Scenario #17
THE SOCIAL ENGINEERING ATTACK
Family Hostage Protocol
9:17 PM
Your phone rings at 9:17 PM. An unfamiliar voice speaks: "We have your daughter. Check your email for proof of life and instructions. You have 3 hours to transfer 15 BTC or we escalate this situation."
Your heart pounds as you open the email to find a photo of your daughter, clearly distressed, holding today's newspaper.
THREAT STATUS: FAMILY MEMBER UNDER DURESS
The email contains detailed instructions: Transfer exactly 15 BTC to a specified wallet address within 3 hours. No police involvement or the consequences will be severe. They know you have the funds, they've researched you thoroughly after discovering your crypto discussions on social media.
You're being watched, they claim. Any attempt to contact authorities will be detected. They've provided a small test address for you to transfer 0.01 BTC immediately to confirm you've received their demands.
Your Situation
You frantically assess your options while trying to maintain composure:
- Your daughter isn't answering her phone or responding to messages
- The kidnappers know specific details about your crypto holdings
- They've requested a sum you can access, suggesting targeted research
- Your security systems were designed for technical attacks, not threats to loved ones
- The countdown timer in the email shows 2:53:42 remaining
- The photo appears genuine based on details only your daughter would know
- Your security cameras show no unusual activity around your home
Immediate Assessment
Duress Challenge: Social Pressure Security
- What duress protocols have you established for coercion scenarios?
- Do you have decoy wallets or honeypot systems to deploy?
- How can you verify the authenticity of the threat?
- What distress signals can you use to alert authorities without detection?
- How are your crypto holdings structured to resist social engineering attacks?
Complications
As you consider your response:
- The attackers send another message showing they're monitoring your wallet activity
- They demonstrate knowledge of your security setup, suggesting inside information
- They provide additional "proof" they have your daughter by sharing private details
- Your spouse is traveling and unreachable for consultation
- The deadline doesn't allow time for extensive verification or planning
- Your high-security wallet requires multiple authorization steps to access
Your Mission
Navigate this social engineering attack targeting your loved ones while protecting your cryptocurrency holdings. You must balance family safety with financial security while under extreme emotional duress.
Will your security systems function when the threat is to people rather than technology?
Your phone buzzes with a new message: "We see no transaction yet. Testing our patience is unwise. 0.01 BTC to the test address NOW to show good faith or this gets worse."
TIME REMAINING: 2:41:17 Until Deadline
What duress countermeasures did you implement, and how will you deploy them in this life-or-death scenario?