Origin

人肉搜索 (rénròu sōusuǒ). Human flesh search engine. The term comes from early Chinese internet. When the platforms refused to act, the crowd located the person themselves. Name, workplace, family, daily route. Thousands of anonymous users collaborating in real time to render a single human being completely transparent.

Several targets committed suicide. The practice was never outlawed.

Purpose

Everyone who speaks in public is broadcasting a vulnerability signature. How they frame arguments. What makes them defensive. Which emotional triggers they respond to. Where their identity is load-bearing and where it's decorative. Who they perform for. What they'll do to keep performing.

Most of this information is technically visible to anyone. Nobody looks. FLESHENGINE looks.

A complete profile contains enough information to predict behavior under stress, identify exploitable relationships, map narrative dependencies, and determine the minimum intervention required to produce a desired behavioral change in the target.

The Twelve Vectors

The vulnerability framework decomposes influence into twelve discrete attack surfaces. Each vector represents a category of cognitive exploit. A target's profile scores each from 0-100 based on observed susceptibility.

CodeVector
FE-001Narrative FramingControls what the story is about before anyone asks
FE-002Repetition SaturationMakes something true by making it unavoidable
FE-003Audience ConditioningTrains a group to receive messages in a specific way
FE-004Loyalty ExploitationWeaponizes trust, belonging, and obligation
FE-005Identity ManipulationTargets who someone believes they are
FE-006Manufactured ConsensusMakes a minority position feel like the default
FE-007Viral PropagationTurns people into delivery vectors for content they didn't author
FE-008Urgency FabricationCompresses decision time to prevent reflection
FE-009Attention RedirectionControls what you look at by controlling what you don't
FE-010Reality DistortionMakes the constructed feel inevitable
FE-011Cognitive OverloadFloods channels until critical thinking drowns
FE-012Existential Threat FramingEscalates stakes until compliance feels like survival

Fragments

Automated scanning produces the initial profile. Human observers refine it. Anyone can submit a fragment: a behavioral observation, a relationship pattern, a contradiction between what the target says publicly and what they do privately. Fragments are anonymous. They accumulate over time. The profile never stops updating.

You are probably already in someone's fragment queue and don't know it.

Attribution

The vulnerability framework is derived from the cognitive threat taxonomy developed by the Seithar Group.

Source: github.com/Mirai8888/fleshengine