The Identity Trap: indexing algorithmically promoted identities that promise self-improvement, belonging, and purpose — but deliver chronic grievance, financial exploitation, and a pipeline toward extremism.
🟡 v0.1 — first public release
This is the first public draft of the project — a preliminary release for feedback, review, and source citation work. Expect active updates as the data and methodology are refined.
Algorithms don't just serve content — they construct identities. A teenager searching for gym advice gets served masculinity content. A lonely young man looking for community finds a world that explains his isolation as someone else's fault. A woman seeking simpler living gets channeled toward ethno-nationalism.
These aren't accidents. They're patterns. The same structural mechanism repeats across seemingly unrelated communities:
- Hook — an emotional appeal that feels like insight
- Cost — hidden damage that the identity obscures
- Pipeline — a directed path toward deeper, more extreme identities
This project makes those patterns visible. It's a directed graph: nodes are identities, edges are the escalation pathways between them.
Once you see the structure, you can recognize the trap — in yourself, in people you care about, or in the platforms that profit from it.
This project is in an initial detection phase. The current graph is sufficiently developed to test pattern discovery and visibility, while the set of identities, clusters, and pipeline mappings is still expanding to capture the identities that are actively shaping online pathways.
| Metric | Count | Status |
|---|---|---|
| Identities (nodes) | 52 | Initial coverage — expanding |
| Clusters | 7 | Provisional |
| Pipeline connections (edges) | 125 | Initial mapping — review ongoing |
| Terminal nodes | 6 | In place |
| Deception tactics (vocabulary) | 14 | Stable |
What's established:
- A working graph structure with 52 identity nodes, each capturing hook, cost, tactics, timelines, and intervention
- 125 directed edges representing escalation pathways with strength and mechanism
- Schema covering nodes, edges, clusters, tag vocabulary, and tactics vocabulary
trap_depthscale on terminal nodes
What is still evolving:
- Identity and cluster coverage as new relevant profiles are discovered
- Per-node source citations (
evidence_sources) - JSON export for visualization and content ops integration
methodology.mdandsources.md
See CHANGELOG.md for version history.
- Researchers — studying algorithmic radicalization, identity fusion, or digital extremism
- Developers — building tools, visualizations, or interventions based on this data
-
Visit https://www.thehumanspace.org for the upcoming visualizations and wiki for this project.
-
Parents — understanding what their kids are encountering online
-
Educators — teaching media literacy, critical thinking, or digital citizenship
-
Individuals — recognizing patterns in their own media consumption or that of friends/family
the-identity-trap/
├── README.md
├── CHANGELOG.md
├── SCHEMA.md
├── LICENSE.md
├── DATA/
│ ├── clusters/ ← 7 cluster definitions (one per file)
│ ├── nodes/ ← 52 identity profiles (one per file)
│ ├── edges/ ← 125 pipeline connections (one per file)
│ └── tactics/ ← 14 deception technique definitions (one per file)
├── DOCS/
│ ├── methodology.md
│ └── sources.md
├── scripts/
│ └── split_data.py ← utility: split monolithic data into per-entity files
└── CONTRIBUTING.md
Each entity is a self-contained markdown file named by its slug (e.g., DATA/nodes/red_piller.md, DATA/edges/red_piller__mgtow.md).
Each node (identity) contains:
| Field | Purpose |
|---|---|
| Hook | The emotional appeal — what draws people in |
| Cost | The hidden damage — what it actually does |
| Tactics | Deception techniques used to recruit and retain |
| Pipeline to | Where it leads next (authoritative data in edges) |
| Risk level | 1–10 severity scale |
| Entry / Terminal | Whether this is a common starting point or a hard-to-escape destination |
| Trap depth | 1–5 escape difficulty for terminal nodes |
| Target demographics | Who is most vulnerable |
| Timeline | How fast the pipeline moves |
| Intervention | Breaking points, alternatives, resources |
Each edge (pipeline connection) contains:
| Field | Purpose |
|---|---|
| From → To | Source and target identity |
| Strength | How reliably the transition occurs (high/medium/low) |
| Mechanism | What drives the movement between identities |
Each tactic (deception technique) contains a name and description of the manipulation mechanism, used across multiple identities.
See SCHEMA.md for full field definitions.
This project describes manipulative, extremist, and violent ideologies for educational purposes only. The content includes:
- Descriptions of radicalization mechanisms
- References to white nationalism, antisemitism, and misogyny
- Discussion of suicide, self-harm, and violence
Reading about these identities does not mean endorsing them. If you recognize yourself in any profile, that's the point — and the intervention section is there for a reason.
If you or someone you know is in crisis:
(Emergency contacts following here)
This project benefits from domain expertise, lived experience, and careful review. See CONTRIBUTING.md for guidelines on:
- Proposing new identities or clusters
- Correcting inaccuracies
- Adding sources or interventions
- Reporting harmful misrepresentations
All contributions are reviewed for accuracy and responsibility.
