Behavioral Pattern Detection

Language has patterns.
So does harm.

A behavior-based emotional abuse detector that sees what others miss — gaslighting, DARVO, coercive control, escalation cycles.

Reflection tool, not a diagnostic service. No data stored or shared.

Free Anonymous Browser-based No account required
Relationship Pattern Analyzer
Powered by Applied Behavioral Linguistics
Your messages are analyzed locally. No data is stored, saved, or transmitted. Nothing leaves your screen.
Also free
Something's Off

Not sure what you're seeing in someone else's relationship? A 3-minute quiz that tells you plainly what you're looking at — and what to do next.

Take the quiz →
Also free
Don't Look Away

A training for people who know an abuser — not the victim, the people around him. How to say something, how to sustain it, how to do it even when nothing changes.

Start the training →

What won't work.

In abusive dynamics, most conventional interventions either fail or actively cause harm. Knowing what doesn't work is as important as knowing what does.

Couples counseling
Therapy can become a tool for manipulation. The abuser may perform well in front of a therapist, shift blame, or use therapy language to gaslight. Joint counseling puts the survivor in an impossible position — asked to "compromise" when the real issue is a power imbalance, not a communication problem.
Behavior contracts
Often ignored, twisted into weapons ("you said YOU wouldn't do that either"), or used to demonstrate surface compliance with no real accountability or change. A contract requires good faith from both parties. Abuse doesn't involve good faith.
Forgiveness frameworks
Survivors are often encouraged to forgive too soon or without real repair. Forgiveness without justice or safety can retraumatize, silence pain, and enable repeat harm. Healing is not contingent on forgiving someone who is still causing harm.
"Better communication" advice
Abuse is not a communication problem — it's a control problem. Communication tools like "I statements" and active listening can be weaponized to create false equivalency or used against the survivor. The problem is not how you're expressing yourself.
Waiting for rock bottom
For chronic abusers, there often is no rock bottom — only a new form of harm. Many escalate rather than collapse. Your safety doesn't have to wait for their breakdown, their epiphany, or the moment they finally "hit consequences." That moment may never come.

Abuser profiles.

Most abusers are not just one type. These profiles describe behavior patterns, not diagnoses. Many overlap or shift over time. The goal is clarity, not categorization — because naming a pattern is the first step to seeing it clearly.
01The Power-Controller
Control is the goal. Compliance is the currency. Uses threats, manipulation, or surveillance to maintain total dominance. Often appears calm or rational — the controlled exterior is not evidence of safety, it's the method.
02The Exploder
Unpredictable. Volatile. Apologetic until the next time. Anger outbursts are used to intimidate or silence. May seem remorseful afterward but rarely takes real accountability. The remorse is part of the cycle, not the end of it.
03The Victim Narcissist
Weaponizes sympathy. Always the one who's "really hurting." Uses DARVO, guilt-tripping, or false accusations to reverse blame and avoid consequences. If you feel confused about who the actual victim is, this profile is often involved.
04The Situational Abuser
"It only happens when..." isn't the same as safe. Harm is tied to specific stressors or conflict, but it's still a pattern. Often denies a pattern exists. The situation doesn't cause the abuse — it's the trigger that reveals what was already there.
05The Dependent Possessor
"I can't live without you" becomes control. Uses emotional blackmail, jealousy, and intense dependency to manipulate. Love and control are presented as the same thing. The intensity feels like devotion until it doesn't.
06The Enforcer
Rigid beliefs. Entitled to obedience. Uses ideology — gender roles, religion, household "rules" — to justify abuse. Positions harm as correction or order. The ideology is the cover. Control is still the goal.
07The Overcorrector
Sees themselves as a righteous judge. Corrects behavior with shame or criticism. Positions themselves as the reasonable one trying to manage an unreasonable partner. The correction is constant. The standard is always just out of reach.

Abuser Pattern Archive.

The Archive hosts published reports based on communication pattern analysis submitted by individuals who affirm they are the recipient of the provided messages. Reports are generated using Tether Pro and published only when abuse patterns meet strict thresholds.

Publishing criteria

Individuals are named publicly only when all of the following conditions are met:

  • The submission includes clear, unaltered communication evidence — text messages, video, or documented interaction
  • Patterns meet a defined threshold for abusive behavior including abuse score, escalation frequency, and manipulation tactic density
  • The submitting party has signed a digital consent form confirming truthfulness and granting permission to publish

These reports are not criminal accusations. They are behavior-based documentation meant to surface communication patterns that align with known abuse dynamics: DARVO, coercive control, emotional invalidation.

Review and removal

Any individual named in a published report may request a review by contacting usetetherai@gmail.com. All review requests are taken seriously. Removal is not guaranteed unless evidence shows the original submission was fraudulent or did not meet publishing criteria.

View the Pattern Archive → Submit evidence →

Find help.

If you are in immediate danger, call 911. If you are not in immediate danger but need support, these resources are confidential and available now.

24/7 Crisis Line
National DV Hotline
Call or text: 1-800-799-7233
Text START to 88788
Chat: thehotline.org
Confidential. They will not tell you what to do — they will help you understand your options.
Sexual Assault
RAINN Hotline
Call: 1-800-656-4673
Chat: rainn.org
Confidential support for survivors of sexual assault, abuse, and incest.
Crisis Text Line
Text-Based Support
Text HOME to 741741
Free, 24/7 crisis support via text. For anyone in crisis — not limited to DV.
Eating Disorders
Alliance for Eating Disorders
Call: 1-866-662-1235
allianceforeatingdisorders.com
Support for those experiencing disordered eating, often co-occurring with abusive relationships.

Protecting yourself online.

After visiting any site for help, clear your browser history. On most phones: Settings → Safari/Chrome → Clear History and Website Data. On desktop: Ctrl+Shift+Delete (Windows) or Cmd+Shift+Delete (Mac). You can also open an Incognito/Private window before searching — this leaves no history automatically.
If your partner has access to your phone, use a device they don't check — a library computer, a friend's phone, or a work device. You can also use a private browsing window. The National DV Hotline website has a quick-exit button that immediately redirects to a neutral site.
Check your phone's location sharing settings. Review which apps have location access. If you suspect spyware, the National DV Hotline has a technology safety team — call or text 1-800-799-7233 and ask specifically about tech safety. Do not factory reset your phone without advice, as this can alert an abuser who monitors remotely.
Screenshot concerning messages and email them to an account your partner doesn't know about — not your main email if they have access. You can also upload screenshots to a Google Drive folder with a neutral name using a new account. Date and note the context for each screenshot.

The science behind it.

Tether is built on Applied Behavioral Linguistics — an approach that decodes the function of language, not just the words. It reveals patterns like gaslighting, blame-shifting, and coercive warmth by asking: what is this message trying to do?

How it works

Tether analyzes tone, behavioral function, emotional manipulation, and risk across written messages. It identifies patterns including DARVO cycles, escalation clusters, boundary violation frequency, and manipulation tactic density.

Unlike tools that look for keywords, Tether looks at behavioral function — the purpose a message is serving, not just its content. "I just worry about you" can be care or surveillance. Context and pattern determine which.

Training data included real messages from known abuse cases, used with consent and including the creator's own experience. It was built from the inside out.

Data and privacy

Tether does not store, save, or transmit any messages. All analysis runs locally in your browser or through Hugging Face's secure API. No identifying information is ever collected, stored, or shared.

Your data never leaves your screen.

Tether is a reflection tool, not a diagnostic service. It is not a substitute for professional support — but it can help you see what you're dealing with clearly enough to know what kind of support to seek.

Questions: usetetherai@gmail.com