Is someone checking your browsing? This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly. Learn more about staying safe online
Need support? 1800RESPECT (1800 737 732) | Emergency: 000

Information Manipulation

Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.

If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.

This framework is under active development. View full limitations & methodology.

Techniques

Techniques: 12
ID Name Description
SAFE-T-0111 Catfishing/Romance Fraud Creating a false online identity to build a fraudulent romantic relationship with victim for purposes of financial exploitation, emotional manipulation, intelligence gathering, or other harm. May involve elaborate fake personas maintained over months or years, including stolen photos, fabricated life stories, and manufactured emotional bonds.
SAFE-T-0109 Context Manipulation Sharing genuine content — real messages, photos, videos, or statements — stripped of essential context to create a misleading impression of victim's character, actions, or intentions. Includes selective quoting, cropping images, sharing old content as if current, or presenting content without the circumstances that explain it.
SAFE-T-0107 Deepfake Creation Creating synthetic intimate, compromising, or damaging media of victim using AI-powered deepfake technology. Generated content may be indistinguishable from real imagery and can be used for extortion, reputational harm, or psychological abuse. Includes face-swapping onto pornographic content, synthetic voice generation, or fabricated video.
SAFE-T-0105 Digital Gaslighting Manipulating digital records, device settings, files, or other digital artifacts to make victim doubt their own memory, perception, or sanity. Includes moving or deleting files, editing shared documents, changing device settings, manipulating photo timestamps, or altering digital records the victim relies on.
SAFE-T-0114 Fake Evidence Creation Fabricating digital evidence including fake emails, text messages, documents, receipts, screenshots, or records to frame victim for misconduct, support false legal claims, or manipulate decision-makers. May involve sophisticated forgeries using editing tools or simple fabrication of documents.
SAFE-T-0108 False Narrative Campaigns Systematically spreading false information about victim to their social network, workplace, community, or online audiences. False narratives may portray victim as unstable, abusive, dishonest, or dangerous, serving to isolate victim from support, preemptively discredit their accounts of abuse, and build sympathy for perpetrator.
SAFE-T-0113 Historical Content Weaponization Surfacing old posts, photos, messages, or other historical digital content to harm victim in their current context. Includes finding embarrassing teenage posts, old dating profiles, past political statements, or previously private content that can be taken out of context to damage victim's current relationships, employment, or reputation.
SAFE-T-0104 Message/Evidence Tampering Editing, deleting, selectively screenshotting, or fabricating screenshots of conversations, messages, or digital records to misrepresent what was communicated. Used to create false evidence, destroy exculpatory evidence, or support false narratives in legal proceedings and social contexts.
SAFE-T-0106 Non-Consensual Intimate Image Distribution Sharing or threatening to share intimate, sexual, or nude images of victim without their consent. Commonly known as 'revenge porn,' this technique weaponizes intimate content to humiliate, control, or coerce victim. Includes sharing via private messages, posting publicly, uploading to pornographic websites, or sending to victim's contacts, family, ...
SAFE-T-0165 Post-Separation App Weaponisation Exploiting court-mandated communication apps (OurFamilyWizard, AppClose, Talking Parents) for microcontrol, excessive documentation demands, or manipulative communication that technically complies with court orders but is designed to exhaust and control. Weaponising the 'paper trail' feature to create false evidence of the other parent's non-compli...
SAFE-T-0112 Reputation Destruction SEO Creating websites, blog posts, social media content, or other material specifically designed to rank highly in search results for victim's name, damaging their reputation to anyone who searches for them. Content may include false accusations, embarrassing information, intimate images, or misleading narratives.
SAFE-T-0110 Sextortion Threatening to release intimate content (real or fabricated) unless victim complies with demands for money, further intimate content, sexual acts, or other concessions. Combines elements of sexual exploitation, financial fraud, and psychological coercion, creating a cycle of escalating demands.