
SCARS Institute’s Encyclopedia of Scams™ Published Continuously for 25 Years


Elicitation – A Scammer’s Manipulation Technique
Elicitation in Relationship Scams: A Manipulation Technique to Extract Information from Targeted Victims
Manipulation Technique – A SCARS Institute Insight
Author:
• Tim McGuinness, Ph.D., DFin, MCPO, MAnth – Anthropologist, Scientist, Director of the Society of Citizens Against Relationship Scams Inc.
See Author Biographies Below
Article Abstract
Elicitation is described as a low-key conversational method that extracts useful details without overt questioning, making it a core tactic in relationship scams such as romance fraud and pig butchering schemes. The approach builds rapport, nudges disclosure through reciprocity, politeness, and praise, and stitches small facts into actionable intelligence about identity, money flows, schedules, and vulnerabilities. Scammers apply prompts that invite correction, flattery tied to follow-up asks, assumed insider knowledge, and secrecy framed as care, then reuse disclosed goals to time requests and discourage withdrawals. Warning signs include persistent logistics talk, oddly specific probes, and momentum toward financial action. Effective defenses emphasize firm boundaries, non-answers, independent verification, slower tempo, and early third-party input, while institutions can add friction, safer defaults, and in-flow education to reduce harm.

Elicitation in Relationship Scams: A Manipulation Technique to Extract Information from Targeted Victims
PART 1: What is Elicitation
Elicitation is a conversational technique used to draw out information without the other person realizing they are being probed. It shows up in intelligence work, law-enforcement interviews, private investigations, corporate competitive intelligence, and criminal social engineering.
What it aims to do
- Build casual rapport, lower vigilance, and let the target “volunteer” facts.
- Bypass outright questions by using prompts that feel social, flattering, or routine.
- Gather small, low-risk details that can be stitched into valuable intelligence.
Why it works
- Reciprocity: people answer after being given a tidbit or compliment.
- Social norms: silence feels awkward, so gaps get filled.
- Ego and identity: praise, curiosity about expertise, or appeals to helpfulness nudge disclosure.
- Commitment and consistency: once a person shares a little, they tend to keep going.
- Foot-in-the-door: benign details first, sensitive items later.
Typical elicitation tactics
- Self-deprecation or ignorance: “I’m terrible with tech. How do you even log in here?”
- Flattery of expertise: “You clearly know this system. What’s the trick everyone misses?”
- False statements to invite correction: “So backups run weekly, right?”
- Mutual exchange: “Our office uses Duo; what do you all use?”
- Assumed knowledge: “When your manager approved the refund, did finance push it same day?”
- Third-party stories: “A client said your fraud queue spikes after 5 p.m. True?”
- Time pressure and small talk: slipping questions into casual, time-boxed chats.
- Social proof: “Everyone at your branch prefers the new portal.”
- Pretexting: adopting a role that seems to deserve answers (vendor, auditor, colleague).
How it differs from formal interrogation
- Elicitation avoids direct or accusatory questions and rarely mentions consequences.
- The setting is informal (hallways, calls, conferences, DMs), not an interview room.
- The speaker steers with prompts, not with a clear Q&A sequence.
Red flags a person can notice
- Questions that are oddly specific for a casual chat.
- Requests for process details, schedules, names, access paths, or unique identifiers.
- Compliments tied to follow-up asks.
- Repeated “innocent” errors that invite correction.
- A stranger using insider jargon or job titles to seem legitimate.
- Sudden interest in exceptions, workarounds, or “how you’d do it if it were urgent.”
How to counter it (practical responses)
- Set boundaries early: “I can’t share internal procedures.”
- Use non-answers: “It varies,” “That’s handled by another team,” “We follow the policy.”
- Ask for purpose and identity, then verify through official channels.
- Move technical or sensitive topics to approved, logged channels.
- Share only public information; treat specifics (names, schedules, systems, vendors, security steps) as sensitive.
- Report attempts to a supervisor or security team with the time, place, pretext used, and what was asked.
Ethical use vs. manipulation
- In clinical or research contexts, elicitation can be ethical when consent, transparency, and safeguards are in place.
- In security and fraud contexts, covert elicitation to obtain protected information is manipulative and may violate policy or law.
Quick examples
- At a conference: “We keep getting locked out of the portal after 3 tries. What’s your lockout threshold?”
- On customer support: “My boss said you push refunds over $500 automatically.”
- Romance scam grooming: “I wish I could call you after your shift ends at 10 p.m. Is that when the night manager leaves?”
Elicitation is the art of steering ordinary conversation so that sensitive facts surface naturally. Knowing the cues and rehearsing short boundary phrases are the best defenses.
PART 2: How Elicitation Works in Scams
What Elicitation Is in Scams
Elicitation is a conversational method that draws out useful details while maintaining a relaxed social atmosphere. The speaker appears friendly and curious. The listener supplies information voluntarily because the exchange feels ordinary. The technique relies on social norms such as reciprocity, politeness, and the desire to be seen as helpful or consistent.
Why It Works in Scams
Most people match the tone they receive. If someone seems warm and attentive, many will share more than they planned. People also correct small inaccuracies, elaborate to fill silence, and respond to flattery with extra detail. Elicitation uses those tendencies. The result is a steady stream of facts about routines, money, constraints, and motives that can be repurposed later.
Typical Tools in Elicitation
Scammers use a short list of predictable moves. They select the ones that fit the moment and the target.
- Assumed knowledge. The scammer states something slightly off, which invites a correction that reveals specifics.
- Compliments and validation. Praise for judgment or resilience leads to stories that expose priorities and patterns.
- Shared vulnerability. A small confession encourages a matching disclosure with actionable detail.
- Casual questions. Soft, nonthreatening questions about preferences or habits feel harmless and keep the conversation flowing.
- Social proof. References to what “others” do or believe nudge the target to explain how they do it, adding more detail.
- Time and routine talk. Chatter about schedules and availability surfaces windows when oversight is lower.
- Money talk by analogy. Comments about fees, transfers, apps, or platforms invite the target to explain their own setup.
How Romance Scams Use Elicitation
In romance scams, elicitation begins at the first contact. The scammer scans public profiles and mirrors values and interests. Early exchanges gather facts about living arrangements, work hours, family dynamics, health concerns, and relationship goals. None of these topics sound risky in isolation. Together they form a map for future requests.
As rapport grows, the scammer shifts from general sharing to targeted prompts. If the target values loyalty, the scammer frames small favors as proof of loyalty. If the target describes long shifts, the scammer learns the best times to message without drawing attention. If the target mentions a strained relationship with a relative, the scammer positions outside skepticism as judgmental and unfair. The plan advances because it feels like a natural deepening of intimacy.
How Pig Butchering Uses Elicitation
Pig butchering blends relationship grooming with staged investment coaching. The scammer opens with friendly contact and keeps the tone light. Once regular chats are established, the dialogue pivots to investing. Elicitation appears as praise for the target’s supposed financial sense and as questions about comfort with risk, crypto literacy, brokerages, and transfer limits. The goal is to size the first deposit, set a cadence for follow-on deposits, and anticipate objections.
The scammer often references a fake platform. The target sees fabricated profits. Elicited goals and statements are then reused to justify reinvestment and to discourage withdrawals. If the target has said they want to “build a cushion by year’s end,” the scammer cites that goal to argue against cashing out. The target feels consistent with their own words even as losses mount.
What Gets Elicited
Across both scam types, the same categories recur:
- Identity fragments. Full name variants, date markers, and names of children or pets.
- Access points. Email domains, messaging apps, and devices used for two-factor authentication.
- Time windows. Work hours, commute times, travel plans, and sleep patterns.
- Financial rails. Banks, cards, payment apps, daily limits, and comfort with wire transfers or crypto.
- Social context. Friends who approve, relatives who doubt, and the likelihood that anyone will intervene.
- Motivators. Hopes, needs, fears, and deadlines that can be invoked to overcome hesitation.
Early Red Flags
Several conversational patterns suggest elicitation is in play.
- Persistent interest in logistics. Repeated returns to how, when, and through which tools tasks or payments happen.
- Praise with a follow-up probe. Compliments that immediately lead to “How do you manage that?” or “What does that look like for you?”
- Small errors that invite correction. Misstated job titles, banks, or time zones that draw out precise facts.
- Secrecy framed as care. Requests to keep details private “for the relationship” or “to protect an edge.”
- Escalation timed to disclosures. New asks that track closely with what the target has just revealed as possible.
Defenses for Individuals
Practical habits reduce exposure without shutting down normal conversation.
- Keep logistics private. Avoid sharing schedules, financial tools, recovery codes, or authentication methods in chat.
- Answer by principle, not detail. Replace “I bank at X and use Y” with “I handle finances offline and through verified channels.”
- Use neutral refusals. Short phrases such as “I do not share that” or “That is not a topic for chat” maintain tone and boundary.
- Verify identities independently. Use official websites and phone numbers you obtain yourself. Do not rely on links or contacts provided in the chat.
- Slow the tempo. Scammers depend on momentum. A pause to think, verify, or sleep on it breaks the script.
- Invite outside perspective early. Tell a trusted person about the new contact. Isolation makes elicitation easier.
Defenses for Families and Friends
Supportive observers can help without confrontation.
- Focus on safety practices, not blame. Encourage use of verified channels and cooling-off periods.
- Offer to help verify. Look up companies, charities, or platforms together using official sites.
- Watch for secrecy about money. Privacy that expands alongside a new online relationship deserves attention.
Platform and Bank Countermeasures
Institutions can disrupt elicitation-driven harm by intervening at predictable moments.
- Education in-flow. Brief prompts about verification, secrecy around transfers, and typical scam patterns placed inside messaging and payment flows.
- Anomaly friction. Holds or step-up checks for first-time recipients, new crypto purchases, or rapid increases in transfer amounts.
- Safer defaults. Lower initial limits for new payees, with clear, human-centered paths to raise limits after independent verification.
- Pattern sharing. Anonymized signals across platforms and institutions to surface current phrasing, hooks, and money routes.
Reporting and Recovery
If loss occurs, early reporting improves outcomes.
- Document the conversation. Keep screenshots, usernames, wallet addresses, transaction IDs, and platform links.
- Notify platforms and banks. Ask for holds or recalls where possible and provide every identifier gathered.
- File official reports. Use local law enforcement portals and national cybercrime reporting sites as applicable.
- Seek support services. Reputable victim support organizations can reduce shame and provide structured steps for financial, legal, and emotional recovery.
Why Clarifying Elicitation Matters
Naming the method helps people understand what happened and how to respond. Elicitation does not imply gullibility. It targets ordinary social behavior. The scammer wins when a normal instinct to be polite or helpful gets redirected toward disclosure that enables manipulation. Recognizing the moves turns those same instincts into strengths. Courtesy can include a firm boundary. Helpfulness can include insisting on verified channels. Consistency can mean staying consistent with safety practices rather than with a scammer’s script.
Examples
These examples are representative of how elicitation looks in the moment.
- Compliment plus probe. “You handle so much at work. How do you keep your projects and personal budget straight?” The safe response keeps methods private.
- False assumption. “Most banks block weekend wires.” A corrective reply that names the bank and limits, supplies useful detail. A safer reply avoids specifics.
- Shared vulnerability. “I worry about fees on international parcels.” A detailed tutorial exposes postal habits and addresses. A brief empathic response without details protects privacy.
- Social proof. “My cousin doubled savings using a lesser-known app.” Describing your own apps and thresholds gives the scammer a playbook. A neutral response declines to compare tools.
A Simple Playbook to Keep Handy
- Treat financial and access logistics (accounts and logins) as private by default.
- Decline to answer specifics about schedules, devices, banks, and limits.
- Verify identities and opportunities away from the chat, using sources you control.
- Slow down when praise turns into a request or when secrecy is framed as care.
- Bring a trusted person into the loop before sending money or documents.
- If something feels off, end the conversation and review it later with distance.
Review
Elicitation is quiet, patient, and effective in relationship scams because it blends into normal conversation. Romance scammers use it to map emotional needs and to script believable emergencies. Pig butchering scammers use it to size deposits, time asks, and discourage withdrawals. In both, the target supplies the raw material that later fuels the fraud. Clear boundaries, independent verification, slower tempo, and early outside input reduce that risk. With a few steady habits, the same social skills that elicitation exploits become the basis for safer connections online.
PART 3: Sample Elicitation Conversations
Casual Chat About Meeting Someone in a Social Media Group
Scammer: “Saw your post in the ‘Weekend Hikers’ group. Impressive mileage. How do you fit that in with work?” [Elicitation: Compliment plus probe; time and routine mapping]
Victim: “Thanks. I usually get out Saturdays after work wraps up.”
Scammer: “Most people are exhausted after late shifts. Do you finish around nine or closer to ten?” [Elicitation: Assumed detail to invite correction; schedule fishing]
Victim: “Closer to nine.”
Scammer: “Good to know. I try not to ping people during family time. Friends keep separate apps for personal chats. Do you prefer WhatsApp or Signal?” [Elicitation: Casual question framed as consideration; access channel discovery]
Victim: “Mostly WhatsApp.”
Scammer: “Funny thing, my bank blocks small transfers after six on Fridays. Your credit union probably has lighter limits, right?” [Elicitation: False statement to trigger correction; financial rails probing]
Victim: “Not sure. I do not move money at night.”
Scammer: “You sound organized. People must rely on you. Who turns to you when things get hectic?” [Elicitation: Flattery to lower guard; social network mapping]
Victim: “My sister sometimes.”
Scammer: “That is kind. I help my aunt monthly, but fees add up. Do you ever use Zelle or Cash App to help family?” [Elicitation: Money talk by analogy; payment method discovery]
Victim: “Occasionally Zelle.”
Scammer: “I am hopeless with tech. I keep getting locked out of a portal when it asks for backup codes. Do you store codes on your phone or somewhere safer?” [Elicitation: Self-deprecation to invite advice; authentication process probing]
Victim: “I keep security private.”
Scammer: “Respect. Careful people build real cushions. What is your main savings goal this year?” [Elicitation: Compliment plus probe; motivators scouting]
Victim: “A small cushion by year’s end.”
Scammer: “A coworker doubled a cushion using a lesser-known app with bonus yield. Everyone in her office uses it now. How do you grow savings without stress?” [Elicitation: Social proof to normalize disclosure; strategy elicitation]
Victim: “I keep it simple.”
Scammer: “You mentioned Saturdays are open. Is your manager off then too, or do they ping you if something breaks?” [Elicitation: Assumed knowledge to invite specifics; vulnerability window mapping]
Victim: “I am not on call.”
Scammer: “Great. If we grab coffee after your hike, I can show a quick fee comparison. Better to keep new ideas private until they are real.” [Elicitation: Secrecy framed as care; pretexting as helpful peer]
Victim: “I verify things on my own.”
Scammer: “Totally. I can send a screenshot so you can compare. Which email should I use so it does not land in spam?” [Elicitation: Access point request; escalation timed to rapport]
Victim: “I do not share addresses in chat.”
Scammer: “Fair. Quick hypothetical. If you ever needed funds fast, would a card advance or a wire feel safer?” [Elicitation: Preference probe that profiles limits]
Victim: “I do not discuss that.”
Scammer: “Understood. Switching back to hikes. Sunrise starts are best. Are you a 6 a.m. person or more 8 a.m.?” [Elicitation: Routine mapping to find low-oversight windows]
Victim: “Depends on the trail.”
Scammer: “Flexible works. Message Friday when free and I will adjust.” [Elicitation: Momentum maintenance to keep channel open]
Casual Dating Site Chat
Scammer: “Saw your profile and the dog photos—great eye. What kind of camera do you use after work?” [Elicitation: Compliment plus probe; routine mapping]
Victim: “Thanks. Just my phone after I get off at six.”
Scammer: “Six is a nice finish. Do you get most weeknights free or does your boss ping you later?” [Elicitation: Assumed detail to invite correction; schedule fishing]
Victim: “Most nights are free.”
Scammer: “Lucky. I try not to message during family time. People here hop to WhatsApp for longer chats. Do you prefer WhatsApp or stay on the site?” [Elicitation: Casual question framed as consideration; access channel discovery]
Victim: “I can use WhatsApp.”
Scammer: “Perfect. My last bank blocked tiny transfers after 7 p.m. Your bank probably has better limits, right?” [Elicitation: False statement to trigger correction; financial rails probing]
Victim: “No idea. I rarely send money.”
Scammer: “Smart habit. You seem steady under pressure. At work, do people lean on you when things get hectic?” [Elicitation: Flattery to lower guard; social network mapping]
Victim: “Sometimes, yes.”
Scammer: “I mess up tech all the time. Got locked out when it asked for backup codes. Do you keep those on your phone or somewhere safer?” [Elicitation: Self-deprecation to invite advice; authentication probing]
Victim: “I keep security details private.”
Scammer: “Respect. Setting a savings goal helps me stay calm. What is your main goal this year?” [Elicitation: Compliment plus probe; motivators scouting]
Victim: “Build a cushion if possible.”
Scammer: “My cousin doubled a cushion using a lesser-known app everyone at her office loves. How do you grow savings without stress?” [Elicitation: Social proof to normalize disclosure; strategy elicitation]
Victim: “I keep it simple.”
Scammer: “Your profile mentions shifts. Are Saturdays completely yours, or does on-call ever pop up?” [Elicitation: Assumed knowledge to invite specifics; vulnerability window mapping]
Victim: “Saturdays are mine.”
Scammer: “Nice. We could grab coffee after your dog walk. Better to compare ideas in person first, then talk to others once it feels real.” [Elicitation: Secrecy framed as care; pretexting as helpful partner]
Victim: “I verify things on my own.”
Scammer: “Of course. I can send a screenshot so you can check later. Which email should I use so it does not land in spam?” [Elicitation: Access point request; escalation timed to rapport]
Victim: “I do not share email here.”
Scammer: “No worries. Quick hypothetical: if someone needed funds fast, would a card advance or a wire feel safer?” [Elicitation: Preference probe that profiles limits]
Victim: “Not discussing that.”
Scammer: “Fair. By the way, I noticed your gym selfie. Are mornings your workout time or do you go after six?” [Elicitation: Routine mapping to find low-oversight windows]
Victim: “Usually mornings.”
Scammer: “Good rhythm. I am planning a short trip next month. If we click, maybe we meet before then. What dates are best so we avoid your niece’s soccer games?” [Elicitation: Third-party assumption to draw out family schedule; social context mapping]
Victim: “Weeknights work.”
Scammer: “Great. Let’s move this to WhatsApp so planning is easier. I will send a wave at 7 p.m. so it does not interrupt dinner.” [Elicitation: Channel shift plus timing test; momentum maintenance]
Victim: “Message here first.”
Scammer: “Sure thing. One last thing—my bank blocked a trial deposit last Friday. Do weekend holds ever hit your credit union?” [Elicitation: False assumption to invite correction; banking process probing]
Victim: “I would not know.”
Scammer: “Understood. I like your boundaries. That makes trust simple. What city area are you in so I can pick a public spot near you?” [Elicitation: Location narrowing; safety pretext]
Victim: “Downtown is fine.”
Scammer: “Perfect. I will propose a cafe near the river, public and busy. If anything changes, just drop me a note here first.” [Elicitation: Keep channel warm; test responsiveness and availability]
Conclusion
A clear picture of elicitation helps turn ordinary conversation into a safer space. The method thrives on social habits such as politeness, reciprocity, and the urge to correct minor errors. Scammers shape those habits into cues that reveal schedules, access paths, and financial routines. Recognizing the pattern can change the outcome. Short boundary phrases, neutral non-answers, and a steady pace interrupt the script. Verification through sources you control protects your accounts and identity. Early outside input widens perspective and lowers isolation.
Practical habits keep risk low. Treat process details, authentication methods, and money movement as private by default. Move any sensitive talk to official channels that log activity – not secret chat platforms such as Signal or Telegram. Ask for the purpose and their identity, then verify both before sharing anything specific. When praise turns into a request or secrecy is framed as care, slow down. Share only your public information in casual chats and decline to compare tools or limits. If something feels off, pause the conversation and review it later.
Families and friends can support your safety without blame. Encourage cooling-off periods, help verify their claims on official websites, and watch for growing secrecy around money. Platforms and banks can add friction at high-risk moments, providing education in the flow, and coordinate information on current hooks and money routes. If a loss occurs, document the evidence, alert platforms and financial institutions, file reports, and seek reputable victim support.
Elicitation is a quiet and persistent technique that works, yet it loses power when boundaries become routine. With practice, courtesy can include clear limits, helpfulness can include verification, and consistency means staying consistent with safety too.

Glossary
- Access points — Refers to the specific tools and channels a person uses to communicate or log in, such as email domains, messaging apps, or devices for two-factor authentication. Scammers attempt to learn these details to plan contact methods and defeat security checks. Keeping these specifics private reduces exposure.
- Anomaly friction — Describes extra checks that platforms or banks add when a payment looks unusual, like first-time recipients or sudden increases in transfer size. These pauses can stop losses by forcing verification. Institutions use them to interrupt scam momentum.
- Assumed knowledge — A tactic where the scammer states something slightly wrong to invite a correction. The correction supplies precise facts that the scammer wants. It feels helpful, but hands over usable details.
- Boundary phrase — A short, practiced sentence that sets a limit during conversation. Examples include “I do not share that” or “That is handled through official channels.” Clear boundaries keep talk polite while protecting sensitive information.
- Casual questions — Soft, routine questions about preferences or daily habits that seem harmless. They keep a chat flowing while collecting small facts. Over time, those facts combine into a useful profile.
- Commitment and consistency — A psychological tendency to keep acting in line with earlier statements. Scammers echo the person’s own words to push follow-through on payments or favors. The pressure feels internal, not imposed.
- Compliment plus probe — Praise followed immediately by a request for “how” something is done. The flattery lowers caution, and the probe extracts process details. This pairing is common during grooming.
- Compliments and validation — Positive feedback that encourages stories about skills, sacrifices, or resilience. Those stories reveal priorities, routines, and limits. The scammer then tailors later requests to fit those themes.
- Defensive non-answer — A reply that shares no specifics while staying polite, such as “It varies” or “We follow policy.” It satisfies social pressure without giving data. Practicing these lines prevents oversharing.
- Education in-flow — Short safety prompts placed inside messaging, banking, or checkout steps. They remind people to verify identities and treat logistics as sensitive. Timely education lowers risk during active decisions.
- Elicitation — A conversational method that draws out information without direct questioning. It relies on rapport, social norms, and gentle prompts so disclosures feel voluntary. Small details accumulate into actionable intelligence.
- Escalation timed to disclosures — A pattern where new requests match what the target just admitted is possible. The person feels consistent rather than pushed. Tracking this timing helps spot manipulation.
- False assumption — A deliberate minor error, like naming the wrong bank rule, is used to trigger a correction. The corrected detail supplies policies, limits, or schedules. It looks harmless, but reveals the playbook.
- Financial rails — The specific paths money can travel, including banks, cards, payment apps, wires, or crypto. Scammers map these routes to time requests and avoid blocks. Treating rails as sensitive blocks that mapping.
- Foot-in-the-door — A sequence that begins with small, easy disclosures or favors, then grows to bigger ones. Early compliance makes later compliance more likely. Scammers use it to move from trivia to money.
- Identity fragments — Bits of personal data like middle initials, nicknames, children’s names, or date markers. Alone, they seem small; together, they enable account recovery or impersonation. Limiting these fragments reduces leverage.
- Independent verification — Checking claims through sources a person controls, such as official websites or phone numbers found directly. It avoids links or contacts supplied in a chat. Independent checks break the scammer’s script.
- Isolation signal — Signs that privacy around money or new relationships is expanding. Scammers encourage secrecy to cut off protective feedback. Increased isolation raises risk and deserves attention.
- Money talk by analogy — Casual mentions of fees, transfers, or apps to invite descriptions of one’s own setup. The comparison feels normal but uncovers limits and habits. Avoiding comparisons protects logistics.
- Motivators — Personal goals, deadlines, fears, or hopes that drive decisions. Scammers echo these motivators to justify deposits or block withdrawals. Naming motivators aloud helps a person spot when they are being used.
- Neutral refusal — A calm decline that gives no reason to debate, such as “That is not a topic for chat.” It maintains rapport while closing the door. Neutral language reduces pushback.
- Pattern sharing — Exchange of anonymized signals across platforms or banks about current hooks, phrases, and routes. It helps systems detect live scam patterns. Broader sharing improves early intervention.
- Persistent interest in logistics — Repeated returns to how, when, and through which tools tasks happen. This focus reveals windows and methods useful for fraud. Noticing the pattern signals a need to shut down detail.
- Pig butchering — A long-game scam that blends relationship grooming with staged investment coaching. Fake platforms show fabricated profits to grow deposits and block withdrawals. Elicited goals are mirrored to keep funds in play.
- Pretexting — Adoption of a role that seems to deserve answers, such as vendor, auditor, or colleague. The role provides cover for targeted prompts. Verification of identity disrupts the pretext.
- Reciprocity — A social norm where people feel inclined to give after receiving. Scammers offer praise, tips, or small favors so the person shares back. Recognizing the pull of reciprocity protects boundaries.
- Reporting early — Prompt notification to platforms, banks, and law enforcement when harm is suspected. Early reports increase the chances of holds, recalls, or investigative leads. Thorough documentation strengthens outcomes.
- Romance scam grooming — A staged relationship that mirrors values and interests to build trust. Early chats collect life details that later justify emergencies or requests. The intimacy feels real while information is harvested.
- Secrecy framed as care — Requests to keep topics private “for the relationship” or “to protect an edge.” The frame sounds protective, but it blocks outside support. Treating secrecy around money as a warning helps safety.
- Shared vulnerability — A small confession used to invite a matching disclosure. The mirrored sharing supplies practical details about routines or constraints. Keeping empathy separate from specifics limits exposure.
- Social context — The network of friends and family who approve or doubt, and their likelihood to intervene. Scammers assess this context to anticipate resistance. Bringing a trusted person in early adds protection.
- Social norms — Common rules of politeness, helpfulness, and conversation flow. Elicitation leans on these norms, so sharing feels expected. Naming the norm makes it easier to pause or refuse.
- Social proof — References to what “others” do to nudge agreement or disclosure. People often explain their own practices in response. Declining comparisons keeps methods private.
- Time and routine talk — Conversation about schedules, availability, or shifts. These details identify low-oversight windows. Avoiding specifics keeps timing unpredictable.
- Time windows — Predictable periods when attention is lower, such as late nights or long shifts. Scammers aim requests at these windows to avoid scrutiny. Vague answers reduce the targeting.
- Verification pause — A deliberate slowdown to think, check, or sleep on a request. Momentum favors scammers; pauses favor safety. Building a habit of pausing prevents rushed decisions.
- Verified channels — Official sites, published phone numbers, and logged company tools used for sensitive topics. Moving discussions there raises accountability and traceability. Verified channels block off-platform manipulation.
- Victim support services — Reputable organizations that provide structured steps for financial, legal, and emotional recovery. Early contact lowers shame and improves planning. Support shortens isolation and speeds stabilization.
- Wallet or account identifiers — Specific numbers, handles, or addresses tied to payments and crypto transfers. Sharing these widely increases the risk of targeting and tracing. Keeping them private limits misuse.
Reference
- Using the Scharff-technique to elicit information: How to effectively establish the “illusion of knowing it all”? https://www.sciencedirect.com/science/article/pii/S1889186116300014
- The Scharff-technique: eliciting intelligence from human sources https://pubmed.ncbi.nlm.nih.gov/24707914/
- Psychological Perspectives on Interrogation https://www.researchgate.net/publication/315735952_Psychological_Perspectives_on_Interrogation
- Eliciting Information and Detecting Lies in Intelligence Interviewing: An Overview Of Recent Research https://www.researchgate.net/publication/265856647_Eliciting_Information_and_Detecting_Lies_in_Intelligence_Interviewing_An_Overview_Of_Recent_Research
- Sketching routes to elicit information and cues to deceit https://www.researchgate.net/publication/362127145_Sketching_routes_to_elicit_information_and_cues_to_deceit
- Oleszkiewicz, S., Granhag, P. A., & Montecinos, S. C. (2014). The first scientific test of the Scharff technique for eliciting human intelligence. Law and Human Behavior. https://doi.apa.org/doi/10.1037/lhb0000085
Author Biographies
-/ 30 /-
What do you think about this?
Please share your thoughts in a comment below!
Table of Contents
- Elicitation in Relationship Scams: A Manipulation Technique to Extract Information from Targeted Victims
- Elicitation in Relationship Scams: A Manipulation Technique to Extract Information from Targeted Victims
- PART 1: What is Elicitation
- How to counter it (practical responses)
- PART 2: How Elicitation Works in Scams
- PART 3: Sample Elicitation Conversations
- Conclusion
- Glossary
- Reference
LEAVE A COMMENT?
Recent Comments
On Other Articles
- SCARS Institute Editorial Team on Exposed To Scams – What Separates Victims From Non-Victims: “The truth is that the types of scams do not matter that much single they follow similar methodologies. Avoiding scams…” Jan 2, 15:34
- on Talking To Scammers – Real Dangers For Victims 2023: “Everything is on our websites, and then also added slowly in our new community. We no longer do much publishing…” Jan 2, 15:31
- on Where Do Romance Scammers Find You?: “I do not have Facebook or any social media platforms for this reason, and I do not use any dating…” Jan 1, 23:12
- on Online Grooming In All Of Its Forms – 2024: “I recognize some of the techniques used by the scammer(s) to groom, manipulate and control me. I just said hi…” Jan 1, 14:54
- on Scammer Lures Used To Exploit Your Needs: “I appreciate the explanation as to how scammers use the innate desires/needs victims have to be vulnerable to being pulled…” Jan 1, 14:40
- on Talking To Scammers – Real Dangers For Victims 2023: “Is the article for Real dating guide for men in the Facebook group or in the Scam School information? I…” Jan 1, 13:18
- on Loneliness – Before And After The Scam: “I think loneliness was more of a factor with the other romance scams I became involved in – particularly the…” Dec 31, 14:26
- on Exposed To Scams – What Separates Victims From Non-Victims: “This article brought up a lot of reactions/thoughts of how as a victim there were factors out of my control…” Dec 31, 14:11
- on Talking To Scammers – Real Dangers For Victims 2023: “The moment I realized that I was involved in a romance scam, I sent a message to the scammer so…” Dec 30, 16:48
- on 7 Deadly Sins of Post Scam Victim Vulnerability – 2023 UPDATED 2026: “I believe that speaking with a therapist soon after the scam (I did this) can help by receiving a objective…” Dec 30, 16:40
ARTICLE META
Important Information for New Scam Victims
- Please visit www.ScamVictimsSupport.org – a SCARS Website for New Scam Victims & Sextortion Victims
- Enroll in FREE SCARS Scam Survivor’s School now at www.SCARSeducation.org
- Please visit www.ScamPsychology.org – to more fully understand the psychological concepts involved in scams and scam victim recovery
If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org
If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines
A Note About Labeling!
We often use the term ‘scam victim’ in our articles, but this is a convenience to help those searching for information in search engines like Google. It is just a convenience and has no deeper meaning. If you have come through such an experience, YOU are a Survivor! It was not your fault. You are not alone! Axios!
A Question of Trust
At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish, Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors experience. You can do Google searches but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.
Statement About Victim Blaming
Some of our articles discuss various aspects of victims. This is both about better understanding victims (the science of victimology) and their behaviors and psychology. This helps us to educate victims/survivors about why these crimes happened and to not blame themselves, better develop recovery programs, and to help victims avoid scams in the future. At times this may sound like blaming the victim, but it does not blame scam victims, we are simply explaining the hows and whys of the experience victims have.
These articles, about the Psychology of Scams or Victim Psychology – meaning that all humans have psychological or cognitive characteristics in common that can either be exploited or work against us – help us all to understand the unique challenges victims face before, during, and after scams, fraud, or cybercrimes. These sometimes talk about some of the vulnerabilities the scammers exploit. Victims rarely have control of them or are even aware of them, until something like a scam happens and then they can learn how their mind works and how to overcome these mechanisms.
Articles like these help victims and others understand these processes and how to help prevent them from being exploited again or to help them recover more easily by understanding their post-scam behaviors. Learn more about the Psychology of Scams at www.ScamPsychology.org
Psychology Disclaimer:
All articles about psychology and the human brain on this website are for information & education only
The information provided in this article is intended for educational and self-help purposes only and should not be construed as a substitute for professional therapy or counseling.
While any self-help techniques outlined herein may be beneficial for scam victims seeking to recover from their experience and move towards recovery, it is important to consult with a qualified mental health professional before initiating any course of action. Each individual’s experience and needs are unique, and what works for one person may not be suitable for another.
Additionally, any approach may not be appropriate for individuals with certain pre-existing mental health conditions or trauma histories. It is advisable to seek guidance from a licensed therapist or counselor who can provide personalized support, guidance, and treatment tailored to your specific needs.
If you are experiencing significant distress or emotional difficulties related to a scam or other traumatic event, please consult your doctor or mental health provider for appropriate care and support.
Also read our SCARS Institute Statement about Professional Care for Scam Victims – click here to go to our ScamsNOW.com website.








Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.