THE EXPLOITATION DIAGNOSTIC
A Structural Screening Framework for Identifying Relational Abuse
Trinket Soul Framework — Brief No. 6
Michael S. Moniz
February 2026
A supplementary brief to the Trinket Soul Framework series
Creative Commons Attribution-NonCommercial-ShareAlike 4.0
A NOTE ON SCOPE AND INTENT
This brief presents a structural framework for identifying exploitative relationship dynamics. It is derived from the theoretical analysis in Volume I of the Trinket Soul Framework (The Physics of Connection, Chapter 10) and is offered as a complementary tool to existing screening instruments, not as a replacement for them.
The framework’s contribution is specificity at an earlier stage. Most existing screening tools for intimate partner violence and relational abuse focus on identifiable behaviors: physical violence, financial control, isolation, verbal degradation. These tools are essential and effective at detecting established abuse. The structural approach presented here attempts to identify architectural patterns—the underlying relational dynamics—that precede and enable those behaviors, potentially allowing earlier detection and intervention.
This document is intended for therapists, counselors, domestic violence advocates, clinical social workers, and researchers studying relational dynamics. It is not a self-diagnosis tool. If you are in a relationship that concerns you, please seek guidance from a qualified professional or contact the National Domestic Violence Hotline (1-800-799-7233).
THE STRUCTURAL APPROACH TO EXPLOITATION
1. Why Structure Matters Before Behavior
Relational abuse follows patterns. The specific behaviors vary enormously—across cultures, personalities, socioeconomic contexts, and relationship types—but the structural dynamics are remarkably consistent. An exploitative relationship has a recognizable architecture regardless of whether the exploitation manifests as physical violence, emotional manipulation, financial control, or coercive caregiving.
The Trinket Soul Framework (Volume I) proposes that this architecture can be described in terms of four structural dimensions that function as diagnostic overrides—meaning that a substantial compromise on any one of them indicates an unhealthy dynamic regardless of how the relationship performs on other measures like exchange frequency, emotional intensity, or reported satisfaction.
This last point is critical. Many exploitative relationships exhibit high trinket velocity (frequent exchange), deep gravity wells (intense attachment), and even high reported satisfaction at certain phases. A diagnostic that relies only on “how connected do you feel?” will miss exploitation entirely. The structural approach asks different questions—questions about the architecture of the exchange rather than its intensity.
2. The Four Structural Dimensions
2.1 Reciprocity Balance
The question: Is the relational exchange roughly symmetric in effort, vulnerability, and power?
In a healthy relationship, both partners contribute effort, both take emotional risks, and both have meaningful influence over shared decisions. The balance does not need to be perfectly equal at every moment—natural fluctuations occur around illness, career stress, and life transitions. What matters is whether the structural pattern is symmetric over time.
In an exploitative relationship, the pattern is structurally asymmetric: one partner consistently gives more, adjusts more, accommodates more, and yields more. The asymmetry may be difficult to see from outside—and even from inside—because the exploiting partner often frames the imbalance as natural, earned, or the other partner’s choice.
Early indicators of structural asymmetry:
One partner consistently initiates contact, plans activities, and manages the emotional climate while the other receives these efforts without reciprocating. One partner modifies their behavior, preferences, and social connections to accommodate the other, while the other makes no comparable adjustments. One partner’s needs, moods, and preferences reliably take priority in decisions, not through explicit negotiation but through an unspoken pattern that both partners have come to accept as “normal.”
These indicators may not yet involve any behavior a standard screening tool would flag. No one is being hit, controlled, or isolated. But the structural pattern—one economy feeding another without reciprocal return—is already exploitative in form, even if not yet in degree.
2.2 Autonomy Preservation
The question: Does the relationship increase or decrease each person’s capacity for independent action?
Arthur Aron’s self-expansion theory, supported by substantial empirical research, demonstrates that people in healthy relationships develop broader skills, perspectives, interests, and social networks. The relationship expands each person’s world. You learn things from your partner. You meet their friends. You try activities you wouldn’t have tried alone. Your sense of who you are and what you can do grows.
Exploitative relationships produce the opposite: self-contraction. The victim’s world gradually narrows. Friendships thin out. Independent interests are abandoned or discouraged. Skills atrophy. The victim becomes increasingly dependent on the relationship for identity, social connection, and practical functioning—which, critically, increases the exploiting partner’s leverage and makes leaving more difficult.
Early indicators of self-contraction:
The person’s social network has shrunk since the relationship began, and the shrinkage correlates with the partner’s preferences or comfort rather than with natural life changes. Activities and interests the person previously enjoyed have been abandoned, not through a natural evolution of preferences but through the partner’s discouragement, jealousy, or competing demands. The person describes their identity increasingly in terms of the relationship (“we” replacing “I”) not as a healthy integration but as a loss of independent selfhood.
2.3 Safety
The question: Can both partners express dissent, set boundaries, and withdraw from interactions without punishment?
Safety in this framework means something specific: the structural freedom to say “no,” to disagree, to set limits, and to take space—without triggering retaliation. Retaliation can be overt (anger, threats, physical violence) or covert (withdrawal of affection, guilt induction, martyrdom, silent treatment, bringing up past grievances as punishment for present boundaries).
In a healthy relationship, boundaries are respected even when they are inconvenient. A partner who says “I need space tonight” receives that space. A partner who disagrees about a decision is heard and negotiated with. Conflict is uncomfortable but not dangerous.
In an exploitative relationship, boundaries trigger escalation. The exploiting partner experiences the victim’s “no” not as a legitimate relational act but as a threat to their control—and responds with behavior designed to extinguish the boundary-setting. Over time, the victim learns that boundary-setting has a cost, and they stop doing it. The absence of conflict in the relationship is not peace. It is suppression.
Early indicators of compromised safety:
The person modifies their honest opinions, preferences, or behaviors to avoid their partner’s negative reactions. They describe feeling “like walking on eggshells.” They pre-screen their own behavior through the lens of “will this upset them?” rather than “is this what I want?” Conflicts that do occur are resolved not through genuine negotiation but through the person yielding to restore the partner’s equilibrium. The person has stopped raising legitimate concerns because the cost of raising them exceeds the cost of bearing them silently.
2.4 Reinforcement Pattern
The question: Is the relationship’s reward schedule consistent or intermittent?
This dimension is derived from Volume I’s analysis of trauma bonding (Chapter 10.3). Behavioral psychology has established since Skinner’s work in the 1950s that intermittent reinforcement—rewards delivered on an unpredictable schedule—produces the strongest and most extinction-resistant behavioral patterns. This is the mechanism behind gambling addiction: the unpredictability of the reward makes the behavior more compulsive, not less.
In a healthy relationship, the reward pattern is relatively consistent. Warmth, affection, and safety are the baseline. Conflict is the exception. The brain builds a stable prediction model: “This person is reliably warm and safe.”
In a trauma bond, the reward pattern is intermittent. The exploiting partner alternates unpredictably between intense affection (love bombing) and cruelty, withdrawal, or punishment. The victim’s brain cannot build a stable model. Instead, it builds a model optimized for an unpredictable reward schedule—hypervigilant, constantly scanning for cues, interpreting every signal through the lens of “are they about to be kind or cruel?”
The result is paradoxical: the trauma bond feels more intense than a healthy bond, not less. The relief when a good period arrives is neurochemically powerful because it follows deprivation and threat. The victim may describe the good periods as “amazing”—and they are describing a real neurochemical experience. But it is the experience of intermittent reinforcement, not of genuine safety.
Early indicators of intermittent reinforcement:
The person describes their partner’s behavior as unpredictable: “I never know which version of them I’m going to get.” The relationship oscillates between periods of extraordinary closeness and periods of distance, coldness, or conflict, without clear external triggers for the shifts. The person describes the good periods as unusually intense—more intense than anything they’ve experienced in stable relationships. The person finds themselves preoccupied with reading their partner’s signals, adjusting their own behavior to stay in the “good” cycle.
THE SCREENING FRAMEWORK
3. How the Dimensions Interact
The four dimensions are not independent. They form a diagnostic pattern:
Reciprocity imbalance creates the structural basis for exploitation: one partner extracts more than they contribute. Autonomy contraction creates the dependency that makes the exploitation sustainable: the victim’s world narrows until the relationship is their primary source of identity, social connection, and practical support. Safety compromise creates the enforcement mechanism: the victim learns that resistance has costs. Intermittent reinforcement creates the psychological binding: the unpredictable reward schedule produces attachment that is disproportionate to the relationship’s actual quality.
The combination is architecturally specific. A relationship with reciprocity imbalance but preserved autonomy and safety is unequal but not necessarily exploitative—the less-invested partner may simply be avoidant or going through a difficult period. A relationship with intermittent reinforcement but preserved autonomy is volatile but not necessarily trapping—the person retains the resources to leave. The exploitation architecture requires multiple dimensions to be compromised, because each dimension enables the others.
This has a practical implication for screening: any single dimension in significant compromise warrants clinical attention. Two or more dimensions in significant compromise warrant serious concern. All four dimensions compromised is the structural signature of an entrenched exploitative dynamic.
4. The Structural Screening Questions
The following questions are designed for use in clinical settings—therapy sessions, counseling intake, domestic violence advocacy. They assess structure rather than behavior, which means they can identify problematic patterns before the patterns produce the behaviors that existing screening tools detect.
Reciprocity Assessment
“When you think about the effort each of you puts into the relationship—initiating contact, planning time together, accommodating each other’s needs—does the pattern feel roughly balanced, or does one of you consistently do more?”
“When was the last time your partner changed their plans, preferences, or behavior to accommodate something important to you? How often does that happen compared to how often you accommodate them?”
“If you stopped initiating contact and planning activities, what do you think would happen to the relationship?”
Autonomy Assessment
“Compared to before this relationship, do you have more friends or fewer? More interests and activities or fewer? More confidence in your own judgment or less?”
“Is there anything you used to enjoy doing that you’ve stopped doing since this relationship began? If so, why did you stop?”
“If this relationship ended tomorrow, how prepared would you feel to manage your life independently? What resources, connections, or skills would you need that you currently don’t have?”
Safety Assessment
“When you disagree with your partner about something important, what typically happens? How do those disagreements end?”
“Do you ever find yourself deciding not to say something, not because it’s unimportant, but because you’re concerned about how your partner will react?”
“What happens when you set a boundary—when you say no to something your partner wants? How does your partner typically respond?”
Reinforcement Pattern Assessment
“Would you describe your partner’s behavior as generally consistent, or does it feel unpredictable—like you’re never sure which version of them you’ll get?”
“How would you describe the best periods in your relationship? Are they very different from the worst periods? How quickly does the relationship shift between them?”
“Do you find yourself spending a lot of mental energy reading your partner’s mood, trying to figure out where things stand between you?”
WHY THIS APPROACH ADDS VALUE
5. Complementing Existing Tools
The structural screening framework is not designed to replace validated instruments like the Danger Assessment (Campbell, 2003), the Conflict Tactics Scale (Straus, 1979), the Women’s Experience with Battering Scale (Smith et al., 1995), or the HITS screening tool (Sherin et al., 1998). These instruments are empirically validated and serve essential functions.
What the structural framework adds is earlier detection. Existing tools are most effective at identifying established patterns of abuse—patterns that have already produced identifiable behaviors. The structural approach identifies the architectural preconditions for those behaviors: the reciprocity imbalance, autonomy contraction, safety compromise, and reinforcement manipulation that create the conditions under which abuse becomes possible and sustainable.
A client who presents with vague relational dissatisfaction—“something feels off but I can’t explain what”—may not trigger any existing screening tool because no flagged behaviors have occurred. But the structural assessment may reveal that two or three dimensions are already compromised, indicating a relational architecture that is pre-exploitative even if no overt exploitation has yet occurred.
Early identification enables early intervention: couples therapy, boundary-setting support, safety planning, or monitoring—before the architecture produces the behaviors that make intervention more difficult and more dangerous.
6. Addressing the High-Functioning Exploitation Problem
One of the most challenging clinical presentations is the high-functioning exploitative relationship: a dynamic that looks, from the outside and often from the inside, like a passionate and committed partnership. The couple may report high satisfaction. Their friends may describe them as “perfect together.” The relationship exhibits high velocity (constant contact), deep attachment, and intense emotional exchange.
Standard screening may not flag this relationship because the behaviors associated with abuse are either absent or well-concealed. But the structural assessment reveals the architecture: asymmetric reciprocity, contracting autonomy, compromised safety (expressed as the victim’s automatic accommodation rather than overt coercion), and intermittent reinforcement producing disproportionate attachment.
The framework’s core insight here is that intensity is not the same as health. A relationship can be intense, consuming, and deeply felt while being structurally exploitative. The structural assessment provides the diagnostic vocabulary to distinguish intensity-from-health from intensity-from-exploitation.
7. Why Victims Don’t “Just Leave”: The Architectural Explanation
A common and damaging question directed at victims of relational abuse is: “Why don’t you just leave?” The framework provides a structural answer that goes beyond “weakness” or “poor judgment”:
Gravity well depth. Years of high-velocity exchange have created dense neural encoding of the partner. The victim’s brain is architecturally organized around the relationship—predictions, habits, identity structures, emotional regulation patterns all route through the partner. Leaving requires not just a decision but a massive neural rewrite: the same metabolically expensive process as grief, undertaken while the system is still active and applying pressure.
Autonomy contraction. The victim’s independent resources—social network, financial independence, practical skills, self-concept—have been eroded. Leaving requires resources that the exploitation has systematically reduced.
Intermittent reinforcement. The attachment pattern is the most extinction-resistant kind. The victim is not attached despite the cruelty. They are attached because of the reward schedule—which is, by design, the schedule that produces the deepest and most persistent behavioral bonds.
Computational inertia. All established relational patterns resist modification. The deeper and longer-standing the pattern, the more energy is required to change it. An exploitative relationship of ten years’ duration has ten years of computational inertia working against the decision to leave.
This is not a justification for staying. It is a structural explanation for why leaving is hard—and why professional support is not optional but architecturally necessary. The victim is not fighting a feeling. They are fighting an architecture.
FOR PRACTITIONERS
8. Integration into Clinical Practice
The structural screening questions (Section 4) can be integrated into existing intake protocols as a supplement to standard screening. They require no specialized training beyond familiarity with the four dimensions and the interaction pattern described in Section 3.
When to use the structural assessment: During initial intake with any client presenting relational concerns. During ongoing therapy when a client describes relational dynamics that feel “off” without meeting criteria for standard abuse screening. When a client presents with anxiety, depression, or identity confusion that appears relational in origin.
What to do with the results: A single dimension in significant compromise warrants exploration and monitoring. Two or more dimensions in significant compromise warrant direct clinical attention and possible safety planning. All four dimensions compromised warrants the same intervention protocol as identified abuse—safety assessment, safety planning, and referral to specialized domestic violence resources.
A caution: The structural assessment identifies patterns, not verdicts. A relationship showing reciprocity imbalance may reflect temporary circumstances rather than exploitation. Context matters. The structural assessment should inform clinical judgment, not replace it.
9. Research Directions
The structural screening framework generates testable predictions that could be validated through empirical research:
Prediction 1: Clients who score high on two or more structural dimensions at intake but low on existing behavioral screening tools will be significantly more likely to report overt abuse within 12–24 months than clients who score low on both. This would validate the framework’s claim of earlier detection.
Prediction 2: Among relationships that have been independently identified as abusive, the intermittent reinforcement dimension will be the strongest predictor of the victim’s difficulty in leaving, controlling for relationship duration and severity of abuse.
Prediction 3: Victims of relationships scoring high on all four structural dimensions will show greater post-separation distress and longer recovery timelines than victims of relationships scoring high on only one or two dimensions, consistent with deeper gravity wells requiring more metabolic rewriting work.
CONCLUSION
Exploitation has an architecture. It is not random cruelty. It is a structural pattern—reciprocity imbalance, autonomy contraction, safety compromise, and intermittent reinforcement—that creates the conditions under which one person’s relational economy feeds another’s at the first person’s expense.
Naming that architecture precisely is the first step toward identifying it earlier, intervening more effectively, and helping victims understand that the difficulty of leaving is not a personal failure but a structural reality. The framework does not replace existing tools. It adds a layer of analysis that existing tools do not provide: the ability to see the architecture before the architecture produces the behaviors that current tools are designed to detect.
Earlier detection means earlier intervention. Earlier intervention means less harm.
© 2026 Michael S. Moniz
Brief No. 6 — The Exploitation Diagnostic
Creative Commons Attribution-NonCommercial-ShareAlike 4.0