AI-accelerated harm refers to abuse, manipulation, stalking, fraud, or coercive control that uses AI tools to move faster and at greater scale than a human abuser could alone. Deepfakes fabricate evidence. Voice cloning impersonates. Automated messaging floods targets with contact. What makes it different from older abuse isn’t the goal — it’s the speed, volume, and plausible deniability that AI adds to every tactic.
Betrayal trauma is the harm that results when someone you depend on — a partner, employer, family member, or institution — violates the trust that dependency requires. Psychologist Jennifer Freyd developed the framework. Survivors often can’t name it while it’s happening because recognizing the betrayal would require acknowledging danger from the person or system they need to survive.
Cluster B personality disorders is a DSM diagnostic category that includes Antisocial, Borderline, Histrionic, and Narcissistic Personality Disorder. In a workplace or intimate relationship, patterns associated with these disorders can look like chronic dishonesty, explosive reactions to perceived criticism, dramatic mood swings used to control others, or a consistent lack of empathy that only becomes visible over time. Survivors often encounter disbelief because these patterns can be invisible to outsiders. This label is also routinely applied to the people reporting abuse rather than those perpetrating it, so receiving this diagnosis in the context of a dispute is worth examining carefully.
Coercive control is a pattern of behavior — not necessarily physical violence — designed to strip another person of their autonomy, freedom, and sense of reality. It includes isolation, financial control, surveillance, threats, and degradation. Legal systems frequently miss it because no single incident rises to a criminal threshold, even when the cumulative pattern is severe.
DARVO stands for Deny, Attack, Reverse Victim and Offender. Coined by Jennifer Freyd, it describes a response pattern in which an abuser or institution, when confronted with harm they caused, denies it happened, attacks the person who raised it, and reframes themselves as the real victim. It appears in intimate partner abuse, workplace retaliation, and institutional misconduct with striking consistency.
Documentation chain is a time-stamped, organized record of evidence — messages, emails, incidents, witnesses, financial records — that establishes a pattern of behavior. It matters because memories fade, systems get wiped, and abusers often control access to evidence. Start capturing it before you think you need it, store copies somewhere the other party cannot reach, and note dates, times, and direct quotes rather than summaries.
FedRAMP stands for Federal Risk and Authorization Management Program. It is the federal government’s process for authorizing cloud services before agencies use them — essentially a security certification that a cloud product has been reviewed and approved for government data. If you are dealing with a federal workplace dispute or government system, FedRAMP matters because it governs which tools agencies are permitted to use and what data handling requirements apply.
Gaslighting is a form of psychological manipulation in which someone causes you to doubt your own memory, perception, or sanity. It works through consistent denial of events, reframing what you experienced, and enlisting others to validate the false account. The difference between gaslighting and honest disagreement is pattern and intent: honest disagreement doesn’t require you to stop trusting yourself.
Institutional betrayal occurs when an institution causes harm directly or fails to prevent harm it had the power to stop — and does nothing meaningful about it. Jennifer Freyd named and researched this phenomenon. Examples include universities that protect faculty accused of misconduct, federal agencies that retaliate against whistleblowers, churches that relocate abusive clergy, and hospitals that dismiss patient complaints.
Institutional courage is what ethical institutions do instead of institutional betrayal. Jennifer Freyd developed both concepts together. It means acknowledging harm, supporting those who report it, holding perpetrators accountable, and changing the conditions that allowed the harm to happen — even when doing so is costly to the institution’s reputation or leadership.
JADE stands for Justify, Argue, Defend, Explain. It originated in support communities for people dealing with manipulative or personality-disordered individuals. When you JADE with someone who has no interest in your reasoning — only in controlling the outcome — you provide material for further attacks and signal that more pressure will produce more response. You do not owe an explanation to someone using your words as weapons.
Social engineering is the practice of manipulating people, rather than hacking systems, to gain access to information, accounts, or physical spaces. In domestic abuse, it looks like a partner impersonating the target to cancel services, contact employers, or access financial accounts. In workplace retaliation, it can look like a manager building a false narrative with HR before a target has any chance to respond. The attack vector is trust, not technology.
Whistleblower retaliation is adverse action taken against an employee because they reported illegal activity, fraud, safety violations, or misconduct — internally or to a government agency. Federal protections exist under statutes including the Whistleblower Protection Act, Dodd-Frank, and others depending on the sector. Common retaliation forms include termination, demotion, reassignment, and harassment. Most whistleblowers do not know they are legally protected at the time retaliation begins.