← BACK TO SCENARIOS
Scenario #02

THE HOME INVASION

Armed Coercion Protocol

SECURITY BREACH ALERT
2:47 AM

The crash of your front door splintering open jolts you awake. Heavy footsteps pound through your house as multiple voices shout commands. Flashlight beams sweep your bedroom wall.

"Get up! Hands where we can see them!"
THREAT STATUS: ARMED INTRUDERS IN RESIDENCE

Three masked individuals storm into your bedroom, one pointing what appears to be a weapon. They know exactly why they're here. This isn't a random burglary.

"We know you have crypto," the leader states coldly. "We've done our homework. Social media posts, your car, this house. You've got serious money in Bitcoin and we want it. This can go easy or hard, but we're leaving here with your coins."

They've clearly researched you. One of them holds up printouts of your Twitter posts discussing cryptocurrency investments.

Your Situation

You're forced to sit at your desk while they systematically search your home office:

You realize they've been watching and planning this for some time.

Immediate Assessment

Coercion Challenge: Physical Security Under Duress

  1. What physical security measures can protect your crypto access under armed coercion?
  2. Do you have decoy systems in place to satisfy attackers while protecting real assets?
  3. What duress protocols did you implement for exactly this scenario?
  4. How compartmentalized are your holdings to limit exposure during forced access?
  5. What emergency alerts or dead man's switches can you activate undetected?

Complications

As the invasion continues:

Your Mission

Protect as many of your cryptocurrency holdings as possible while ensuring your physical safety. Navigate the coercion while deploying any duress measures you've prepared for this exact scenario.


Will your security systems protect your crypto when your life is at stake?

The leader approaches with your hardware wallet.

"This little device is going to make us all rich tonight. Start with the PIN, then we'll talk about the rest of your setup. And don't try anything clever, we know more than you think."
What hidden defenses and decoy systems did you prepare for when compliance isn't optional?