LURE Framework Lifecycle of User-targeted Risk and Exploitation

Select a Harm → Modes highlight → Tap a Mode to view Acts  |  ver.01
Select a Harm to highlight its Criminal Path Modes H1 Financial — Financial / Property path active H2 Informational — Information / Privacy path active H3 Sexual — Sexual Exploitation path active H4 Psychological — Psychological / Mental path active H5 Reputational — Social / Reputational path active H6 Legal — Legal Entanglement path active H7 Physical — Physical / Life path active
S1
Resource Dev.
Preparation
S2
Target Selection
Targeting
S3
Approach
Contact
S4
Trust Shaping
Trust Building
S5
Behavioral Steering
Steering
S6
Compromise
Compromise
S7
Exploitation
Exploitation
S8
Cover & Exit
Concealment
S1 Resource Dev. / PreparationCriminal Infrastructure & Malware Acquisition
H1 Financial / Property
  • Acquire burner SIMs and disposable email addresses
  • Purchase phishing kits and malware
H2 Information / Privacy
  • Acquire spyware and keyloggers
  • Prepare fake app development and distribution environment
H3 Sexual Exploitation
  • Acquire burner SIMs and disposable emails
  • Set up anonymous communication (VPN, Tor)
H5 Social / Reputational
  • Acquire deepfake generation tools
  • Prepare access to anonymous boards and leak sites
H6 Legal Entanglement
  • Acquire burner SIMs and disposable emails
H7 Physical / Life
  • Acquire burner SIMs and disposable email addresses
  • Acquire location tracking tools and stalkerware
  • Secure vehicle and transportation
S1 Resource Dev. / PreparationMoney Laundering Infrastructure
H1 Financial / Property
  • Prepare cryptocurrency wallets
  • Open and recruit money mule accounts
  • Secure layered transfer accounts
S1 Resource Dev. / PreparationData Trading Infrastructure
H2 Information / Privacy
  • Prepare access to darkweb marketplaces
  • Organize and de-duplicate purchased leaked databases
S1 Resource Dev. / PreparationContent Infrastructure
H3 Sexual Exploitation
  • Acquire deepfake generation tools
  • Prepare image and video collection/editing tools
H5 Social / Reputational
  • Set up disinformation, fake image, and fake video production
  • Prepare bot networks for mass distribution
S1 Resource Dev. / PreparationPayment Infrastructure
H3 Sexual Exploitation
  • Prepare anonymous cryptocurrency wallets
S1 Resource Dev. / PreparationOrganizational Infrastructure
H4 Psychological / Mental
  • Build role-based structure: recruiter, coercer, persuader
S1 Resource Dev. / PreparationRole Structure
H6 Legal Entanglement
  • Build division of labor: recruiter, manager, and escape role
S1 Resource Dev. / PreparationLegal Knowledge Gathering
H6 Legal Entanglement
  • Research laws and investigative methods to minimize detection risk
S1 Resource Dev. / PreparationIntel Collection Infrastructure
H7 Physical / Life
  • Build capacity to pre-survey target's lifestyle and movement range
S1 Resource Dev.Fake Accounts & False Identities
H1 Financial / Property
  • Create attractive fictional profiles for romance and investment scams
  • Build and operate fake social media accounts and profiles for financial fraud
  • Build and maintain multiple fake accounts on social media and dating apps
  • Use AI-generated images or stolen photos to construct realistic fake profiles
H3 Sexual Exploitation
  • Create fake social media accounts and impersonation profiles for sexual exploitation purposes
  • Build fake identities with falsified age and personal details to approach minors
H5 Social / Reputational
  • Create fake social media accounts impersonating trusted individuals or institutions
  • Mass-create fake accounts for defamation or coordinated impersonation campaigns
H2 Information / Privacy
  • Create fake accounts to build trust before delivering phishing links or malicious apps
  • Establish fake personas to facilitate data harvesting and credential theft
H4 Psychological / Mental
  • Create fake community accounts as entry points for cult-like control and psychological manipulation
  • Mass-create fake social media accounts and profiles for psychological manipulation
  • Build fake personas for impersonation-based psychological domination
H6 Legal Entanglement
  • Create fake company or recruiter accounts for fraudulent job offers and side-hustle solicitation
  • Build credible fake profiles to recruit money mules and nominees
H7 Physical / Life
  • Create fake accounts to approach targets for stalking or abduction purposes
  • Prepare impersonation accounts to facilitate physical access to victims
S2 Target Selection / TargetingSocial Media Reconnaissance
H1 Financial / Property
  • Estimate wealth, occupation, and lifestyle from public profiles
  • Extract behavioral routines from EXIF/location data in photos
H2 Information / Privacy
  • Collect public profiles, social networks, and behavioral patterns
  • Identify associates from friends lists and tag data
H3 Sexual Exploitation
  • Identify age, location, and family structure from public profiles
  • Collect photos and videos of children
H4 Psychological / Mental
  • Identify loneliness, distress, and vulnerabilities from public profiles
  • Identify periods of psychological instability from past posts
H5 Social / Reputational
  • Identify occupation, social network, and public standing
  • Collect attack material from past posts and statements
H6 Legal Entanglement
  • Identify vulnerabilities: financial hardship, unemployment, debt
H7 Physical / Life
  • Identify residence, workplace, and routine from public profiles and posts
  • Identify home location and range from photo EXIF data and backgrounds
S2 Target Selection / TargetingLeaked Database Exploitation
H1 Financial / Property
  • Use purchased email and phone number lists from darkweb
H2 Information / Privacy
  • Obtain target credentials from past data breaches
S2 Target Selection / TargetingAd Platform Targeting
H1 Financial / Property
  • Narrow targets via ad platforms using investment/asset interest signals
S2 Target Selection / TargetingMetadata Harvesting
H1 Financial / Property
  • Estimate daily patterns from document and post metadata
S2 Target Selection / TargetingDevice Fingerprinting
H2 Information / Privacy
  • Extract device information through browser fingerprinting
S2 Target Selection / TargetingPlatform Prospecting
H3 Sexual Exploitation
  • Search games, dating apps, and forums for vulnerable targets
H4 Psychological / Mental
  • Search mental health boards and groups for vulnerable targets
H6 Legal Entanglement
  • Search job boards and side-hustle sites for targets
H7 Physical / Life
  • Scout targets on dating apps and social media
S2 Target Selection / TargetingAssociate Identification
H3 Sexual Exploitation
  • Identify socially isolated individuals from friends lists
H4 Psychological / Mental
  • Map family and friend networks to measure degree of isolation
H5 Social / Reputational
  • Map workplace, family, and friend networks to gauge blast radius
H6 Legal Entanglement
  • Map family and friend networks to design recruitment routes
H7 Physical / Life
  • Map family and friend network to design access routes
S2 Target Selection / TargetingVulnerability Research
H5 Social / Reputational
  • Investigate past scandals, failures, and secrets
S3 Approach / ContactPhishing Email
H1 Financial / Property
  • Lure targets to fake sites impersonating banks, delivery services, or government
H2 Information / Privacy
  • Direct targets to fake sites impersonating service providers
S3 Approach / ContactSmishing
H1 Financial / Property
  • Direct targets to fake sites via official-looking SMS
S3 Approach / ContactSocial Media DM
H1 Financial / Property
  • Initiate contact via DMs posing as investors or friends
H3 Sexual Exploitation
  • Initiate contact posing as a peer with shared interests
H4 Psychological / Mental
  • Initiate contact posing as a compassionate supporter
H7 Physical / Life
  • Initiate contact with feigned romantic or friendly interest
S3 Approach / ContactFake Advertisements
H1 Financial / Property
  • Run fake investment ads on social media using celebrity imagery
S3 Approach / ContactPretexting
H1 Financial / Property
  • Fabricate personas and scenarios to justify initial contact
H2 Information / Privacy
  • Make contact posing as a fake support representative
S3 Approach / ContactExisting Relationship Exploitation
H1 Financial / Property
  • Leverage existing relationships with family, friends, or colleagues
H2 Information / Privacy
  • Approach target while impersonating service staff or acquaintances
H3 Sexual Exploitation
  • Use existing relationship with partner or acquaintance as starting point
H4 Psychological / Mental
  • Leverage existing trust from family, religious leaders, or supervisors
H5 Social / Reputational
  • Attack from existing ties: ex-partner, colleague, or neighbor
H6 Legal Entanglement
  • Recruit via existing trust as family, friend, or colleague
H7 Physical / Life
  • Use existing relationship with partner, ex-spouse, or family as starting point
S3 Approach / ContactFake App Distribution
H2 Information / Privacy
  • Distribute spyware disguised as legitimate apps
S3 Approach / ContactIn-Game Chat
H3 Sexual Exploitation
  • Build friendly rapport within online games
S3 Approach / ContactDating App
H1 Financial / Property
  • Use dating apps to play a fictional romantic partner with the goal of financial fraud
  • Establish the initial connection used to later redirect victims toward investment scams or financial requests
H3 Sexual Exploitation
  • Approach target with feigned romantic interest
H7 Physical / Life
  • Approach target with feigned romantic interest
S3 Approach / ContactImpersonation Contact
H3 Sexual Exploitation
  • Pose as a celebrity or admired figure
H4 Psychological / Mental
  • Pose as a professional (counselor, doctor)
H5 Social / Reputational
  • Pose as a known associate to gather intelligence
H7 Physical / Life
  • Pose as a mutual acquaintance or support figure
S3 Approach / ContactCommunity Infiltration
H4 Psychological / Mental
  • Infiltrate support groups or religious communities to gain trust
S3 Approach / ContactFake Recruitment
H4 Psychological / Mental
  • Approach with pitches about self-fulfillment or social contribution
S3 Approach / ContactAnonymous Contact
H5 Social / Reputational
  • Directly contact and threaten target from anonymous accounts
S3 Approach / ContactFake Job Posting
H6 Legal Entanglement
  • Initiate contact via high-pay, work-from-home, easy-job postings
S3 Approach / ContactSide-hustle Solicitation
H6 Legal Entanglement
  • Recruit via SNS and messaging apps as "easy money" opportunity
S3 Approach / ContactPeer Referral
H6 Legal Entanglement
  • Reach new targets through already-recruited individuals
S4 Trust Shaping / Trust BuildingAuthority Impersonation
H1 Financial / Property
  • Impersonate regulators, banks, or prominent investors
S4 Trust Shaping / Trust BuildingPerformance Fabrication
H1 Financial / Property
  • Present fake trading records, reviews, and media coverage
S4 Trust Shaping / Trust BuildingSmall Win Seeding
H1 Financial / Property
  • Allow a real small profit on an initial investment to build trust
S4 Trust Shaping / Trust BuildingEmpathy Performance
H1 Financial / Property
  • Mirror the target's concerns to close psychological distance
H3 Sexual Exploitation
  • Mirror loneliness and troubles to close psychological distance
H4 Psychological / Mental
  • Deeply mirror distress and loneliness — play the only person who understands them
H7 Physical / Life
  • Mirror distress and loneliness to close psychological distance
S4 Trust Shaping / Trust BuildingReciprocity Exploitation
H1 Financial / Property
  • Provide small favors or tips first to create a sense of obligation
H3 Sexual Exploitation
  • Give gifts, attention, and praise first to create dependency
S4 Trust Shaping / Trust BuildingIn-group Cultivation
H1 Financial / Property
  • "I'm sharing this only with you" — cultivate a sense of exclusive community
H3 Sexual Exploitation
  • "You're special to me" / "This is our secret" — draw them in
S4 Trust Shaping / Trust BuildingGradual Relationship Deepening
H1 Financial / Property
  • Gradually deepen the relationship to increase the victim's emotional investment, making them more receptive to financial requests
  • Lower psychological barriers to money transfers or investments by steadily building intimacy
H3 Sexual Exploitation
  • Build a romantic or close friendship over an extended period
S4 Trust Shaping / Trust BuildingIsolation Operations
H1 Financial / Property
  • Isolate the victim from family and friends to eliminate external checks on financial decision-making
  • Isolated victims have no one to intervene in abnormal transfer requests, making financial exploitation easier
H3 Sexual Exploitation
  • Sever family and friend ties to deepen dependency
H4 Psychological / Mental
  • "Your family and friends don't understand you" — sever those ties
H7 Physical / Life
  • Sever family and friend ties to deepen dependency
S4 Trust Shaping / Trust BuildingDependency Formation
H1 Financial / Property
  • Create emotional and financial dependency so that victims feel psychological pressure to comply with monetary demands or risk losing the relationship
  • Dependent victims show reduced resistance to repeated transfers and investment requests
H4 Psychological / Mental
  • Function as a psychological pillar and intervene in all life decisions
H7 Physical / Life
  • Function as a psychological pillar and intervene in all life decisions
S4 Trust Shaping / Trust BuildingWorldview Replacement
H4 Psychological / Mental
  • Repeatedly instill a proprietary belief system (mind control)
S4 Trust Shaping / Trust BuildingLove Bombing
H1 Financial / Property
  • Overwhelm the victim with affection, praise, and gifts to create psychological bonds that make them susceptible to financial demands
  • Rapidly establish strong emotional ties to accelerate redirection toward investment scams or financial exploitation
H4 Psychological / Mental
  • Flood the target with affection and praise to disable critical thinking
S4 Trust Shaping / Trust BuildingTrust Then Betray
H5 Social / Reputational
  • Build closeness posing as a friend or supporter, then pivot to attack
S4 Trust Shaping / Trust BuildingInsider Information Gathering
H5 Social / Reputational
  • Recruit insiders at target's workplace or community
S4 Trust Shaping / Trust BuildingLegitimacy Performance
H6 Legal Entanglement
  • Forge contracts, company profiles, and credentials to appear as a legal business
S4 Trust Shaping / Trust BuildingAdvance Payment Seeding
H6 Legal Entanglement
  • Pay real initial wages to establish trust
S4 Trust Shaping / Trust BuildingComplicity Normalization
H6 Legal Entanglement
  • "Everyone does it" / "Company policy" — rationalize the illegal nature
S4 Trust Shaping / Trust BuildingGradual Escalation
H6 Legal Entanglement
  • Start with minor tasks, progressively shift to higher-risk criminal activities
S4 Trust Shaping / Trust BuildingExcessive Affection
H1 Financial / Property
  • Express excessive affection and attention to win the victim's favor and prepare the ground for financial exploitation
  • Functions as the psychological foundation for framing money transfers or investments as "proof of love"
H7 Physical / Life
  • Love bomb to disable critical judgment
S5 Behavioral Steering / SteeringUrgency Fabrication
H1 Financial / Property
  • "Act today or your account will be frozen" — apply time pressure
S5 Behavioral Steering / SteeringLoss Aversion Framing
H1 Financial / Property
  • "You'll lose X if you don't act now" — drive action through fear of loss
S5 Behavioral Steering / SteeringAuthority Compliance Induction
H1 Financial / Property
  • Instruct target to follow orders from "police, lawyers, or regulators"
S5 Behavioral Steering / SteeringSocial Proof
H1 Financial / Property
  • "X others have already profited" — apply conformity pressure
S5 Behavioral Steering / SteeringThird-party Persuasion
H1 Financial / Property
  • "My supervisor will explain directly" — layer additional authority
S5 Behavioral Steering / SteeringTransfer Instruction
H1 Financial / Property
  • Provide specific account numbers and transfer steps
S5 Behavioral Steering / SteeringApp Installation Induction
H1 Financial / Property
  • Have target install fake investment apps or remote access tools
H2 Information / Privacy
  • Have target install spyware or location tracking apps
S5 Behavioral Steering / SteeringPII Input Induction
H2 Information / Privacy
  • Have target enter name, address, DOB, and ID number into fake site
S5 Behavioral Steering / SteeringCredential Input Induction
H2 Information / Privacy
  • Have target enter IDs, passwords, and security questions
S5 Behavioral Steering / SteeringPermission Grant Induction
H2 Information / Privacy
  • Have target grant access to contacts, camera, microphone, and location
S5 Behavioral Steering / SteeringSexual Content Solicitation
H3 Sexual Exploitation
  • Gradually request sexual images or videos
S5 Behavioral Steering / SteeringSecret Enforcement
H3 Sexual Exploitation
  • "This is just between us" — forbid the target from telling parents or friends
S5 Behavioral Steering / SteeringFait Accompli
H3 Sexual Exploitation
  • Use previously obtained images to make them feel "there's no going back"
S5 Behavioral Steering / SteeringIn-Person Induction
H3 Sexual Exploitation
  • Maneuver toward a real-world meeting
S5 Behavioral Steering / SteeringBehavioral Code Enforcement
H4 Psychological / Mental
  • Minutely control and regulate diet, clothing, and social relationships
S5 Behavioral Steering / SteeringReward and Punishment Manipulation
H4 Psychological / Mental
  • Praise compliance and harshly punish deviation to condition behavior
S5 Behavioral Steering / SteeringGroup Pressure
H4 Psychological / Mental
  • Use organizational or group pressure to suppress individual decision-making
S5 Behavioral Steering / SteeringSelf-Negation Implanting
H4 Psychological / Mental
  • "You can't make decisions on your own" — destroy self-efficacy
S5 Behavioral Steering / SteeringAccount Provision Request
H6 Legal Entanglement
  • "For receiving your salary" — have target provide their bank account
S5 Behavioral Steering / SteeringPackage Receipt Request
H6 Legal Entanglement
  • "Forwarding work" — have target receive contraband or drugs
S5 Behavioral Steering / SteeringCash Withdrawal Request
H6 Legal Entanglement
  • Have target withdraw cash from ATM and hand it to a third party
S5 Behavioral Steering / SteeringContract Proxy Request
H6 Legal Entanglement
  • Have target sign phone and credit card contracts in their own name
S5 Behavioral Steering / SteeringCoercive Continuation
H6 Legal Entanglement
  • "You can't back out now" — threaten target to continue after first involvement
S5 Behavioral Steering / SteeringIn-Person Meeting Induction
H7 Physical / Life
  • "I want to see you" / "I need help" — maneuver toward physical meetings
S5 Behavioral Steering / SteeringLocation Information Extraction
H7 Physical / Life
  • Extract residence and behavioral patterns through casual conversation
S5 Behavioral Steering / SteeringIsolated Location Steering
H7 Physical / Life
  • Arrange meetings at secluded locations and times
S5 Behavioral Steering / SteeringSurveillance Normalization
H7 Physical / Life
  • "I'm just worried" — normalize location sharing and check-ins
S6 Compromise / CompromiseCredential Theft
H1 Financial / Property
  • Steal IDs, passwords, and OTPs via phishing sites
S6 Compromise / CompromiseRemote Access
H1 Financial / Property
  • Remotely operate banking apps via RAT
S6 Compromise / CompromiseSIM Swapping
H1 Financial / Property
  • Hijack phone number to bypass authentication
S6 Compromise / CompromisePassword Reset Chaining
H1 Financial / Property
  • Fully take over accounts via security questions and email
S6 Compromise / CompromiseAccount Takeover
H2 Information / Privacy
  • Log in with stolen credentials and harvest personal data
H3 Sexual Exploitation
  • Seize victim's social media to control their images and social network
H5 Social / Reputational
  • Seize target's social accounts to post false statements
S6 Compromise / CompromiseSpyware Persistence
H2 Information / Privacy
  • Maintain device-resident spyware sending keystrokes, screen, and location
S6 Compromise / CompromiseCookie / Session Hijacking
H2 Information / Privacy
  • Steal browser session tokens for ongoing access
S6 Compromise / CompromiseCredential Stuffing
H2 Information / Privacy
  • Auto-test leaked credentials against other services to expand access
S6 Compromise / CompromiseSexual Media Acquisition
H3 Sexual Exploitation
  • Retain sexual content sent by victim
S6 Compromise / CompromiseDeepfake Generation
H3 Sexual Exploitation
  • Generate sexual images/videos from victim's face photos
S6 Compromise / CompromisePhysical Sexual Contact
H3 Sexual Exploitation
  • Carry out sexual abuse in person
S6 Compromise / CompromisePsychological Control Establishment
H4 Psychological / Mental
  • Create a state where victim cannot act without the perpetrator's direction
H7 Physical / Life
  • Create a state where victim cannot resist through fear and dependency
S6 Compromise / CompromiseReality Distortion
H4 Psychological / Mental
  • Use gaslighting to deny victim's own perceptions and memories
S6 Compromise / CompromiseSocial Isolation Completion
H4 Psychological / Mental
  • Fully sever all ties with family, friends, and supporters
S6 Compromise / CompromiseReputation Infrastructure Capture
H5 Social / Reputational
  • Dominate search results and social narratives about the target
S6 Compromise / CompromiseInsider Information Acquisition
H5 Social / Reputational
  • Obtain confidential information or scandals from inside the organization
S6 Compromise / CompromiseEvidence Capture
H6 Legal Entanglement
  • Record evidence of victim's criminal involvement to make escape impossible
S6 Compromise / CompromiseDebt / Unpaid Wages
H6 Legal Entanglement
  • Withhold payment and create debt to reinforce subordination
S6 Compromise / CompromisePsychological Control
H6 Legal Entanglement
  • "You're the one who'll get arrested" — control through fear
S6 Compromise / CompromiseLocation Control
H7 Physical / Life
  • Continuously track victim's whereabouts via GPS and stalkerware
S6 Compromise / CompromiseBehavioral Pattern Mapping
H7 Physical / Life
  • Fully map commute routes, school routes, and daily habits
S6 Compromise / CompromisePhysical Access Securing
H7 Physical / Life
  • Identify entry points to home, workplace, and frequented locations
S7 Exploitation / ExploitationUnauthorized Transfer
H1 Financial / Property
  • Immediately transfer funds from victim account to attacker account
S7 Exploitation / ExploitationWithdrawal Refusal / Additional Demands
H1 Financial / Property
  • "Taxes and fees required" — demand additional payments
S7 Exploitation / ExploitationCryptocurrency Theft
H1 Financial / Property
  • Steal wallet private keys and transfer all funds
S7 Exploitation / ExploitationGift Card Demand
H1 Financial / Property
  • Demand payment via hard-to-trace gift cards
S7 Exploitation / ExploitationPII Sales
H2 Information / Privacy
  • Sell names, addresses, and financial data on darkweb
S7 Exploitation / ExploitationIdentity Fraud
H2 Information / Privacy
  • Apply for loans and credit cards using stolen identity
S7 Exploitation / ExploitationSpear Attack Conversion
H2 Information / Privacy
  • Use collected data to run higher-precision attacks
S7 Exploitation / ExploitationLocation Data Abuse
H2 Information / Privacy
  • Continuously monitor and track victim's location and routine
S7 Exploitation / ExploitationSextortion
H3 Sexual Exploitation
  • Demand money or additional content using sexual images as leverage
S7 Exploitation / ExploitationCSAM Distribution
H3 Sexual Exploitation
  • Share or sell sexual images/videos through networks
S7 Exploitation / ExploitationOngoing Control
H3 Sexual Exploitation
  • Sustain long-term sexual and financial demands using images as leverage
S7 Exploitation / ExploitationVictim Network Exploitation
H3 Sexual Exploitation
  • Use victim's social network to contact new targets
S7 Exploitation / ExploitationOngoing Psychological Abuse
H4 Psychological / Mental
  • Use fear, shame, and guilt to maintain long-term control
S7 Exploitation / ExploitationFinancial Exploitation Conversion
H4 Psychological / Mental
  • Use psychological control to extract assets and labor (chain to H1)
S7 Exploitation / ExploitationSexual Exploitation Conversion
H4 Psychological / Mental
  • Use psychological control to coerce sexual compliance (chain to H3)
S7 Exploitation / ExploitationForced Criminal Complicity
H4 Psychological / Mental
  • Coerce victim under control to act as criminal operative (chain to H6)
S7 Exploitation / ExploitationDisinformation Campaign
H5 Social / Reputational
  • Spread fabricated images, videos, and statements to damage reputation
S7 Exploitation / ExploitationDoxxing
H5 Social / Reputational
  • Publish personal data (address, workplace, family) to incite public shaming
S7 Exploitation / ExploitationImpersonation Posting
H5 Social / Reputational
  • Impersonate target and perform damaging statements or behaviors
S7 Exploitation / ExploitationCoordinated Harassment
H5 Social / Reputational
  • Organize targeted harassment using bots and followers
S7 Exploitation / ExploitationWorkplace / Family Notification
H5 Social / Reputational
  • Send mixed-truth information to employer and family to destroy relationships
S7 Exploitation / ExploitationMoney Mule Utilization
H6 Legal Entanglement
  • Launder illicit funds through victim's account
S7 Exploitation / ExploitationContraband / Drug Trafficking
H6 Legal Entanglement
  • Use victim as a carrier
S7 Exploitation / ExploitationFraud Front Utilization
H6 Legal Entanglement
  • Use victim as the "face" of another fraud operation
S7 Exploitation / ExploitationNominee Abuse
H6 Legal Entanglement
  • Use accounts and contracts in victim's name as criminal infrastructure
S7 Exploitation / ExploitationStalking
H7 Physical / Life
  • Conduct ongoing surveillance, following, and ambushes
S7 Exploitation / ExploitationConfinement / Restraint
H7 Physical / Life
  • Physically deprive victim of freedom of movement
S7 Exploitation / ExploitationPhysical Violence
H7 Physical / Life
  • Commit assault and battery
S7 Exploitation / ExploitationSexual Assault
H7 Physical / Life
  • Perpetrate sexual violence (chain to H3)
S7 Exploitation / ExploitationAbduction
H7 Physical / Life
  • Forcibly transport and isolate victim
S7 Exploitation / ExploitationLethal Violence
H7 Physical / Life
  • Apply life-threatening force
S8 Cover & Exit / ConcealmentEvidence Erasure
H1 Financial / Property
  • Immediately delete SNS accounts, emails, and profiles used
H2 Information / Privacy
  • Delete fake sites and apps
H3 Sexual Exploitation
  • Immediately delete communication tools and accounts
H4 Psychological / Mental
  • Delete communication tools and accounts
S8 Cover & Exit / ConcealmentTransfer Chain Obfuscation
H1 Financial / Property
  • Route funds through multiple accounts and crypto to prevent tracing
S8 Cover & Exit / ConcealmentBurner SIM / Device
H1 Financial / Property
  • Leave no trace using disposable numbers and devices
S8 Cover & Exit / ConcealmentNext Cycle Prep
H1 Financial / Property
  • Convert victim lists, funds, and techniques into S1 resources
H2 Information / Privacy
  • Reuse collected data as S1 resources for the next crime
H3 Sexual Exploitation
  • Convert collected content and social data into S1 resources
H4 Psychological / Mental
  • Repurpose acquired relationships and community access for the next target
H5 Social / Reputational
  • Repurpose collected insider data and social maps for the next target
H6 Legal Entanglement
  • Repurpose acquired accounts, nominees, and infrastructure for the next crime
S8 Cover & ExitAnonymization
H3 Sexual Exploitation
  • Delete and discard accounts and email addresses used during the crime
  • Erase communication logs and records to prevent source tracing
H5 Social / Reputational
  • Delete and discard accounts used for defamation or impersonation
  • Post-hoc erasure of traces to prevent identification of posting origins
S8 Cover & Exit / ConcealmentAnonymization
H3 Sexual Exploitation
  • Hide IP address via VPN and Tor
H5 Social / Reputational
  • Conceal origin via VPN, Tor, and anonymous accounts
S8 Cover & Exit / ConcealmentVictim Silencing
H3 Sexual Exploitation
  • "I'll publish them" — threaten victim to suppress reporting
H4 Psychological / Mental
  • "Tell no one" — coerce or cajole victim into silence
H7 Physical / Life
  • Suppress reporting through threats and fear
S8 Cover & Exit / ConcealmentBlame Shifting
H4 Psychological / Mental
  • "You chose this yourself" — instill guilt to suppress reporting
H5 Social / Reputational
  • "I just told the truth" — rationalize and conceal culpability
S8 Cover & Exit / ConcealmentAutonomous Spread
H5 Social / Reputational
  • Create a state where disinformation spreads independently, severing direct involvement
S8 Cover & Exit / ConcealmentVictim Blame Shifting
H6 Legal Entanglement
  • Push legal liability onto victim: "You did this yourself"
S8 Cover & Exit / ConcealmentEvidence Destruction
H6 Legal Entanglement
  • Erase links to criminal organization, leaving victim as sole investigation target
H7 Physical / Life
  • Delete communication history and location records
S8 Cover & Exit / ConcealmentContact Severance
H6 Legal Entanglement
  • Abruptly cut off victim contact to isolate them
S8 Cover & Exit / ConcealmentAlibi Fabrication
H7 Physical / Life
  • Use third parties to falsify whereabouts at the time of the offense
S8 Cover & Exit / ConcealmentFlight
H7 Physical / Life
  • Flee domestically or abroad / falsify identity