The Six PUSHED Tactics
The Six Tactics in Detail
Now let’s break down each PUSHED tactic. For each one, you’ll learn:
- What it is
- What it sounds like (example phrases)
- Why it works psychologically
- How to recognize it
P — Pressure / Polite Predation
What it is: Using authority OR excessive politeness to make you comply without questioning.
This comes in two flavors:
Direct Pressure (Authority)
Invoking power or position to demand compliance:
- “As your supervisor, I need this done now”
- “This is from the CEO’s office”
- “You must respond immediately”
- “Failure to comply will result in account termination”
- “I’m calling from the fraud department”
Why it works: We’re trained from childhood to respect authority. Questioning someone who claims to be in charge feels uncomfortable, even risky.
Polite Predation (Subtle)
Using excessive politeness to disarm you:
- “I’m so sorry to bother you, but…”
- “I know you’re busy, I just really need this one favor…”
- “I wouldn’t ask if it wasn’t absolutely necessary…”
- “I hate to put this on you, but you’re the only one who can help”
Why it works: It’s hard to say no to someone being extremely polite. The excessive niceness creates social pressure to reciprocate by helping.
U — Urgency
What it is: Creating artificial time pressure to prevent careful thinking.
- “Act within 24 hours”
- “Limited time offer — expires today!”
- “Your account will be suspended immediately”
- “Respond before end of business”
- “This link expires in 30 minutes”
- “URGENT” or “TIME SENSITIVE” in subject lines
Why it works: Time pressure triggers our fight-or-flight response. When we feel rushed, we skip our normal verification steps and act on instinct.
Reality check: Legitimate organizations rarely operate on compressed timelines for individual requests. Banks don't give you 30 minutes to fix an account issue. The IRS doesn't call demanding immediate payment.
S — Surprise
What it is: Unexpected communications that destabilize your normal pattern recognition.
- An unexpected request from upper management
- A package delivery notification you weren’t expecting
- “We noticed unusual activity on your account”
- A prize notification for a contest you didn’t enter
- An invoice for something you didn’t buy
- A job offer from a company you didn’t apply to
Why it works: When something is unexpected, you don’t have context to evaluate it. Your normal “this doesn’t fit the pattern” alarm doesn’t trigger because there’s no established pattern.
Key question to ask: “Was I expecting this?” If no, verify before acting.
H — High-Stakes
What it is: Threatening serious consequences to create fear-driven action.
- “Your account will be permanently closed”
- “Legal action will be taken”
- “You will lose access to your funds”
- “We have compromising information about you”
- “Your data has been breached”
- “Failure to pay will result in arrest”
Why it works: Even if the probability seems low, the severity of the threat makes it feel too risky to ignore. Fear of catastrophic outcomes overrides logical assessment.
Remember: Real organizations with real concerns give you reasonable time and multiple ways to resolve issues. Threats of immediate catastrophe are almost always scams.
E — Excitement
What it is: Using positive emotions to bypass your skepticism.
- Job offers (especially “perfect” ones)
- Prize winnings and lottery notifications
- Exclusive investment opportunities
- Unexpected tax refunds
- Romantic interest from attractive strangers
- Deals that seem too good to be true
Why it works: We WANT good things to be true. When we’re excited about a potential opportunity, we lower our guard. Positive emotions are just as blinding as negative ones.
If it seems too good to be true, it probably is. Legitimate opportunities don't require you to act immediately or share sensitive information upfront.
D — Desperation
What it is: Emergency situations and pleas for help that exploit your empathy.
- “I’m stranded and need money for a flight”
- “This is my only chance to save my job”
- “My wallet was stolen, please wire me money”
- “You’re the only one who can help me”
- “Grandma/Grandpa, I’m in trouble and need help”
- “I’m in the hospital and need gift cards for medicine”
Why it works: Empathy is one of our best qualities — and attackers exploit it. When someone we care about (or think we care about) is in trouble, our natural response is to help immediately.
The “Hi Mom” scam: Attackers send texts like “Hi Mom, I lost my phone, this is my new number. Can you send me money for X emergency?” They’re betting you won’t verify because you want to help your “child.”
Multiple Tactics Stack
Real attacks usually combine multiple PUSHED tactics:
Hey,
I'm in a meeting and can't talk. Need you to purchase 5x $200 Amazon gift cards for a client appreciation event ASAP.
Send me the codes when you have them. Will reimburse you today.
Don't mention this to anyone yet — it's a surprise.
Thanks,
Michael
PUSHED analysis:
- P Pressure: From CEO (authority)
- U Urgency: “ASAP”
- S Surprise: Unexpected request
- D Desperation: “In a meeting, can’t talk”
Red flag: “Don’t mention this to anyone” — isolation is a classic scam tactic.
Quick Reference
| Tactic | Key Words | Why It Works |
|---|---|---|
| Pressure | Authority claims, excessive politeness | Hard to question power or refuse niceness |
| Urgency | Deadlines, “immediately,” “expires” | Rushed = skip verification |
| Surprise | Unexpected messages, unfamiliar situations | No pattern to recognize |
| High-stakes | Threats, consequences, legal action | Fear overrides logic |
| Excitement | Prizes, opportunities, too-good-to-be-true | We want good things to be real |
| Desperation | Emergencies, stranded, “only you can help” | Empathy bypasses caution |
Key Takeaways
- Pressure and Polite Predation exploit social dynamics
- Urgency prevents careful thinking by creating time pressure
- Surprise catches you without context to evaluate
- High-stakes uses fear of consequences
- Excitement uses positive emotions to lower your guard
- Desperation exploits your natural empathy
- Real attacks usually combine multiple tactics