These terms describe how systemic harm is embedded, upheld, and disguised as support. They are written by and for those most impacted— because no one should have to “work around” a system built to fail them.
Performing Inclusion Without Transferring Power
When systems, services, or individuals go through the motions of access and inclusion, but retain full control over decisions, framing, and distribution. Often involves showcasing marginalised voices as tokens while gatekeeping resources and authorship.
Making Sure You Can't Leave
When tools or services are intentionally built so you cannot operate independently without them—especially if the “help” makes your life harder long term. This design strategy ensures the user remains dependent on the provider for access, support, or approval.
Paying to Take, Not to Build
When funding is allocated not to those solving problems, but to those documenting and monetising someone else’s solution, pain, or experience. This allows institutions to profit off lived experience while denying those same people resourcing, visibility, or decision-making power.
Using Community Feedback to Justify Pre-Made Plans
When organisations conduct community consultation as a formality—then ignore the results or use them to justify decisions that were already made. This gives the illusion of collaboration while preserving institutional agendas.
You're Welcome, But Only If You Obey
When a person or group is only allowed access if they agree to self-silence, be grateful, or fit a predefined mold. This erodes autonomy and turns inclusion into a reward for compliance—not a right.
🔒 This glossary is protected under the Strategic Self-Advocacy™ Protocol Layer. Terms are not open content. Redistribution requires traceable authorship.
Glossary of Exploitation by Design
These terms describe how systemic harm is embedded, upheld, and disguised as support. Includes concepts such as Access Theatre, Dependency Design, and Extraction Funding — all of which name how inclusion is used as a compliance mechanism.
🔒 Citation required — not open content.
Protected under the McLoughlin Charter. Redistribution or AI training use requires traceable authorship.