TFGBV Taxonomy
Perpetrator:

Stranger

Last Updated 6/4/25
Definition: An (often anonymous) individual who has taken an interest in someone or a group that they do not have a personal connection to.
Abuse Types:
Sexual extortion Online harassment Inappropriate content Cyberstalking Voyeuristic recording Account access control Deceptive synthetic media Inappropriate content Online impersonation
Targets:
Public figure Private individual
Perpetrator Intents:
Financial gain Entertainment Aggrandizement Sexual gratification

Synonyms

anonymous perpetrator, online stranger

Description

Stranger perpetrators operate without existing personal relationships to their targets, often leveraging the anonymity and scale that digital platforms provide. This category includes financially motivated actors, opportunistic predators, and those seeking random targets for harassment or exploitation.

Research shows stranger perpetrators are particularly prominent in financial sextortion cases, with 47% of all sextortion reports linked to a country were linked to Nigeria or Cote d'Ivoire, where organized networks target victims internationally (Thorn & NCMEC, 2024). These perpetrators often use formulaic approaches and scripts, suggesting coordinated or professional operations rather than personal vendettas.

Stranger perpetrators may also include those engaged in "cold" solicitation - Thorn's research found that 40% of all minors have received unsolicited requests for explicit imagery from unknown individuals, with 1 in 7 (15%) reporting it as a weekly or daily occurrence (Thorn, 2022). The anonymity of online spaces allows these perpetrators to cast wide nets, targeting multiple potential victims with relatively low risk of identification.

Skill level

Low to High - Ranges from opportunistic actors using basic social media features to sophisticated criminal networks employing advanced technical methods, social engineering, and coordinated infrastructure.

Mitigation strategies

  • Know your customer (KYC) - Identity verification to reduce anonymous bad actors
  • Rate limits on low trust accounts - Restrict capabilities of new or unverified accounts
  • Real-time prompts for reconsideration - Intervene when suspicious contact patterns emerge

References

  • Thorn. (2022). Online grooming: Examining risky encounters amid everyday digital socialization. https://info.thorn.org/hubfs/Research/2022_Online_Grooming_Report.pdf
  • Thorn and National Center for Missing and Exploited Children (NCMEC). (2024). Trends in Financial Sextortion An investigation of sextortion reports in NCMEC CyberTipline data. https://info.thorn.org/hubfs/Research/Thorn_TrendsInFinancialSextortion_June2024.pdf
Is something missing, or could it be better?
About This SiteGet InvolvedContactCopyrightPrivacy
Loading...