A Blade in the Dark: The Com Network’s Nihilistic Playbooks (Part V)

A Blade in the Dark: The Com Network’s Nihilistic Playbooks (Part V)

 All previous posts in this series can be found here PART 1PART 2, PART 3, PART 4

⚠️ Content Warning: This article discusses topics including suicide, self-harm, sextortion, violent extremism, and real-world violence that some readers may find distressing. Reader discretion is advised.

Introduction

In this series, we have plunged into the violent manifestos and operational guides of groups like the Maniacs Murder Cult (M.K.Y.), Satanic Front, and No Lives Matter (NLM), each wielding their brand of nihilism marked by elements of accelerationism, occultism, national socialism. In this fifth and final, we move away from Offline Com and venture into Sextortion Com, where CVLT and 764 originated and whose instructional materials epitomize a cold, calculated practicality. Their guides and manuals dispense with grand ideological posturing, offering instead a bare-bones approach to chaos: efficient, brutal, and disturbingly effective.

The Com Network has generated an arsenal of instructional material– including the five I will cover today: the “Sextortion Handbook,” “Suicide Guide 2.0,” "6996 Bible", "Purgatory", and “Dox Guide”. These instructional documents, reveals hybridized tactics, techniques and procedures meant to strip humanity down to its darkest impulses. They instruct on how to weaponize information, psychological vulnerability, and even self-loathing, crafting a nihilistic toolbox for those seeking to dismantle the world—or themselves. Where other groups in Offline Com revel in overt misanthropy, nihilism or grotesque theatricality; Sextortion Com takes a quieter, sharper route—like the glint of a blade in the dark, waiting to strike.

Overview of the Manifesto and Guides

The guides produced by The Com Network reflect an ethos of exploitation, manipulation, and self-destruction that crosses criminal and national security thresholds. Threat like Com highlights the need to break down traditional national security silos, and cross sectoral collaboration.

A) Sextortion Handbook

Written by 764 member "Convict" (aka Baron Martin, from Arizona who was arrested December 13, 2024), the Sextortion Handbook is a methodical manual for emotional and financial extortion, offering detailed steps for gaining trust from minors, extracting compromising material, and leveraging it for blackmail. It is a document that transforms human connection into a battlefield, where trust becomes the most exploitable weapon. The guide’s premise is to blackmail or coerce minor victims into producing sexually explicit content or self-harm content (photos, videos) under threat of exposure. Targets are manipulated via grooming tactics, and the manual includes instructions on preserving anonymity, controlling the victim, and monetizing the obtained material. This guide is designed for targeting individuals of all genders and ages, but particularly minors or people who can be manipulated with shame/fear of exposure. The text specifically mentions ways to maintain ones operational security and avoid detection from law enforcement, in a users efforts to exploit personal weaknesses for monetary or sexual gain.

Tactics & Techniques Promoted

  1. Victim Profiling
    The manual underscores the importance of researching and identifying your vulnerable targets, who are often minors or socially isolated individuals with vulnerable identities. Perpetrators are advised to trawl social media platforms and messaging apps (e.g., Discord, Snapchat, Telegram) to spot those exhibiting traits such as low self-esteem, loneliness, or emotional turmoil. By focusing on people who might be seeking attention, empathy, or validation, the attacker gains a potential foothold for manipulation. Profiling also involves cataloging behavioral patterns—like how frequently a target logs on, the openness of their posts, or the nature of their social network—thereby refining the approach to ensure maximum impact when a grooming attempt begins.
  2. Establishing False Trust
    Once a target is identified, the handbook recommends building a façade of reliability and understanding, often by assuming the persona of someone attractive or compassionate. Techniques range from flattering comments, white knighting and sympathetic listening to feigned personal confessions, all designed to lower the victim’s guard. This illusion of friendship or romance is key to eliciting personal disclosures, explicit images, or videos. The manipulator may spend weeks or even months slowly cultivating credibility, often using psychological tactics like mirroring the target’s interests and emotional “love-bombing”—the sudden intensification of attention and praise—to deepen the perceived bond.
  3. Blackmail Cycle
    The guide emphasizes that once compromising content is obtained, perpetrators should then pivot to threats of exposure, using the fear and shame of extortion as leverage. This cyclical extortion strategy often begins with gentle pressure—like a warning about “what might happen” if the material is leaked—and escalates to explicit demands for further content or money. If the victim complies, the cycle intensifies: the abuser demands increasingly extreme or humiliating material under the constant specter of family, friends, or professional contacts being sent the victim’s explicit images or LoreBook. This ongoing, open-ended blackmail ensures that perpetrators can extract as many resources as possible (sexual, financial, or bringing in other victims) . This cycle has been described by victims in several of the 764 affidavits.
  4. Anonymity Tools
    To avoid detection by law enforcement, the Sextortion Handbook prescribes an array of digital camouflage measures. These include using VPN services and creating sock puppets. The manual advocates storing or transferring explicit material on secure cloud services that offer end-to-end encryption and password-protected files. The manual stresses never to operate under real identities or from traceable IP addresses.
  5. Monetization
    Beyond sexual exploitation, the Sextortion Handbook lays out routes for financial gain. Perpetrators can directly demand money—through payment services, prepaid gift cards, or cryptocurrency—to refrain from sharing a victim’s explicit material online. The text suggests a stepwise approach: begin with threats and small monetary demands, then scale to larger sums as panic and dependency set in. Additionally, it instructs on how to market this content within the Com Network, reinforcing the idea that victims’ images or videos can be repackaged as digital commodities.

B) Suicide Guide 2.0

This documents takes a different approach, targeting the self rather than the external world. It reframes despair as defiance, presenting methods of self-harm as acts of rebellion against an uncaring existence. Its clinical tone strips away the last vestiges of empathy, leaving only cold instructions for ending a life. This is a document that is designed to be shared with those that have suicidal ideations in order to aid in their efforts to kill themselves, with the hope that the ones egging them on can convince them to kill themselves on livestream. The guide provides a detailed breakdown of multiple suicide methods—from hanging and firearms to drowning and pesticide ingestion. It also includes discussion of how to formulate ones “last words,” living wills, and final poems or notes. Throughout, the content emphasizes the finality of suicide, acknowledges its difficulty to complete successfully, and illustrates potential pain or risks of failure. The manual purports to be a resource for those contemplating suicide, structuring each method by steps, warnings, or disclaimers about possible consequences. This is the guide that Cameron Finnigan shared with his victims, when encouraging them to move on from self-harming to killing themselves on "live" (on a livestream).

The guide’s recommended methods begin with a calculated “getting started” phase, instructing readers to pause and examine whether their suicidal ideation stems from fleeting impulse or an entrenched intent. Following this self-assessment, the text advises them to gather what it calls the “tools” essential for the act—such as specific medications, a firearm, or a rope—as though preparing for a practical undertaking. Further, it normalizes a methodical stance on suicide by advocating that individuals write living wills, final notes, or even poems, effectively framing self-harm as a meticulously planned project rather than a purely emotional crisis. Although it provides mild disclaimers about the emotional toll on loved ones, the text’s primary goal remains prescriptive rather than cautionary: readers are prompted to anticipate possible failures, but they are not strongly dissuaded from taking action.

Embedded throughout the guide is an acknowledgment of the psychological factors—fear, impulse, and despair—that often underpin self-harm. While these emotional states are mentioned, they mainly serve as backdrop for the logistical aspects of suicide. By providing direct, granular instructions, the manual appeals most strongly to individuals actively seeking validation or a blueprint for ending their lives. Many of these approaches come with the additional risk of endangering bystanders or emergency personnel. Thus, the text both addresses those intent on self-harm and inadvertently draws more people into harm’s way.

A driving theme is the manual’s emphasis on finality: readers are instructed to plan meticulously, from choosing the most lethal tools to arranging posthumous responsibilities like property distribution and guardianship for children. The few nods to potential pain or regrets, rather than halting attempts, risk serving as refinements for a “successful” outcome—unwittingly encouraging readers to aim for lethal thoroughness instead of seeking help. Overall, the Suicide Manual channels a grim sense of utility, presenting suicide as a logistical project requiring preparation and technique. While it acknowledges the emotional roots of suicidal ideation it ultimately reads like a fatalistic blueprint.

C) Dox Guide

The Dox Guide delves into the mechanics of digital warfare, equipping readers with methods to unearth personal information and exploit it as a weapon for harassment or harm. It merges digital reconnaissance with real-world implications, transforming online anonymity into both a shield for perpetrators and a sword against their targets. The guide exemplifies the calculated deployment of technology to dismantle privacy and amplify fear, presenting doxing as a strategic act of intimidation. In concert with similar materials, it contributes to a broader arsenal of tools designed to blur ethical boundaries, weaponize information, and perpetuate cycles of cruelty and violence.

D) 6996 Bible by Nikita Khvoikin

The 6996 Bible is a multifaceted playbook for malicious online activity, showcasing everything from basic card-skimming tactics to more psychologically oriented maneuvers the author calls "cult formation". While it includes instructions for exploiting technology (e.g., setting up skimmers or grabbing IP addresses), it also delves deeply into manipulative social engineering by outlining how to recruit and control others under the guise of a “group” or “cult.” Peppered throughout are step-by-step directions for doxing, grooming, and extortion—methods that directly target vulnerable individuals. The document frames these illicit actions as deceptively simple, underscoring how anyone with a rudimentary grasp of technology or human nature could implement them. The overall topics covered in this document are:

Credit/Debit/ATM Skimming

  • Hardware/Software
  • Crowd Infiltration
  • Cloning Cards
  • Mobile Tools and NFC-based apps to intercept data.

IP Grabbing

  • Mobile Tools and NFC-based apps to intercept data.
  • Encourages using link-logging services to harvest IPs.
  • Reverse-lookup websites can then roughly identify location by IP.
  • Avoiding IP Exposure

Forming a Cult/Group

  • Suggests an “onion-like” structure, with outer layers appearing benign and hidden inner layers containing the real, possibly violent or malicious, motives.
  • Cult leaders keep real identities hidden, while encouraging members to be active.
  • Deception & secrecy is primordial. Do not share real names, using front-groups, and how to control the flow of information.
  • Encourages doxing or threatening members who show disloyalty.
  • Encourage conflict by pitting members against each other or outsiders, fueling paranoia and reinforcing group bonds.
  • Maintaining activity by using drama, arguments, calls to action (trolling raids, hacks, doxes) so members remain engaged.

Doxing Extortion, and Grooming

  • Find a vulnerable individual on social media, especially those indicating emotional distress or insecurity.
    • minors or lonely/isolated adults on platforms like Discord, Telegram, Instagram.
    • People with significant fear of public embarrassment.
  • Gain their trust by portraying empathy or affection.
  • Recommends searching specialized OSINT sites and directories
  • Alternatively gradually extract personal or explicit content through social engineering
  • Encourages final “dox” packages to be posted on sites like DoxBin, Vilebin, Pastebin, or other public “paste” sites for maximal exposure.

The “6996 Bible” is essentially a mash-up of illicit hacking methods, manipulative social-engineering guides, and psychologically exploitative tactics. Its intended goal is to lower the barrier to entry and relies on publicly available sites, off-the-shelf hardware, or phone apps, underscoring how accessible these malicious techniques are to novices and minors in Com.

E) The Purgatory Manifesto

Cements a starkly ideological agenda, pushing for violent extremism under a National Socialist framework. With calls for secrecy, small “cells,” and unwavering devotion, it strips away any veneer of moderation. Targets include Jewish and other non-white communities, as well as anyone deemed “defective.” This guide positions itself as a radical manifesto, demanding militant, almost cult-like adherence to its core beliefs—above all, the sanctification of white supremacist violence. The document promotes:

  • A hyper-violent, white supremacist call-to-action advocating genocide or eradication of perceived “enemies”—particularly Jews, people of color, and anyone not aligned with National Socialism.
  • Emphasizes the formation of small, loyal “cells” that practice secrecy, share extremist propaganda, and potentially commit violent acts.

The document pushes for small, insular “cells” to prevent infiltration, each acting autonomously and maintaining a strict chain of secrecy. Members are instructed to create and distribute hateful propaganda—like graffiti and posters—aimed at intimidating and demoralizing target communities. Entry into a cell is governed by rigorous trust and vetting standards that require staunch ideological agreement, physical and mental fitness, minimal social media presence, and even a willingness to sacrifice one’s life for the cause. The text also endorses a lone wolf approach for those who cannot form or join a cell, urging them to commit violent acts or spread propaganda individually. Central to all of this is a relentless emphasis on “action,” demanding followers move from online posturing to real-world vandalism or attacks in pursuit of a so-called “Global National Socialist State.” In this drive for militant engagement, the guide targets non-white individuals, Jewish people, LGBTQ+ communities, political opponents, and any perceived adversaries of its National Socialist ideology.

Operational Themes and Strategic Instructions

The Com Network’s guides are pragmatic and dispassionate, reducing violence and manipulation to their most functional elements. They eschew lofty rhetoric in favor of direct, actionable instructions, making them accessible to anyone seeking to disrupt or destroy. These manifestos and guides are rooted in alienation and despair, presenting violence and manipulation as the only logical responses to an uncaring world. Their appeal lies in their brutal pragmatism, which strips away ideological complexities to focus on immediate, tangible outcomes. The emphasis on autonomy and decentralization reflects The Com Network’s understanding of modern violent extremist milieus and the digital habits of youths. By offering modular guides that can be adapted to various contexts, they empower individuals to act independently, reducing the risk of infiltration while ensuring that their influence spreads. This decentralization not only lowers the barrier to entry but also enables a more agile and resilient form of extremism.

The “Sextortion Handbook” exemplifies this ethos, transforming interpersonal relationships into tactical opportunities. It teaches readers to exploit trust, using charm and deception to extract vulnerabilities that can be weaponized. Anonymity is paramount, as the guide provides strategies to erase digital footprints and avoid detection. Each step is calculated, devoid of sentiment, aiming solely at control and coercion. The “Suicide Guide 2.0” represents the network’s darker turn inward, reframing self-destruction as a final act of defiance. It offers methods of harm that are as practical as they are grotesque, emphasizing efficiency and certainty over any moral consideration. The guide’s chilling detachment reflects a worldview where even death becomes a means of expressing nihilistic resistance. What is key to highlight is the role of alienation in the narrative framing. Alienation serves as the foundation for these guides, targeting individuals who feel disconnected from societal norms. By reframing exploitation and self-harm as acts of defiance, they offer a twisted sense of purpose to those who feel powerless. The “Suicide Guide 2.0” exemplifies this, transforming existential despair into a weapon against oneself, while the “Sextortion Handbook” turns that same alienation outward, using it to manipulate and control others.

The “Dox Guide” shifts the focus back outward, equipping readers with the tools to unmask and harass their targets. It outlines techniques for uncovering personal information, crafting threats, and escalating harassment to inflict maximum psychological harm. This guide blurs the line between the digital and physical worlds, demonstrating how online aggression can translate into real-world consequences. The “Dox Guide” teaches readers how to turn personal data into tools of intimidation and harm. This focus on asymmetrical tactics allows even the most isolated individuals to exert disproportionate influence, blending online aggression with real-world impact.

The "6996 Bible" chief operational thrust is twofold: first, the harnessing of easily accessible technology (RFID scanners, phone apps, link-shortening tools) for direct exploits like skimming and IP tracking; second, the weaponization of personal relationships or emotional vulnerabilities via group manipulation, grooming, and extortion. Its strategic instructions emphasize stealth, anonymity, and the quick adaptation of tactics. For instance, the text advises layering secrecy (e.g., using VPNs and false identities) while systematically turning newfound data against unsuspecting victims and their families. The “6996 Bible” also promotes orchestrated harassment campaigns and fosters paranoia within groups to maintain control. Behaviourally, this document weaves together disparate criminal and national security threats into a single tapestry of nihilistic opportunism. The casual instructions on how to exploit people’s weakest moments (for extortion or cult-building) exhibit a mercenary detachment; empathy is replaced by a calculated approach to mental and emotional vulnerability. Equally telling is how it portrays privacy, trust, and safety as mere barriers to be circumvented. This demonstrates a worldview that thrives on chaos, seeking to dominate through cunning rather than any explicit ideological crusade. Members of the Com Network are primed to see themselves as cultivating a sense of purpose through violent confrontation and the demonization of outsiders. By embedding fear, mistrust, and an “us-versus-them” doctrine, the text drives individuals to sacrifice personal autonomy for collective accelerationist goals.

Conclusion

The Com Network’s ideological material is a masterclass in nihilistic pragmatism. By prioritizing utility over ideology, these guides enable acts of violence and manipulation that are as calculated as they are destructive. They turn despair into defiance, alienation into a weapon, and information into ammunition, creating a playbook for dismantling the fragile structures of human connection. These materials demonstrates how the Com network thrives on decentralization and adaptability. They do not seek to inspire allegiance or loyalty; instead, they offer tools for destruction that can be wielded by anyone, anywhere. In the end, the Com Network’s guides are not merely instructional documents—they are scripts for minors seeking to act out violently against themselves or others, shaping their worldview to be one where violence and manipulation are the only constants, and the line between predator and prey blurs into darkness.

You are not alone—help and hope are available. If you feel unsafe, overwhelmed, or in need of support, please reach out to a trusted professional, crisis line, or emergency services in your area.

Canada

  • Crisis Services Canada: Call 1-833-456-4566 or text 45645
  • Kids Help Phone (for youth): Call 1-800-668-6868 or text 686868
  • Canadian Centre for Child Protection Cybertip.ca (report online child exploitation) | 1-800-532-9135 https://www.protectchildren.ca

United States

United Kingdom

Australia

New Zealand