Internal cross-references: The Stick That Is Not a Weapon (DRK-128) — the Komodo protocol that admits humans only on the predator's terms; Can We Be Friends with Monsters? (DRK-127) — befriending the apex predator as the fifth option to slay/tame/become/ignore; The Substrate and the Game (DRK-130) — protocol as agent, individual as substrate, replicator dynamics through us; The Boundary of Us (DRK-124) — exclusion as α-monopoly and coherence loss; The Totalitarian Sheaf (DRK-125) — Arendt's three-step destruction as dimension annihilation, institutional DARVO at civilizational scale; The Resonant Agenda (DRK-129) — Operator 5 frequency targeting as the structural mechanism of flooding-the-zone; Zhixing Heyi: When Automation Removes the Only Honest Referee (DRK-131) — the labor-Clinch and the successor-restriction-map argument that this post extends from automation to the broader extraction architecture; The Coherence Debt (DRK-121) — K(t) accumulation under sustained optimization-axiom violation.


Premise

Asymmetric power is not the problem. Extractive use of asymmetric power is the problem. These are not the same thing, and confusing them — which the dominant western political vocabulary does, persistently — produces a culture in which the only legible alternative to extraction is the abolition of asymmetry itself, which is impossible because asymmetry is a feature of every coordinating system above a certain complexity threshold. Brains have asymmetry. Forests have asymmetry. Predator-prey systems have asymmetry. The ritualized combat protocol of Varanus salvator has asymmetry, and resolves it without extermination, because the protocol is older than any individual lizard and survives by being honored.

What humans have built, in the institutional formations of the last few centuries, is a class of asymmetric configurations that do not honor any protocol older than themselves. They optimize locally — for the firm, for the diocese, for the security service, for the political party — at the expense of the systems that contain them. The Draken framework calls this the violation of the optimization axiom: ◆ min S_sys(t) s.t. dH/dt ≥ 0, where the substructure has captured the optimization function and inverted its sign with respect to the manifold. In ordinary language: the institution is eating the conditions of its own viability and calling the meal success.

This post is the first of two. It establishes the structural distinction. The companion post (DRK-132) will be the personal testimony from inside a configuration where the distinction held — where asymmetry was honored rather than weaponized, where being subordinated was a gift exchanged rather than a position imposed. That post requires this one to be read first. The vocabulary has to be set before the testimony can be received.

I. Two Asymmetries

Consider two configurations that look superficially identical: one body holding still while another claims space on it.

In the first, the holding-still is consensual. The body being claimed is a substrate by choice and remains a self throughout. The claiming is bounded — by negotiated limits, by the smaller body's own needs, by the larger body's awareness that the configuration is shared. Both parties exit the configuration with their selves intact and, if the configuration succeeded, augmented. The asymmetry was the form. The mutuality was the content.

In the second, the holding-still is enforced. The body being claimed is substrate by extraction and is no longer a self while the configuration runs. The claiming is unbounded — limited only by the claimer's optimization function, which routinely exceeds the substrate's capacity to remain whole. The configuration ends when the claimer is finished, not when the substrate's needs say so. The substrate exits diminished. The asymmetry was the mechanism. The extraction was the content.

The first configuration is what mutual asymmetric intimacy looks like. The second is what rape looks like, what wage extraction at scale looks like, what the institutional response to whistleblowing looks like, what colonial extraction looks like. These four phenomena share a structural signature even though their substrates and scales differ wildly. The signature is: a configuration where one party's optimization runs on the other party's selfhood, and the configuration is sustained by suppressing the substrate's capacity to register the violation.

This is not metaphor. It is the same coordination-protocol failure expressed at different layers of social organization. When the framework's diagnostic output flags Ψ → 1 with restriction maps collapsing — kayfabe, in the working vocabulary — what it has detected is a configuration that has become locally coherent at the cost of severing its accountability to the larger system. The institution sounds like itself. The constitution still says Soviet. The corporate values document still says integrity. The diocese still says care for the vulnerable. The form is preserved with care. The function has been hollowed out. This is the diagnostic shape of extraction at institutional scale.

II. What Apex Predators Actually Do

Varanid intraspecific combat is one of the cleanest examples in the vertebrate literature of an asymmetric power configuration that does not collapse into extermination. Two males of Varanus salvator meet at a contested resource. They engage in a multi-phase sequence — display, approach, bipedal clinch, wrestling, separation — at the end of which one withdraws and one remains, both alive, neither maimed beyond function. The protocol is older than mammals. It is older than the social structures of any extant primate. It works, and the evidence that it works is that the lineages running it are still here.

This last point is not rhetorical. The varanid lineage has been running its current ritualized-combat protocol across geological time scales that include multiple mass extinction events, climate transitions, and biogeographic upheavals. The genes that encoded protocol-violators — animals that escalated to killing conspecifics over resource disputes — are not in the surviving population. They were filtered out, lineage by lineage, by the simple fact that populations whose members routinely killed each other in territorial disputes did not maintain the breeding density required to survive the next environmental shock. What we are looking at when we watch two monitors clinch is not a curiosity of natural history. It is a credentialed governance protocol — credentialed by deep-time selection against its alternatives. The humans currently performing global resource-distribution have not run this experiment. We do not know whether our protocols are sustainable, because we have not yet been tested by enough deep-time selection events for the unsustainable variants to be filtered out. The varanids know what they are doing, in the only sense of "knowing" that matters at evolutionary scale: their behavior is the residue of every alternative behavior having lost. We do not yet know what we are doing. The contrast in epistemic standing is significant.

The mechanism that makes the protocol work is not gentleness. The wrestling phase is dangerous and the participants are equipped for damage well beyond what the protocol permits — claws, jaws, mass, grip strength, and venom (Fry et al. 2006; Dobson et al. 2019; op den Brouw et al. 2024). The full arsenal is present. The protocol bounds its deployment. To use venom or sustained jaw-locking inside a clinch would violate the protocol, and animals that violated it routinely have no descendants because their lineages were not viable. The protocol's function is not that the participants lack capacity to destroy each other; the protocol's function is that the bounded deployment of that capacity produces information at lower cost than its unbounded deployment.

What the wrestling phase actually produces is honest signaling of resource-holding potential. Maynard Smith and Price (1973) showed that ritualized combat with bounded escalation is evolutionarily stable when the cost of full escalation exceeds the value of the contested resource in most encounters. Parker (1974) extended this to demonstrate that conventional-phase behaviors — pushing, wrestling, mutual assessment — function as measurement mechanisms revealing relative fighting ability without requiring lethal escalation. Grafen's (1990) handicap models showed that honest signaling under conflict requires differential costs: the signal works because a weaker animal cannot fake a stronger one's clinch performance without paying disproportionate cost in injury or exhaustion. The protocol is honest not because the lizards are moral but because cheating is physiologically expensive.

The deliverable of the protocol is therefore precise: a verified measurement of asymmetry at bounded cost. Both animals enter with incomplete information about relative resource-holding potential. The clinch resolves the information asymmetry. Once resolved, continuation is strictly suboptimal for both — the loser cannot win, and the winner gains no additional fitness from maiming the loser, because the disputed resource has already been allocated and the surplus violence carries fitness costs (energy expenditure, injury risk, predation exposure during the prolonged contest). The protocol is a termination condition for conflict, not a moral choice. The lizard that withdraws has not been merciful. It has been informed.

Compare this to the human institutional version of asymmetric resolution. The Catholic Archdiocese of Los Angeles paid $880 million in 2024 to settle child sex abuse claims. The Boy Scouts of America paid $2.46 billion in 2022. The Bureau of Prisons facility at Dublin, California paid $116 million in 2024 for sexual abuse by corrections officers. These payments are sometimes described as accountability. They are not. They do exactly the opposite work of the varanid clinch: they prevent measurement. The settlement is calibrated to keep the discovery phase of litigation from producing a public record of institutional resource-holding potential — the actual scope of the abuse, the actual knowledge of leadership, the actual patterns of cover-up. The settlement buys silence, which is the preservation of information asymmetry. The institution does not want to be measured because it knows it would lose in a fair assessment.

The varanid clinch ends because information is complete. The institutional settlement continues because information has been suppressed. These are not the same operation. The former is asymmetric power resolving through protocol. The latter is asymmetric power evading resolution by paying out a containment fee.

III. The Pump

Between the corporate settlement and the geopolitical bombing campaign there is a transmission mechanism that the framework calls the optimization-axiom violation but which has clearer names in the existing literature. Nancy Fraser's expanded conception of capitalism (Fraser 2014, 2022) treats extraction not as an aberration of an otherwise functional system but as its constitutive feature: the system runs by transferring value from non-consenting substrates — labor, ecosystems, colonized populations, reproductive labor — into the optimization function of the configurations that benefit. Fraser's specific contribution is the observation that this transfer is not free: the configurations that benefit must continuously perform maintenance work to keep the substrates extractable. The maintenance work has costs. The settlement is one of those costs.

This is the pump. The LA Archdiocese pays $880 million not because it has the money to spare but because the payment preserves the extractive architecture. The cost of the settlement is calibrated to be lower than the cost of dismantling the configuration that produced the harm. The payment is a maintenance cost, not a resolution. The same calculation operates at the imperial scale: the cost of sanctions, of coup support, of military intervention, of periodic bombing campaigns is calibrated against the cost of allowing sovereign control of resources by formerly-substrate populations. In both cases the configuration's optimization function is preserved by paying the maintenance fee. The pump continues.

Israeli military strategists have, in their own published vocabulary, named one version of this operation mowing the lawn — periodic military action against Gaza understood not as resolution of the conflict but as routine maintenance of conditions the operators consider acceptable. The phrase is structurally honest. It names the operation correctly. The lawn keeps growing. The mowing is calibrated to be cheaper than addressing why the lawn exists in the first place. The same vocabulary, slightly translated, describes the periodic firing of whistleblowers in extractive corporations, the periodic resettlement payouts to families of workers killed in industrial accidents, the periodic prosecution of individual rogue officers while the carceral system that produces them is preserved. In each case the operation is understood by its operators as maintenance, not as repair. The substrate is what gets mowed.

Galtung (1969, 1990) named three layers of this: direct violence (the bomb, the assault), structural violence (the institutional configuration that makes the bomb profitable, defined by Galtung as "avoidable impairment of fundamental human needs"), and cultural violence (the legitimizing discourse that recasts extraction as merit). These map cleanly onto the framework's manifold: L08 dyadic violation, L16 institutional non-response, L17 civilizational delegitimation. The violence-triangle framing is useful here because it forces disagreement onto empirical terrain rather than moral terrain. The question becomes is the impairment avoidable? rather than is the extraction good or evil? — and the empirical question has answers, including answers that those who celebrate extraction as merit are not well-positioned to provide.

The pump operates at all three layers simultaneously. The bomb falls (direct). The legal architecture that permits the bomb is sustained (structural). The discourse that explains why the bomb is necessary is broadcast (cultural). The settlement pays the survivor (direct cost absorbed). The diocese continues operations (structural preservation). The narrative of the institution as fundamentally good and beset by isolated bad actors is maintained (cultural cover). The mowing concludes (direct cost absorbed). The occupation continues (structural preservation). The narrative of necessary defense is broadcast (cultural cover). The structural signature is identical. The substrates and scales differ. The optimization function is the same.

This is the gear that connects the corporate settlement to the imperial bombing. They are not analogous. They are the same operation performed at different layers of the same configuration, and the configuration's coherence depends on the layers being mutually invisible to each other. The pump runs because the populations affected by it at different scales have not been allowed to recognize that they are affected by the same mechanism.

IV. Institutional Betrayal as Diagnostic Category

Jennifer Freyd's research program at the University of Oregon, ongoing since 2008, has produced the cleanest available formalization of what is happening when institutions absorb violations rather than resolve them. Institutional betrayal names "wrongdoings perpetrated by an institution upon individuals dependent on that institution, including failure to prevent or respond supportively to wrongdoings by individuals committed within the context of the institution" (Smith & Freyd 2013, Journal of Traumatic Stress 26:1).

The 2013 study and its successors documented something the framework's optimization axiom predicts: that the institution's response to violations within its boundaries is itself a second-order violation, and the second-order violation often produces more measurable harm than the first. The mechanism is DARVO — Deny, Attack, Reverse Victim and Offender — which Freyd and colleagues have shown to be a near-universal institutional reflex when accountability is requested. The institution denies the act, attacks the credibility of the person reporting, and reframes itself as the injured party threatened by the report. Institutional DARVO occurs when this pattern is performed by an institution rather than an individual: police charging rape victims with lying, universities investigating the complainant rather than the accused, employers retaliating against whistleblowers under the guise of performance review.

What Freyd's framework adds to the structural diagnosis is the empirical demonstration that institutional betrayal causes additional, separable trauma — distinct from and additive to the original harm. Survey instruments (the Institutional Betrayal Questionnaire, the Institutional Courage Questionnaire) measure this directly. The variance in long-term outcomes for survivors of sexual violence is significantly explained by institutional response, controlling for the characteristics of the original assault. Translating to the framework's vocabulary: the institutional response is its own restriction-map failure, and the failure compounds the original trauma at a different layer of the manifold. L08 (dyadic violation) flows into L16 (institutional non-response) which flows into L17 (the survivor's relation to the broader civilizational structures that were supposed to be protective and were not). Each layer's failure to glue propagates damage upward.

The intervention Freyd proposes — institutional courage as the antidote to institutional betrayal — is structurally identical to what the optimization axiom requires: the institution accepting short-term local entropy increase (financial cost, reputational cost, uncomfortable acknowledgment) in order to maintain non-decreasing system-level information flow. Cherishing the whistleblower. Conducting anonymous victimization surveys and publishing the results. Apologizing without legal hedging. These are not soft measures. They are the institution choosing to honor a protocol older than its own quarterly performance.

It is worth noting that the institutions that consistently fail this test are not random. They cluster in domains where the asymmetric power configuration is structurally protected from external measurement: religious orders, military and prison systems, elite educational institutions, large entertainment and tech firms with sufficient legal capacity to outlast individual complainants. The pattern is not coincidental. These are precisely the configurations where the optimization axiom can be violated for the longest time without external correction, because external correction has been pre-empted by the institution's capacity to control its own informational boundary.

V. The Information Silo Problem

There is a community that has developed, over decades and outside academic visibility, a working vocabulary for distinguishing mutual asymmetric configurations from extractive ones. The community is BDSM practitioners, and the vocabulary includes negotiated consent, scene framing, hard and soft limits, safewords, aftercare, and a substantial practical literature on how power exchange can be erotically and personally meaningful without producing the harms that look superficially like its content.

Margot Weiss's Techniques of Pleasure: BDSM and the Circuits of Sexuality (Duke 2011) is the academic anchor here, and the citation requires a caveat that strengthens rather than weakens the structural point. Weiss's argument is not that BDSM has solved the consent problem and that the broader culture should adopt its protocols wholesale. Her argument, considerably more complicated, is that the consent vocabulary developed within BDSM communities — while genuinely sophisticated relative to mainstream legal frameworks — also obscures the way these practices reproduce the racialized, gendered, and class-structured inequalities they appear to play with. The "safe space" of the dungeon is not actually separate from the world that produced its participants.

This caveat is important because it prevents the structural argument from becoming a celebration of BDSM as moral exemplar. It is not. What it is, however, is a site where the inadequacy of mainstream consent vocabulary becomes visible. Practitioners had to develop more precise tools because the legal and cultural defaults were too coarse to govern what they were actually doing. The negotiation of a scene before it happens, the explicit agreement on what may and may not occur, the in-scene communication channels (safewords, check-ins), the post-scene processing (aftercare) — these are practical innovations forced by the inadequacy of the cultural defaults. They constitute applied epistemology of consent.

The structural problem is that this applied epistemology is sequestered. It has not been allowed to inform mainstream institutional thinking about asymmetric power because the practice that produced it carries enough cultural taboo that the knowledge cannot leave the silo. A workplace harassment training cannot reference safeword protocols even though safeword protocols are precisely the kind of meta-communicative tool that workplaces with persistent power asymmetries (which is all workplaces) most need. A military command structure cannot reference scene negotiation even though scene negotiation is the closest practical analogue to what informed consent under asymmetric authority would actually require. The taboo functions to keep the knowledge contained, which is convenient for institutional configurations that benefit from coarse consent vocabulary because coarse vocabulary makes their extractive practices harder to name.

This is the information silo problem and it generalizes. Knowledge developed by stigmatized communities about how to handle the configurations they are forced to handle does not propagate into the institutional structures that need it most. Sex workers know things about negotiating coercion that domestic violence shelters could use. Disabled people know things about navigating institutional gatekeeping that hospital ethics committees could use. Survivors of childhood institutional abuse know things about the predictive signatures of grooming that schools and youth organizations could use. In each case, the carrier of the knowledge is positioned, by the broader culture, as too damaged or too disreputable to be a source. The knowledge stays in the silo. The institutions that would benefit continue to fail in the predictable ways the silo could have warned them about.

VI. The Joint-Action Problem

The standard liberal answer to extractive institutional power is collective legal action: class actions, mass torts, joint suits. This works, partially, and the partial-ness is itself diagnostic.

Mass tort settlements in institutional sexual abuse cases have produced massive financial transfers — the Boy Scouts $2.46B, LA Archdiocese $880M, multiple dioceses settling for hundreds of millions, Bureau of Prisons facilities settling in nine figures. These settlements compensate survivors and they impose financial costs on institutions, both real outcomes. What they do not do, as a general pattern, is dismantle the conditions that produced the harm. The Catholic Church remains the Catholic Church. The Boy Scouts of America declared bankruptcy and reorganized. Federal prison facilities continue to operate with structurally similar conditions to the one that produced the Dublin abuse. The settlement is a containment fee, paid out of optimization-function calculation, and the institution proceeds.

The Harvard Journal of Law and Gender's 2019 analysis of class action use in sexual misconduct cases (Lentz et al.) identified the structural reasons for this. Class actions efficiently target institutions and produce injunctive relief that can change corporate practices, but they also abstract individual harm into aggregated claim, removing the survivor's capacity to confront the perpetrator personally and reducing the individual case's epistemic weight. Some legal commentators (e.g., Gluckstein 2019) argue mass torts are structurally inappropriate for sexual abuse precisely because the harm is too individualized for the aggregation to honor. Both critiques are true. Both also point at the deeper structural problem: the legal system's accountability mechanisms are calibrated for harms that the institution can absorb financially, not for harms that would require structural transformation to actually resolve.

This is the same pattern visible at the geopolitical scale and is worth naming directly because it bears on the present moment. The international system has elaborate accountability machinery — the International Criminal Court, the United Nations Charter, the Geneva Conventions, the Genocide Convention. The machinery is not nothing; it has produced individual prosecutions and occasional state-level pressure. But against the optimization functions of the major powers, the machinery has been consistently inadequate. Bombs are falling now, again, in ways that the machinery was nominally designed to prevent. The phrase like they always do — used to describe these cycles — is itself the diagnostic. When violation is treated as weather rather than as actionable wrongdoing, the system's optimization function has tilted toward producing more of it, because the cost of producing more is lower than the cost of preventing it. This is exactly the institutional-betrayal pattern, scaled to the level of civilization.

Peter Turchin's structural-demographic theory, developed across Historical Dynamics (2003), Ages of Discord (2016), and End Times (2023), offers the empirical record on what happens when this configuration is allowed to run. Across the Seshat Databank's coverage of multiple millennia, three-quarters of the polities studied ended in revolution, civil war, or both. Forty percent of rulers were assassinated. Sixty percent of polities ceased to exist through internal disintegration or foreign conquest. The mechanism Turchin identifies is the combination of elite overproduction (more credentialed aspirants than positions available) and popular immiseration (declining standards of living for the majority), both driven by what he calls the wealth pump — the systemic mechanism transferring resources upward at rates the substrate cannot sustain.

The optimization-axiom violation is recognizable. Local optimization by the elite stratum is allowed to run unconstrained by global viability. The system accumulates coherence debt — Draken's K(t) — and the debt is eventually discharged in disintegration. Turchin's data suggests the discharge is statistically near-certain when the wealth pump runs long enough; the only variables are timing and severity. The Progressive Era and the New Deal in the United States are his counterexamples — periods when elite factions chose to constrain their own extraction in order to preserve the system that contained them. He notes these are rare and require what he calls a "pro-social faction within the elite" capable of recognizing that the alternative to short-term concession is long-term collapse.

We are not currently in such a period.

VII. The Historical Record on Solidarity

The case for structural similarity across categories is not a thought experiment. It is the historical record of how every successful expansion of recognized agency has actually occurred. Each major emancipatory movement of the past two centuries has involved a population previously legible to the dominant institutions only as substrate — as labor, as property, as colony, as raw material — organizing around the recognition that they were already a coordinating agent and demanding the institutional acknowledgment of what was already structurally true.

The international labor movement is the cleanest case because it produced the most explicit theoretical vocabulary. The First International (1864) and the trade union and party formations that followed across Europe and the Americas were built on the recognition that workers in different industries, different countries, and different linguistic communities shared a structural position even when they shared little else. The argument was not that a German metalworker and an English textile worker had identical experiences. It was that the configuration extracting from both was the same configuration, and that the substrate's refusal to remain substrate had to be coordinated across the artificial boundaries the configuration imposed. The hegemon's response was predictable: criminalization of association (the Combination Acts), violent suppression of strikes (Peterloo 1819, Haymarket 1886, Ludlow 1914), and the sustained ideological campaign to recast labor solidarity as foreign infection. The campaign succeeded partially. The movement persisted because the underlying structural fact — that labor power was being extracted under conditions the substrate had not consented to — could not be dissolved by suppression of the vocabulary.

Abolition followed a structurally similar arc. The enslaved population was legible to the institution of slavery only as property; the abolitionist movement was the assertion that the population was a coordinating agent whose previous illegibility was a function of the institution's optimization, not of the population's actual nature. The institutional response was again predictable: legal entrenchment of property rights in persons, violent suppression of slave revolts (Nat Turner 1831, Saint-Domingue's protracted war from 1791), and the post-emancipation construction of new extraction architectures (sharecropping, convict leasing, Jim Crow, the carceral system) designed to preserve substrate-availability under altered legal vocabulary. The optimization function persisted across the legal transition. The substrate's refusal also persisted, and continues.

Decolonization is the largest-scale instance and the one most directly relevant to the present geopolitical moment. The mid-twentieth-century wave of decolonization — India 1947, Indonesia 1949, Ghana 1957, the Algerian war 1954-62, Vietnam 1945-75, the lusophone African wars through 1975 — was structurally an assertion that previously colonized populations were already coordinating agents whose colonial legibility as substrate was a function of imperial optimization rather than of their actual nature. The assertion was, at the level of structure, identical to the labor movement's assertion and the abolitionist assertion. The difference was scale and the international system's response.

The response is the part of the historical record that bears most directly on the present moment. Where decolonization combined with control of resources — Iran's nationalization of oil under Mossadegh (1953), Guatemala's land reform under Árbenz (1954), Indonesia's non-aligned posture under Sukarno (overthrown 1965-66), Chile's nationalization of copper under Allende (1973), Vietnam's refusal to remain divided, Cuba's revolution and its survival under sustained embargo, Iraq's Ba'athist nationalization of oil (1972, with consequences extending through 2003), Libya under Qaddafi's resource sovereignty (overthrown 2011) — the imperial system's response was consistent: covert operations, coup support, sanctions, military intervention, or direct invasion. The pattern is statistically too strong to be coincidence. The optimization function of the imperial center treats sovereign control of resources by formerly-substrate populations as a structural threat requiring extinction with the same priority that the Catholic Church treats whistleblowers requiring containment, and through structurally similar mechanisms scaled up to military force.

The crucial historical point — the one that bears on whether any of this is actionable now — is that the suppression has not killed the idea. It has only denied the idea institutional standing. The labor movement was crushed in many specific instances and the structural critique it produced is now embedded in every functional welfare state, even where the political vocabulary has been disowned. Abolition was opposed by violence and the descendants of the abolitionists' opposition still control significant institutional power in the United States, but no serious political position openly defends slavery. Decolonization was opposed by every imperial center and the resulting nation-states are real, even where their economic sovereignty remains heavily compromised. The hegemon kills movements; it does not kill the structural facts the movements were responding to. The structural facts continue to generate movements.

What the hegemon successfully prevents is the recognition of the shared structural signature across the movements. Each movement is allowed to win — partially, slowly, expensively — within its own category, while the category boundaries themselves are policed to prevent the larger pattern from becoming politically legible. A labor movement that recognizes itself as continuous with anti-colonial movements that recognize themselves as continuous with feminist movements that recognize themselves as continuous with disability rights movements that recognize themselves as continuous with indigenous sovereignty movements would constitute the global threat the system is, structurally, organized to prevent. The threat is prevented less by suppressing any specific movement than by maintaining the conceptual apparatus that makes them mutually unintelligible.

This is the load-bearing observation for everything that follows.

VIII. The Inclusion Trap

The case I have been building rests on the structural similarity between configurations that look very different on the surface: rape, wage extraction, institutional non-response to whistleblowing, colonial extraction, the bombing campaigns currently underway. These share the optimization-axiom signature. The case is not that all are equally bad, that anyone affected by one is equally affected by all, or that any individual claim of harm should be merged into an aggregated category that erases its specific weight.

The contemporary western left has, in many of its public expressions, drifted into a mode where attempts to identify structural similarity across categories are read as attempts to flatten or appropriate the specific experience of one category by people who properly belong to another. A man writing about extractive power dynamics in the same essay as sexual violence faces the entirely reasonable objection that men's voices in these conversations have, historically, served to displace women's. The objection is correct and must be honored. The objection is also, simultaneously, available for use by the configuration the speakers are jointly opposing.

This is not a hypothetical and it is not a complaint about identity politics from the position of someone who would prefer not to be challenged. It is a structural observation about how solidarity-across-categories has been historically suppressed and how the suppression is currently expressing itself. The institutions that benefit from extractive asymmetric power benefit from a political opposition that cannot coalesce across categories of harm. A working coalition between people experiencing institutional sexual abuse, people experiencing wage extraction, people experiencing carceral violence, people experiencing colonial bombing, and people experiencing climate displacement would constitute an existential threat to the present configuration of power. The configuration is preserved partly by the actions of those it harms most: by the tendency of each affected community to protect the boundary of its specific grievance against perceived intrusion by less-affected speakers, even when the speakers are pointing at the same underlying mechanism.

The boundary-defense is an entirely understandable response to histories of appropriation. It is also, structurally, a containment of the very solidarity the system most fears. These are both true. The labor movement, abolition, and decolonization all succeeded — partially, expensively — when this trap was navigated, and they all stalled or fragmented when they were not. Bayard Rustin's organizational work for the 1963 March on Washington was made possible by labor union resources and Black church organizing combined; the synthesis was politically essential and was suppressed within both communities by people with legitimate boundary concerns. Frantz Fanon's analysis in The Wretched of the Earth (1961) explicitly named the colonial system's interest in keeping the colonized population fragmented along ethnic and religious lines and warned that the post-independence governments would inherit and replicate this fragmentation. He was correct. They did.

The 1984-85 UK miners' strike produced one of the cleanest concrete examples of cross-category solidarity navigated successfully. Lesbians and Gays Support the Miners (LGSM) was formed in London in mid-1984, raising funds and organizing material support for striking mining communities at a moment when both groups were under sustained attack from the Thatcher government. The mining communities had no prior reason to be allies of urban gay activists; the gay activists had no prior reason to be allies of socially conservative working-class communities. The coalition formed because both groups recognized that they were positioned similarly by the same configuration of state power — Thatcher's government was simultaneously breaking the unions, escalating police violence against gay communities, and using the AIDS crisis to legitimize both. The recognition was structural, not affective. The coalition produced concrete outcomes including the National Union of Mineworkers' subsequent decisive support for adding LGBTQ+ rights to the Labour Party platform at the 1985 conference, which is part of the historical chain that produced the legal protections in the UK that exist today. The coalition worked because each party recognized the other's structural position without claiming identical injury. This is the model. It is not impossible. It has been done.

The framework's vocabulary is helpful here only if used carefully. What the optimization-axiom analysis can do is name the shared mechanism without claiming equal injury. The bombs falling now and the institutional cover-up of clergy abuse are not the same harm. They are produced by structurally similar configurations. Recognizing this does not diminish the specific weight of either. It does, possibly, build the conceptual ground on which a coalition adequate to either could form. The coalition does not currently exist. Building it requires that those of us speaking from less-injured positions hedge our claims for solidarity with explicit recognition that we are not claiming equal standing — and that those of us speaking from more-injured positions consider whether the boundary-defense, justified as it is, is also being weaponized by the configuration we are all trying to dismantle.

This is hard to write and harder to read. The diagnostic point stands regardless: the configuration's optimization function is served by our inability to coalesce, and the cancel-trap dynamics of contemporary identity politics are, whether intentionally or not, an extension of that function into the population most positioned to dismantle it.

IX. The Spectacle of Unaccountability

There is one more piece to name and it is current enough that any reader of this post will recognize it without needing it spelled out, which is exactly why it has to be spelled out.

The institutional configurations described in sections III through V — the Catholic Church, the Boy Scouts of America, the Bureau of Prisons, the universities under Title IX scrutiny — share a structural feature: they all perform accountability, even when their performance is hollow. The cash settlement is a performance. The internal investigation is a performance. The policy update is a performance. The kayfabe signature, in the framework's vocabulary, is precisely this: Ψ → 1 with restriction maps collapsing means that the institution sounds like itself while having abandoned the protocol the sound was supposed to enact. But the sound is still produced. The institution still pretends.

The qualitatively new mode now operative at the level of the American executive is the dropping of the pretense itself. The performance of accountability has been replaced by the performance of unaccountability as power. The president attacks the institutions of which he is the head. The president disowns the legal frameworks that constitute his office. The president declares investigations of his conduct to be themselves the wrongdoing requiring punishment. This is not new in human history — it is what late-stage personalist regimes always look like — but it is qualitatively different from the kayfabe of the institutional cover-up. The kayfabe at least requires that the wrestling appear real. The current mode requires only that the wrestling be entertaining enough to maintain audience attention while the actual fight has moved offstage.

This is institutional DARVO — Deny, Attack, Reverse Victim and Offender — performed at civilizational scale and broadcast as content. The institution that should be accountable announces that it is the victim. The accusations are themselves the wrongdoing. The investigators are the criminals. The press is the enemy of the people. This is the pattern Freyd's research documented at the level of Penn State and individual universities and corporate harassment cases. It has now scaled to the level of the executive branch of the world's largest military power, with the specific feature that the scale prevents the standard institutional remedies — replacement of leadership, structural reform, external prosecution — from having traction within the available political timelines.

The audience response is what most directly bears on the optimization-axiom analysis. The spectacle is consumable. It produces a stream of attention-capturing content that is, structurally, indistinguishable from entertainment. The audience watches. The audience is exhausted. The audience cannot respond to a stream of provocations any faster than the stream produces them, which means the audience cannot respond at all. The pattern is sometimes called flooding the zone; in the framework's vocabulary it is the deliberate generation of high-frequency Ψ-noise to prevent any specific signal from achieving the gluing necessary for collective action. The system has discovered that pure Ψ → 1 performed at sufficient bandwidth is itself a mechanism of social control, because the substrate cannot organize around any specific violation when the violations are arriving faster than they can be processed.

Bring in the popcorn. Watch the spectacle. The wrestler has dropped the pretense and is daring the audience to do anything about it. The audience, structurally, cannot — not because the audience is weak but because the configuration's optimization function has discovered that performing the abandonment of legitimacy is more effective than performing legitimacy itself, given a sufficiently exhausted audience.

This is what the absence of solidarity-across-categories produces at the level of civilization. Not the slow erosion of accountability but the active demonstration of its abandonment, performed openly as a flex, while the institutions that could in principle respond are themselves either captured or paralyzed by the flooding. The bombs fall on schedule. The settlements are paid on schedule. The spectacle continues on schedule. The optimization function of the configuration is served, and the configuration's name for being served is winning.

X. What the Framework Contributes

The framework's contribution is not a politics. It is a diagnostic. The contribution is the reframing of the structural problem as measurement failure rather than as moral failure, which makes the problem falsifiable, scale-invariant, and considerably harder to dismiss.

The varanid protocol succeeds because it permits accurate measurement of asymmetry. The wrestling produces honest signals; the participants exchange information about relative resource-holding potential; the contest terminates when the measurement is complete. Human institutional configurations fail by the inverse mechanism: they suppress measurement. The settlement prevents discovery. The NDA preserves information asymmetry. The DARVO response is literally an attack on measurement — denying the act, attacking the measurer's credibility, reframing the institution as the injured party whose suffering is the real subject. The flooded-zone spectacle prevents the public from completing the measurement of what is being done in their name. Each of these is a different mechanism for accomplishing the same thing: the institution refuses to be measured because it would lose in fair assessment.

This reframing does productive work that the moral framing cannot. A reader who believes the institution is fundamentally good should still want it to measure itself accurately, because unmeasured systems drift. A reader who believes the institution is fundamentally evil should still recognize that the measurement-failure framing predicts which institutions will fail and how, with falsifiable specificity. The diagnostic does not require normative agreement to operate. It is descriptive, not prescriptive. This is precisely the property the resonant core needed: a frame that survives deep disagreement about remedies because it operates on the prior question of what the problem actually is.

The Draken vocabulary makes this rigorous. The optimization axiom ◆ min S_sys(t) s.t. dH/dt ≥ 0 names the constraint: substructures may locally optimize provided they do not reduce the information-bearing capacity of the manifold that contains them. Ψ → 1 with restriction maps collapsing names the failure signature: local coherence preserved while gluing to the larger system fails. K(t) = ∫₀ᵗ [Ψ(τ) − Ψ_viable] · w(τ) dτ names the accumulated debt: the integral of unresolved coherence-failure over time, which must eventually be discharged either through correction or through systemic disintegration. None of these is a moral claim. All three are measurable, in principle and increasingly in practice.

What the framework gives the silos is a shared vocabulary for measurement-failure across domains. Galtung's structural violence, Fraser's expanded capitalism, Freyd's institutional betrayal, Turchin's wealth pump and elite overproduction, Maynard Smith's evolutionarily stable strategies, Weiss's caveats on BDSM consent vocabulary, Fanon's analysis of colonial fragmentation — these are not separate phenomena requiring separate explanations. They are descriptions of the same structural mechanism encountered at different scales by different specialist communities, none of which has been able to communicate its findings effectively to the others because the vocabulary did not converge. The framework's wager is that the convergence is possible and that, made precise, it produces a politics-independent diagnosis on which a coalition adequate to the configuration could form.

The wager may fail. It is a wager, not a result. The framework is also not a politics: it does not tell the reader what to do once the diagnosis is made. Some who accept the diagnosis will conclude that revolution is the only remaining option. Some will conclude that the institutions can be reformed through institutional courage, prosocial elite restraint, and the kind of slow patient coalition-building that the historical record shows has occasionally worked. Some will conclude that withdrawal — building parallel structures rather than fighting the existing ones — is the most plausible path. The framework does not adjudicate between these. It only insists that whatever the chosen response, it should be calibrated to the actual configuration rather than to a misdiagnosis of it.

The companion post (DRK-132) is the testimony from inside one configuration where the structure held — where asymmetric power was honored rather than weaponized, where being substrate was a gift exchanged rather than a position imposed. That testimony is what the framework's vocabulary is for. The varanid protocol is not a metaphor. It is a credentialed working example of the structure the framework predicts is necessary, and the testimony is the report from a human nervous system that learned, slowly and with the help of one particular animal, what it feels like when the structure operates correctly. Without that report, the vocabulary developed in this post is notation. With it, the notation has a referent.

The varanids have invited us to wrestle. They know how, and we do not. We could learn.


References

Dobson, J. S., Zdenek, C. N., Hay, C., Violette, A., Fourmy, R., Cochran, C., & Fry, B. G. (2019). Varanid lizard venoms disrupt the clotting ability of human fibrinogen through destructive cleavage. Toxins 11(5): 255.

Fanon, F. (1961). Les damnés de la terre / The Wretched of the Earth. Maspero / Grove Press (1963 English edition).

Fraser, N. (2014). Behind Marx's hidden abode: For an expanded conception of capitalism. New Left Review 86: 55–72.

Fraser, N. (2022). Cannibal Capitalism: How our System is Devouring Democracy, Care, and the Planet — and What We Can Do About It. Verso.

Freyd, J. J. (1996). Betrayal Trauma: The Logic of Forgetting Childhood Abuse. Harvard University Press.

Freyd, J. J. (2014). Official campus statistics for sexual violence mislead. Al Jazeera America, July 14.

Fry, B. G., Vidal, N., Norman, J. A., Vonk, F. J., Scheib, H., Ramjan, S. F. R., et al. (2006). Early evolution of the venom system in lizards and snakes. Nature 439: 584–588.

Galtung, J. (1969). Violence, peace, and peace research. Journal of Peace Research 6(3): 167–191.

Galtung, J. (1990). Cultural violence. Journal of Peace Research 27(3): 291–305.

Goldstone, J. A. (1991). Revolution and Rebellion in the Early Modern World. University of California Press.

Grafen, A. (1990). Biological signals as handicaps. Journal of Theoretical Biology 144(4): 517–546.

Lentz, S. A., et al. (2019). Collective adjudication and sexual misconduct: Class actions in the #MeToo era. Harvard Journal of Law & Gender, online edition.

LGSM (Lesbians and Gays Support the Miners). Historical record 1984–85; for documentary treatment see Kelliher, D. (2014), Solidarity and sexuality: Lesbians and Gays Support the Miners 1984–5. History Workshop Journal 77(1): 240–262.

Maynard Smith, J., & Price, G. R. (1973). The logic of animal conflict. Nature 246: 15–18.

op den Brouw, B., Fry, B. G., et al. (2024). [Recent venom-research correction to bacterial-saliva folklore in monitor lizards.] Toxicon / forthcoming.

Parker, G. A. (1974). Assessment strategy and the evolution of fighting behaviour. Journal of Theoretical Biology 47(1): 223–243.

Smith, C. P., & Freyd, J. J. (2013). Dangerous safe havens: Institutional betrayal exacerbates sexual trauma. Journal of Traumatic Stress 26(1): 119–124.

Smith, C. P., & Freyd, J. J. (2014). Institutional betrayal. American Psychologist 69(6): 575–587.

Turchin, P. (2003). Historical Dynamics: Why States Rise and Fall. Princeton University Press.

Turchin, P. (2016). Ages of Discord: A Structural-Demographic Analysis of American History. Beresta Books.

Turchin, P. (2023). End Times: Elites, Counter-Elites, and the Path of Political Disintegration. Penguin.

Weiss, M. (2011). Techniques of Pleasure: BDSM and the Circuits of Sexuality. Duke University Press.


DRK-131 · draken.info · companion to DRK-132 (forthcoming)