Tropedia

All unique and most-recently-edited pages, images and templates from Original Tropes and The True Tropes wikis have been copied to this wiki. The two source wikis will remain open for any last minute copying until Monday., at which time they will be redirected to this wiki. Please see the FAQ on the merge for more.

READ MORE

Tropedia
WikEd fancyquotesQuotesBug-silkHeadscratchersIcons-mini-icon extensionPlaying WithUseful NotesMagnifierAnalysisPhoto linkImage LinksHaiku-wide-iconHaikuLaconic
Under construction icon-blue This is a Trope Workshop page, still under consideration for creation.
Help out by editing the current page, or leave a comment on the Talk page.
Trope Workshop Guidelines

In mysteries and thrillers, villains often track down the heroes (or at least try to) using social engineering--pretending to be people with a legitimate need to know the information.

Do We Have This One?

Needs A Better Title.

Examples of Villains Use Social Engineering to Hunt Heroes include:

Anime and Manga[]

  • In Rising of the Shield Hero, Naofumi is faced with false accusations from his former party member and princess of the kingdom which then leads to him being a pariah and becoming jaded towards the world he has been transported to.

Literature[]

  • In Tony Hillerman's People of Darkness, the hit man Colton Wolf tracks down hero-cop Jim Chee by first looking through newspaper files, pretending to be an academic researcher, and then uses the information he gains that way--a Navajo Police officer's name--to pretend to be a Navajo cop on the radio with the Navajo Tribal Police.
  • In Meg Gardiner's The Shadow Tracer, the villains track the hero's activities by calling her credit card agency, pretending that her credit card is really their credit card that got stolen, so they can find out all the transactions the hero has made.
  • Nonfiction example: In Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, Kevin Mitnick says, "Every city I went to, I'd compromise their telecommunications infrastructure, so I could keep track of them trying to track me." He did some of that with methods like calling up people in the organizations he was spying on, pretending to be someone working for a different section of the organization, or tech support or such, who needed to know a password or something. (Whether Mitnick qualifies as a "villain" is debatable.)