|
SAFE-TA-0001
|
Surveillance & Tracking
|
The adversary is trying to monitor the victim's location, activities, communications, and relationships without consent or beyond consent given. Surveillance techniques enable perpetrators to maintain awareness of victim movements, predict behavior, and gather information for use in other tactics.
|
|
SAFE-TA-0002
|
Account & Access Compromise
|
The adversary is trying to gain unauthorized access to victim's accounts, devices, or digital identity, or deny victim access to their own. These techniques enable perpetrators to control victim's digital presence, access private information, and restrict victim's autonomy.
|
|
SAFE-TA-0003
|
Harassment & Intimidation
|
The adversary is directly threatening, frightening, humiliating, or exhausting victim through digital means. These techniques create fear, emotional distress, and psychological harm through sustained digital aggression.
|
|
SAFE-TA-0004
|
Information Manipulation
|
The adversary is trying to control, distort, fabricate, or weaponize information to harm victim's reality, reputation, or relationships. These techniques undermine victim's credibility, social support, and sense of reality.
|
|
SAFE-TA-0005
|
Isolation & Control
|
The adversary is trying to cut victim off from support networks, control their communications, or restrict their digital autonomy. These techniques reduce victim's ability to seek help, maintain relationships, or exercise independent judgment.
|
|
SAFE-TA-0006
|
Resource & Financial Control
|
The adversary is trying to control, restrict, or exploit victim's financial resources and economic independence through technology. These techniques create financial dependency, economic harm, and material vulnerability.
|
|
SAFE-TA-0007
|
Physical Enablement
|
The adversary is using technology to enable, coordinate, or amplify physical-world harm. These techniques bridge digital abuse to physical danger, representing the most severe escalation of tech-facilitated abuse.
|
|
SAFE-TA-0008
|
Grooming & Targeted Recruitment
|
Techniques for building exploitative relationships via technology. Covers child grooming, romance fraud initiation, and trafficking recruitment. The perpetrator uses technology to identify, approach, build trust with, desensitise, and ultimately exploit a target.
|
|
SAFE-TA-0009
|
Discovery & Preparation
|
How perpetrators learn, discover, and acquire the tools and techniques for technology-facilitated abuse. The pre-attack phase — understanding where someone learns to install stalkerware, discovers AirTag tracking, or is recruited into scam operations. Prevention-focused tactic for NFPs, law enforcement, and educators.
|