Nationwide survivor-centered platform

We are the voices for the ones who cannot be heard.

A place to document truth, recognize patterns, protect survivors, and connect people to real-world accountability pathways. Built for clarity. Built for safety. Built to endure.

This platform does not publish unverified allegations against identifiable individuals. Private reports stay private unless explicitly anonymized for public education.

Know the patterns

Abuse often thrives in secrecy, confusion, power imbalance, and isolation. Naming behavior patterns can help people recognize danger earlier and document it more clearly.

Grooming

Boundary testing, special attention, secrecy, gifts, emotional dependency, isolating the target from outside support.

Coercion

Threats, manipulation, blackmail, intimidation, fear-based pressure, exploiting trauma or financial instability.

Institutional protection

Silencing, retaliation, transfers instead of accountability, record gaps, reputation management, pressure not to report.

Private survivor report

This is the private intake area. People can document names, locations, dates, patterns, and evidence here for private review and organized recordkeeping. Nothing in this section is meant for automatic public posting.

Before you submit

  • Use a safe device if possible.
  • Do not include anything you are not ready to preserve.
  • If you are in immediate danger, contact emergency services first.
  • Use the Quick Exit button anytime.

What this form is for

Private documentation, pattern tracking, survivor support, and referral pathways. Public content should only come from anonymized stories or verified public records.

Set this up: Create a Google Form and replace the placeholder iframe link below with your own published embed link.

  • Turn off “Collect email addresses” if anonymity is important.
  • Turn off “Limit to 1 response.”
  • Send responses to a private Google Sheet.
  • Restrict the connected Drive folder to administrators only.
  • Add a consent checkbox that explains reports are reviewed before any anonymized sharing.

Suggested fields: incident type, name of accused, last known location, timeline, description, witnesses, uploads, consent, whether the submitter permits anonymized story sharing, and whether they want follow-up contact.

Survivor toolkit

These tools help turn memory into structure. The more organized the record, the harder it is for truth to be brushed aside.

Timeline builder

Create a simple document with date, event, people involved, what happened, and what evidence exists.

Add your Google Doc link

Evidence checklist

Gather and preserve what exists before it disappears or gets overwritten.

  • Texts and emails
  • Photos and videos
  • Medical records
  • Witness names
  • Employment or school records
  • Police or HR reports

Incident log

Track ongoing behavior with dates, locations, actions, reactions, and any follow-up reporting steps.

Add your template link

Anonymous stories

Public stories should remove names and identifying details while keeping the pattern clear. That protects survivors and keeps the focus where it belongs: on behaviors, systems, and harm.

Submission rule

No names. No addresses. No workplaces listed with enough detail to identify a private person. Stories are reviewed before publication and edited for safety.

Sample format

“In a correctional setting, repeated boundary violations escalated into coercive behavior. When concerns were raised, the response centered on silence and reputation protection rather than safety.”

Verified public-record cases

This section is for public-record material only: arrests, filed charges, convictions, court findings, or official agency actions. Keep summaries neutral and link directly to the source record.

Case entry template

  • Case title
  • Jurisdiction
  • Status
  • Neutral summary
  • Official source link

Important guardrail

Do not add private allegations here. If it is not part of an official public record, it stays out of this section.