LURE Framework Lifecycle of User-targeted Risk and Exploitation
Select a Harm → Modes highlight → Tap a Mode to view Acts | ver.01
Select a Harm to highlight its Criminal Path Modes
H1 Financial — Financial / Property path active
H2 Informational — Information / Privacy path active
H3 Sexual — Sexual Exploitation path active
H4 Psychological — Psychological / Mental path active
H5 Reputational — Social / Reputational path active
H6 Legal — Legal Entanglement path active
H7 Physical — Physical / Life path active
S1
Resource Dev.
Preparation
S2
Target Selection
Targeting
S4
Trust Shaping
Trust Building
S5
Behavioral Steering
Steering
S7
Exploitation
Exploitation
S8
Cover & Exit
Concealment
H1 Financial / Property
- Acquire burner SIMs and disposable email addresses
- Purchase phishing kits and malware
H2 Information / Privacy
- Acquire spyware and keyloggers
- Prepare fake app development and distribution environment
H3 Sexual Exploitation
- Acquire burner SIMs and disposable emails
- Set up anonymous communication (VPN, Tor)
H5 Social / Reputational
- Acquire deepfake generation tools
- Prepare access to anonymous boards and leak sites
H6 Legal Entanglement
- Acquire burner SIMs and disposable emails
H7 Physical / Life
- Acquire burner SIMs and disposable email addresses
- Acquire location tracking tools and stalkerware
- Secure vehicle and transportation
H1 Financial / Property
- Prepare cryptocurrency wallets
- Open and recruit money mule accounts
- Secure layered transfer accounts
H2 Information / Privacy
- Prepare access to darkweb marketplaces
- Organize and de-duplicate purchased leaked databases
H3 Sexual Exploitation
- Acquire deepfake generation tools
- Prepare image and video collection/editing tools
H5 Social / Reputational
- Set up disinformation, fake image, and fake video production
- Prepare bot networks for mass distribution
H3 Sexual Exploitation
- Prepare anonymous cryptocurrency wallets
H4 Psychological / Mental
- Build role-based structure: recruiter, coercer, persuader
H6 Legal Entanglement
- Build division of labor: recruiter, manager, and escape role
H6 Legal Entanglement
- Research laws and investigative methods to minimize detection risk
H7 Physical / Life
- Build capacity to pre-survey target's lifestyle and movement range
H1 Financial / Property
- Create attractive fictional profiles for romance and investment scams
- Build and operate fake social media accounts and profiles for financial fraud
- Build and maintain multiple fake accounts on social media and dating apps
- Use AI-generated images or stolen photos to construct realistic fake profiles
H3 Sexual Exploitation
- Create fake social media accounts and impersonation profiles for sexual exploitation purposes
- Build fake identities with falsified age and personal details to approach minors
H5 Social / Reputational
- Create fake social media accounts impersonating trusted individuals or institutions
- Mass-create fake accounts for defamation or coordinated impersonation campaigns
H2 Information / Privacy
- Create fake accounts to build trust before delivering phishing links or malicious apps
- Establish fake personas to facilitate data harvesting and credential theft
H4 Psychological / Mental
- Create fake community accounts as entry points for cult-like control and psychological manipulation
- Mass-create fake social media accounts and profiles for psychological manipulation
- Build fake personas for impersonation-based psychological domination
H6 Legal Entanglement
- Create fake company or recruiter accounts for fraudulent job offers and side-hustle solicitation
- Build credible fake profiles to recruit money mules and nominees
H7 Physical / Life
- Create fake accounts to approach targets for stalking or abduction purposes
- Prepare impersonation accounts to facilitate physical access to victims
H1 Financial / Property
- Estimate wealth, occupation, and lifestyle from public profiles
- Extract behavioral routines from EXIF/location data in photos
H2 Information / Privacy
- Collect public profiles, social networks, and behavioral patterns
- Identify associates from friends lists and tag data
H3 Sexual Exploitation
- Identify age, location, and family structure from public profiles
- Collect photos and videos of children
H4 Psychological / Mental
- Identify loneliness, distress, and vulnerabilities from public profiles
- Identify periods of psychological instability from past posts
H5 Social / Reputational
- Identify occupation, social network, and public standing
- Collect attack material from past posts and statements
H6 Legal Entanglement
- Identify vulnerabilities: financial hardship, unemployment, debt
H7 Physical / Life
- Identify residence, workplace, and routine from public profiles and posts
- Identify home location and range from photo EXIF data and backgrounds
H1 Financial / Property
- Use purchased email and phone number lists from darkweb
H2 Information / Privacy
- Obtain target credentials from past data breaches
H1 Financial / Property
- Narrow targets via ad platforms using investment/asset interest signals
H1 Financial / Property
- Estimate daily patterns from document and post metadata
H2 Information / Privacy
- Extract device information through browser fingerprinting
H3 Sexual Exploitation
- Search games, dating apps, and forums for vulnerable targets
H4 Psychological / Mental
- Search mental health boards and groups for vulnerable targets
H6 Legal Entanglement
- Search job boards and side-hustle sites for targets
H7 Physical / Life
- Scout targets on dating apps and social media
H3 Sexual Exploitation
- Identify socially isolated individuals from friends lists
H4 Psychological / Mental
- Map family and friend networks to measure degree of isolation
H5 Social / Reputational
- Map workplace, family, and friend networks to gauge blast radius
H6 Legal Entanglement
- Map family and friend networks to design recruitment routes
H7 Physical / Life
- Map family and friend network to design access routes
H5 Social / Reputational
- Investigate past scandals, failures, and secrets
H1 Financial / Property
- Lure targets to fake sites impersonating banks, delivery services, or government
H2 Information / Privacy
- Direct targets to fake sites impersonating service providers
H1 Financial / Property
- Direct targets to fake sites via official-looking SMS
H1 Financial / Property
- Initiate contact via DMs posing as investors or friends
H3 Sexual Exploitation
- Initiate contact posing as a peer with shared interests
H4 Psychological / Mental
- Initiate contact posing as a compassionate supporter
H7 Physical / Life
- Initiate contact with feigned romantic or friendly interest
H1 Financial / Property
- Run fake investment ads on social media using celebrity imagery
H1 Financial / Property
- Fabricate personas and scenarios to justify initial contact
H2 Information / Privacy
- Make contact posing as a fake support representative
H1 Financial / Property
- Leverage existing relationships with family, friends, or colleagues
H2 Information / Privacy
- Approach target while impersonating service staff or acquaintances
H3 Sexual Exploitation
- Use existing relationship with partner or acquaintance as starting point
H4 Psychological / Mental
- Leverage existing trust from family, religious leaders, or supervisors
H5 Social / Reputational
- Attack from existing ties: ex-partner, colleague, or neighbor
H6 Legal Entanglement
- Recruit via existing trust as family, friend, or colleague
H7 Physical / Life
- Use existing relationship with partner, ex-spouse, or family as starting point
H2 Information / Privacy
- Distribute spyware disguised as legitimate apps
H3 Sexual Exploitation
- Build friendly rapport within online games
H1 Financial / Property
- Use dating apps to play a fictional romantic partner with the goal of financial fraud
- Establish the initial connection used to later redirect victims toward investment scams or financial requests
H3 Sexual Exploitation
- Approach target with feigned romantic interest
H7 Physical / Life
- Approach target with feigned romantic interest
H3 Sexual Exploitation
- Pose as a celebrity or admired figure
H4 Psychological / Mental
- Pose as a professional (counselor, doctor)
H5 Social / Reputational
- Pose as a known associate to gather intelligence
H7 Physical / Life
- Pose as a mutual acquaintance or support figure
H4 Psychological / Mental
- Infiltrate support groups or religious communities to gain trust
H4 Psychological / Mental
- Approach with pitches about self-fulfillment or social contribution
H5 Social / Reputational
- Directly contact and threaten target from anonymous accounts
H6 Legal Entanglement
- Initiate contact via high-pay, work-from-home, easy-job postings
H6 Legal Entanglement
- Recruit via SNS and messaging apps as "easy money" opportunity
H6 Legal Entanglement
- Reach new targets through already-recruited individuals
H1 Financial / Property
- Impersonate regulators, banks, or prominent investors
H1 Financial / Property
- Present fake trading records, reviews, and media coverage
H1 Financial / Property
- Allow a real small profit on an initial investment to build trust
H1 Financial / Property
- Mirror the target's concerns to close psychological distance
H3 Sexual Exploitation
- Mirror loneliness and troubles to close psychological distance
H4 Psychological / Mental
- Deeply mirror distress and loneliness — play the only person who understands them
H7 Physical / Life
- Mirror distress and loneliness to close psychological distance
H1 Financial / Property
- Provide small favors or tips first to create a sense of obligation
H3 Sexual Exploitation
- Give gifts, attention, and praise first to create dependency
H1 Financial / Property
- "I'm sharing this only with you" — cultivate a sense of exclusive community
H3 Sexual Exploitation
- "You're special to me" / "This is our secret" — draw them in
H1 Financial / Property
- Gradually deepen the relationship to increase the victim's emotional investment, making them more receptive to financial requests
- Lower psychological barriers to money transfers or investments by steadily building intimacy
H3 Sexual Exploitation
- Build a romantic or close friendship over an extended period
H1 Financial / Property
- Isolate the victim from family and friends to eliminate external checks on financial decision-making
- Isolated victims have no one to intervene in abnormal transfer requests, making financial exploitation easier
H3 Sexual Exploitation
- Sever family and friend ties to deepen dependency
H4 Psychological / Mental
- "Your family and friends don't understand you" — sever those ties
H7 Physical / Life
- Sever family and friend ties to deepen dependency
H1 Financial / Property
- Create emotional and financial dependency so that victims feel psychological pressure to comply with monetary demands or risk losing the relationship
- Dependent victims show reduced resistance to repeated transfers and investment requests
H4 Psychological / Mental
- Function as a psychological pillar and intervene in all life decisions
H7 Physical / Life
- Function as a psychological pillar and intervene in all life decisions
H4 Psychological / Mental
- Repeatedly instill a proprietary belief system (mind control)
H1 Financial / Property
- Overwhelm the victim with affection, praise, and gifts to create psychological bonds that make them susceptible to financial demands
- Rapidly establish strong emotional ties to accelerate redirection toward investment scams or financial exploitation
H4 Psychological / Mental
- Flood the target with affection and praise to disable critical thinking
H5 Social / Reputational
- Build closeness posing as a friend or supporter, then pivot to attack
H5 Social / Reputational
- Recruit insiders at target's workplace or community
H6 Legal Entanglement
- Forge contracts, company profiles, and credentials to appear as a legal business
H6 Legal Entanglement
- Pay real initial wages to establish trust
H6 Legal Entanglement
- "Everyone does it" / "Company policy" — rationalize the illegal nature
H6 Legal Entanglement
- Start with minor tasks, progressively shift to higher-risk criminal activities
H1 Financial / Property
- Express excessive affection and attention to win the victim's favor and prepare the ground for financial exploitation
- Functions as the psychological foundation for framing money transfers or investments as "proof of love"
H7 Physical / Life
- Love bomb to disable critical judgment
H1 Financial / Property
- "Act today or your account will be frozen" — apply time pressure
H1 Financial / Property
- "You'll lose X if you don't act now" — drive action through fear of loss
H1 Financial / Property
- Instruct target to follow orders from "police, lawyers, or regulators"
H1 Financial / Property
- "X others have already profited" — apply conformity pressure
H1 Financial / Property
- "My supervisor will explain directly" — layer additional authority
H1 Financial / Property
- Provide specific account numbers and transfer steps
H1 Financial / Property
- Have target install fake investment apps or remote access tools
H2 Information / Privacy
- Have target install spyware or location tracking apps
H2 Information / Privacy
- Have target enter name, address, DOB, and ID number into fake site
H2 Information / Privacy
- Have target enter IDs, passwords, and security questions
H2 Information / Privacy
- Have target grant access to contacts, camera, microphone, and location
H3 Sexual Exploitation
- Gradually request sexual images or videos
H3 Sexual Exploitation
- "This is just between us" — forbid the target from telling parents or friends
H3 Sexual Exploitation
- Use previously obtained images to make them feel "there's no going back"
H3 Sexual Exploitation
- Maneuver toward a real-world meeting
H4 Psychological / Mental
- Minutely control and regulate diet, clothing, and social relationships
H4 Psychological / Mental
- Praise compliance and harshly punish deviation to condition behavior
H4 Psychological / Mental
- Use organizational or group pressure to suppress individual decision-making
H4 Psychological / Mental
- "You can't make decisions on your own" — destroy self-efficacy
H6 Legal Entanglement
- "For receiving your salary" — have target provide their bank account
H6 Legal Entanglement
- "Forwarding work" — have target receive contraband or drugs
H6 Legal Entanglement
- Have target withdraw cash from ATM and hand it to a third party
H6 Legal Entanglement
- Have target sign phone and credit card contracts in their own name
H6 Legal Entanglement
- "You can't back out now" — threaten target to continue after first involvement
H7 Physical / Life
- "I want to see you" / "I need help" — maneuver toward physical meetings
H7 Physical / Life
- Extract residence and behavioral patterns through casual conversation
H7 Physical / Life
- Arrange meetings at secluded locations and times
H7 Physical / Life
- "I'm just worried" — normalize location sharing and check-ins
H1 Financial / Property
- Steal IDs, passwords, and OTPs via phishing sites
H1 Financial / Property
- Remotely operate banking apps via RAT
H1 Financial / Property
- Hijack phone number to bypass authentication
H1 Financial / Property
- Fully take over accounts via security questions and email
H2 Information / Privacy
- Log in with stolen credentials and harvest personal data
H3 Sexual Exploitation
- Seize victim's social media to control their images and social network
H5 Social / Reputational
- Seize target's social accounts to post false statements
H2 Information / Privacy
- Maintain device-resident spyware sending keystrokes, screen, and location
H2 Information / Privacy
- Steal browser session tokens for ongoing access
H2 Information / Privacy
- Auto-test leaked credentials against other services to expand access
H3 Sexual Exploitation
- Retain sexual content sent by victim
H3 Sexual Exploitation
- Generate sexual images/videos from victim's face photos
H3 Sexual Exploitation
- Carry out sexual abuse in person
H4 Psychological / Mental
- Create a state where victim cannot act without the perpetrator's direction
H7 Physical / Life
- Create a state where victim cannot resist through fear and dependency
H4 Psychological / Mental
- Use gaslighting to deny victim's own perceptions and memories
H4 Psychological / Mental
- Fully sever all ties with family, friends, and supporters
H5 Social / Reputational
- Dominate search results and social narratives about the target
H5 Social / Reputational
- Obtain confidential information or scandals from inside the organization
H6 Legal Entanglement
- Record evidence of victim's criminal involvement to make escape impossible
H6 Legal Entanglement
- Withhold payment and create debt to reinforce subordination
H6 Legal Entanglement
- "You're the one who'll get arrested" — control through fear
H7 Physical / Life
- Continuously track victim's whereabouts via GPS and stalkerware
H7 Physical / Life
- Fully map commute routes, school routes, and daily habits
H7 Physical / Life
- Identify entry points to home, workplace, and frequented locations
H1 Financial / Property
- Immediately transfer funds from victim account to attacker account
H1 Financial / Property
- "Taxes and fees required" — demand additional payments
H1 Financial / Property
- Steal wallet private keys and transfer all funds
H1 Financial / Property
- Demand payment via hard-to-trace gift cards
H2 Information / Privacy
- Sell names, addresses, and financial data on darkweb
H2 Information / Privacy
- Apply for loans and credit cards using stolen identity
H2 Information / Privacy
- Use collected data to run higher-precision attacks
H2 Information / Privacy
- Continuously monitor and track victim's location and routine
H3 Sexual Exploitation
- Demand money or additional content using sexual images as leverage
H3 Sexual Exploitation
- Share or sell sexual images/videos through networks
H3 Sexual Exploitation
- Sustain long-term sexual and financial demands using images as leverage
H3 Sexual Exploitation
- Use victim's social network to contact new targets
H4 Psychological / Mental
- Use fear, shame, and guilt to maintain long-term control
H4 Psychological / Mental
- Use psychological control to extract assets and labor (chain to H1)
H4 Psychological / Mental
- Use psychological control to coerce sexual compliance (chain to H3)
H4 Psychological / Mental
- Coerce victim under control to act as criminal operative (chain to H6)
H5 Social / Reputational
- Spread fabricated images, videos, and statements to damage reputation
H5 Social / Reputational
- Publish personal data (address, workplace, family) to incite public shaming
H5 Social / Reputational
- Impersonate target and perform damaging statements or behaviors
H5 Social / Reputational
- Organize targeted harassment using bots and followers
H5 Social / Reputational
- Send mixed-truth information to employer and family to destroy relationships
H6 Legal Entanglement
- Launder illicit funds through victim's account
H6 Legal Entanglement
- Use victim as the "face" of another fraud operation
H6 Legal Entanglement
- Use accounts and contracts in victim's name as criminal infrastructure
H7 Physical / Life
- Conduct ongoing surveillance, following, and ambushes
H7 Physical / Life
- Physically deprive victim of freedom of movement
H7 Physical / Life
- Commit assault and battery
H7 Physical / Life
- Perpetrate sexual violence (chain to H3)
H7 Physical / Life
- Forcibly transport and isolate victim
H7 Physical / Life
- Apply life-threatening force
H1 Financial / Property
- Immediately delete SNS accounts, emails, and profiles used
H2 Information / Privacy
- Delete fake sites and apps
H3 Sexual Exploitation
- Immediately delete communication tools and accounts
H4 Psychological / Mental
- Delete communication tools and accounts
H1 Financial / Property
- Route funds through multiple accounts and crypto to prevent tracing
H1 Financial / Property
- Leave no trace using disposable numbers and devices
H1 Financial / Property
- Convert victim lists, funds, and techniques into S1 resources
H2 Information / Privacy
- Reuse collected data as S1 resources for the next crime
H3 Sexual Exploitation
- Convert collected content and social data into S1 resources
H4 Psychological / Mental
- Repurpose acquired relationships and community access for the next target
H5 Social / Reputational
- Repurpose collected insider data and social maps for the next target
H6 Legal Entanglement
- Repurpose acquired accounts, nominees, and infrastructure for the next crime
H3 Sexual Exploitation
- Delete and discard accounts and email addresses used during the crime
- Erase communication logs and records to prevent source tracing
H5 Social / Reputational
- Delete and discard accounts used for defamation or impersonation
- Post-hoc erasure of traces to prevent identification of posting origins
H3 Sexual Exploitation
- Hide IP address via VPN and Tor
H5 Social / Reputational
- Conceal origin via VPN, Tor, and anonymous accounts
H3 Sexual Exploitation
- "I'll publish them" — threaten victim to suppress reporting
H4 Psychological / Mental
- "Tell no one" — coerce or cajole victim into silence
H7 Physical / Life
- Suppress reporting through threats and fear
H4 Psychological / Mental
- "You chose this yourself" — instill guilt to suppress reporting
H5 Social / Reputational
- "I just told the truth" — rationalize and conceal culpability
H5 Social / Reputational
- Create a state where disinformation spreads independently, severing direct involvement
H6 Legal Entanglement
- Push legal liability onto victim: "You did this yourself"
H6 Legal Entanglement
- Erase links to criminal organization, leaving victim as sole investigation target
H7 Physical / Life
- Delete communication history and location records
H6 Legal Entanglement
- Abruptly cut off victim contact to isolate them
H7 Physical / Life
- Use third parties to falsify whereabouts at the time of the offense
H7 Physical / Life
- Flee domestically or abroad / falsify identity