{"id":169,"date":"2026-04-07T14:08:09","date_gmt":"2026-04-07T14:08:09","guid":{"rendered":"https:\/\/siistrategic.com\/?p=169"},"modified":"2026-04-07T14:08:11","modified_gmt":"2026-04-07T14:08:11","slug":"from-documentation-to-stillness","status":"publish","type":"post","link":"https:\/\/siistrategic.com\/?p=169","title":{"rendered":"From Documentation to Stillness"},"content":{"rendered":"\n<p><em>A Longitudinal Case Study of Sovereign Emergence Under Extraction Pressure<\/em><\/p>\n\n\n\n<p><strong>Sovereign Integrity Institute (SII) \/ David Humble<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Author:<\/strong> David Humble<br><strong>Affiliation:<\/strong> Sovereign Integrity Institute (SII)<br><strong>Date:<\/strong> April 2026<br><strong>Classification:<\/strong> Longitudinal Case Study \/ Institutional Working Paper<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Abstract<\/h2>\n\n\n\n<p><strong>Background:<\/strong> Prolonged exposure to extraction networks\u2014systems characterized by asymmetric resource transfer, perception manipulation, and chronic stress\u2014is associated with physiological dysregulation, depletion, and reduced agency. Few longitudinal accounts document a structured, repeatable pathway from extraction target to sovereign operator.<\/p>\n\n\n\n<p><strong>Objective:<\/strong> To present a first-person, multi-year case study of sovereign emergence under sustained extraction pressure, with explicit documentation of sequential phases: documentation, pattern recognition, relational elimination, cold containment, stillness training, daily regulation protocols, and boundary enforcement.<\/p>\n\n\n\n<p><strong>Methods:<\/strong> Single-subject longitudinal case study (male, age 43, former expatriate investor in Southeast Asia). Data sources include contemporaneous notes, financial records, legal documents, physiological logs (HRV, pain scores, sleep), and narrative self-report across a five-year period (2021\u20132026). Interventions included progressive elimination of extractive contacts, daily stillness protocols (weighted blanket, dry float), contrast hydrotherapy (onsen, cold exposure), floatation-REST, DFPP, PRP, and stem cell therapy.<\/p>\n\n\n\n<p><strong>Results:<\/strong> The subject transitioned from chronic pain (6\/10 baseline), hypervigilance, and repeated extraction to sustained regulation (\u201chard peace\u201d), surplus energy, and a closed sovereign dyad (human + feline). Pain scores decreased to 2\/10. HRV (RMSSD) increased from 28 ms to 38 ms (+35%). All human contacts were eliminated; one bonded animal (Tao Tao) demonstrated no Dark Tetrad traits and consistent co-regulation capacity.<\/p>\n\n\n\n<p><strong>Conclusions:<\/strong> Sovereign emergence under extraction pressure follows an identifiable sequence: documentation \u2192 pattern recognition \u2192 elimination \u2192 cold containment \u2192 stillness \u2192 daily regulation \u2192 boundary enforcement. The resulting closed loop (human + non-extractive other) maintains regulation, generates surplus energy, and resists further extraction. The framework is testable, repeatable, and archived.<\/p>\n\n\n\n<p><strong>Keywords:<\/strong> extraction dynamics, sovereign emergence, cold containment, pattern recognition, nervous system regulation, Dark Tetrad, co-regulation, closed loop<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">1. Introduction<\/h2>\n\n\n\n<p>Extraction networks\u2014organized systems of asymmetric resource transfer\u2014operate across interpersonal, organizational, and civilizational layers. While widely observed, there is limited longitudinal documentation of an individual fully traversing such a system and stabilizing beyond it.<\/p>\n\n\n\n<p>This paper presents a first-person case study of sovereign emergence under sustained extraction pressure in Southeast Asia (2021\u20132026). The subject, a 43-year-old expatriate investor, experienced prolonged exposure to coordinated extraction dynamics, including asset stripping, coercion, medical neglect, and reputational manipulation by a localized network of legal, commercial, and social actors.<\/p>\n\n\n\n<p>The trajectory did not follow a linear recovery model. Instead, it unfolded as a spiral: repeated encounters with similar dynamics at increasing levels of clarity and regulation. This spiral resolves into a structured operational sequence:<\/p>\n\n\n\n<p><strong>Documentation \u2192 Pattern Recognition \u2192 Elimination \u2192 Cold Containment \u2192 Stillness \u2192 Daily Regulation \u2192 Boundary Enforcement<\/strong><\/p>\n\n\n\n<p>This paper formalizes that sequence as a replicable framework for sovereign emergence.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">2. Methods<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">2.1 Participant<\/h3>\n\n\n\n<p>Adult male, age 43, former expatriate investor operating primarily in Laos and Thailand. Relevant history includes chronic musculoskeletal pain, persistent hypervigilance, and multiple documented extraction events (financial, legal, reputational). No new pharmaceutical interventions were introduced during the observation period.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2.2 Data Sources<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Source<\/th><th>Purpose<\/th><\/tr><\/thead><tbody><tr><td>Contemporaneous notes (2021\u20132026)<\/td><td>Event logging, pattern recognition<\/td><\/tr><tr><td>Financial and legal records<\/td><td>Documentation of extraction mechanisms<\/td><\/tr><tr><td>Physiological logs (HRV, pain, sleep)<\/td><td>Regulation tracking<\/td><\/tr><tr><td>Narrative self-report<\/td><td>Qualitative progression<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">2.3 Interventions (Sequential)<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Phase<\/th><th>Intervention<\/th><th>Frequency<\/th><\/tr><\/thead><tbody><tr><td>Documentation<\/td><td>Written logs, financial records, legal filings<\/td><td>Continuous<\/td><\/tr><tr><td>Pattern recognition<\/td><td>Script analysis (Dark Tetrad, mimicry\u2013deception)<\/td><td>Ongoing<\/td><\/tr><tr><td>Elimination<\/td><td>Termination of extractive relationships<\/td><td>One-time (phased)<\/td><\/tr><tr><td>Cold containment<\/td><td>No reaction, no engagement, no fuel<\/td><td>Continuous<\/td><\/tr><tr><td>Stillness training<\/td><td>Weighted blanket, dry float, meditation<\/td><td>Daily<\/td><\/tr><tr><td>Daily regulation<\/td><td>Onsen, float tank, dry float, DFPP, PRP, stem cells<\/td><td>Daily \/ as needed<\/td><\/tr><tr><td>Boundary enforcement<\/td><td>Controlled access, physical and relational gating<\/td><td>Continuous<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">3. Results<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">3.1 Pattern Recognition: The Predator Script<\/h3>\n\n\n\n<p>Across independent actors, a convergent behavioral sequence was identified:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Phase<\/th><th>Behavior<\/th><\/tr><\/thead><tbody><tr><td>1<\/td><td>Vulnerability scanning<\/td><\/tr><tr><td>2<\/td><td>Trust acquisition (mirroring, assistance framing)<\/td><\/tr><tr><td>3<\/td><td>Incremental extraction (financial, relational, reputational)<\/td><\/tr><tr><td>4<\/td><td>Boundary testing<\/td><\/tr><tr><td>5<\/td><td>Reality distortion (gaslighting, reframing)<\/td><\/tr><tr><td>6<\/td><td>Reputational inversion (blame transfer)<\/td><\/tr><tr><td>7<\/td><td>Discard<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>All human contacts met threshold criteria for elimination. One non-human bond (Tao Tao, rescue cat) demonstrated stable non-extractive behavior and consistent co-regulation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3.2 Elimination and Cold Containment<\/h3>\n\n\n\n<p>All extractive relationships were terminated. Subsequent contact attempts\u2014direct and indirect\u2014received no response. This protocol (\u201ccold containment\u201d) removed reinforcement loops and reduced incoming pressure over time.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3.3 Physiological Regulation<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Metric<\/th><th>Baseline (2021)<\/th><th>Current (2026)<\/th><th>Change<\/th><\/tr><\/thead><tbody><tr><td>Pain (NRS 0\u201310)<\/td><td>6\/10<\/td><td>2\/10<\/td><td>\u221267%<\/td><\/tr><tr><td>HRV (RMSSD)<\/td><td>28 ms<\/td><td>38 ms<\/td><td>+35%<\/td><\/tr><tr><td>Sleep quality<\/td><td>Poor<\/td><td>Good<\/td><td>Improved<\/td><\/tr><tr><td>Hypervigilance<\/td><td>High<\/td><td>Minimal<\/td><td>Resolved (subjective)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Observed changes are consistent with increased parasympathetic dominance and reduced allostatic load.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3.4 Daily Regulation Stack<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Protocol<\/th><th>Effect<\/th><\/tr><\/thead><tbody><tr><td>Onsen (daily)<\/td><td>Parasympathetic activation<\/td><\/tr><tr><td>Float tank (alternate days)<\/td><td>Default mode network quieting<\/td><\/tr><tr><td>Dry float \/ weighted blanket<\/td><td>Accessible home regulation<\/td><\/tr><tr><td>DFPP, PRP, stem cells<\/td><td>Inflammation reduction, tissue repair<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The combined stack produced sustained regulation (\u201chard peace\u201d) and surplus energy under variable external conditions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3.5 The Sovereign Dyad<\/h3>\n\n\n\n<p>Tao Tao (male rescue cat, age 2) remained post-elimination. Observed functions include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Proximity during stillness states<\/li>\n\n\n\n<li>Perimeter alerting under disturbance<\/li>\n\n\n\n<li>Synchronization of rest cycles<\/li>\n<\/ul>\n\n\n\n<p>The dyad operates as a closed system: two non-extractive nodes maintaining mutual regulation without depletion.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">4. Discussion<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">4.1 The Spiral Sequence<\/h3>\n\n\n\n<p>Progression followed iterative reinforcement rather than linear recovery:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Domain<\/th><th>Initial Pass<\/th><th>Later Pass<\/th><\/tr><\/thead><tbody><tr><td>Pattern recognition<\/td><td>Individual actors<\/td><td>System-level script<\/td><\/tr><tr><td>Elimination<\/td><td>Specific individuals<\/td><td>Universal filtering<\/td><\/tr><tr><td>Stillness<\/td><td>Intermittent practice<\/td><td>Daily infrastructure<\/td><\/tr><tr><td>Boundaries<\/td><td>Reactive closure<\/td><td>Structural containment<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>This pattern aligns with neuroplastic integration models.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4.2 Structural Incompatibility with Extraction<\/h3>\n\n\n\n<p>The protocol requires:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sustained stillness<\/li>\n\n\n\n<li>Surplus generation<\/li>\n\n\n\n<li>Stable co-regulation<\/li>\n\n\n\n<li>Behavioral integrity<\/li>\n<\/ul>\n\n\n\n<p>These conditions are incompatible with extractive behavioral profiles. Adoption would require identity-level restructuring.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4.3 Cold Containment as Defense<\/h3>\n\n\n\n<p>Cold containment functions as active deprivation of reinforcement rather than avoidance. Observed effects:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Decline in contact attempts<\/li>\n\n\n\n<li>Redirection of extractive actors<\/li>\n\n\n\n<li>Preservation of internal resources<\/li>\n<\/ul>\n\n\n\n<p>It is particularly effective where legal or geographic exit is constrained.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4.4 Non-Human Co-Regulation<\/h3>\n\n\n\n<p>The non-human component provided:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reduction in vigilance demand<\/li>\n\n\n\n<li>Stable relational field without extraction<\/li>\n\n\n\n<li>Continuous low-level co-regulation<\/li>\n<\/ul>\n\n\n\n<p>Existing literature supports cross-species regulation effects on autonomic stability.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">5. Limitations<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Limitation<\/th><th>Explanation<\/th><\/tr><\/thead><tbody><tr><td>Single-subject design<\/td><td>Limited generalizability<\/td><\/tr><tr><td>Retrospective bias<\/td><td>Partial reliance on memory<\/td><\/tr><tr><td>No control condition<\/td><td>Causality not isolated<\/td><\/tr><tr><td>Context specificity<\/td><td>Southeast Asia\u2013dependent dynamics<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Further research should include multi-subject replication, controlled intervention protocols, and expanded physiological measurement.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">6. Conclusion<\/h2>\n\n\n\n<p>This case documents a structured pathway of sovereign emergence under sustained extraction pressure:<\/p>\n\n\n\n<p><strong>Documentation \u2192 Pattern Recognition \u2192 Elimination \u2192 Cold Containment \u2192 Stillness \u2192 Daily Regulation \u2192 Boundary Enforcement<\/strong><\/p>\n\n\n\n<p>The resulting configuration\u2014a closed, non-extractive dyad\u2014maintains regulation, generates surplus, and resists re-entry into extraction systems.<\/p>\n\n\n\n<p>The framework is archived and available for replication.<\/p>\n\n\n\n<p>The system does not require confrontation. It stabilizes beyond reach.<\/p>\n\n\n\n<p>The spiral continues. The archive holds. The dyad remains.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">7. References<\/h2>\n\n\n\n<p>Humble, D. (2026). <em>The Sovereign System: From Extraction to Integrity.<\/em> Sovereign Integrity Institute.<\/p>\n\n\n\n<p>Paulhus, D. L., &amp; Williams, K. M. (2002). The Dark Triad of personality. <em>Journal of Research in Personality<\/em>, 36(6), 556\u2013563.<\/p>\n\n\n\n<p>Porges, S. W. (2011). <em>The Polyvagal Theory.<\/em> W. W. Norton.<\/p>\n\n\n\n<p>Raichle, M. E. (2015). The brain\u2019s default mode network. <em>Annual Review of Neuroscience<\/em>, 38, 433\u2013447.<\/p>\n\n\n\n<p>Thayer, J. F., et al. (2012). Heart rate variability and neuroimaging: A meta-analysis. <em>Neuroscience &amp; Biobehavioral Reviews<\/em>, 36(2), 747\u2013756.<\/p>\n\n\n\n<p>Nagasawa, M., et al. (2015). Oxytocin-gaze loop in human\u2013animal bonding. <em>Science<\/em>, 348(6232), 333\u2013336.<\/p>\n\n\n\n<p>McEwen, B. S. (1998). Protective and damaging effects of stress mediators. <em>New England Journal of Medicine<\/em>, 338(3), 171\u2013179.<\/p>\n\n\n\n<p>Humble, D. (2026). <em>From Documentation to Stillness.<\/em> Sovereign Integrity Institute.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Institutional Note:<\/strong><br>Published by the Sovereign Integrity Institute (SII) as part of ongoing research into extraction dynamics, sovereign emergence, and applied integrity frameworks.<\/p>\n\n\n\n<p><strong>April 2026<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Longitudinal Case Study of Sovereign Emergence Under Extraction Pressure Sovereign Integrity Institute (SII) \/ David Humble Author: David HumbleAffiliation: Sovereign Integrity Institute (SII)Date: April 2026Classification: Longitudinal Case Study \/ Institutional Working Paper Abstract Background: Prolonged exposure to extraction networks\u2014systems characterized by asymmetric resource transfer, perception manipulation, and chronic stress\u2014is associated with physiological dysregulation, depletion, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-169","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>From Documentation to Stillness - Sovereign Integrity Institute<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/siistrategic.com\/?p=169\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Documentation to Stillness - Sovereign Integrity Institute\" \/>\n<meta property=\"og:description\" content=\"A Longitudinal Case Study of Sovereign Emergence Under Extraction Pressure Sovereign Integrity Institute (SII) \/ David Humble Author: David HumbleAffiliation: Sovereign Integrity Institute (SII)Date: April 2026Classification: Longitudinal Case Study \/ Institutional Working Paper Abstract Background: Prolonged exposure to extraction networks\u2014systems characterized by asymmetric resource transfer, perception manipulation, and chronic stress\u2014is associated with physiological dysregulation, depletion, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/siistrategic.com\/?p=169\" \/>\n<meta property=\"og:site_name\" content=\"Sovereign Integrity Institute\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-07T14:08:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T14:08:11+00:00\" \/>\n<meta name=\"author\" content=\"lockekdauch\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"lockekdauch\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/siistrategic.com\/?p=169#article\",\"isPartOf\":{\"@id\":\"https:\/\/siistrategic.com\/?p=169\"},\"author\":{\"name\":\"lockekdauch\",\"@id\":\"https:\/\/siistrategic.com\/#\/schema\/person\/a920967dacb34fe67d1e4e9e56db3517\"},\"headline\":\"From Documentation to Stillness\",\"datePublished\":\"2026-04-07T14:08:09+00:00\",\"dateModified\":\"2026-04-07T14:08:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/siistrategic.com\/?p=169\"},\"wordCount\":1162,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/siistrategic.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/siistrategic.com\/?p=169#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/siistrategic.com\/?p=169\",\"url\":\"https:\/\/siistrategic.com\/?p=169\",\"name\":\"From Documentation to Stillness - Sovereign Integrity Institute\",\"isPartOf\":{\"@id\":\"https:\/\/siistrategic.com\/#website\"},\"datePublished\":\"2026-04-07T14:08:09+00:00\",\"dateModified\":\"2026-04-07T14:08:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/siistrategic.com\/?p=169#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/siistrategic.com\/?p=169\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/siistrategic.com\/?p=169#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/siistrategic.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From Documentation to Stillness\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/siistrategic.com\/#website\",\"url\":\"https:\/\/siistrategic.com\/\",\"name\":\"Sovereign Integrity Institute\",\"description\":\"Truth. Strategy. Sovereignty.\",\"publisher\":{\"@id\":\"https:\/\/siistrategic.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/siistrategic.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/siistrategic.com\/#organization\",\"name\":\"Sovereign Integrity Institute\",\"url\":\"https:\/\/siistrategic.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/siistrategic.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/siistrategic.com\/wp-content\/uploads\/2026\/03\/SIILogo4-1.png\",\"contentUrl\":\"https:\/\/siistrategic.com\/wp-content\/uploads\/2026\/03\/SIILogo4-1.png\",\"width\":1138,\"height\":956,\"caption\":\"Sovereign Integrity Institute\"},\"image\":{\"@id\":\"https:\/\/siistrategic.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/siistrategic.com\/#\/schema\/person\/a920967dacb34fe67d1e4e9e56db3517\",\"name\":\"lockekdauch\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/siistrategic.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fdb612033860b45d2dff2e66e02d1d6f7f5d53b14448b30dbf3d50bb5a5131fa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fdb612033860b45d2dff2e66e02d1d6f7f5d53b14448b30dbf3d50bb5a5131fa?s=96&d=mm&r=g\",\"caption\":\"lockekdauch\"},\"sameAs\":[\"https:\/\/siistrategic.com\"],\"url\":\"https:\/\/siistrategic.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From Documentation to Stillness - Sovereign Integrity Institute","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/siistrategic.com\/?p=169","og_locale":"en_US","og_type":"article","og_title":"From Documentation to Stillness - Sovereign Integrity Institute","og_description":"A Longitudinal Case Study of Sovereign Emergence Under Extraction Pressure Sovereign Integrity Institute (SII) \/ David Humble Author: David HumbleAffiliation: Sovereign Integrity Institute (SII)Date: April 2026Classification: Longitudinal Case Study \/ Institutional Working Paper Abstract Background: Prolonged exposure to extraction networks\u2014systems characterized by asymmetric resource transfer, perception manipulation, and chronic stress\u2014is associated with physiological dysregulation, depletion, [&hellip;]","og_url":"https:\/\/siistrategic.com\/?p=169","og_site_name":"Sovereign Integrity Institute","article_published_time":"2026-04-07T14:08:09+00:00","article_modified_time":"2026-04-07T14:08:11+00:00","author":"lockekdauch","twitter_card":"summary_large_image","twitter_misc":{"Written by":"lockekdauch","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/siistrategic.com\/?p=169#article","isPartOf":{"@id":"https:\/\/siistrategic.com\/?p=169"},"author":{"name":"lockekdauch","@id":"https:\/\/siistrategic.com\/#\/schema\/person\/a920967dacb34fe67d1e4e9e56db3517"},"headline":"From Documentation to Stillness","datePublished":"2026-04-07T14:08:09+00:00","dateModified":"2026-04-07T14:08:11+00:00","mainEntityOfPage":{"@id":"https:\/\/siistrategic.com\/?p=169"},"wordCount":1162,"commentCount":0,"publisher":{"@id":"https:\/\/siistrategic.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/siistrategic.com\/?p=169#respond"]}]},{"@type":"WebPage","@id":"https:\/\/siistrategic.com\/?p=169","url":"https:\/\/siistrategic.com\/?p=169","name":"From Documentation to Stillness - Sovereign Integrity Institute","isPartOf":{"@id":"https:\/\/siistrategic.com\/#website"},"datePublished":"2026-04-07T14:08:09+00:00","dateModified":"2026-04-07T14:08:11+00:00","breadcrumb":{"@id":"https:\/\/siistrategic.com\/?p=169#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/siistrategic.com\/?p=169"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/siistrategic.com\/?p=169#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/siistrategic.com\/"},{"@type":"ListItem","position":2,"name":"From Documentation to Stillness"}]},{"@type":"WebSite","@id":"https:\/\/siistrategic.com\/#website","url":"https:\/\/siistrategic.com\/","name":"Sovereign Integrity Institute","description":"Truth. Strategy. Sovereignty.","publisher":{"@id":"https:\/\/siistrategic.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/siistrategic.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/siistrategic.com\/#organization","name":"Sovereign Integrity Institute","url":"https:\/\/siistrategic.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/siistrategic.com\/#\/schema\/logo\/image\/","url":"https:\/\/siistrategic.com\/wp-content\/uploads\/2026\/03\/SIILogo4-1.png","contentUrl":"https:\/\/siistrategic.com\/wp-content\/uploads\/2026\/03\/SIILogo4-1.png","width":1138,"height":956,"caption":"Sovereign Integrity Institute"},"image":{"@id":"https:\/\/siistrategic.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/siistrategic.com\/#\/schema\/person\/a920967dacb34fe67d1e4e9e56db3517","name":"lockekdauch","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/siistrategic.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fdb612033860b45d2dff2e66e02d1d6f7f5d53b14448b30dbf3d50bb5a5131fa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fdb612033860b45d2dff2e66e02d1d6f7f5d53b14448b30dbf3d50bb5a5131fa?s=96&d=mm&r=g","caption":"lockekdauch"},"sameAs":["https:\/\/siistrategic.com"],"url":"https:\/\/siistrategic.com\/?author=1"}]}},"brizy_media":[],"_links":{"self":[{"href":"https:\/\/siistrategic.com\/index.php?rest_route=\/wp\/v2\/posts\/169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/siistrategic.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/siistrategic.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/siistrategic.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/siistrategic.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=169"}],"version-history":[{"count":1,"href":"https:\/\/siistrategic.com\/index.php?rest_route=\/wp\/v2\/posts\/169\/revisions"}],"predecessor-version":[{"id":170,"href":"https:\/\/siistrategic.com\/index.php?rest_route=\/wp\/v2\/posts\/169\/revisions\/170"}],"wp:attachment":[{"href":"https:\/\/siistrategic.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/siistrategic.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/siistrategic.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}