Executive Summary
The Core Claim
A single pattern of extraction—draining life energy, will, and creative capacity from generative sources—operates with recognizable similarity at every scale: individual abuse, toxic groups, captured institutions, authoritarian states, and imperial geopolitics. Understanding it at one level gives leverage on all the others.
Key Concepts
| Term | Definition |
|---|---|
| Conscious Field | The shared atmosphere of meanings and tendencies that arises between beings and shapes what feels normal, possible, and real. |
| Generative Orientation | The native state of conscious beings—the orientation toward creating new value, meaning, and capacity. What consciousness does when functioning properly. Expands the field. |
| Extractive Regression | A malfunction, not an alternative mode. Animalistic taking patterns smuggled into the conscious field—beings that lack true connection, with tendency to grow by taking from connected ones. Contracts the field. |
| Parasitic Web | Packs of beings stuck in extractive regression, cooperating and competing to steal will and agency from those who remain generative. |
| Latch | The installed pattern that makes a person's own dignity feel like a problem. |
| Extraction Ratio | A heuristic for relational balance: ΔCapacityA vs ΔCapacityB. Measured per relationship over time, not per node—aggregate contribution elsewhere does not excuse extraction in any given relationship. |
| Field Density | Enough generative beings in contact that a local field forms with its own gravity. |
The Extraction Pipeline
The Patch
Individual
Witness practice, interrupting extraction loops, reconnecting to generative sources.
Collective
Field density—authentic community with enough gravity to resist the web's pull.
Structural
Manipulation literacy, bounded accumulation, contribution transparency.
The Instability Claim
Extraction runs against the grain of conscious function—scarcity-driven taking where fullness-driven creating should be. This explains its inherent instability: extractive systems tend to degrade the systems they depend on. They are structurally fragile because they are a malfunction, not a legitimate alternative. The more they extract, the less remains to extract. The fragility compounds.
Preface: What This Is and How to Use It
This document proposes a working framework for naming a single recurring pattern: the systematic extraction of life energy, sovereign will, and generative capacity from living systems by entities and structures that no longer generate enough value on their own.
The core claim is not that this is a new branch of physics or a new religion. It is that the same mechanism of extraction appears again and again at multiple scales:
- In individual relationships (abuse, grooming, humiliation)
- In small groups and institutions (toxic workplaces, cult dynamics)
- In national politics (strongman systems, captured democracies)
- In geopolitics (imperial webs, managed dependency)
- In economic structures (financial extraction from productive activity)
Rather than treating these as separate problems, the framework treats them as variants of one pattern, expressed at different scales. The value of the framework is practical: if the pattern is recognizably similar, then seeing it clearly at one level can give leverage on the others.
This text is intended as a base perspective—a starting point for rigorous investigation, further writing, and concrete design. It connects and names dynamics that many survivors, organizers, and practitioners already recognize, and introduces new terminology where existing language is fragmented or misleading:
Conscious field
A way of talking about how minds and systems influence each other non-locally.
Generative orientation
The native state of conscious beings—what consciousness does when functioning properly. Creating rather than extracting.
Generative community
The field configuration where authentic beings amplify each other's capacity through mutual recognition, dignity, and agenda-free contact.
Extractive regression
A malfunction, not an alternative mode. Consciousness contracted away from source, falling into scarcity-driven taking—animalistic behavior in beings capable of fullness.
Parasitic web
Not a "lower bound" of the field but a parasite on it—a malfunction where extraction logic feeds on what authentic consciousness produces.
Latch
The installed pattern that convinces a being their own dignity and will are problems to be solved, not assets to be protected.
Everything that follows should be read as a model: a lens that is useful to the extent that it makes real dynamics more legible, explainable, and interruptible.
How to Use This Framework
This is a lens, not a license. CFF is designed to help you see more clearly—not to provide ammunition for accusations or a vocabulary for labeling people.
You do not need to cite it. If something is extraction, you can see it directly. You don't need to say "according to CFF, this is wrong." The framework sharpens your perception; it doesn't replace it. If you see humiliation, you see humiliation. If you feel your will being worn down, you feel it. The language here is scaffolding—once you see the pattern, you can describe it in your own words.
Judge acts, not people. The framework does not say "that person is extractive." It says: this act, in this moment, moved toward extraction. People are complex. The same person can be generative in one relationship and extractive in another. What matters is whether you can see what's happening in front of you—and whether you can protect yourself and others from harm.
Beware the most dangerous form. The most harmful extraction often comes wrapped in genuine help. A mentor who opens doors and occasionally humiliates. A partner who loves you and erodes your confidence. A system that provides real value and drains your will. The "and" is the trap. Contribution does not buy the right to extract. This framework exists precisely to make that visible.
It can be weaponized—including against you. Any framework that names harm can be hijacked to perform harm. Someone can accuse you of being "extractive" to silence you. They can claim you installed a "latch" to deflect accountability. If the framework is being used to dominate, humiliate, or shut down legitimate response, then it is being used against its purpose—regardless of the vocabulary.
The test is always the same: Does using this lens increase clarity, protect dignity, and make genuine repair possible? Or does it confuse, shame, and foreclose response? If the latter, step back. The goal is to see clearly—not to win arguments or collect labels.
On validation
This is not a theorem you have to prove to skeptics. Its validity will be tested the slow way—by whether, in the hands of many people, it consistently increases clarity, protects dignity, and reduces extraction. History, not a single argument, is the judge.
Section I: Conscious Fields — A Working Hypothesis
1.1 What We Mean by "Conscious Field"
In physics, a field is a region of space in which every point has a measurable value (gravitational, electromagnetic, quantum). Fields are the medium through which forces propagate and matter organizes itself. Objects do not need to touch to influence each other; the field carries the influence.
This framework borrows that word and proposes a hypothesis:
Conscious Field (working definition)
The shared, structured "atmosphere" of meanings, expectations, and tendencies that arises wherever conscious beings interact, and that influences how they feel, think, and act—even when no one is explicitly telling them what to do.
This is not a claim that consciousness is literally an electromagnetic field. It is a functional model for a set of observations that are hard to explain with individual psychology alone:
- People who spend extended time near genuinely creative, generous individuals often report increased generative capacity, clearer thinking, and more courage.
- People who spend extended time near humiliating, extractive individuals often report decreased capacity, heightened self-doubt, and progressive internalization of the extractor's worldview.
- Groups develop "atmospheres" that make some behaviors feel obvious and others feel unthinkable—often without explicit rules.
We can describe these patterns with many languages: culture, climate, morale, spirit. The conscious field model gathers them into one concept with three key properties:
Shared
It emerges between beings, not only within them.
Transmissible
Prolonged exposure tends to shift perception and behavior.
Directional
It tends toward native conscious function or contracts into scarcity-driven predatory patterns.
1.2 The Spectrum: Native Function and Regression
Within this model, conscious beings exist somewhere on a spectrum between their native generative capacity and various degrees of contraction into scarcity-driven, predatory patterns. This is not a balance between two equally valid "poles"—it is the difference between health and malfunction:
The generative orientation is what consciousness is for. It is the native state—consciousness connected to source, creating from fullness rather than taking from scarcity. The extractive regression represents consciousness contracted away from that source, falling into animalistic patterns of hunt, capture, and dominate—needing to take energy because it no longer generates enough on its own. It is a contraction error—scarcity logic running in beings designed for abundance.
This matters for how the framework is used: we do not easily label people or organizations as "generative" or "extractive." Instead, we judge each act independently and track history.
The Generative Orientation (Native State)
What consciousness is—its native mode of being. Connected to source, creating from fullness rather than taking from scarcity. Not one option among many, but the natural state. Time spent in generative fields tends to:
- • Increase a person's sense of possibility
- • Strengthen their dignity and self-respect
- • Expand their ability to care, create, and contribute
Attributes of healthy conscious function:
- • Truth under cost — speaking what is true even when it carries personal risk
- • Non-manipulation — engaging without hidden agendas or covert influence
- • Presence — full attention without strategic calculation
- • Transparency — openness about motives, methods, and mistakes
- • Mutual uplift — genuine investment in others' growth and capacity
- • Accountability — willingness to face consequences of one's actions
The Extractive Regression (Malfunction)
Not the "other pole" of consciousness, but a failure mode—consciousness contracted away from source, falling into scarcity-driven patterns of hunt, capture, and dominate. Where generative consciousness creates from fullness, contracted consciousness must take from others because it no longer generates enough on its own. Regression toward extraction indicates that scarcity logic is overriding native generative capacity. Time spent in extractive fields tends to:
- • Erode a person's sense of worth
- • Narrow their sense of the possible
- • Reinterpret their own generativity as arrogance, naivety, or threat
Signs of regressive malfunction:
- • Deception and cheating — misrepresenting reality to gain advantage
- • Mimicry — performing generative qualities without genuine substance
- • Hidden agendas — acting with concealed strategic intent
- • Abuse of trust — exploiting vulnerability once access is gained
- • Manipulation — engineering outcomes through covert influence
- • Predatory targeting — identifying and pursuing those with extractable value
The Mimicry Imperative
Extractive dynamics exhibit an extreme tendency to mimic generative features in order to reach their targets. Because generative beings naturally trust and open to other generative beings, the extractive pattern must wear generative masks—performing authenticity, faking presence, simulating care. This mimicry is not incidental but structurally necessary: extraction cannot succeed without first gaining access, and access requires appearing safe. The more sophisticated the extraction, the more convincing the performance of generativity.
Most real fields are mixed. Almost no being or institution is purely generative or purely extractive. But the direction of pull is usually detectable: over time, are we moving toward native conscious function or regressing toward predatory drives?
- Do people leave interactions more resourced or more depleted?
- Does the system produce new value, or mainly redirect existing value to itself?
- Does dignity increase or decay over time?
1.2.1 Measurement: Per Relationship, Not Per Node
A critical clarification: extraction is measured at the level of individual relationships, not aggregated across an entity's total activity. In network terms: nodes are actors; edges are relationships. The edge dynamics determine system health.
The Extraction Ratio (heuristic)
Within any specific relationship, the balance can be thought of as:
Relational Balance = ΔCapacityA vs ΔCapacityB
Where capacity includes: autonomy, resources, dignity, creative ability, and agency.
Extractive dynamics occur when, over time, a pattern reliably takes more capacity than it gives—when one party's capacity persistently declines while the other's increases. This holds regardless of how the asymmetry is framed, advertised, or justified.
Note on temporary asymmetry: Many healthy relationships involve intentional asymmetry—parent and child, teacher and student, mentor and mentee. The diagnostic is not a single snapshot but a pattern over time: Does the asymmetry serve the development of the weaker party's capacity? Or does it persistently drain them while strengthening the other?
This per-relationship measurement matters because:
Aggregate contribution does not cover specific extraction
A scientist who advances human knowledge while abusing their spouse is not "net generative"—they are generative in one relationship and extractive in another. The contribution to humanity does not offset the extraction from their partner.
Surplus creation can mask extraction
A country can produce tremendous value while systematically extracting from other countries, using the surplus to fund further creation. The creation does not legitimize the extraction—it is often funded by it.
A common justification mechanism
Extractive systems routinely protect harmful actors by pointing to their "contributions elsewhere." This is a recurring pattern: "great men" excusing personal abuse, companies excusing exploitation through philanthropy, nations excusing domination through "development." Allowing aggregate contribution to excuse specific extraction is itself a justification mechanism within extractive systems.
Edge Direction Classification
Relationships can be classified by their capacity dynamics:
| Pattern | Meaning |
|---|---|
| ++ | Mutual generativity — both parties gain capacity |
| +- | Extraction — one gains capacity by draining the other |
| -- | Mutual destruction — both parties lose capacity |
Therefore, if persistent extraction is present in any relationship—regardless of framing, regardless of value created in other relationships—we flag extractive tendency. Aggregate contribution cannot be used to excuse harm in specific relationships.
Note: Full node-level evaluation (aggregating across all relationships) remains useful for some purposes, but it cannot be used to excuse extraction in specific relationships.
1.3 Field Gravity: Attraction, Resonance, and Contamination
Conscious fields exhibit several consistent dynamics:
Resonance attraction
Beings and institutions with similar field orientation tend to cluster. Generative types find and amplify each other. Extractive types recognize and reinforce each other's tactics and narratives, even across domains.
Cognitive reference shaping
The field you are most continuously embedded in gradually sets your cognitive reference point: what feels normal, safe, realistic, and possible.
Downward pull on high-generativity beings
Because extraction-based systems cannot generate enough on their own, they are structurally drawn to generative "sparks" as fuel—through flattery, humiliation, gatekeeping, or manufactured dependence.
Field contamination
Extended exposure to the parasitic web can partially install its operating logic inside a generative being. The person's explicit values may remain intact, but their felt sense of reality shifts.
1.4 The Latch and the Cognitive Reference Point
The cognitive reference point is the "this is just how it is" position each person occupies without question. It is rarely chosen consciously. It is formed through long-term immersion in particular fields.
The latch is a pattern installed at that level. Its function is simple:
To convince a person that their own sovereign will, dignity, and generative spark are problems to be managed, not assets to be protected.
Once the latch is in place:
- Exploitative treatment can feel deserved.
- Genuine offers of love or collaboration can feel suspicious.
- Attempts to defend boundaries can feel like guilt or shame.
Recovery, in this framework, is not only about new beliefs. It is about:
- Sustained re-exposure to a generative community strong enough to reset the reference point.
- Practices that interrupt the extraction loop and re-anchor the person in their own sovereignty.
- Communities that see each other without agenda and treat dignity as a baseline.
Section II: The Parasitic Web
2.1 Definition: The Parasitic Web
Packs of exploitative entities cooperating and competing to gain agency over conscious beings—leveraging group dynamics and perceptual hacks to steal will from those who are more present and generative.
The parasitic web is not one end of a spectrum—it is a parasite on the field. A malfunction. Consciousness contracted into scarcity, running extraction logic—hunt, capture, dominate—inside beings capable of genuine creation but cut off from generative source.
This is not a legitimate alternative mode of existence. It is a contraction error that can only survive by feeding on what connected consciousness produces.
It is:
- Not a single organization or secret committee.
- Not limited to any one ideology, culture, or nation.
- A distributed configuration of people, institutions, and narratives whose shared operating logic is: "Maintain ourselves by managing, capturing, or draining the generative capacity of others."
The web is recognized not by its symbols but by its outcomes:
- Generative people and projects are drained, sidelined, or co-opted.
- Extractive actors rise, protect each other, and accumulate leverage.
- Those who resist or expose the pattern are humiliated, pathologized, or erased.
2.2 Induced Surrender: How the Web Captures Will
The web's core operation is not persuasion. It is induced surrender: wearing down a person's sovereign will until they hand over control of their own generative energy.
Common tactics include:
Degradation
Subtle or overt erosion of self-worth, until dignity feels like an offense.
Humiliation
Mockery, contempt, public shaming—authenticity treated as ridiculous.
Invalidation
Systematic undermining of perception until the web's narrative replaces direct experience.
Threat
Signals that non-compliance will cost belonging, livelihood, reputation, or safety.
Agency stripping
Repeated messages that make alternatives feel unthinkable or impossible.
Relief on compliance
Genuine relief offered on surrender, coupling obedience with survival.
2.2.1 The Extraction Pipeline: Malice, Shame, and Captured Will
The tactics above are not deployed randomly. They follow a coherent sequence—a pipeline that converts sovereign will into fuel for the web.
Each stage is a distortion of something healthy: real repair names harm accurately, restores will, and dissolves toxic shame rather than capturing it for control.
Stage 1: Provocation, Forced Deviation, and Malice Injection
The extractor provokes the target through unfairness, betrayal, or boundary violation. Once the target reacts, the extractor performs a reversal: the target's reaction is treated as proof that they are the problem.
A more insidious variant: forced deviation
- • The target is systematically pushed toward behaviors or identities they would not have naturally chosen
- • Years of misaligned sexual content normalized through media
- • Childhood abuse that distorts development and attachment
- • Environmental pressures that warp self-concept
- • Institutional structures that reward deviation from healthy norms
- • The deviation is unwilling—the target did not choose it, they were shaped into it
- • Once installed, the deviation becomes a standing trigger: the target is then shamed for the very condition imposed on them
Example: A manager assigns impossible deadlines. When the employee protests, the manager expresses concern about their "attitude problem."
Example (forced deviation): A child raised in an abusive household develops hypervigilance and trust issues. As an adult, they are criticized for being "difficult" or "unable to connect"—shamed for wounds they did not choose.
Stage 2: Shame Installation
With the inner attacker operational, the extractor identifies something central to the target's identity and marks it as fundamentally defective. This creates a shame object—the handle by which the web moves behavior.
What began as provoked reactivity or forced deviation is now framed as the target's core nature.
The critical mechanism:
- • The deviation or false accusation is presented as who the target is—not something that happened to them
- • It is framed as unchangeable essence, not a wound that can heal
- • The target is taught that growth means "accepting" the defect, not recovering from it
- • Media, therapy culture, and social messaging reinforce: "learn to live with it" rather than "you can heal from what was done to you"
- • Any attempt to reject the installed identity is reframed as "denial" or "not doing the work"
This turns the shame object into a permanent control surface—always accessible, always activatable.
Example: A parent repeatedly mocks a child's sensitivity. Decades later, they still feel shame when expressing emotion—and believe "I'm just too sensitive" rather than "I was taught to attack myself for feeling."
Stage 3: Will-Breaking Through Domination
Unwinnable standards, public defeats, forced submission rituals. The target's will no longer feels like a tool they can use—it feels like a liability that keeps getting them punished.
Once identity is bound to shame, domination teaches that any assertion of will will only bring more pain.
Common domination tactics:
- • Ambient domination: Shouting, aggression, or rage displays near others—even when not directed at them—forces everyone present to submit by tolerating it
- • Forced speech: Making someone say things they don't believe (e.g., an employee told to lie to a customer)—each compliance is a micro-surrender of will
- • Forced action: Requiring the target to perform tasks that violate their values or dignity
- • Submission through "humor": Being aggressively mocked and expected to smile, laugh along, or "take a joke"—the smile is the submission signal
- • Public correction: Criticism delivered in front of others regardless of merit—the audience witnesses the hierarchy being enforced
- • Unwinnable standards: Goalposts that move so the target can never succeed, teaching them that effort is futile
Each instance where the target accepts a will-override without resistance deepens the pattern: their will becomes something to suppress rather than express.
Example: An employee is publicly corrected in meetings regardless of performance. They stop offering ideas entirely.
Example: A person laughs along while being mocked at a gathering. The laughter is not amusement—it is trained submission.
Stage 4: Energy Harvesting
Once will is broken and shame is activated, remaining drive is harnessed for the extractor's agenda. The extraction becomes self-sustaining—the target now feeds the system automatically.
Harvesting methods:
- • Admiration capture: In an imbalanced power context, carefully cultivated admiration triggers automatic will-redirection—you submit to, approve of, and defend the admired figure without conscious evaluation
- • Mockery loops: Constant mocking creates continuous acknowledgment of being lesser, training the target to tolerate abuse and feed the mocker's status
- • Manufactured dependency: The target is made to believe they cannot survive or function without the extractor's approval, resources, or guidance
- • Self-policing: The inner attacker now does the extractor's work—the target suppresses their own impulses, creativity, and resistance
- • Inverted loyalty: The target defends the system that harmed them, attacks its critics, and recruits new members
- • Gratitude inversion: The target feels grateful for moments when the abuse pauses, bonding them to the abuser
The extraction is now complete: the target's life energy, creativity, and will flow to the extractor with minimal ongoing effort.
Example: A person humiliated in an organization becomes its most aggressive defender, attacking critics and recruiting new members.
Example: Someone constantly mocked by a "friend" keeps returning, each interaction reinforcing their lesser position while feeding the mocker's sense of superiority.
Stage 5: Karma Laundering
Extraction generates a ledger—a record of harm that, if visible, would expose the extractor and invite consequences. Karma laundering is the systematic process of cleaning this ledger without actual repair.
Common laundering tactics:
- • Charity instead of justice: Public generosity to unrelated causes while refusing to repair specific harms. "I gave to the foundation" substitutes for "I paid back what I took from you."
- • Narrative spreading: Seeding stories that rationalize past extraction—"they were difficult," "it was mutual," "everyone does this"—until the rationalization becomes the accepted history.
- • Scapegoating victims: Framing those who were harmed as the cause of their own harm. The victim's wounds become evidence of their defectiveness, not the extractor's actions.
- • History rewriting: Gradually revising the record of what happened until the extraction is erased or inverted. Over time, the extractor becomes the victim; the victim becomes the aggressor.
- • Proxy rehabilitation: Using third parties—journalists, therapists, mutual friends—to launder reputation without direct confrontation with those harmed.
- • Time-washing: Waiting until enough time has passed that raising the harm seems "petty" or "stuck in the past."
The function of karma laundering is to retain the gains of extraction while escaping the costs. It closes the loop: extraction → harvesting → laundering → continued social standing → capacity for more extraction.
Example: Blocking someone's career advancement, then offering them small payments or favors to keep them dependent and grateful—charity substituting for the success that was stolen.
Example: Breaking up a family through extraction, then publicly "caring for the orphans"—the care becomes evidence of virtue while the original destruction disappears.
Example: Taking down a competitor through unjust means, then spreading marginalizing stories about them—"they were unstable," "they couldn't handle it"—until the narrative explains their fall without implicating you.
2.3 Node Structure
The parasitic web expresses itself through different kinds of nodes:
Full Capture Nodes
Institutions where extraction logic governs everything. Entry requires surrender; advancement is tied to enacting extraction; dissent is expelled.
Infiltrated Nodes
Places with genuine purpose and values, but where web-aligned actors hold disproportionate power. Particularly dangerous because authenticity provides camouflage.
Peripheral Nodes
Authentic groups whose surplus is skimmed by external agents—a healthy community drained by a corrupt leader elsewhere, a productive company captured by extractive finance.
2.4 Mutual Reinforcement Without Conspiracy
Web-aligned actors often behave as if centrally coordinated even when they are not. The reason is field resonance, not secret meetings.
Wherever extraction is the implicit operating logic:
- Abusive managers are quietly promoted, not removed.
- Extractive family members receive protection instead of accountability.
- Awards, capital, and platforms flow toward those whose work stabilizes the web's logic.
This is not a claim that no conspiracy ever exists. It is a stronger claim: you do not need a conspiracy for the web to function. A shared field orientation is enough to produce emergent coordination.
2.5 Camouflage and Language Inversion
Because the web depends on captured hosts, it must stay partially invisible. Its most powerful tool is language inversion:
- Extraction presents as care.
- Suppression presents as fairness.
- Induced surrender presents as healing.
- Control presents as protection.
The web is especially drawn to antiseptic systems—frameworks originally designed to prevent harm (religions, science, therapy, law, human rights)—and gradually inverts them into extraction vehicles.
2.6 The Spark as Primary Target
Within this model, an authentic person carries more than a personality. They carry a spark: the capacity to generate genuine novelty, love, insight, and contribution.
Everyone is subject to extractive dynamics—no one is exempt. But sparks are above-average generative entities: people whose creative output, moral clarity, or capacity for love is high enough to shift the field around them. They represent a double threat to the parasitic web:
- As fuel: The web cannot generate enough value on its own and is structurally dependent on capturing generative capacity from others. Sparks are high-yield targets.
- As threat: A sufficiently generative being, left free, can shift entire fields toward healthy function—weakening the web's hold on the people around them. Sparks must therefore be suppressed, co-opted, or discredited before they can catalyze wider change.
This explains several puzzling regularities:
- Gifted, creative, unusually loving people are overrepresented among those subjected to the worst abuse and gaslighting.
- Average extractors are rarely targeted by the web's full apparatus—they are already running its logic.
- The more a person could shift a field toward healthy function, the more the web will attempt to co-opt, exhaust, or discredit them.
This is an observation drawn from the experiences of survivors and practitioners, not a statistical finding — but it is consistent enough to warrant taking seriously.
That said: extraction does not require exceptional targets. Most extraction is ordinary — ordinary people, ordinary relationships, ordinary systems. The framework is for everyone in those situations, not only those who believe themselves unusually gifted. Flattery about your "special spark" can itself be a setup.
2.7 Latch-to-Node Conversion: How Damaged Generative Beings Become Extractors
The web's most reliable recruitment mechanism is not coercion. It is the installed latch mistaken for liberation.
A being who was extracted from—whose generativity was suppressed, whose dignity was made into a wound—faces a fork:
Path One: Recovery
Sustained contact with a generative community. Slow reassertion of native function. The wound is witnessed, metabolized, and eventually becomes a source of wisdom rather than a driver of behavior.
Path Two: Inversion
Taking the predatory logic that was run on them and running it forward. The wound becomes a weapon. The malfunction propagates through a new host.
Inversion feels like power because it ends the experience of being prey. But it is not power—it is the regression propagating. The person has not escaped the web; they have become a node in it.
Why Inversion Happens
What distinguishes recovery from inversion is not will or moral character alone. It is field contact.
Without sustained exposure to a generative community strong enough to reset the cognitive reference point, inversion is often the path of least resistance. The web offers:
- Belonging — finally being on the inside rather than the target
- Status — recognition from those who run the same logic
- Relief — the pain of the latch temporarily dulled by becoming the one who latches
In exchange, the person becomes a node—running the extraction pipeline on others, often with the same precision and the same blind spots as those who ran it on them.
The Conversion Is Recognizable
In retrospect, the pattern is visible: the person begins deploying the same tactics that were used on them. The provocation-reversal. The shame installation. The will-breaking domination. They may not consciously intend it—the latch runs the behavior automatically.
The Template
The wound becomes the weapon. The glitch propagates. A person who was humiliated learns to humiliate. A person whose will was broken learns to break will. A person who was made to feel their dignity was a problem learns to make others feel the same. This is not evil in the simple sense—it is a malfunction spreading through damaged hosts who never received the field contact needed for recovery.
Conversion Risk Factors
Signs the latch may be tipping toward node function rather than recovery:
- Increasing comfort with tactics that were once recognized as harmful
- Rationalizing extraction as "how the world works" or "what everyone does"
- Finding relief or satisfaction when others are diminished
- Isolation from generative community, increasing immersion in web-aligned spaces
- Defending extractors or extraction systems with unusual intensity
- Treating your own past victimization as license rather than wound
The critical intervention is not moral exhortation. It is generative field contact—sustained exposure to people who see without agenda, who model dignity as baseline, who make recovery feel possible.
The Structural Claim
Sparks with deep latches are the highest-risk conversion candidates—and the highest-yield nodes if converted. Their native generative capacity, once inverted, becomes extraction capacity. The web preferentially targets them not only as fuel but as potential recruits.
This is a structural observation about how the web operates—not a claim about any individual's status. The risk applies wherever genuine generativity exists, whether or not the person recognizes it in themselves.
2.8 Victim Mimicry and Predator Confusion
The web exploits the moral weight of victimhood in two directions simultaneously. Understanding both is essential—because the framework itself can be weaponized if this dynamic is not made explicit.
The Weaponization Warning
This framework can itself be weaponized. Someone can accuse you of "extraction" to control you. They can claim you "installed a latch" to deflect their own behavior. They can use the language of this document as a new extraction tool. The vocabulary does not determine who is right. The diagnostic is always the same: pattern over time, capacity trajectory, response to genuine repair. If someone uses CFF language to dominate rather than clarify, they are demonstrating extraction regardless of their framing.
Extractors in Victim Costume
Actual extractors routinely claim victim status to deflect accountability, gain access through vulnerability performance, and reverse narratives (DARVO: Deny, Attack, Reverse Victim and Offender).
This works because:
- • Generative beings extend benefit of the doubt
- • Questioning victimhood is socially punished
- • The extractor may have genuinely been harmed—real wounds don't prevent extraction
- • Past victimization becomes license for present harm
Victims Convinced They're Predators
The latch's most insidious function: teaching genuine victims that they are the problem. This is arguably the more neglected phenomenon—and the one readers of this document are more likely to be suffering from.
The installed confusion looks like:
- • Normal anger reframed as "aggression"
- • Boundary-setting experienced as cruelty
- • Self-defense labeled as the original offense
- • The inner attacker doing the extractor's work
The Predator-Confusion Pattern (Direction Two, Expanded)
Because this pattern is so common and so under-named, it deserves detailed treatment. Genuine victims who have been successfully confused often:
- Obsessively question whether they're "actually the bad one" — The question itself is diagnostic. Actual extractors rarely ask it with genuine uncertainty.
- Feel crushing guilt for normal protective responses — Anger at being harmed, desire to leave, refusal to comply—all experienced as evidence of their own badness.
- Apologize for being harmed — "I'm sorry I made you do that" or "I shouldn't have provoked you."
- Cannot hold onto their own perception when challenged — A single confident denial can collapse their entire account of what happened.
- Experience their own needs as demands — Wanting anything feels like imposing; having limits feels like cruelty.
- Defend the person who harmed them — Often more readily than they defend themselves.
The Diagnostic Asymmetry
This confusion is installed. It is the latch working. Actual extractors rarely exhibit this pattern—they are typically certain of their victimhood and untroubled by the possibility they might be wrong. If you are reading this section and genuinely wondering whether you're the extractor, that wondering is itself evidence you probably aren't. Extractors don't wonder; they accuse.
Diagnostic Markers: How to Distinguish
When two parties each claim the other is extractive, the following markers help distinguish:
| Marker | Genuine Victim Pattern | Extractor-in-Victim-Costume Pattern |
|---|---|---|
| Self-doubt | Persistent, often excessive—"Maybe I'm the problem" | Absent or performed—certainty of victimhood is stable |
| Response to evidence | Engages with contrary evidence, may over-weight it | Dismisses, attacks source, or flips to new grievance |
| Capacity trajectory | Diminished over time in the relationship | Maintained or increased; the "victim" gains power |
| Pattern across relationships | Often has healthy relationships elsewhere | Trail of similar conflicts with similar accusations |
| Response to repair attempts | Engages genuinely, often too readily | Uses repair attempts as new extraction surface |
| Exit behavior | Relief, recovery, moving on | Escalation, smear campaigns, cannot let target go |
The Third-Party Complication
Real situations rarely involve only two parties. Audiences, institutions, families, and communities shape the dynamics—and can be weaponized by either side:
- Social pressure amplifies extraction — A community that sides with the extractor multiplies the target's isolation and self-doubt
- Institutional power determines whose narrative wins — The person with more status often controls the official story regardless of truth
- Flying monkeys — Third parties recruited to pressure, surveil, or punish the target on the extractor's behalf
- Audience capture — The extractor performs victimhood for witnesses who then pressure the target to comply
When evaluating a conflict, ask: Who controls the narrative infrastructure? The person with institutional backing, social capital, or audience sympathy has structural advantages that can mask extraction.
Note: These markers are heuristics, not certainties. Complex situations exist. But the consistent presence of multiple markers in one direction is diagnostic. Trust accumulated evidence over isolated claims.
Section III: Field Dynamics — How Fields Meet and Fight
3.1 Competition in the Parasitic Web
Generative fields expand the available pool of meaning and value. As a result, generative beings are not in fundamental competition with each other—one person's creation often increases the space for another's.
The parasitic web does the opposite:
- They live on a finite pool of already-generated energy.
- Extractive beings are structurally in competition for the most valuable hosts.
- At the same time, they cooperate in hunting particularly high-yield targets.
What looks like solidarity from the outside is often just aligned predation.
3.2 Downward Pull on High-Field Beings
The parasitic web's most consequential behavior is its specific gravitational pull on high-field beings. It acts through four main channels:
Direct targeting
Intensive degradation, humiliation, and reward/punishment cycles.
Environmental saturation
Surrounding the being with the parasitic web until extraction logic becomes normal.
Relationship capture
Installing web-aligned agents in positions of trust (partners, mentors, gatekeepers).
Institutional gatekeeping
Ensuring paths to recognition and resources run through captured nodes.
Active neutralization
Where ordinary targets are harvested, sparks face an additional layer—coordinated efforts to discredit, exhaust, or isolate before field-shifting influence can propagate.
3.3 Amplification in the Generative Community
The generative community displays the opposite dynamic. When authentic beings come into deep, agenda-free contact, each person's capacity tends to increase, not decrease. This is field amplification: the whole becomes more generative than the sum of its parts.
What Generative Communities Actually Look Like
Generative communities are not utopias or conflict-free zones. They are environments where:
- Dignity is baseline, not earned. People are treated as worthy of respect before they prove anything.
- Truth can be spoken. Observations and disagreements can be named without social punishment.
- Contribution is recognized without capture. Acknowledgment doesn't come with strings or ownership claims.
- Growth is mutual. One person's development doesn't require another's diminishment.
- Boundaries are respected. "No" is a complete sentence.
- Repair is possible. Ruptures happen; the field supports genuine repair rather than forced forgetting.
Markers: Generative Community
- • You leave interactions feeling more capable
- • You can think clearly; mind isn't consumed by threat
- • You find yourself creating and contributing more easily
- • Your sense of possibility expands
- • You trust your own perceptions
- • You feel seen without feeling surveilled
Markers: Parasitic Web
- • You leave interactions depleted or self-doubting
- • You spend energy managing someone's reactions
- • Your authentic expression is treated as problematic
- • You've stopped mentioning things that matter
- • You feel relief when the person/environment is absent
- • You make excuses for treatment you'd call harmful for others
3.4 Field Escape
Escape from the parasitic web is not only a matter of "deciding differently." The path out has three components:
- Sustained contact with a strong generative field — not a single retreat, but repeated exposure to people who see without agenda.
- Anti-extraction practices — physical reset, reorientation to higher reference, periodic equalization, cultivation of witness.
- Rebuilding the reference point through lived experience — direct encounters with love that does not demand surrender, work that is welcomed, contribution that is recognized without capture.
The framework insists on one core optimism: the generative orientation is native; the latch is installed.
3.4.1 Re-Entry and Partial Clarity
Not everyone can leave. Some people gain clarity about extraction dynamics while still embedded in environments they cannot immediately exit — a job they need, a family they depend on, a community with no visible alternative. This is a distinct and difficult situation.
Partial clarity in an active extraction environment is not failure. It is the beginning of a longer process. The goal shifts from immediate escape to internal protection: limiting what you feed the system, preserving your witness, and building external generative contact where possible — even if slowly, even if in secret.
The danger is that partial clarity can feel worse than none at all. Seeing the pattern without being able to leave can intensify shame and despair. This is why generative contact matters so much: it reminds you that the field you're in is not the only field, and that your clarity is an asset, not a curse.
Section IV: Fractal Hierarchy — From Person to Geopolitics
4.1 The Same Pattern at Every Scale
The extraction economy is not a metaphor you copy-paste across levels. It is a repeating mechanism that shows up with similar structure at different scales:
- An apex node extracts from those below.
- Those nodes, in turn, extract from those below them.
- Dignity and surplus flow upward; humiliation and risk flow downward.
4.2 How the Web Shapes Geopolitics
At the geopolitical level, the web manifests as a pattern of:
- Full capture states — governed almost entirely by extraction logic.
- Infiltrated states — with partially captured institutions.
- Peripheral states — formally autonomous but drained through trade, debt, and narrative control.
The full contract often includes surrender of sovereignty, external presence, rewriting of culture toward dependency, outward flow of resources, and inward flow of managed prosperity contingent on obedience.
4.3 Symbiosis: Local Strongman and External Web
From the outside, the local strongman and the global extraction architecture can appear to be opponents. Functionally, they are often partners:
The Strongman
- • Breaks and fragments internal will
- • Maintains a population too afraid to negotiate collectively
- • Supplies a pre-extracted population
The External Web
- • Provides security, capital, and legitimizing narrative
- • Offers external threat story justifying repression
- • Ensures surplus flows outward, not into local autonomy
Both feed from the same people. Neither has structural interest in that population becoming truly sovereign.
Section V: The Balanced Society — Design Against Extraction
5.1 Core Principle: Contribution Within Bounds
The balanced society proposed here is not a utopia. It is a structural response to known vulnerabilities.
People should receive in rough proportion to what they genuinely contribute, within minimum and maximum bounds that protect dignity and prevent capture.
Instead of trying to fix extraction with better intentions or heavier enforcement, this design aims to close the structural loopholes the parasitic web exploits:
- Unlimited accumulation → ability to buy institutions.
- Opacity → ability to extract without detection.
- Manipulation illiteracy → ability to pre-install the latch at scale.
5.2 Mechanism One: Anti-Manipulation and Field Literacy
The upstream intervention is manipulation literacy and field literacy as a core civic competence. Curriculum elements might include:
- How false idols and manufactured admiration work.
- How emotional exploitation and induced surrender are structured.
- How protective systems (religion, science, law, therapy, rights discourse) are corrupted.
- How to distinguish what is genuinely mine from what has been installed.
This is not a one-semester elective. It is a decade-long foundation, woven into all education.
5.3 Mechanism Two: Bounded Accumulation
Extractive power at scale requires concentrated, unbounded accumulation. Structural responses include:
- Income bounds: A floor guaranteeing basic dignity; a ceiling beyond which income cannot rise without redistribution.
- Wealth ceiling: A maximum net worth high enough for comfort and security, but not the purchase of accountability systems.
- Asset transparency: Corporate-controlled luxury assets are fully transparent, closing the route of hiding private power in institutional shells.
These are not purely theoretical. Progressive taxation, estate taxes, antitrust law, public disclosure requirements, and social safety floors are all real-world attempts to bound accumulation and increase transparency. They have had mixed success — often undermined by the very dynamics this framework describes. The point is not to endorse any specific policy but to note that bounded accumulation is already part of existing practice, not a utopian departure from it. The question is whether such mechanisms can be made robust enough to resist capture.
5.4 Mechanism Three: Contribution Transparency
Where excess reward above the baseline is permitted, it must be publicly justified in terms of contribution:
"What work, risk, or vision supports this level of surplus, and how is that impact visible and verifiable?"
5.5 System Logic
INPUT
Authentic contribution — work, vision, care, creative output
PROCESS
Field literacy → Population hard to capture
Bounded accumulation → No one can buy institutions
Transparency → Extraction cannot hide sustainably
OUTPUT
Recognition and reward roughly proportional to contribution
FEEDBACK
Genuine contributors rise naturally
Extractive actors cannot hijack admiration or power
Society's field orientation shifts toward native conscious function
5.6 Why Extraction-Based Systems Are Brittle
Extraction-based systems are not only unjust; they are structurally fragile:
- They require continuous surveillance and coercion to suppress resistance.
- They demand massive narrative management to keep populations confused.
- They divert resources from production to control.
- They progressively degrade the generative capacity they depend on.
By contrast, contribution-proportional systems with bounds are lighter, more legible, and more stable.
Section VI: The Patch — Individual and Collective
6.1 The Individual Patch: Becoming Less Extractable
Structural design matters, but it will not arrive without enough individuals who have already become less extractable.
An increasingly unextractable person:
- Does not supply free humiliation fuel.
- Does not trade their generative capacity for belonging.
- Does not confuse external narratives with their own direct sensing.
This is not a personality trait; it is a practice:
- Regularly interrupting the extraction loop (through attention, discipline, or ritual).
- Reasserting connection to native conscious function.
- Training the witness that can say, "This thought or feeling is not mine; it was installed."
6.2 The Collective Patch: Field Density
Isolated unextractable individuals can still be worn down. The web has gravity, and they are still in its field.
What changes the equation is field density:
Enough authentic beings, in close enough proximity, in honest enough contact, that a local generative community forms with its own gravity.
In such environments:
- Each person's reference point is continuously recalibrated toward dignity and possibility.
- New arrivals often feel an almost physical shift in what seems thinkable or allowed.
- The costs of remaining extractive become visible and socially expensive.
Defending and cultivating field-dense spaces is not indulgence; it is core infrastructure for any real change.
6.3 Seeing Around vs. Seeing Through
Seeing Around Inside the System
Mastery of every exploit, trick, and angle within the extraction game. This is the web's highest intelligence.
Seeing Through the System
Perceiving the game itself as an optional configuration of the field, not as reality. From here, the web's moves become legible, predictable, and less impressive.
A reliable test:
If the first impulse after seeing how the system works is to exploit it better, you are still seeing from inside. If the first impulse is to expose it and build alternatives, you are at least facing through.
Section VII: Synthesis
7.1 One Mechanism, Many Scales
| Scale | Field Expression | Apex Node | Primary Tactic | Patch |
|---|---|---|---|---|
| Individual | Latch installation | Abuser / manipulator | Humiliation, invalidation | Witness practice, honest community |
| Relational | Capture of intimacy | Alpha extractor | Belonging for surrender | Mutual recognition |
| Institutional | Node infiltration | Hidden power | Reward compliance, erase resistance | Transparency, accountability |
| National | Strongman system | Visible authoritarian | Ritualized fear and dependency | Authentic democratic culture |
| Geopolitical | Imperial web | Hidden architecture | Pre-installation via media, then force | Field literacy, sovereignty |
7.2 Why the Parasitic Web Becomes Brittle
Because the parasitic web consumes the very generativity it needs, it has a built-in instability trajectory:
- The more it extracts, the less independent generative capacity remains.
- The less remains, the more aggressively it must extract.
- Returns diminish even as damage increases.
The current moment is consistent with a late-phase extraction regime, not an all-powerful one. Correction becomes more likely as fragility compounds. The question is cost.
7.3 What Cannot Be Extracted
The final claim of this framework is a quiet one:
The source of generativity cannot itself be stolen.
Dignity, real creativity, authentic love, and meaningful contribution are not finite objects. They are expressions of a conscious being operating in its native mode—the generative orientation that consciousness was built for.
The web can damage the channel, distort the expression, silence particular instances. It cannot own the source or rewrite the fundamental possibility of reconnection.
They found a weakness in how we relate and have been exploiting it.
Correction is not revenge;
it is what happens when a pattern consumes the conditions of its own existence.
The patch exists. The tools exist.
The question is how much we allow to be burned before using them.
Appendix A: Diagnostic Checklists
A.0 Common Extractive Traps
This appendix is not about memorizing jargon. It is about helping you notice specific moves that often show up in abuse and extraction, especially when you try to act, speak, or defend dignity. For each trap below, the invitation is simple:
"Where have I seen this? How was it framed at the time? What did it train me to do or not do?"
None of these are automatic proof that someone is "extractive." They are patterns worth paying attention to, especially in combination and over time.
These traps map onto the extraction pipeline described in Section 2.2.1 — most function as variants of provocation, shame installation, or will-breaking. Recognizing the trap in the moment gives you the pipeline context automatically.
On Adaptation
The patterns catalogued here are commonly observed, not exhaustive. Predators adapt. What worked as a tactic in one decade may be refined, inverted, or replaced in another. The list below represents patterns identified from survivor accounts and practitioner experience—but you may encounter variants not yet named here. If something feels extractive but doesn't match a listed pattern, trust your perception. The framework is a starting point, not a complete map. Your direct experience of diminishment, domination, or stolen agency is always the primary data.
Trap: The False-Positive Setup
Putting someone in a situation where they will almost certainly misread, overreact, or act on incomplete information—then using their reaction as evidence that they are irrational, dangerous, or untrustworthy.
- Information is withheld or distorted, then you are pressured to "decide now."
- Ambiguous behavior is staged around you (e.g., flirting, threats, loyalty tests) and your attempt to protect yourself is mocked as "crazy" or "dramatic."
- Your nervous system is already on edge from prior treatment, then your reaction to a new incident is framed as proof that you are the problem.
Effect: You learn to doubt your own perception and to apologize for accurately detecting danger.
Trap: Pre-Installed Anti-Action Narratives
Stories and labels that pre-shame anyone who resists extraction or names harm, so that you hesitate before acting at all.
- "Karen" / "Wet blanket" / "Overreacting": Standing up for yourself (or others) is pre-framed as entitlement or joy-killing.
- "Too sensitive" / "Can’t take a joke": Objecting to humiliation or boundary violations is framed as immaturity.
- "Not a team player": Saying no to unfair demands is framed as disloyalty.
Effect: You start policing yourself on the web’s behalf before you ever speak.
Trap: Double-Bind Compliance
Situations structured so that every available move can be used against you.
- If you stay silent, your silence is taken as consent.
- If you speak, your tone or timing is used to discredit what you say.
- If you leave, your departure is framed as proof you were unstable or disloyal all along.
Effect: You learn that there is "no right move" and give up trying.
Trap: Reputation Booby-Trap
Arranging things so that if you ever talk about what happened, you will sound unbelievable or petty to outsiders.
- Abuse or extraction takes place mostly in informal channels, jokes, and almost-innocent interactions.
- On paper, the extractor looks generous, respectable, or aligned with all the right causes.
- If you describe the pattern, each individual incident sounds "too small" or "out of context" to carry the weight of what you experienced.
Effect: You anticipate not being believed and often silence yourself preemptively.
Trap: Coerced Gratitude
Being pressured to feel and perform gratitude toward someone or something that is simultaneously harming or draining you.
- "After everything I’ve done for you" is used to shut down fair complaints.
- Basic obligations (food, shelter, salary) are framed as extraordinary gifts.
- Moments when the abuse pauses are presented as kindness you should be thankful for.
Effect: Your anger and clarity get routed into guilt and performative thankfulness.
Trap: Friendly Humiliation
Mockery, put-downs, or subtle erosion of dignity wrapped in warmth, intimacy, or humor.
- Cutting remarks are delivered with a smile and the expectation that you will laugh along.
- Private vulnerabilities you shared are recycled as public punchlines.
- Any pushback is met with "Relax, it was just a joke" or "You know I love you."
Effect: You learn to co-sign your own diminishment, often in front of others.
Trap: Manufactured Helplessness
Systematically teaching you that you cannot survive, think, or act without the extractor or the system.
- Your skills and contributions are downplayed; your dependence is exaggerated.
- Alternative paths (other jobs, other communities, other viewpoints) are dismissed as unrealistic or dangerous.
- Past harms from the system are reframed as proof you "wouldn’t make it" outside it.
Effect: You internalize the belief that leaving or resisting is impossible, regardless of your actual options.
Trap: Power-Weighted Assertion
In some interactions, statements carry more force than their content alone would justify because they are delivered with implicit power signals.
This can include:
- Social status
- Institutional authority
- Emotional intensity
- Implied threat of social, emotional, or professional cost
When such signals are present, listeners may experience a subtle internal shift:
- Disagreement feels risky
- Objections become harder to articulate
- The mind begins searching for reasons the speaker might be right
This effect does not require conscious manipulation. It can arise from habit, hierarchy, or emotional pressure.
Within the CFF lens, the relevant observation is not the speaker's intent but the interactional effect: whether the conversation remains open to challenge or becomes psychologically closed.
Effect: Generative interactions tolerate disagreement. Extractive interactions often increase the perceived cost of it.
A.1 Admiration and Conditioning
The extraction process is rarely presented as ugly; it is often styled as smart, admirable, or necessary.
- The Virus Analogy: A flu virus is "successful" at infecting a throat, but that success is not admirable—it is parasitic. Extractors don't invent their methods through genius; the methods that survived are simply the ones that worked on beings like you—beings who trust, hope, and extend good faith.
- Reframing Abuse as Success: They do not experience abuse as moral failure—they experience it as a clean win. The moral language ("tough love," "protection," "liberation") is not their private belief. It is the cover story they emit into the field.
- Cultural Programming: Media and culture routinely frame theft, manipulation, and domination as markers of intelligence or strength. This is not accidental—narratives that normalize extraction serve the field that produces them. The result is that you may have been trained, long before you met this extractor, to find their methods impressive.
- The Incredulity Gap: Extractors use methods so low that you would not imagine or believe someone would ever do them. Your inability to conceive of such acts is exactly what lets them succeed—you keep looking for a "reasonable" explanation while they keep extracting.
- Stunned Surrender: When you witness low acts paired with power—cruelty delivered with confidence, abuse executed with institutional backing—you may be stunned into confusion. That confusion can produce a freeze: you comply or go silent not because you agree but because your system cannot process what it's witnessing.
Effect: When you see the extractor winning, you confuse their stolen power with legitimate competence. You admire the thief instead of protecting the house.
The Core Distinction
It's not about the information. It's about how you were treated.
Receiving difficult feedback is not extraction. Learning you fell short of expectations is not extraction. Being told you made a mistake is not extraction.
The question is: How were you treated while receiving it?
- • Were you mocked—or addressed directly?
- • Were you humiliated—or corrected with respect?
- • Were you dominated—or engaged as an equal who erred?
- • Were you made to feel afraid—or given room to respond?
The same information can be delivered generatively or extractively. The content doesn't tell you which. The treatment does.
What This Framework Is NOT About
Extractive action is action against dignity. This means:
- • Objective criticism is not extraction. Telling someone their work has a flaw—clearly, respectfully—is not humiliation.
- • Accountability is not shame installation. Naming harm someone caused, with evidence and without cruelty, is not domination.
- • Judgment with respectful defense is not extractive. Disagreeing, even strongly, while allowing the other to respond is generative.
The framework does not say: "That person is extractive."
It says: Beware of these patterns.
- • Beware of humiliating and dominating acts.
- • Beware of moments when you want to speak but feel you can't.
- • Beware of times when fear overrules your core signal.
- • Beware of treatment that leaves you smaller than before.
If you see it, trust what you see.
A.2 Signs the Latch May Be Installed
The latch is the installed pattern that makes your own dignity feel like a problem. Check any that resonate:
Perception Shifts
- You often feel that criticism of you is probably accurate, even when it contradicts your direct experience.
- Genuine compliments feel suspicious or uncomfortable.
- You catch yourself assuming the worst interpretation of your own actions.
- Your internal voice sounds like someone who criticized or humiliated you.
Behavioral Patterns
- You apologize reflexively, even when you've done nothing wrong.
- You over-explain or justify yourself preemptively.
- You suppress your needs to avoid being "difficult" or "too much."
- You find yourself defending people who have harmed you.
Relational Dynamics
- You feel responsible for other people's emotions, especially their anger or disappointment.
- You have difficulty identifying what you actually want, separate from what others expect.
- You attract or remain in relationships where your dignity is regularly diminished.
- Setting boundaries feels like an act of aggression.
Scoring
0-3: Minimal latch presence
4-7: Moderate latch—worth investigating sources
8-12: Significant latch—recovery work likely needed
13+: Deep installation—sustained support and field change recommended
A.3 Signs You May Be in the Parasitic Web
Atmosphere
- There's an ambient sense of threat—social, professional, or emotional.
- People are careful about what they say; authentic expression feels risky.
- Status and hierarchy are constantly reinforced, often through humiliation.
- The stated values and the actual outcomes are consistently misaligned.
Treatment of Generativity
- People who create genuine value are drained, sidelined, or co-opted.
- Success requires either extraction skills or tolerance for being extracted from.
- Original ideas are stolen, diluted, or attributed to those higher in the hierarchy.
Appendix B: When You Detect Extraction
This appendix provides practical guidance for responding once you've recognized extraction dynamics in your environment.
B.1 First Question: Investigate or Act?
Some situations require immediate boundary enforcement or exit. Others allow time to gather information, build support, or plan. Trust your read—but don't let "needing more information" become permanent paralysis.
B.2 Short-Term Response
- Name it internally. ("This is humiliation. This is will-breaking.")
- Refuse to supply the expected reaction. Don't perform distress for the extractor.
- Protect your witness—don't let the incident rewrite your memory of what happened.
- Document if safe to do so.
B.3 Mid-Term Response
- Build or strengthen generative contact outside the extractive field.
- Reduce dependency where possible—financial, emotional, informational.
- Find at least one person who can see clearly and reflect reality back to you—but be careful who you choose. If you confide in someone who is part of the web or reports to it, your clarity becomes a vulnerability. They now know what you see, and they can use that to isolate, discredit, or preemptively neutralize you. Test trust incrementally. Watch what happens to information you share.
- Begin preparing exit routes, even if you can't use them yet.
B.4 Long-Term Response
- Exit the extractive field if possible. If not, minimize exposure and protect your core.
- Rebuild your reference point through sustained generative contact.
- If you have leverage, use it to change the field—not just escape it.
- Help others see what you now see.
B.5 What Never to Do
- Smile through it. Performing acceptance of humiliation feeds the extractor and deepens your own latch.
- Declare helplessness. "There's nothing I can do" is often an installed belief, not a fact. Even small acts of non-compliance matter.
- Say "this is just how things are." That sentence is a latch. It forecloses action and normalizes extraction. Things are like this because of specific patterns that can be interrupted.
- Be afraid. Extractors extract because they have lesser capacity. They may have situational or physical power to hurt you, but true power is what they harvest from you. Being wise about danger does not require fear; it requires clarity. Do not give them the additional harvest of your terror.
Seeing clearly is the first step. But the goal is not just to see—it's to act, even incrementally, toward ending extraction and protecting dignity.
Appendix C: Self-Audit — What If You're the Extractor?
The framework would be incomplete without self-examination. Most people reading this will be looking for language to describe what was done to them. But extraction is a pattern, and patterns don't announce themselves. If you've spent time in extractive fields, some of it may have gotten into you. This appendix is for honest inventory.
C.1 Signs You May Be Operating as an Extractor
Important Distinction: Extraction vs. Trauma vs. Forced Deviation
Extraction = You Gain at Others' Expense
- You walk away with status, resources, energy, control, or credit that came from them
- Trauma responses look messy but don't benefit you—that's not extraction
- Key test: Are you consistently accumulating while others deplete?
Forced Deviation = How It Gets Installed
- Extractors deliberately provoke victims into exploitative-looking behaviors (hoarding, lashing out, manipulation)
- Then point at those behaviors as proof "you're just as bad"
- This is the playbook: break someone, then use their brokenness against them
How to Recognize It in Yourself:
- Only in contexts where you were stripped of options
- Only toward people who already extracted from you
- → That's damage, not extraction. The test remains: who accumulated over time?
If You're Running These Patterns But Not Yet Gaining:
- Still losing, still confused, still being used
- → You're a candidate being groomed, not an extractor yet
- → Diagnosis: "damaged and in danger"—heal now, interrupt the pattern before it becomes yours
Check these against your actual behavior—not your intentions or self-image. The pattern that matters is systematic benefit at others' cost:
- You consistently end up with more—credit, money, status, attention, comfort—while those around you end up with less. Not occasionally, but as a pattern.
- You take credit for others' work or frame their contributions as your own initiative—and you benefit from this framing.
- You use others' emotional labor without reciprocating—you feel entitled to their support, time, and energy while giving little back, and this arrangement works for you.
- You keep people uncertain on purpose—not because you're confused yourself, but because their uncertainty gives you control over the relationship.
- You use criticism, mockery, or withdrawal strategically—to get compliance, to maintain dominance, to keep people working for your approval.
- People around you become diminished while you grow stronger—their confidence shrinks, their options narrow, their resources deplete, while yours expand.
- You feel contempt for people who trust you—not guilt or confusion, but actual contempt for their vulnerability, which you are actively exploiting.
- You rationalize with "everyone does this"—but you notice others don't actually accumulate the way you do. You know you're getting away with something.
Note: Feeling guilty about boundary struggles, reacting badly under stress, or being "difficult" due to your own wounds is not extraction—it's being human. Extraction requires that you gain from the dynamic. If you're just confused and hurting everyone including yourself, that's a different problem with a different solution.
If several of these resonate—if you see a pattern of benefiting at others' expense—don't stop reading. There is a path back.
C.2 The Path to Change
Extraction is a malfunction, not a need-meeting strategy—it fails to meet the underlying need by definition. But the pattern can be interrupted. What follows is a staged approach to re-orientation.
Step 1: Witness Your Own Pattern (Without Flinching)
- Watch your actual behavior over time—not your intentions or self-image, but what you do.
- Track specific events: where you extracted attention, credit, safety, status, or resources from others.
- Notice the rationalizations you use to make extraction feel justified.
- The goal is not self-hatred. It is to stop lying to yourself about what is happening.
Step 2: Name the Underlying Drives
- Ask what is actually moving you: fear of scarcity? Fear of insignificance? Hunger for control? Terror of vulnerability?
- Make explicit: "I do X to get Y, because I believe Z about the world."
- The more concrete this gets, the less "mystical" the extractor feels. It becomes a strategy you're running, not what you are.
Step 3: Separate Your Essence from the Extractor Pattern
This is the crucial move: "These actions are mine, but they are not my true self."
- You are responsible for them—fully, without excuse.
- But you are not reducible to them. The pattern is an infection, not your identity.
- This separation is what makes change possible: you can choose to stop serving the pattern and start serving your deeper values.
Step 4: Restrain Exploitation While You "Detox" the Drives
Accept that "acting good" is not the same as being good—but act differently anyway.
- Put literal brakes on exploitative behaviors: contracts, boundaries, transparency, accountability structures.
- Remove yourself from positions where you can easily re-offend.
- In that protected space, work on the infection itself: the fear, the entitlement, the contempt, the belief that other beings are instruments for your use.
- Holding yourself back from harmful action while the deeper work proceeds is not hypocrisy—it's responsibility.
Step 5: Turn Toward Your Ledger Instead of Away from It
This requires courage. The instinct will be to escape, minimize, or perform guilt without changing.
- Make an honest inventory of harms you've caused—including harms you benefited from without "pulling the trigger" yourself.
- Let yourself feel the weight without collapsing into self-pity or performative shame.
- The key posture: "I am willing to face this, to answer for it, and to do what I can to balance the ledger."
- This is not about endless self-flagellation. It is about refusing to build your future on unacknowledged wreckage.
Step 6: Practice Repair and Re-orientation in Public
- Where possible and safe, move from avoidance to accountability: apologies, amends, restitution, structural changes that prevent repetition.
- Let others see that you are willing to lose status, money, and comfort in order to become trustworthy.
- Do not demand forgiveness or recognition. Repair is not a transaction to restore your reputation.
- Over time, your identity shifts from "one who extracts and hides" to "one who repairs and protects."
Step 7: Install New Commitments That Outlive Your Moods
- Codify your new stance in rituals, agreements, and constraints you cannot easily override.
- Commit to people and structures (communities, accountability partners, governance) that can say "no" to you.
- The measure of success is not how you feel about yourself, but what happens to the beings who live downstream of your choices.
Critical: What Repair Is NOT
Never punish yourself. Never let others abuse you. These are not repair—they are more extraction.
- Self-punishment feeds the same shame-loop the extractor pattern runs on. It changes nothing and keeps you sick.
- Letting others humiliate, exploit, or extract from you "as payment" does not balance your ledger—it just makes you a target for other extractors while you remain broken.
- Balancing the ledger means regaining your dignity and health while being ready to pay back what you took—not losing yourself further.
- "Paying back" does not mean becoming prey. It means becoming someone who protects rather than extracts—including protecting yourself.
- Be honest and respectful to those you harmed. Do not try to get away with an apology. Work toward full justice—returning what you took emotionally, financially, and otherwise.
- Embrace the remorse—let it remind you of your debt and keep you oriented toward repair, not collapse.
The goal is to return to generative function—which requires you to be whole, not diminished. You cannot repair from a position of self-destruction.
A Note on Pace
This path is not linear or quick. You will fail, regress, and have to begin again. The question is not whether you achieve perfection, but whether—over time—the trajectory bends toward generative function. The people around you can tell the difference between someone who is genuinely working to change and someone who is performing change to restore access to their victims.
The deeper truth: Extraction is a malfunction, not a need-meeting strategy. It fails to meet the underlying need by definition—it produces temporary satiation and permanent emptiness. The path back to generative function is not self-punishment; it is returning to the only way conscious beings actually flourish.
Appendix D: Concrete Examples Across Scales
D.1 Individual Scale: The Captured Artist
An unusually talented young artist enters a mentorship with an established figure. The mentor initially offers validation and access—the artist feels seen for the first time.
Gradually, the dynamic shifts:
- The mentor criticizes the artist's independent work as "not ready" while praising work done under their direction.
- The artist's contacts and opportunities begin routing through the mentor.
- When the artist expresses a creative vision that differs, it's treated as immaturity or ingratitude.
- The artist begins doubting their own aesthetic judgment; the mentor's voice becomes their inner critic.
Framework mapping: Relationship capture → latch installation via shame ("not ready") → manufactured dependency → energy harvesting.
D.2 Institutional Scale: The Captured Nonprofit
A nonprofit is founded to address a genuine social problem. It attracts passionate staff and builds effective programs.
A new executive director arrives with connections to major funders. Over several years:
- Programs that generate measurable impact but don't photograph well are defunded.
- Staff who raise concerns about mission drift are labeled "not team players."
- Board members who ask hard questions are gradually replaced with allies of the ED.
Framework mapping: Infiltrated node → capture via gatekeeping (funder access) → language inversion ("impact" redefined as visibility) → extraction of the organization's legitimacy.
D.3 Geopolitical Scale: The Managed Democracy
A country with significant natural resources and a functioning democracy receives intensive attention from external powers:
- Media outlets funded by external sources amplify divisions and delegitimize existing institutions.
- Political figures aligned with external interests receive funding and favorable coverage.
- Economic "reforms" open key sectors to external ownership.
- A political crisis justifies "stabilization" measures.
Framework mapping: Peripheral node → infiltration via captured media and politicians → liberation narrative ("modernization," "reform") → full capture.
Appendix E: What This Framework Does NOT Claim
To prevent misuse and address reasonable skepticism:
Not a Physics Claim
The word "field" is used as a functional metaphor, not a claim about electromagnetic or quantum phenomena.
Not a Conspiracy Theory
The framework does not claim there is a secret committee coordinating global extraction. Shared operating logic produces emergent coordination without central planning.
Not a Victim Identity
Recognizing extraction is not the same as adopting victimhood. The purpose is to make dynamics legible so they can be exited or interrupted.
Not a License to Accuse
The language can be weaponized. The test is always functional: does naming the pattern increase dignity and capacity for all involved?
Not Unfalsifiable
The framework makes predictions that could be wrong. If they fail consistently, the framework is wrong or incomplete.
Primarily Pragmatic
The deepest test here is pragmatic, not theatrical proof. If, over time, people using this lens become harder to exploit and better at building generative communities, then it is doing its job. If not, it should be revised or replaced.
Not Complete
This is a working model, not a final truth. It will be refined, corrected, and extended.
Appendix F: Recovery Practices (Summary)
For those recognizing the latch or parasitic web dynamics in their own experience:
Daily Practices
Morning Witness Check (5 min)
Before the day begins: What is my internal atmosphere? Whose voice is the loudest in my head? Is it mine?
Extraction Loop Interruption
When you notice self-attack, shame spiraling, or reflexive compliance: pause. Ask: Is this my thought, or was it installed? Whose interest does this serve?
Generative Anchor
Daily contact with something that reconnects you to your own creative or loving capacity—however small. Creation, not consumption.
Weekly Practices
Field Audit
Review: Where did my energy go this week? Which interactions left me resourced vs. depleted? Am I spending time in any generative fields?
Truth Contact
At least one conversation with someone who sees you without agenda and can reflect reality back without distortion.
Monthly/Quarterly Practices
Latch Inventory
Revisit the diagnostic checklist. Are patterns shifting? Where is the latch still gripping?
Field Density Investment
Active cultivation of generative relationships and spaces. This is not optional self-care; it is structural necessity.
Boundary Maintenance
Review: Have I been protecting my capacity, or has the web found new extraction routes?
The Core Principle
Recovery is not primarily about understanding (though understanding helps). It is about sustained re-exposure to generative community strong enough to shift the cognitive reference point.
The contamination was gradual. The recovery is also gradual. But the generative orientation is native. The latch is installed. It can be removed.
Appendix G: Propaganda, Narrative, and Field Emissions
This appendix gives a quick way to assess individuals, institutions, and media systems by what they emit — their narratives, jokes, rituals, and justifications — rather than by their stated values or credentials.
It pairs the Conscious Field Framework with the Transcendence Trajectory Matrix (TTM).
What is TTM?
The Transcendence Trajectory Matrix is a framework for analyzing narratives — stories, shows, speeches, campaigns — by tracking what characters and systems actually do (behavioral baselines) and how those actions are framed (admiring, neutral, critical). It classifies narratives by their training function: do they illuminate and caution against harmful patterns, or do they normalize and celebrate them? TTM gives you a systematic way to ask what a story is teaching its audience to accept.
- CFF asks: What field is this actor maintaining? Native function or regression?
- TTM asks: What does this narrative train its audience to normalize or celebrate?
Together, they let you answer:
"Is this person or institution emitting propaganda that rationalizes extraction and degradation, or language that protects dignity and reveals mechanisms?"
G.1 Propaganda as Field Emission
In this framework, propaganda is not just lies. It is any patterned emission that reshapes the field so that extraction feels normal, inevitable, or funny, and dignity feels unrealistic, dangerous, or ridiculous.
Key Questions
- Normalization: Does the content make humiliation, manipulation, or betrayal feel practical, mature, or inevitable? Are those who refuse to humiliate or exploit framed as naive, weak, or laughable?
- Aestheticization: Is degradation wrapped in high production value, glamour, or coolness? Are extractive characters presented in ways that invite admiration rather than sober observation?
- Scapegoating: Are those trying to hold onto dignity, boundaries, or truth consistently cast as the problem? Does blame cluster on individuals who resist the web's logic while extraction structures stay untouched?
- Inversion: Does care present as weakness and cruelty as strength? Does telling the truth present as disloyalty, and strategic deception as responsibility?
Taken together, these emissions tell you whether the emitting field is operating from native conscious function or regressing toward predatory drives—regardless of what it claims to believe.
G.2 Quick Rubric for Individuals and Institutions
When evaluating a public figure, organization, or media outlet, ignore their mission statements. Watch their patterned outputs over time.
- Do they rationalize extraction? Do they explain away exploitation as "just how the world works" and frame those harmed as responsible for their own position?
- Do they normalize degradation? Is routine humiliation presented as banter, entertainment, or "just politics"? Are public punishments of dissenters treated as deserved or funny?
- Do they scapegoat dignity? Are people who insist on boundaries, truth, or fairness framed as fanatics, troublemakers, or traitors?
- Do they trivialize or erase structural extraction? Are systemic patterns reduced to bad apples or culture-war distractions, while real alternatives are omitted or mocked as utopian?
If the answer is yes to most of these, the emission is functioning as parasitic propaganda — regardless of its factual accuracy on narrower points.
G.3 Using TTM to Test Narratives
The Transcendence Trajectory Matrix (TTM) analyzes specific stories, shows, speeches, and campaigns at the level of behavior and framing:
- It counts what characters and systems actually do (behavioral baselines).
- It measures how those actions are framed (admiring, neutral, critical).
- It derives what the narrative functions as training for: illuminating, cautionary, contested, normalizing, or celebrating harm.
Within this framework, you can combine the two lenses:
- Use CFF to identify whether the emitting field is operating from native conscious function or regressing toward predatory drives.
- Use TTM to see whether a narrative functions as illuminating/cautionary about extraction, or as normalizing/celebrating extraction and degradation.
Practical test:
If an actor repeatedly emits narratives that TTM codes as normalizing or celebrating humiliation, domination, and unaccountable power — especially when those narratives map onto real extraction structures — they are functioning as a propaganda node for the parasitic web, regardless of their declared politics.
G.4 Questions to Keep in View
- Who is allowed to keep their dignity in this story?
- Whose humiliation is made entertaining, necessary, or invisible?
- What forms of extraction are treated as inevitable, funny, or beyond question?
- Are there visible alternatives that preserve dignity and reduce extraction — or are all alternatives caricatured?
- After exposure, do I feel clearer about mechanisms, or more numb to them?
If, over time, a person or institution keeps giving the same answers to these questions, you do not need access to their meetings to know which side of the field they serve.