PW Data Systems v2.3x © 2005 -
 ⚿ Custody Record
 🕿 Crime Report
 🗪  CAD Record
Jump Target
CHIP/ID Guide
Functional grammar · quick reference · chain reading
Domain key

Chip colour identifies the domain at the jump target — not the node you are standing on. It tells the reviewer what terrain the backward jump leads to.

🔶Field ConditionIgnition point. A single originating event whose contamination propagated through state machinery without interception and embedded permanently into institutional record systems.
OriginThe jump target is a chain origin: an initiating condition, trigger point, or seed state.
ProcessThe jump target sits within a procedural, legal, or administrative mechanism.
RecordThe jump target involves the state of a document: alteration, breach, or falsification.
InstitutionThe jump target involves an agency's posture: actor recurrence, adoption, or reinforcement.
SuppressionThe jump target involves narrative pressure, oversight deflection, or containment.
ConsequenceThe jump target is a downstream outcome: harm, displacement, loss, or operational fallout.
>
Numbered Class Index
  • Origin: 1, 2, 3, 4
  • Process: 1, 2, 3, 4
  • Record: 1, 2, 3, 4, 5
  • Institution: 1, 2, 3, 4
  • Suppression: 1, 2, 3, 4, 5, 6
  • Consequence: 1, 2, 3, 4, 6
Alphabetical Seed Chain
    Example Forms
    • [origin|1] = target is Origin class 1 (no actor resolved)
    • [origin|1|A] = target is Origin class 1, chain seeded by P. Sharples / alias
    • [process|2|C] = target is Process class 2, chain seeded by Police / Suffolk Constabulary
    Current Map Totals
    6 domains, 27 numbered states, 20 seeds, 540 single CHIP/ID forms.
    Two systems, two views of the same node

    Marker glyphs in the node header describe the structural role of the node itself — what kind of event this is, read against the public institutional failure corpus (Hillsborough, Horizon, Windrush, Grenfell). They are the first-person view: what is happening here.

    CHIP/ID chips appear on the backward jumps beneath the node. Each chip describes the target at the other end of that jump — domain, class, and originating actor — as seen from the node currently being read. They are the third-person view: what terrain that jump leads to, and who seeded it.

    A complete CHIP/ID is read in three parts: colour identifies the domain at the jump target, class index identifies the sequence within that target domain, and seed chain identifies the originating actor — the one constant that persists across every domain the chain crosses.

    Where several chips appear beneath one node, the reviewer is looking at a convergence: multiple chains arriving from different targets, through different domains, from one or more actors. Where two actors operate in the same domain at the same target, their seed letters compress into one chip. Where they operate in different domains, each domain produces a separate chip.

    Read together
    Read the marker first to identify what is happening at the node. Then read the CHIP/ID on each backward jump to see where that node is connected to and who brought the connection.
    Read order
    Within a CHIP/ID, read left to right: colour (domain at the target), then class index (sequence at the target), then seed chain (originating actor — constant).
    Interpretive limit
    A CHIP/ID does not conclude the issue. It shows where a chain leads, what domain it crosses at the target, and who seeded it.
    Why it exists
    The chip announces the connection at the point of reading. A reviewer cannot claim ignorance of a connection that is visible at the node they are already standing on.
    Sequence logic

    The class index identifies the sequence at the jump target. It does not rank seriousness and it does not mark chronology. It distinguishes one recognised line from another inside the same target domain.

    What the index does
    It identifies which numbered sequence exists at the jump target. Two chips may share a colour but lead to different sequences within that domain.
    What the index does not do
    It does not weight the event, rank the evidence, or tell the reviewer what conclusion to reach.
    Repeated index
    The same colour-index recurring across distant nodes indicates the same sequence at the target continuing through time.
    Multiple indices, one colour
    Several indices in the same colour at one node mean the jumps lead to more than one sequence within that target domain.
    The constant

    The seed chain letter identifies the originating actor. It is the only axis that does not change as a chain moves through the chronology. Colour shifts at the target. Number shifts at the target. The letter persists from seed event to present node, through every domain the chain crosses.

    Purpose
    Follow any backward jump through any domain and the letter always leads to the same originating actor. The terrain changes. The origin does not.
    Absence of a seed
    If no letter is shown, the colour and class index still stand. The domain and class at the target are identified; the originating actor is not yet resolved.
    Same letter across nodes
    The same letter recurring across distant nodes means the same actor's chain is propagating through the chronology. The colour may differ at each hop — the letter does not.
    Multiple letters at one node
    Different letters at the same node mean independent chains — seeded by different actors — converge at this event.
    Seed Registry
      Tri-axis Visual Grammar

      Notation: [colour|number|letter]

      colour = domain at the jump target
      number = class within that target domain
      letter = originating actor (constant across all domains)

      Origin

      The jump target sits at an initiating condition of the chain.

      • [OR|1] — Seed Event: The single, identifiable initiating action (e.g., an initial false report or a minor procedural breach).
      • [OR|2] — Predisposing Condition: Pre-existing structural vulnerabilities (e.g., an existing "risk" flag or a prior misclassification) that allow the seed event to take root.
      • [OR|3] — Trigger Event: An external accelerant that activates a dormant condition, such as a new agency entering the timeline.
      • [OR|4] — Narrative Inversion: The point at which the victim–offender relationship is structurally reversed at origin; the actor is reframed as offender, the original offender's conduct unnamed. Operational DARVO at institutional letterhead.
      Process

      The jump target sits within a procedural, legal, or administrative mechanism.

      • [PR|1] — Narrative Injection: The moment a non-evidenced claim is inserted into an official record.
      • [PR|2] — Recursive Validation: The process where an institution cites a previous error as "proof" of its current action.
      • [PR|3] — Jurisdictional Laundering: Reframing an issue (e.g., changing "Service Failure" to "Clinical Risk") to bypass safeguards.
      • [PR|4] — Narrative Reinforcement: A procedural mechanism that locks an inverted framing into the record (acceptable-behaviour contract, no-contact obligation on the victim, tenancy condition pre-supposing the inversion). Converts a contested claim into a procedural obligation.
      Record

      The jump target involves the state of a primary document or evidence block.

      • [RE|1] — Determinative Record: An authoritative, unaltered state document (e.g., a CAD log or clinical note).
      • [RE|2] — Structural Fault: A record that is missing, withheld, or substituted by a summary.
      • [RE|3] — Narrative Capture: The complained-of characterisation has become the established frame through which subsequent events are interpreted. The distortion is load-bearing; downstream institutions read it as verified fact.
      • [RE|4] — Evidence Suppression: Active withholding of material that would alter the trajectory. Distinguished from RE|1 by absence rather than alteration — the record that should exist does not.
      • [RE|5] — Jurisdictional Displacement: Transfer to a body without jurisdiction, authority, or access to material necessary to resolve the matter. Creates the appearance of process without substance.
      Institution

      The jump target involves an agency's posture toward the information it received.

      • [IN|1] — Transmission Node: The agency acts as a conduit, repeating a narrative without verifying it.
      • [IN|2] — Self-Reinforcement: The agency actively aligns its records to justify a prior intervention.
      • [IN|3] — Channel Capture: Future complaints, reports, or escalations are required to be routed through the institutional vector that is itself the source of the complaint. The agency assesses complaints about itself under its own authority.
      • [IN|4] — Network Convergence: Multiple independent chains arrive at the same institutional node. The agency is a structural concentration point — its posture determines the trajectory of more than one chain simultaneously.
      Suppression

      The jump target involves a method used to prevent correction of the record.

      • [SU|1] — Issue Fragmentation: Deliberately "time-slicing" the chronology to hide causal links.
      • [SU|2] — Procedural Deflection: Using delay, silence, or "remit narrowing" to avoid making a classification decision.
      • [SU|3] — Pre-emptive Criminalisation: Clauses or conditions imposed on the victim that criminalise future complaints, communications, or self-defence in advance. Subsequent attempts to raise the matter become breaches of the imposed obligation; institutional response is directed at the breach, not the matter.
      • [SU|4] — Enforcement Deployment: Institutional enforcement power — arrest, sectioning, legal proceedings, tenancy action, professional termination — used as the operational arm of suppression. The state mechanism becomes the instrument of the chain.
      • [SU|5] — Institutional Reconnaissance: The use of official authority or institutional access to gather operational intelligence about the subject's evidentiary position, surveillance capability, or documentation state, for the purpose of informing or avoiding detection in subsequent chain actions. Distinguished from SU|4 in that no enforcement power is deployed — the mechanism is access, not force.
      • [SU|6] — Jurisdictional Superposition: The use of a single instrument or act to simultaneously operate in two distinct legal domains while suppressing the visible connection between them. Each domain reads the instrument as belonging to its own process and does not examine the other. The result is that neither chain can be scrutinised independently — each is shielded by the framing of the other. Distinguished from SU|1 in that the chains are not time-sliced but co-present and mutually occluding. The mechanism is authorial — it requires a specific act at a specific node — not emergent.
      Consequence

      The jump target is a downstream outcome produced by the preceding chain.

      • [CO|1] — Procedural Harm: The loss of legal routes, delay, or exposure to unlawful powers.
      • [CO|2] — Institutional Reality: A permanent distortion where the "contaminated record" becomes the only recognized fact.
      • [CO|3] — Record Foreclosure: A disproof, acquittal, or finding that cannot correct the contaminated record because the correction mechanism is itself captured or procedurally exhausted.
      • [CO|4] — Chain Occlusion: A consequence in which the conflation of two distinct legal sequences — produced by a jurisdictional superposition event — renders one or both chains inaccessible to the remedial process. The oversight body, complaint handler, or court reads only the surface framing and cannot reach the independent chain beneath it. Distinguished from CO|3 in that the correction mechanism is not exhausted or captured — it is structurally unreachable from the framing the superposition has imposed.
      • [CO|6] — Institutional Direction Reversal: A consequence in which an actor who has been operating within the contaminated chain reaches an irreconcilable contradiction between the received narrative and the evidential reality, reverses their institutional trajectory, and takes a documented step toward correction — but the reversal does not propagate. The acknowledgement is contained within the actor's own record or conduct. The broader chain continues unaffected. Distinguished from CO|3 in that the correction mechanism was reached and partially activated, not exhausted or captured.

      When reading a CHIP/ID like [process|2|C], the logic is:

      • Colour (process): The jump target sits in the procedural domain.
      • Number (2): The target is a Recursive Validation node (an institution citing a prior error as proof).
      • Letter (C): The chain was seeded by the Police / Suffolk Constabulary thread. Follow it backwards and you arrive at the police-originated seed event.
      CHIP/ID Grammar
      Institutional Chain Marker Taxonomy
      Classification system · 23 markers · 6 categories
      Marker Taxonomy

      Temporal Graph

      Time displacing lateral cognition is the hidden cost of legal order.
      Any system that cannot survive being replayed in strict temporal order is not a system of record.
      It is a system of concealment.

      "The position is specified, the consequences are specified, test at your convenience. The record doesn't move." - Sir Patrick Stewart

      SYSTEM NOTICE: Chip/Id Tri-Axial Visual Grammar 'compression' stage completed. Refactor completion: 03/05/2026 - 12.35 Online.

      ⚠️ Important: About Cross-Reference Links

      The chronological jumps in this document are indicative, not exhaustive.

      They show examples of connections the author identified, not a complete catalog of all relationships.

      Following the links ≠ Thorough examination.

      To properly review this chronology:
      — Read the entire timeline in chronological sequence
      — Examine all attached documents
      — Identify relationships independently
      — Use jumps as navigation aids, not analytical conclusions

      Asserting thorough review while only following documented jumps is either a fundamental misunderstanding of this tool, or a deliberate choice to avoid thorough examination while claiming to have conducted one.

      ALL of the 'actors' in this graph can be likened to a Christian proselytising God; they ALL went into a dark room looking for a black cat that wasn't there, all exclaimed they had found it... Some of them knew the cat was not there and said they found it anyway.