A First-Person Observational Analysis Through the Lens of the Dark Tetrad and Behavioral Script Theory
Locke Kosnoff Dauch
Sovereign Integrity Institute (SII)
Date: April 2026
Abstract
This paper presents a structured first-person observational analysis of recurrent exploitative behavioral patterns encountered within a high-risk, low-governance environment in Southeast Asia. Drawing on multi-year lived experience, the author documents repeated interactions with individuals engaged in financial, relational, and institutional extraction.
These observations are interpreted through established frameworks, including:
- the Dark Tetrad of personality [1,2]
- mimicry-deception theory (MDT) [3,4]
- the social predator hypothesis [5,6]
- behavioral script theory [8,9]
Across multiple independent actors, a highly convergent behavioral sequence was observed, characterized by: target selection → trust acquisition → incremental extraction → resistance testing → reality distortion → reputational inversion → disengagement.
The paper advances the hypothesis that such behaviors are not purely idiosyncratic, but instead reflect shared, learnable behavioral scripts operating under conditions of weak enforcement and asymmetric vulnerability.
Finally, the paper proposes a counter-framework—sovereign agency—defined operationally as a combination of boundary integrity, interoceptive awareness, and non-coercive relational orientation, which appears to reduce susceptibility to repeated exploitation.
Keywords: Dark Tetrad, mimicry-deception, social predator hypothesis, script theory, extraction, sovereignty, pattern recognition
1. Introduction
In environments characterized by:
- weak institutional enforcement
- informal power structures
- high information asymmetry
exploitative interpersonal strategies often emerge as adaptive behaviors [5,7].
During an extended period operating in such an environment, the author encountered multiple independent actors—including legal, commercial, and social counterparts—whose behaviors, while superficially distinct, exhibited striking structural similarity over time.
Initially interpreted as coordinated activity, these interactions more closely aligned, upon repeated exposure, with the execution of shared behavioral patterns.
This paper investigates the possibility that:
Exploitative behavior in such environments is structured, repeatable, and partially predictable when analyzed through established psychological and criminological frameworks.
2. Theoretical Framework
2.1 The Dark Tetrad and Exploitative Orientation
The Dark Tetrad—narcissism, Machiavellianism, psychopathy, and sadism—captures a cluster of traits associated with instrumental social behavior and reduced concern for others [2].
Empirical findings indicate:
- Negative correlation with affective empathy
- Retention (or enhancement) of cognitive empathy, enabling strategic social navigation [1]
This combination allows individuals to:
- Accurately model others’ emotional states
- Utilize that information without corresponding emotional inhibition
2.2 Mimicry-Deception Theory (MDT)
MDT distinguishes between short-term opportunistic deception and long-term embedded deception [3,4].
Of particular relevance is the latter, which involves:
- Gradual integration into a target’s social or professional environment
- Behavioral mirroring to establish trust
- Delayed extraction to minimize detection
This aligns with patterns observed in extended relational and financial exploitation contexts.
2.3 Social Predator Hypothesis
The social predator hypothesis proposes that individuals with elevated psychopathic traits demonstrate:
- Enhanced sensitivity to behavioral vulnerability cues
- Greater likelihood of selecting targets based on perceived exploitability [5,6]
Importantly, target selection appears to prioritize:
- interpersonal openness
- cooperative orientation
- low defensive signaling
2.4 Script Theory
Script theory conceptualizes behavior as structured sequences of actions activated in specific contexts [8,9].
Criminological applications demonstrate that:
- Offenders frequently rely on standardized procedural scripts
- These scripts are learned, shared, and repeatable [10]
This framework provides a basis for interpreting exploitative interactions as patterned rather than purely improvisational.
3. Observational Findings
3.1 Convergent Behavioral Sequencing
Across multiple independent interactions, a recurring sequence was observed:
| Phase | Behavioral Pattern | Theoretical Alignment |
|---|---|---|
| 1. Target Identification | Selection based on openness/trust | Social predator hypothesis [5,6] |
| 2. Trust Acquisition | Mirroring values, offering assistance | MDT (behavioral mimicry) [3,4] |
| 3. Incremental Extraction | Gradual financial/relational gain | Long-term deception [3] |
| 4. Boundary Testing | Probing resistance thresholds | Machiavellian calibration [2] |
| 5. Reality Distortion | Denial, contradiction, reframing | Empathy asymmetry [1] |
| 6. Reputational Inversion | Blame shifting, narrative control | Narcissistic defense [2] |
| 7. Disengagement | Abrupt withdrawal post-utility | Psychopathic traits [1,2] |
While individual expressions varied, the sequence itself remained highly stable.
3.2 Behavioral Consistency Across Roles
Notably, this pattern appeared across:
- professional roles (e.g., legal, commercial)
- informal relationships
- varying socioeconomic strata
This suggests the presence of:
shared behavioral templates rather than isolated individual strategies
3.3 Perceived Loss of Behavioral Variability
With repeated exposure, interactions became increasingly predictable. Anticipation of:
- denial patterns
- escalation responses
- disengagement timing
was possible prior to their occurrence.
This perceived predictability aligns with:
- script theory [8,9]
- recidivism patterns associated with psychopathy [11]
4. Interpretation: Scripts vs. Intentional Coordination
A key analytical distinction is between:
- Coordinated conspiracy
- Convergent behavior arising from shared scripts
The observed evidence more strongly supports the latter.
Rather than requiring centralized coordination, these behaviors may emerge from:
- shared incentive structures
- learned exploitative strategies
- similar personality architectures
5. Defensive Adaptation: Toward an Operational Model of Sovereign Agency
5.1 Definition (Operationalized)
In this context, sovereign agency is defined as:
A stable behavioral configuration characterized by boundary clarity, reduced exploitability signals, and non-reactive decision-making under social pressure.
In essence: the predator’s script finds nothing to grab onto.
5.2 Observed Protective Factors
The following factors appeared to reduce susceptibility:
| Factor | Description |
|---|---|
| Interoceptive awareness | Ability to detect internal stress signals during misaligned interactions |
| Boundary enforcement | Consistent refusal of asymmetrical or unclear agreements |
| Non-transactional relational orientation | Reduced dependence on validation, status, or external approval |
| Emotional regulation stability | Lower reactivity to manipulation attempts |
5.3 Mechanism of Reduced Targeting
From a theoretical standpoint, these traits may:
- Decrease detectable vulnerability cues
- Increase cost of exploitation
- Disrupt expected script progression
In effect, the interaction fails to advance beyond early-stage phases.
6. Discussion
This analysis suggests that exploitative behavior in low-governance environments may be:
- Structured rather than random
- Learned rather than purely dispositional
- Predictable under repeated observation
The implication is not that all actors conform to such scripts, but that:
When such scripts are present, they significantly constrain behavioral variability.
The concept of sovereign agency, reframed in operational terms, provides a potential pathway for systematically reducing exploitability without requiring direct confrontation.
7. Limitations
- Single-observer dataset (narrative-based)
- Lack of controlled experimental validation
- Potential recall and interpretation bias
- Context-specific (geopolitical and cultural factors)
- Findings may not generalize to other cultural or institutional contexts without further validation
Future work should incorporate:
- multi-subject validation
- forensic case comparison
- behavioral coding methodologies
8. Conclusion
This paper documents a highly consistent pattern of exploitative behavior observed across multiple actors within a high-risk environment.
When interpreted through established frameworks, these patterns align with:
- Dark Tetrad traits [1,2]
- mimicry-based deception strategies [3,4]
- vulnerability-targeting mechanisms [5,6]
- script-based behavioral execution [8,9,10]
Recognition of these patterns enables:
- improved anticipatory awareness
- earlier boundary enforcement
- reduced exposure to repeated exploitation
The concept of sovereign agency, reframed in operational terms, provides a potential pathway for systematically reducing exploitability without requiring direct confrontation.
The script runs on its hosts, but it does not have to run on you.
References
[1] Dow, G. T., & Crawley, H. (2023). Dark Tetrad and Empathy: The Interrelationship of Narcissism, Psychopathy, Machiavellianism, and Sadism With Affective and Cognitive Empathy. Psi Chi Journal of Psychological Research, 28(3), 229–236.
[2] Paulhus, D. L., & Williams, K. M. (2002). The Dark Triad of personality: Narcissism, Machiavellianism, and psychopathy. Journal of Research in Personality, 36(6), 556–563.
[3] de Roos, M. S., & Jones, D. N. (2022). Assessing Deception Differences with Mimicry Deception Theory. Journal of Personality Assessment, 104(1), 44–56.
[4] Jones, D. N. (2021). Predatory Personalities as Behavioral Mimics and Parasites: Mimicry‑Deception Theory. Journal of Personality Assessment.
[5] Hicks, H. (2025). The Weak Spot: Psychopathic Traits and Environmental Cues for Exploitation (Master’s thesis). Brock University.
[6] Book, A., et al. (2013). Psychopathic Traits and the Assessment of Victim Vulnerability Using Gait. Journal of Interpersonal Violence.
[7] Rico‑Bordera, P., et al. (2025). Towards the Non‑Self‑Reported Assessment of the Dark Traits 20 Years Later: A Systematic Review. Psychological Reports.
[8] Tomkins, S. S. (1979). Script theory: Differential magnification of affects. In H. E. Howe, Jr. & R. A. Dienstbier (Eds.), Nebraska Symposium on Motivation (Vol. 26, pp. 201–236). University of Nebraska Press.
[9] Schank, R. C., & Abelson, R. P. (1977). Scripts, Plans, Goals, and Understanding: An Inquiry into Human Knowledge Structures. Lawrence Erlbaum Associates.
[10] Hockey, D., & Honey, R. C. (2013). Evaluating script‑like knowledge in offenders and a small group of non‑apprehended offenders. Psychology, Crime & Law, 19(2), 161–178.
[11] Seto, M. C., & Barbaree, H. E. (1999). Psychopathy, treatment behavior, and recidivism: An extended follow‑up. Journal of Interpersonal Violence.
This paper is published by the Sovereign Integrity Institute (SII) as part of its ongoing research into extraction dynamics, pattern recognition, and the restoration of sovereign agency.

Leave a Reply