled gates that make straight-line escape runs difficult even before fields or tractors activate.
- Modular Barricade Slots - Certain corridors and garage lanes contain recessed slots for rapid barricade deployment, letting staff convert open vehicle paths into segmented holding zones.
- Service Panel Authentication - Maintenance panels require tool recognition, staff credentials, and timed work orders. Opening the correct panel at the wrong time can be treated as tampering.
LAYER FIVE: ENERGY BARRIERS AND CONTAINMENT FIELDS
- Laser Wall Gates - Energy barriers seal vehicle ramps, pedestrian corridors, toll lanes, cargo inspection paths, brig corridors, and emergency containment routes during lockdown.
- Energy Fence Fields - Visible defensive fields surround seized vehicles, evidence cages, contraband storage, hazardous cargo, and high-risk impound decks.
- Ray-Shielded Security Fields - Defensive field emitters protect vessel berths, brig doors, contraband cages, command rooms, high-value storage vaults, and reinforced choke points.
- Sequential Field Locking - Key corridors use more than one barrier. Gates can close in sequence, trapping intruders between laser walls, blast doors, and ray-shielded thresholds while security decides whether to bill them, arrest them, or shoot them.
- Emergency Magcon Seals - Select bays use atmospheric and pressure containment seals to isolate fires, decompression, chemical spills, toxic cargo, sabotage, or weapons discharge while keeping the rest of the tower active.
- Field Failure Cascades - Important barriers are paired with secondary doors or backup emitters. If a field drops, shutters may close; if a shutter jams, a second barrier may activate behind it.
- Evidence-Safe Isolation - Contraband cages and evidence rooms favor containment fields that isolate rooms while preserving held property, preserving value and proof whenever possible.
- Timed Release Windows - Some barriers only open during narrow authorized intervals, forcing legitimate staff to move quickly while making improvised intrusions harder to coordinate.
LAYER SIX: VEHICLE IMMOBILIZATION AND LAUNCH DENIAL
- Tractor-Lock Projectors - Short-range tractor systems pin vehicles, small craft, cargo haulers, and impounded vessels in place until security crews can respond.
- Port Authority B.O.O.T. Launch Denial Systems - Gravitic immobilization devices anchor small craft, prevent unauthorized departure, and broadcast telemetry during escape attempts.
- Docking Clamp Override Locks - Seized vessels are held by docking clamps tied to command authorization, payment status, inspection holds, and property-release codes.
- Fuel-Line and Coolant Lockouts - Select impounded vessels have fueling, coolant, or service lines locked out until release is approved, making sudden departure more difficult even if the hull is reached.
- Repulsorlift Dampening Floors - Certain vehicle vaults and tow intake lanes include localized systems that interfere with quick repulsorlift takeoff, keeping speeders from lifting cleanly out of a sealed lane.
- Ion Suppression Nodes - Low-yield disabling systems shut down fleeing speeders, seized vehicles, compromised droids, hijacked loaders, cargo sleds, and unauthorized machinery while preserving the surrounding level.
- Transponder Cage Protocols - Vehicles and small craft may be fitted with temporary impound markers, telemetry tags, release locks, or transmitter cages that make silent removal difficult and resale annoying.
- Wheel, Skid, and Clamp Locks - Ground vehicles can be physically anchored through tire cages, skid hooks, docking boots, cargo-frame clamps, or maglock plates tied to the property file.
- Ignition and Control Interlocks - Certain seized vehicles receive temporary interlocks that block startup pending an approved release code and physical technician clearance.
- Exit Route Desynchronization - Gates, lifts, and ramps open stage by stage only after release is complete. Freeing one stage may leave the vehicle trapped at the next, now with alarms active.
LAYER SEVEN: DROID, PERSONNEL, AND RESPONSE DEFENSES
- Security Droid Patrols - Armed enforcement droids patrol public halls, recovery counters, parking decks, impound cages, tow ramps, storage vaults, and restricted staff corridors.
- Custody Escort Droids - Heavier droids escort detainees, high-value cargo, seized droids, and dangerous claimants through secure corridors where living guards would be easier to bribe or threaten.
- Droid Restraining Protocols - Restraining bolts, caller pings, and compliance sockets are used on impounded service droids, seized loader droids, stolen automata, and compromised cargo handlers.
- Rotating Guard Assignments - Staff rotate across levels, with long-term sole control over one vault, one release desk, or one evidence cage treated as a security risk. Familiarity is treated as a security risk.
- Two-Person Release Rules - High-value vehicles, contraband, seized vessels, and legal-dispute property require multiple staff approvals before physical release, terminal clearance, and gate opening can happen together.
- Binders - Durasteel restraints are used for detainee intake, prisoner transfer, medical checks, and movement through secure brig spaces.
- Temporary Brig and Holding Cells - Secure detention rooms hold violent trespassers, captured smugglers, prisoner transfers, customs detainees, and suspects awaiting handoff.
- Clerk Panic Protocols - Staff can silently escalate a desk interaction under a steady tone, locking counters, delaying lifts, routing droids, or marking the visitor while continuing to discuss forms.
- Anti-Bribery Rotation - Valuable property requires more than one clerk, guard, or supervisor for release. Staff duties rotate, records are cross-checked, and suspiciously helpful employees are audited.
- Claimant Escort Trails - High-risk visitors are escorted through routes selected moments before movement, making preplanned ambushes and memorized paths less reliable.
- Compliance Enforcement Placeholder Teams - Future generic enforcement NPCs may operate from Aurek-Seven as uniformed compliance enforcement officers, tow officers, seizure agents, scanner techs, and armed recovery supervisors trained to treat every arrest like a form with legs.
- Evidence Recovery Squads - Future enforcement NPCs may include specialized teams trained to recover stolen property, secure evidence, escort seized cargo, and keep criminals alive long enough to be billed, questioned, or transferred.
- Plainclothes Claim Observers - The Authority may station unmarked personnel in public waiting areas to watch for intimidation, coded speech, bribe attempts, gang lookouts, or claimants hiding their association with one another.
LAYER EIGHT: SLICER AND SYSTEM HARDENING
- Slicer Countermeasure Core - Rotating encryption, false-access traps, decoy terminals, isolated backups, hardline override points, local-only command loops, and security blackboxes protect tower controls from intrusion.
- Air-Gapped Vault Controls - The most important vault doors, evidence cages, and seized-vessel berths use systems separate from the public terminal network. Slicing a lobby kiosk may ruin someone's afternoon while the Red Lanes stay sealed.
- Decoy Release Systems - Some terminals appear to control vehicle release while actually feeding intruders false status updates, bad lift routes, marked credentials, or sealed maintenance paths watched by security.
- Local Manual Overrides - Critical systems require on-site physical confirmation, command clearance, or mechanical release. Remote slicing can create confusion, while high-value property stays bound to physical confirmation and command clearance.
- Audit-Spike Alarms - Suspicious access attempts may trigger quiet alarms. Some quietly increase security level, flag credentials, alter lift routing, and attach investigation fees to the relevant case file.
- Data Redundancy and Legal Mirrors - Property records, claim histories, camera captures, release orders, fee schedules, and breach logs are mirrored to off-site Authority records. Destroying the local terminal avoids erase the debt.
- Credential Burn Protocols - Once a badge, code cylinder, or terminal login is suspected of compromise, the system can let it keep working just long enough to map the intrusion before cutting it off.
- False Success Responses - Some failed slicing attempts receive convincing but useless confirmations, sending intruders toward wrong rooms, sealed lifts, or property that has already been moved.
- Terminal Personality Traps - Certain customer service terminals ask harmless-seeming questions that confirm identity, motive, ownership, or criminal knowledge while pretending to assist with appeals.
LAYER NINE: ENVIRONMENTAL CONTROL AND CROWD CONTAINMENT
- Atmosphere Sectioning - The tower can isolate smoke, fumes, toxic spills, fire, decompression, or chemical leakage to specific rooms, ramps, or garage decks.
- Fire Suppression Flooding - Selected areas can be filled with suppressant foam, coolant mist, or oxygen-reduction protocols appropriate to the hazard and species safety requirements.
- Nonlethal Denial Effects - Public-facing zones may deploy alarms, glare strobes, sonic warnings, adhesive foam, smoke curtains, floor locks, and droid cordons before lethal force is authorized.
- Directional Evacuation Corridors - During emergencies, civilians are guided away from vaults and toward controlled exits, while suspicious movement against evacuation flow is marked for security attention.
- Containment-First Design - Most tower systems are designed to close around trouble as a default response. A breached area becomes smaller, slower, brighter, louder, more expensive, and easier to record.
- Garage Deck Pressure Doors - Larger vehicle decks can be isolated with pressure-rated doors, preventing smoke, chemical spills, or hostile movement from spreading between levels.
- Hazard Fee Sensors - Systems that detect fire, leaked fuel, toxins, radiation, unstable cargo, or exposed contraband automatically create hazard records, which may later become billable charges.
- Crowd Sorting Lights - Public emergencies activate color-coded floor lights and signboards, guiding civilians toward exits while directing marked suspects into lanes that are easier to monitor and lock down.
LAYER TEN: HEAVY RESPONSE AND LAST-RESORT SYSTEMS
- Autoturret Defense Emplacements - Automated blaster turrets cover ceiling mounts, garage ramps, lift approaches, gate housings, security doors, cargo corridors, and fortified chokepoints.
- Stun and Ion Priority Settings - Most turret and droid response begins with containment, stun, ion, or disabling settings where practical, especially in public or evidence-heavy areas.
- Anti-Materiel Disruptor Cannon Emplacements - Restricted disintegration-capable weapons are mounted only in hardened breach lanes, seized-vessel vaults, and armored escape corridors. These are reserved for severe threats such as hostile boarding craft, armored vehicles, fortified raiders, exposed hull plating, and dangerous seized vessels attempting escape.
- Restricted Disruptor Turrets - High-output disintegrator-grade turret systems are used only in the Red Lanes and hardened vault corridors. These serve as restricted Red Lane and hardened-vault weapons requiring command authorization.
- Phase-Pulse Disintegrator Reference Systems - Rare specialist weapon principles are used as reference material for controlled-range disintegration defenses. These systems are logged as extreme-force measures and kept out of public areas.
- Kill-Lane Authorization Locks - The most destructive defenses require layered command approval, active threat confirmation, and sealed-lane containment before activation. The tower would rather invoice a criminal than vaporize a paying dispute.
- Evidence Preservation Bias - Heavy weapons are held back where possible because seized vehicles, cargo, and suspects are valuable. The tower prefers immobilization, fees, and proof over mess unless the threat forces escalation.
- Armored Response Niches - Select corridors contain recessed defensive stations where droids or guards can hold a position behind reinforced cover while gates and fields narrow the approach.
- Vault Purge Denial - The tower is built to prevent intruders from destroying evidence or seized property to erase liability. Critical vaults may seal harder if internal destruction is detected.
LAYER ELEVEN: COMMAND, REDUNDANCY, AND OFF-SITE CONTROL
- Central Command Lockdown - Authorized staff can seal gates, freeze lifts, trap vehicles between levels, activate shields, close toll barriers, mark suspects, dispatch droids, and trigger impound-wide emergency containment.
- Distributed Security Rooms - The tower distributes control across multiple rooms, making each command node only one part of the building's security spine.
- Independent Power Cells - Blast doors, vault fields, command spine systems, evidence cages, and lockdown barriers have backup power reserves to prevent a simple outage from freeing the tower.
- Off-Site Authority Oversight - Critical alarms, property records, breach events, and major release commands are mirrored to other Nar Shaddaa Sector Docking Authority nodes, making local compromise harder to hide.
- Dead-Clerk Safeties - If key staff credentials are stolen, coerced, or used under suspicious conditions, release authority can be suspended until external review. Threatening the clerk may only upgrade the fee category.
- Emergency Auction Hold - During serious breaches, disputed property can be locked into legal freeze, preventing sudden transfers, releases, or suspicious clerical corrections until review clears.
- Priority Reversion Modes - If central systems are compromised, the tower can fall back to prewritten lockdown patterns that favor sealing vaults, protecting records, trapping lifts, and denying exit over restoring convenience.
- Mutual Node Alerts - Nearby Authority properties can be warned when Aurek-Seven is breached, allowing other garages, docks, and impound cages to change codes or raise prices before criminals scatter there.
- Post-Breach Billing Engine - Damage reports, droid deployments, lockdown time, disrupted business, emergency maintenance, and hazard cleanup can all be added to the offending case file, assuming the offender survives or leaves assets behind.
PLANNED SUPPORT SUBMISSIONS
- Audit-Mote Surveillance Droid - A future small flying spy droid used by the Nar Shaddaa Sector Docking Authority for audio capture, movement tracking, visual surveillance, and tag deployment. It is intended to be small, annoying, maintainable, and legal enough to place in public-facing corporate property.
- Ledger-Moth Espionage Droid - A future insectlike surveillance droid disguised as a common dockside pest, used in garage levels, vents, service corridors, exterior ledges, and trash-cluttered maintenance spaces.
- Receipt-Eye Mobile Holocam - A future hovering surveillance remote used in toll booths, impound lobbies, claim counters, and recovery halls to record threats, bribes, forged claims, and attempted intimidation.
- Tow-Tag Surveillance Marker - A future tracker/tag fired, planted, or magnetically attached to vehicles, crates, droids, or suspects during impound disputes and breach events.
- Authority Compliance Enforcement Officers - Future generic enforcement NPCs intended to serve as the tower's visible staff muscle: polite, armored, document-heavy officers who arrive with binders, scanners, droid backup, and enough legal authority to ruin a criminal's afternoon before the first shot is fired.
SECURITY LIMITATIONS
- Maximum security is rated for a civilian corporate impound structure, beneath a full military base.
- The tower houses staff, droids, and corporate security; fleets, armies, and capital-grade defenses sit outside its scope.
- Disruptor and disintegration-capable defenses are limited to fortified breach lanes, high-risk vault corridors, and severe escape scenarios.
- Disintegrator-grade systems remain restricted away from routine crowd control, fee enforcement, minor trespass, traffic disputes, and ordinary impound recovery.
- Micro-surveillance droids and taggers are small, detectable, and removable; careful scanners, ion bursts, slicer tools, maintenance sweeps, trained eyes, or simple destruction can remove individual units.
- The tower can be bribed, sliced, infiltrated, sabotaged, damaged, or escaped from with enough skill, planning, resources, or inside help, but doing so is difficult, expensive, noisy, heavily recorded, and likely to create more evidence, more fees, and more enforcement attention.
HISTORICAL INFORMATION
Authority Impound Tower Aurek-Seven began as an old vertical parking stack buried inside one of Nar Shaddaa's crowded dock districts. Before the Nar Shaddaa Sector Docking Authority claimed it, the tower belonged to a chain of shell companies, crooked lot managers, dockside lenders, and gang-backed tow crews who used the structure to hide stolen speeders, smuggled cargo, stripped droids, and ships that had been temporarily misplaced for a fee.
That changed after the Authority's expansion through Docking Rights and Wrongs: Nar Shaddaa. As contracts shifted, access codes changed, and old dock claims were dragged into the light, Aurek-Seven was folded into the Authority's growing seizure network. Nar Shaddaa rarely gives up useful bones. The Authority kept the old tower, gutted it level by level, reinforced it, rewired it, locked it down, and turned it into something colder.
The first upgrades arrived before most locals understood what had happened. Heavy blast shutters sealed old vehicle ramps. Garage gates were replaced with armored barriers. Holocams appeared over toll lanes and lift shafts. Payment kiosks began printing new fee schedules. Biometric locks cut old staff out of rooms they had used for years. Entire levels that had once been ruled by gang favors now required case numbers, release forms, and clearance codes.
The crews worked fast, and that speed became part of the tower's legend. Whole ramps vanished behind new shutters between one evening and the next. Old guards arrived to find their badges dead. Gang lookouts discovered their favorite blind corners filled with cameras. Tow hooks, scanner arches, payment terminals, field emitters, and droid chargers appeared in places where yesterday there had been rust, spilled oil, and a man with a blaster asking for cash. A week later, the corners that still looked blind began producing evidence anyway.
The change was hilarious in the cruelest possible way: it was lawful.
A stolen speeder required proof of ownership. A smuggling hauler required a manifest that matched its cargo. A gang transport remained trapped because its old access code lacked legal registration. Every attempt to argue created more paperwork. Every attempt to force entry created more charges. Every day spent disputing the seizure added storage fees. The tower learned people's voices, their routes, their favorite lies, their preferred exits, and which friends arrived five minutes after a denial notice.
Operations such as Spice-Run Shutdown hardened the tower's purpose. Spice runners, shadow-port logistics, hidden manifests, and criminal handlers proved that an impound facility needed more than a garage with locks. It needed scanners, cages, droid patrols, seizure records, brig cells, hostile-breach defenses, and enough firepower to make even an armored gang convoy think twice.
Now, Aurek-Seven stands as one of the Authority's nastier symbols on Nar Shaddaa: a tower of unpaid fees, seized property, trapped secrets, and sealed doors. Its public lobby still pretends to be civil. Its kiosks still ask for credits in bright, pleasant tones. But above the counters and behind the glass, the tower climbs into dark levels of immobilized speeders, ray-shielded cages, cold command rooms, and impound vaults where vehicles wait under white light while their owners decide whether to hire a lawyer, pay the fine, bribe a clerk, or try something much more foolish.
The Authority only needs criminals to want their vehicles back.
That is the true cruelty of Aurek-Seven. It only needs to hold the speeder they use for collections, the shuttle they use for spice runs, the cargo sled with the false bottom, the droid that knows the route, or the luxury transport that proves someone important was there. Once the property is inside, the criminal problem becomes a customer service problem, and customer service has blast doors.
Last edited: