DARVO Is a Sequence, Not a Label: How the TTI Framework Reveals the Mechanics of Coercive Control

1st May 2026 - Stand Again

Why Naming Tactics Is Not Enough

The vocabulary of coercive control has grown considerably in recent years. 

Clinicians, lawyers, and advocates can now identify and name a wide range of abusive behaviours: gaslighting, isolation, financial control, threats, emotional manipulation, surveillance. This growing recognition matters. It is the foundation of any effective response.

And it is where most frameworks stop. They name the tactic. They describe what it looks like. They may categorise it by type. What they rarely do is explain why a particular tactic works on a particular person, or what measurable effect it produces on that person’s capacity to function. 

A clinician can sit with a client and say “what you are describing sounds like gaslighting.” That is useful. What the clinician often cannot explain is why this particular client is so vulnerable to it, why another client with similar experiences is not, and what specifically the gaslighting has damaged in the first client’s daily functioning. The tactic has been named. The mechanism remains invisible.

There is a second problem. Coercive control tactics are rarely deployed in isolation. They are stacked in sequences where each tactic creates the conditions for the next one to land. A victim who has been isolated is more vulnerable to gaslighting because the social reality check has been removed. A victim whose finances are controlled is more vulnerable to threats because the exit has been blocked. 

The interaction between tactics is where the devastation lives, and individual tactic identification cannot see it. It looks at each piece separately and misses the machine.

TTI: Abuse as a Chain Reaction

TTI stands for Tactic, Trigger, Impact. 

It describes abuse as a chain reaction. 

The abuser deploys a tactic. That tactic lands on a trigger inside the victim. The trigger activates and produces an impact. 

The chain is the abuse. A tactic that does not find a trigger and produce an impact is attempted abuse: the intent was present, the behaviour was deployed, and the chain did not complete. When the chain does complete, the result is measurable harm to the victim’s capacity to engage in ordinary life.

The same chain operates across every domain of coercive control. A guilt trip lands on a man’s belief that good partners sacrifice everything, and he abandons his own needs to keep the peace. Constant criticism finds a childhood wound where he was never good enough, and his confidence erodes until he doubts his own competence. A threat to take the children activates his identity as a father and protector, and he complies with whatever she demands. Different tactics. Different triggers. Different impacts. The same chain.

Every moment of confusion, shame, or capitulation a man experiences in an abusive relationship can be traced through this sequence. The tactic that landed. The trigger it found. The impact it produced. Understanding this chain, and how each link functions, is the first step toward breaking its grip.

The Three Links

Tactic: the external behaviour

The tactic is what the abuser does. The yelling, the silent treatment, the guilt trips, the accusations, the manipulation. It is the observable action that can be named, described, and documented. Some tactics are loud and obvious. Others are quiet and easily missed: withdrawing affection, micro-managing emotions, subtle commentary that lands as criticism only in retrospect. The quiet tactics are often more damaging precisely because they are harder to name.

The tactic alone is not what makes something abuse. 

Tactics are behaviours, and behaviours exist on a spectrum. A single instance of raised voice during an argument is not necessarily abuse. What makes a tactic abusive is the full chain: when it activates a trigger in the target and produces an impact that is harmful or diminishes the victim’s capacity to function. This includes impacts that look like absence: numbness, dissociation, shutdown. These are psychological destabilisation. The chain has completed. The man who goes numb is still being abused.

Trigger: the internal vulnerability

The trigger is where the tactic lands. It is the internal vulnerability the tactic touches, and it is deeply personal to the victim. This is not victim-blaming. Triggers do not mean the abuse was the victim’s fault. They reveal where past pain lives unhealed, where development was incomplete, where society installed beliefs that create exposure, or where prior abuse left its mark. They explain why the same tactic affects different people differently. And they point toward where therapeutic work is needed.

Triggers can be categorised by their source, and the source matters clinically because it directs the type of intervention required. 

  • Learned behaviours are the gaps and immaturities in a man’s relational toolkit: what he was never taught, what he learned incorrectly, where he has not yet matured. These point toward skill building and education. 
  • Pre-conditioned responses are automatic reactions installed through repeated exposure to prior abuse, whether from previous partners, parents, or family systems. A flinch learned in childhood, silence learned in a previous relationship. These point toward trauma processing. 
  • Cultural and societal narratives are beliefs absorbed from the surrounding environment: “real men don’t complain,” “a good father sacrifices everything,” “men can’t be victims.” The abuser does not need to install these beliefs. Society already did. She leverages what is already there. These point toward examining and questioning inherited frameworks. 
  • Prior wounds are injuries from life that have not been processed: abandonment, betrayal, significant loss. When a tactic touches a prior wound, it activates the original injury. The response is disproportionate to the current situation because the body and psyche are responding to accumulated pain. These point toward grief work and healing specific life events.

Each source indicates different intervention. This is the clinical precision that broad labels cannot provide. A clinician who identifies the trigger source can direct the work accordingly, and the client begins to understand not just what was done to them, but why it landed where it did.

Impact: the outcome

The impact is what the tactic achieves when it successfully activates a trigger. It is what the abuser gets and what the victim is left holding. Impacts fall into four categories. 

  • Extraction: the victim becomes invested in the abuser, orienting himself toward earning her approval, giving attention, validation, labour, money, and time because he believes she deserves them. 
  • Direct compliance: the victim does as he is told, modifying his behaviour, his schedule, his habits, his relationships to avoid her reaction. 
  • Emotional compliance: the victim shapes his emotional life around hers, appeasing, self-silencing, becoming attuned to her moods and organising himself around managing them. 
  • Psychological destabilisation: the victim begins to doubt his memory, his perception, his sanity, at both a cognitive level (doubting his account of events) and an emotional level (doubting the validity of his responses).

These impacts do not disappear when the relationship ends. He carries them forward, sometimes unconsciously repeating patterns, choosing similar dynamics, or becoming hypervigilant in ways that sabotage peace. The destabilised self-trust persists. The compliance patterns persist. This is why intervention at the impact level requires more than distance from the source of the tactic. It requires deliberate work to build new responses and practise them until they replace the conditioned patterns.

Why All Three Links Matter

If intervention addresses only the impact, the work is masking. The man can be coached to stop fawning, stop apologising, stop going quiet. If the trigger that produced that response is still live, the pain goes underground. He white-knuckles new behaviours while the wound festers beneath. The presenting symptoms may improve. The underlying vulnerability remains. The next relationship, the next conflict, the next tactic will find it.

If intervention addresses only the trigger, the work is incomplete. The man may process the childhood wound that made him vulnerable to criticism. He may understand where the sensitivity came from and grieve what caused it. If he is still in the relationship, if the abuser is still present, the tactic may find a different trigger or simply wear down the healing through repetition. Different trigger, same chain. The therapeutic work is undermined by ongoing exposure to the source.

True healing requires all three links to be addressed. Tactic, trigger, impact. This is how decades of abuse are untangled, one chain at a time. The man does not have to dismantle the whole web at once. He finds one chain. He follows it from tactic to trigger to impact. He works it. Then he finds the next. The more chains he unravels, the easier it gets. Patterns emerge. He starts to notice the same triggers appearing across different tactics. He starts to recognise the same impacts showing up in different contexts. What once felt like incomprehensible chaos begins to reveal its structure.

TTI gives the clinician something to follow. Any moment of confusion a man presents with, any lingering shame he cannot explain, any behaviour he does not recognise as his own, can be traced back through the chain.

One Chain at a Time

In reality, abuse does not arrive in tidy chains. It is chaotic, messy, and layered. A man may face one tactic that hits five different triggers simultaneously. He may have one internal wound that is activated by every tactic in the taxonomy. The chains do not come one at a time. They knot together. They wrap around him until he is tangled in a web he cannot see his way out of.

This is why recovery can feel paralysing. He is not trying to escape one chain. He is trying to untangle dozens.

But he does not have to dismantle the whole web at once. He finds one chain. He follows it from tactic to trigger to impact. He works it. Then he finds the next. The more chains he unravels, the easier it gets. Patterns emerge. He starts to notice the same triggers appearing across different tactics. He starts to recognise the same impacts showing up in different contexts. What once felt like incomprehensible chaos begins to reveal its structure. The web loosens. And chain by chain, he frees himself.

How Tactics Are Deployed

TTI operates at the level of individual interactions, and it becomes most powerful when applied to the patterns in which tactics are deployed. Tactics fall into five deployment patterns, each with a different function and a different clinical signature.

  • One-off incidents are single events that complete the chain: a tactic hits a trigger and produces an impact. They are what men often remember and report because they are discrete and nameable. They are rarely the whole picture.
  • Conditioning is the long game. The same tactic is repeated, consistently and incrementally, to widen the victim’s window of tolerance. The first time it happens, it feels off. By the fiftieth time, it barely registers. This is how abuse becomes normalised.
  • Reactive training is where the victim is trained through repeated action and consequence to respond in specific ways. Speak up and she rages. Next time, he stays silent. His behaviour becomes shaped by reactivity, and he is no longer authentically choosing his responses. Men are particularly vulnerable because their pragmatic nature frames this as “learning what works” when it is actually trained compliance.
  • Switched attack patterns occur when one tactic does not land as intended and the abuser pivots to another. Gaslighting fails, she switches to guilt. Guilt does not land, she tries anger. Anger fails, she cries. The victim experiences rapid cycling: guilt to mockery to tears to rage to withdrawal, all in a single interaction. The underlying logic is substitution. She is searching for the tactic that will complete the chain.

The fifth pattern is the one that matters most for what follows.

  • Stacked combination attacks are sequences of multiple tactics deployed in order, where each tactic creates the conditions for the next one to land. The impacts compound. The sequence produces effects that no individual tactic could achieve alone. This is where TTI reveals something that individual tactic identification cannot see: the dependency chain between the phases, and the reason the sequence is devastating.

The most well-known stacked combination attack has a name that every clinician recognises.

DARVO: What TTI Reveals About a Pattern Everyone Already Knows

DARVO, Deny, Attack, Reverse Victim and Offender, was identified by psychologist Jennifer Freyd in 1997 to describe a common response pattern when abusers are held accountable. It has become standard vocabulary in clinical practice, legal advocacy, and public discourse. Therapists teach it. Lawyers recognise it. Victims learn to name it.

What has never been shown is that the order is structurally necessary. The three phases are typically presented as a description of what abusers do, as though naming the pattern is the same as understanding it. TTI applied to DARVO reveals something more precise: each phase activates a different psychological trigger in the victim, each phase depends on the damage done by the one before it, and the dependency chain between the three phases is the mechanism that makes the pattern devastating.

The sequence

A man raises a legitimate grievance with his partner. He names something that hurt him. He enters the conversation knowing what happened, with a clear account and the energy to hold his position. This is where the sequence begins.

  • Deny. She invalidates his experience. “That never happened.” “You’re making something out of nothing.” The tactic lands on his need for shared reality with his partner. Human beings are wired to co-construct reality with the people closest to them, and in intimate relationships this need is particularly strong. When the person he trusts most tells him that what he experienced did not happen, it does not simply create a disagreement. It fractures the shared ground he stands on. His certainty cracks. He entered knowing what happened. Now he is not sure. The original grievance is still on the table, but his confidence in it has been shaken. This is the setup.
  • Attack. She escalates. The conversation moves from the original issue to his character, his failings, his inadequacies. “You always do this.” “This is why nobody can stand being around you.” The tactic lands on a different trigger: his fear of conflict, his need to be seen as a good partner, his vulnerability to identity-level criticism. For men, attacks on competence, character, and adequacy land on values that sit at the core of masculine identity. The accusation that he is a bad partner, a bad father, a failure, consumes his cognitive and emotional resources. He is no longer thinking about the original issue. He is defending who he is. The crack that Deny opened has now widened. His perception was already shaken. His energy is now depleted. He is operating with compromised certainty and diminished capacity. This is the bridge.
  • Reverse Victim and Offender. She positions herself as the one who has been wronged. Tears arrive. Vulnerability is performed. “You always attack me.” “I don’t know why I even try.” The tactic lands on his empathy, his guilt, his sense of obligation as a partner. These are among the most reliable psychological entry points in intimate relationships, and they are particularly potent in men socialised to protect, provide, and take responsibility for their partner’s emotional state. Two phases ago, this reversal would have met resistance. He knew what happened. He had the energy to hold his position. He would have seen the manipulation. Now, with his certainty fractured and his capacity depleted, the reversal slides in where it could not have landed before. He apologises. He comforts. He takes responsibility for raising the issue. The original grievance is not only unresolved. It has been inverted. He is now the problem.

He entered the conversation knowing what happened. He leaves it apologising for raising it. Three phases, three different psychological entry points, targeted in an order that ensures each one is maximally exposed by the time it is reached.

The Dependency Chain

The power of DARVO is in the sequence. Remove or reorder any phase and the mechanism collapses. TTI makes this dependency visible.

If the abuser moves straight to the reversal without first denying and attacking, the victim’s perception is intact and his emotional resources are full. He knows what happened. He can see the manipulation for what it is. The reversal bounces off because the protective layers have not been stripped.

If Deny is followed by the reversal without the attack in between, his perception is shaken but his capacity is intact. He is uncertain about what happened, and he still has the energy to say “I need to think about this” or “Let’s return to what I raised.” The reversal is weakened because the depletion that Attack provides is missing.

If Attack is followed by the reversal without the denial, he is depleted but his perception is intact. He knows what she did. He may be too exhausted to fight in the moment, and he does not internalise the guilt because his factual foundation has not been compromised. He may withdraw, but the reversal does not stick.

The full sequence works because Deny removes certainty, Attack removes capacity, and Reverse Victim and Offender exploits the gap left by both. 

The stacking is not random. It is optimised. Each phase depends on the damage produced by the one before it, and each phase targets a different vulnerability in the victim. Deny activates his need for shared reality. Attack activates his fear and identity vulnerability. Reverse Victim and Offender activates his empathy and obligation. Three different psychological entry points, hit in a sequence that ensures each one is maximally exposed by the time it is targeted.

What This Means for Practice

The DARVO deconstruction demonstrates what TTI does when applied to a stacked pattern. It makes the dependency chain visible. It identifies which psychological triggers are activated and in what order. It shows how the cumulative impact across the sequence exceeds what any individual tactic would produce. And it creates a clinical roadmap for intervention.

If you understand that Deny works by exploiting the victim’s need for shared reality, you can do therapeutic work on that need. You can help the client build an internal reference point for truth that does not depend on his partner’s validation. If you understand that Attack works by targeting identity vulnerability and fear of conflict, you can help the client strengthen those specific areas. If you understand that Reverse Victim and Offender works by activating empathy and guilt, you can help the client recognise the activation in real time and build a pause between the trigger and the response. Each phase has a corresponding intervention. The framework creates precision where there was previously only a label.

For the victim, this precision is equally important. A man who has lived through hundreds of DARVO cycles may have learned to name the pattern. Naming it is a start. Understanding why it worked on him, why he could never hold his ground, why he always ended up apologising, is where the deeper healing lives. The answer is not that he is weak or that he lacks willpower. The answer is that the sequence was engineered to exploit specific vulnerabilities in a specific order, and that each phase stripped away a layer of protection that the next phase required to be absent. He was not outmatched by force. He was outmanoeuvred by structure. Understanding the structure is how he begins to dismantle it.

Beyond DARVO

DARVO is one pattern. Coercive control contains dozens. Reactive abuse, the cycle of violence, hoovering, FOG (Fear, Obligation, Guilt), dependency enclosure, authority capture, rescue entrapment, total environment control. Each of these involves multiple tactics deployed in sequence. Each of them works because the stacking creates effects that no single tactic could achieve alone. And each of them can be decoded using the same framework.

When TTI is applied to any stacked pattern, three things become visible. 

  • The dependency chain: which phase requires which preceding condition. 
  • The trigger sequence: which psychological vulnerabilities are activated and in what order. 
  • The compounding impact: how the cumulative damage across the sequence exceeds what any individual tactic would produce. 

These three elements give clinicians a precise map of how the abuse functioned in this particular relationship, with this particular victim, targeting these particular vulnerabilities.

That precision changes the work. Treatment becomes targeted. Documentation becomes structured around patterns and impacts. Safety planning becomes anticipatory, because if you understand the dependency chain, you can predict what comes next and prepare the client for it. And the client begins to understand their own experience with a clarity that naming tactics alone cannot provide.

Final Thoughts

TTI is a framework for making the mechanics of coercive control visible. It works at the level of individual tactics, and it becomes most powerful when applied to the sequences and patterns that define how abuse actually operates in lived relationships. DARVO was the demonstration. The principle applies everywhere.

If you are a clinician working with victims of coercive control, the framework gives you a structured way to understand why specific tactics work on specific people, how those tactics interact when deployed together, and where to intervene at each point in the chain. If you are someone who has lived through these patterns and wondered why you could never hold your ground, the answer is in the structure. The sequence was built to ensure you couldn’t. Understanding that changes everything.

The full TTI framework, including the complete taxonomy of tactics, trigger categories, impact categories, deployment patterns, and formation models of coercive control relationships, is documented in Coercive Control: Every Tactic Explained.

DisclaimerTerms of UsePrivacy Policy 

© Copyright. All rights reserved. 

Disclaimer: This website offers peer-informed education and resources. It is not a substitute for legal or clinical advice.  If you are in danger or experiencing a crisis, please seek immediate professional help.

Information icon

We need your consent to load the translations

We use a third-party service to translate the website content that may collect data about your activity. Please review the details in the privacy policy and accept the service to view the translations.