Video above: Torture Therapy - giving survivors their lives back.
Catch The Feed 8:30pm Thursdays and 5pm Sundays on SBS VICELAND. Connect with us on Facebook, Twitter and Instagram.
Australia's notoriously secretive cyber security agency has revealed how one of its science grads from the suburbs convinced a radicalised man to abandon his violent mission.
The young woman - a key operative at the Australian Signals Directorate - assumed the identity of a terrorist commander to convince the man not to join an overseas terrorist group.
The head of the agency, Mike Burgess, says it was a high-stakes operation.
One word or reference out of place and the whole thing could have fallen apart, potentially with grave consequences.
The woman used broken English and other techniques to convince the would-be extremist that she was a fellow terrorist.
"In this case, a young operative sitting at a computer in Canberra successfully pretended to be a senior terrorist fighting in a faraway war zone," Mr Burgess said.
The woman isn't an IT or cyber hacking expert - she's a science graduate from the suburbs, enjoys yoga, hiking and touch football.
"When she was studying science at university, she would never have dreamed that one day she would be posing online as a terrorist, and helping to defend Australia from global threats," Mr Burgess said.
They're targeting women and trying to shake up the perception the job is only for male computer geeks, tapping away on their keyboards in a darkened room.
The agency doesn't just catfish terrorists - Mr Burgess revealed that his officers helped shape a crucial battle at the height of the fight against the so-called Islamic State.
Just as coalition forces were preparing to attack the militants, his team were at their keyboards in Australia.
Terrorist commanders couldn't connect to the internet and were unable to communicate with each other.
"The terrorists were in disarray and driven from their position - in part because of the young men and women at their keyboards some 11,000 kilometres away."
It was the first time an offensive cyber operation had been conducted so closely alongside military officers in the field.