Language has patterns. So does harm.

A behavior-based emotional abuse detector that sees what others miss.

Tether is a reflection tool, not a diagnostic service. No data is stored or shared.

Try Tether

Free, anonymous, browser-based.
No data saved. No account required.

About Tether

Tether is a behaviorally informed abuse pattern detector. It analyzes written language for subtle patterns of control, manipulation, and emotional harm — including gaslighting, blame-shifting, and DARVO cycles.It’s built for survivors, therapists, support networks, and anyone who’s ever asked:
“Is this normal?”

Tether is the first AI system built on Applied Behavioral Linguistics—an approach that decodes the function of language, not just the words. It reveals patterns like gaslighting, blame-shifting, and coercive warmth by asking: What is this message trying to do? Is it flipping blame, dodging accountability, or escalating control?Tether analyzes tone, behavioral function, emotional manipulation, and risk—all to make the invisible visible.
It’s not just abuse detection. It’s behavior, revealed.


What Won't Work

Couples CounselingBehavior ContractsForgiveness Frameworks"Better Communication” AdviceWaiting for Rock Bottom
In abusive dynamics, therapy can become a tool for manipulation. The abuser may perform well in front of a therapist, shift blame, or use therapy language to gaslight or control. Joint counseling can make survivors feel invalidated or pressured to “compromise” when the real issue is power imbalance—not communication.Behavior contracts are often suggested as a structured way to promote change. But in abusive relationships, contracts are often ignored, twisted into weapons (“you said YOU wouldn’t do XYZ either”), or used to show surface compliance without real accountability or change.Survivors are often encouraged to forgive too soon or without real repair.Forgiveness without justice or safety can retraumatize, silence pain, and enable repeat harm.Abuse is not a communication problem—it’s a control problem. Communication tools like “I statements” or “active listening” can be used against survivors or weaponized to create false equivalency.Many survivors wait, hoping things will finally hit a breaking point. But for chronic abusers, there often is no rock bottom—only a new form of harm. Your safety doesn’t have to wait for their collapse.

Abuser Profiles

The Power-ControllerThe ExploderThe Victim NarcissistThe Situational AbuserThe Dependent PossessorThe EnforcerThe Overcorrector
Control is the goal. Compliance is the currency.  Uses threats, manipulation, or surveillance to maintain total dominance. Often appears calm or rational, but controls every detail behind closed doors.Unpredictable. Volatile. Apologetic until the next time.  Anger outbursts are used to intimidate or silence. May seem remorseful afterward but rarely takes real accountability.Weaponizes sympathy. Always the one who’s “really hurting.”  Uses DARVO, guilt-tripping, or false accusations to reverse blame and avoid consequences.“It only happens when…” isn’t the same as safe.Harm tied to specific stressors or conflict, but still abusive. Often denies a pattern exists.“I can’t live without you” becomes control.  Uses emotional blackmail, jealousy, and intense dependency to manipulate.Rigid beliefs. Entitled to obedience.  Uses ideology (gender roles, religion, “rules”) to justify abuse.  Uses punishment to “fix” their partner.Sees themselves as a righteous judge. Corrects behavior with shame or criticism.

Most abusers are not just one type. These profiles describe behavior patterns, not diagnoses. Many overlap or shift over time. The goal of this guide is clarity, not categorization.

🔒 Data Use & PrivacyTether does not store, save, or transmit any messages. All analysis runs locally in your browser or through Hugging Face’s secure API.No identifying information is ever collected, stored, or shared.Training data included real messages from known abuse cases (used with consent), including the creator’s own experience. The tool was built to illuminate patterns, not to surveil.❤️ Your data never leaves your screen.

© 2025 Tether AI by Tether Insight LLC. All rights reserved. Tether and the reflection engine are proprietary tools for emotional pattern detection.

Tether is a behavioral pattern detection system built to recognize and respond to emotional abuse.Using machine learning and trauma-informed design, Tether analyzes language for subtle abuse cues—things like gaslighting, DARVO, control, and escalation risk. It was created to support survivors, counselors, and professionals in naming what often slips through the cracks.But Tether is more than software. It’s a framework built by survivors, shaped by behavior analysts, and grounded in lived experience. Every feature—from sentiment tracking to motif analysis—is designed to serve those navigating the aftermath of coercion, manipulation, or trauma.Tether is also deeply connected to Stormcaller Hollow—our real-world space for recovery, ritual, and return. While Tether maps the language of harm, Stormcaller offers the somatic work of healing—through animal care, quiet cycles, and the land itself.Together, they form a full circle: the naming, and the mending.

Abuse Pattern Archive DisclosureAbuse Pattern Reports Published on This Site
This site hosts reports based on communication pattern analysis submitted by individuals who affirm that they are the recipient or recorder of the provided messages, videos, or other media.
Reports are generated using the Tether Pro forensic communication system and published only when abuse patterns meet strict thresholds for control, escalation, and psychological manipulation.These reports are not criminal accusations. They are behavior-based documentation meant to surface communication patterns that align with known abuse dynamics (e.g., DARVO, coercive control, emotional invalidation). All reports are reviewed for consent and accuracy prior to publication.🔹 Public Naming CriteriaIndividuals are named publicly only when:
• The submission includes clear, unaltered communication evidence (e.g., text messages, video)
• The patterns meet a defined threshold for abusive behavior (e.g., abuse score, escalation frequency)
• The submitting party has signed a digital consent form confirming the truthfulness of the submission and granting permission to publish
🔹 Request for Review or RemovalAny individual named in a published report may request a review of the content by contacting [email protected]All review requests must include:
• The full name of the individual
• The URL or archive title of the report
• A written explanation of the concern
• Any supporting materials for re-evaluation
We review all requests seriously but do not guarantee removal unless evidence shows the original submission was fraudulent or did not meet our publishing criteria.🔹 Data Storage and ConsentSubmitted evidence is stored securely and privately.
We do not share survivor-identifying information or raw evidence with third parties.
Publishing consent can be revoked at any time by the original submitter using their original submission email or ID.