Scenario #02
THE HOME INVASION
Armed Coercion Protocol
2:47 AM
The crash of your front door splintering open jolts you awake. Heavy footsteps pound through your house as multiple voices shout commands. Flashlight beams sweep your bedroom wall.
"Get up! Hands where we can see them!"
THREAT STATUS: ARMED INTRUDERS IN RESIDENCE
Three masked individuals storm into your bedroom, one pointing what appears to be a weapon. They know exactly why they're here. This isn't a random burglary.
"We know you have crypto," the leader states coldly. "We've done our homework. Social media posts, your car, this house. You've got serious money in Bitcoin and we want it. This can go easy or hard, but we're leaving here with your coins."
They've clearly researched you. One of them holds up printouts of your Twitter posts discussing cryptocurrency investments.
Your Situation
You're forced to sit at your desk while they systematically search your home office:
- They've found your computer and are demanding passwords
- One intruder is examining what appears to be your hardware wallet
- They're photographing documents and asking about specific crypto holdings
- They mention knowing about your "cold storage setup"
- The leader keeps checking a phone, suggesting they're working with outside information
- They've disabled your home security system and blocked your phone signal
You realize they've been watching and planning this for some time.
Immediate Assessment
Coercion Challenge: Physical Security Under Duress
- What physical security measures can protect your crypto access under armed coercion?
- Do you have decoy systems in place to satisfy attackers while protecting real assets?
- What duress protocols did you implement for exactly this scenario?
- How compartmentalized are your holdings to limit exposure during forced access?
- What emergency alerts or dead man's switches can you activate undetected?
Complications
As the invasion continues:
- They demand you unlock your computer and show them your portfolio
- One attacker claims to have technical knowledge about crypto security
- They threaten escalating violence if you don't cooperate fully
- They're taking photos of seed phrases and hardware wallets they discover
- They mention having inside information about your security setup
- Time pressure mounts as they worry about police response despite disabled alarms
Your Mission
Protect as many of your cryptocurrency holdings as possible while ensuring your physical safety. Navigate the coercion while deploying any duress measures you've prepared for this exact scenario.
Will your security systems protect your crypto when your life is at stake?
The leader approaches with your hardware wallet.
"This little device is going to make us all rich tonight. Start with the PIN, then we'll talk about the rest of your setup. And don't try anything clever, we know more than you think."
What hidden defenses and decoy systems did you prepare for when compliance isn't optional?