Is someone checking your browsing? This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly. Learn more about staying safe online

Tactics

Tactics: 9
ID Name Description
SAFE-TA-0001 Surveillance & Tracking The adversary is trying to monitor the victim's location, activities, communications, and relationships without consent or beyond consent given. Surveillance techniques enable perpetrators to maintain awareness of victim movements, predict behavior, and gather information for use in other tactics.
SAFE-TA-0002 Account & Access Compromise The adversary is trying to gain unauthorized access to victim's accounts, devices, or digital identity, or deny victim access to their own. These techniques enable perpetrators to control victim's digital presence, access private information, and restrict victim's autonomy.
SAFE-TA-0003 Harassment & Intimidation The adversary is directly threatening, frightening, humiliating, or exhausting victim through digital means. These techniques create fear, emotional distress, and psychological harm through sustained digital aggression.
SAFE-TA-0004 Information Manipulation The adversary is trying to control, distort, fabricate, or weaponize information to harm victim's reality, reputation, or relationships. These techniques undermine victim's credibility, social support, and sense of reality.
SAFE-TA-0005 Isolation & Control The adversary is trying to cut victim off from support networks, control their communications, or restrict their digital autonomy. These techniques reduce victim's ability to seek help, maintain relationships, or exercise independent judgment.
SAFE-TA-0006 Resource & Financial Control The adversary is trying to control, restrict, or exploit victim's financial resources and economic independence through technology. These techniques create financial dependency, economic harm, and material vulnerability.
SAFE-TA-0007 Physical Enablement The adversary is using technology to enable, coordinate, or amplify physical-world harm. These techniques bridge digital abuse to physical danger, representing the most severe escalation of tech-facilitated abuse.
SAFE-TA-0008 Grooming & Targeted Recruitment Techniques for building exploitative relationships via technology. Covers child grooming, romance fraud initiation, and trafficking recruitment. The perpetrator uses technology to identify, approach, build trust with, desensitise, and ultimately exploit a target.
SAFE-TA-0009 Discovery & Preparation How perpetrators learn, discover, and acquire the tools and techniques for technology-facilitated abuse. The pre-attack phase — understanding where someone learns to install stalkerware, discovers AirTag tracking, or is recruited into scam operations. Prevention-focused tactic for NFPs, law enforcement, and educators.