Back

Intellectual Framework

Seven commitments — theoretical and operational in equal measure — that define how this firm names harm, gathers evidence, and chooses its tools.

This firm operates from a set of explicit intellectual commitments — theoretical and operational in equal measure. The frameworks below are not decorative. They define how harm is named, how evidence is gathered, how tools are chosen, and what accountability actually looks like. Each one earns its place by doing real work in practice.

The technology choices here are held to the same standard as the theoretical ones. Principled tool selection — based on privacy architecture, transparency, and values alignment — is itself an intellectual commitment. These are not defaults.

Theory i

Betrayal Trauma Theory


Jennifer Freyd's framework identifies a specific category of harm: trauma inflicted by institutions or individuals on whom the victim depends. Dependency suppresses detection and disclosure — a survival mechanism that institutions routinely exploit. The affirmative counterpart, institutional courage, defines the standard this firm holds organizations to: prioritizing accountability over self-protection. This is the load-bearing theory behind every institutional accountability engagement.

Taxonomy ii

HiTOP


The Hierarchical Taxonomy of Psychopathology replaces DSM categorical diagnoses with empirically derived spectra. Personality pathology, internalizing disorders, and externalizing behavior exist on dimensions — not in discrete boxes. This matters operationally: coercive control perpetrators rarely fit clean diagnostic profiles, and survivors rarely present with single-disorder pictures. HiTOP gives the firm a more accurate map of the psychological terrain it works in.

Framework iii

Coercive Control


Evan Stark's framework reframes intimate partner abuse as a liberty crime rather than an injury crime. Physical violence is one tactic within a larger pattern of isolation, surveillance, degradation, and microregulation of daily life. Measuring abuse by incident count systematically undercounts harm. This firm uses the coercive control framework in all survivor-facing work, in institutional accountability assessments, and in public education that addresses how harm actually operates.

Practice iv

Trauma-Informed


Trauma-informed practice — grounded in SAMHSA's six principles — shapes both how services are delivered and how research is conducted. Safety, trustworthiness, peer support, collaboration, empowerment, and attention to cultural context are not aspirational values; they are design constraints. Work that ignores trauma history in its process will replicate harm regardless of its stated intent. Every client engagement and public resource is built against this standard.

AI v

Claude


Anthropic's Claude is the AI system this firm uses for analysis, structured drafting, research synthesis, and reasoning under complexity. The choice is principled: Anthropic's Constitutional AI approach prioritizes safety and interpretability over capability at any cost. Claude was a collaborator in building this site and is used daily as a thinking partner in engagements where speed and rigor both matter. AI literacy is not optional in this work — it is part of the threat model.

Infrastructure vi

GitHub


All public work produced by this firm is version-controlled and auditable on GitHub. The same principle that demands institutional transparency in accountability work applies here: the record should be legible, persistent, and independently verifiable. The site itself is hosted via GitHub Pages. Open-source tooling wherever possible is not sentiment — it is how you avoid depending on systems that can be quietly altered.

Hardware vii

Apple


The firm's hardware and software stack is built on Apple's privacy-first architecture — on-device processing, end-to-end encrypted storage, and a platform where privacy is a design constraint rather than a compliance checkbox. For survivor advocacy work, operational security is not optional. The choice of Apple hardware is a direct consequence of the threat model: adversaries with resources, AI-accelerated tactics, and institutional cover require a baseline that treats privacy as default.

Methodology viii

Human-Centered Design


Emmanuel Tsekleves's work — and the participatory design tradition more broadly — establishes one standard: solutions that affect people should be built with them, not for them. Co-design is not a method for softening deliverables; it is how you avoid replicating the power structures an intervention claims to disrupt. In survivor advocacy and public health work, lived experience is not a qualitative supplement to quantitative data — it is authoritative. Every platform, resource, and engagement this firm produces is evaluated against a single question: does it center the person it claims to serve? This is a design constraint, not aspiration.

Reach out and we can find a time to talk through what you need.

Get in Touch