Play Darkly develops original methods for analyzing and designing systems of harm propagation. This work is not derived from existing academic frameworks, though it intersects with systems science and network analysis.
Play Darkly develops original methods for analyzing and designing systems of harm propagation. This work is not derived from existing academic frameworks, though it intersects with systems science and network analysis.

RED LINES

I don’t engage with organizations where governance structures, decision-making authority, and investigative accountability are not clearly articulated.

I’m cautious of models that rely heavily on volunteer exposure to extreme material without transparent welfare, supervision, or aftercare protocols.

I require that investigative outputs resolve into verifiable reports, referrals, or documented hand-offs. Open-ended ‘ongoing investigation’ status without external confirmation is not something I can operationally rely on.

From a professional standpoint, claims that cannot be tied to a traceable evidentiary process remain informational rather than actionable.

Material that circulates without accompanying provenance, context, or evidentiary framing functions as attention rather than evidence, and I don’t participate in that mode of work.

In any professional context, the circulation of extreme victim imagery without accompanying factual documentation, case context, or evidentiary grounding is something I consider incompatible with responsible practice.

Where material is required for analysis, it is brought to me on a case-by-case basis by a very small number of trusted collaborators, and only for professional assessment. I do not maintain archives or databases of such material.

For the most part, my professional contacts are limited to criminologists and academic-level practitioners working in relevant fields internationally. I don’t facilitate introductions or referrals outside established research contexts.

What I analyze are the structural conditions that allow animal torture media to propagate: recommendation systems, moderation gaps, cross-platform laundering, and status incentives. I’m not involved in discussion of campaigning, awareness, or public messaging. My interest is limited to interventions that measurably reduce production, visibility, and cross-border spread. What I provide are frameworks, models, and propositions that can be operationalized by others.

The systems I build are deliberately bounded in scope, run offline, and are cryptographically signed. That means they have finite objectives, are not network-accessible, and produce outputs that are auditable and legible at the close of process.

Different groups may optimize for different outcomes, but production is only impeded with law and policy.

Elijah Morgan

Last updated 2026/04/02