TL;DR: Integrity abuse takes recognizable forms across cases. This post gives twelve composite patterns drawn from clinical practice, organized by what the operation concealed and how the concealment was maintained. The examples are illustrative composites rather than specific cases. The point is to give partners and clinicians a vocabulary for recognition. The structural feature that makes each example a case of integrity abuse is the same: an organized operation of concealment maintained across substantial time through active deception, producing cumulative harm to a partner whose reality was altered to accommodate it.
Why examples matter for this construct
A partner sits with a clinician three months after discovery and tries to describe what they have been living through. The vocabulary keeps falling short. He had an affair is what people understood when they asked, but the description does not match. The discovery uncovered nine years of organized concealment, two encrypted phones, a bank account they had never seen, and a coworker the partner had been told to stop worrying about repeatedly. Affair is a word for an event. What happened to this partner was not an event.
The reason examples matter for integrity abuse is that the construct names a structural pattern, and structural patterns become recognizable through specific instances rather than through definitions alone. The post on what integrity abuse means lays out the construct in terms of cumulative harm, parallel life, and active deception. This post gives the construct skin by walking through twelve composite patterns. None of the examples are real clients. All of them are recognizable to clinicians who have worked in this terrain for any length of time.
What unifies the examples is not the content of what was concealed. The content varies. What unifies them is the structure: an organized operation maintained across time, requiring executive function and rehearsal, producing a parallel reality that the partner could not access while it was operating.
Sexual examples
1. The hidden device. A spouse maintains a second phone or a heavily firewalled account on a primary device, used exclusively for hidden sexual activity, across the duration of a long marriage. The architecture includes specific apps, specific hours, specific physical locations where the device is used. The partner has periodically asked questions about phone use. The questions have been deflected with plausible alternatives that cumulatively trained the partner not to ask.
2. The coworker emotional and sexual affair. An emotional affair with a coworker that the partner repeatedly asked about over a period of years is denied, minimized, and reframed as a friendship. The partner is told they are paranoid. The relationship continues through business trips, late-night text exchanges, and shared vocabulary the partner has noticed but cannot prove. When the relationship surfaces, it is revealed to have been sexual since early in the period the partner was being told their concerns were unfounded.
3. The serial pattern across previous partners. On discovery, the partner learns that the pattern they thought was new to their relationship has operated across two or three prior relationships. Each prior partner was told the same cover story they were told. The pattern’s history extends back into adolescence. What the discovering partner thought was a marital crisis is the surfacing of a developmental structure they had not been told existed.
4. Undisclosed sexual identity material. A spouse has maintained a sustained sexual life with people of a gender or in a context the partner had explicitly asked about and been told did not apply. The integrity abuse here is not in the orientation. The integrity abuse is in the sustained denial of a fact the partner had reasonable right to know in order to make decisions about their own sexual health and identity.
Financial and material examples
5. The parallel financial life. A partner discovers that the household has carried significant debt the discovering partner did not know existed, often for the funding of activities inside another concealed operation. Decisions about the family’s spending, savings, and life direction were made on the basis of an account of the finances that was systematically false. The harm is not the debt itself but the years of decisions made inside a fabricated material reality.
6. The undisclosed inheritance, payout, or hidden asset. A partner learns that their spouse has held assets, received settlements, or maintained accounts that were never disclosed during years of joint financial decision-making, including decisions about whether one partner could leave a job, take time off work to raise a child, or remain in a marriage at all. The asymmetry of information altered the partner’s range of options without their knowledge.
Substance and medical examples
7. Active substance use during pregnancy or a child’s medical crisis. A partner concealed sustained substance use during specific high-stakes periods, including a pregnancy or a child’s serious illness, when the family was making decisions on the assumption that one parent was sober and available. The harm extends beyond the use to the years of family decisions made on a false account of who was and was not present.
8. The undisclosed serious medical condition. A spouse has known of a serious medical or psychiatric condition for years and has not disclosed it, allowing the partner to make life decisions, including reproductive decisions and major financial decisions, on the assumption of facts that were not true. The harm here is the partner’s loss of access to an accurate account of their own life.
Identity and origin examples
9. The undisclosed prior marriage, child, or significant past relationship. A spouse has not disclosed a prior marriage, the existence of a child, or a significant relational history that has continued to operate in their life through ongoing financial or emotional contact. The partner discovers this years into the marriage and recognizes that decisions about their own family planning, their own use of time, and their own relational expectations were made without information they had relational right to.
10. The undisclosed legal exposure. A spouse has known of pending legal matters, prior convictions, or active investigations that could materially affect the family. The information was withheld through years of decisions in which both partners participated as if the information did not exist.
Tactical and architectural examples
11. The trained partner. Across years, the partner has raised concerns and been redirected. Each individual redirection was plausible. Cumulatively, the redirections trained the partner not to bring up concerns at all, because the cost of asking had become higher than the benefit. The integrity abuse here is not located in any single conversation. It is located in the operational training that produced a partner who had stopped trusting their own perceptions.
12. The systematic shaming of the partner’s reality-testing. Over years, the partner’s accurate perceptions, intuitions, and questions have been reframed as paranoid, controlling, jealous, or evidence of the partner’s own dysfunction. The pattern is consistent enough that the partner has incorporated the framing into their self-concept. On discovery, the partner often reports that the worst part of the situation is not the underlying behavior but the realization that they had spent years thinking something was wrong with them when in fact they had been perceiving accurately.
What the examples have in common
The examples differ in content. They share three structural features.
The first is duration. None of these patterns are explicable as a moment of weakness. Each requires sustained operation across months, years, or decades, with the corresponding operational complexity that sustained concealment demands. A construct that names duration as a defining feature is naming something different from what betrayal names in ordinary speech.
The second is organization. Each pattern requires architecture: specific places, specific times, specific tools, specific people who knew what the partner did not know. The architecture is itself diagnostic. A pattern that has architecture is a pattern that has been planned and resourced. The partner who lived alongside it without seeing it was kept from seeing it.
The third is the active production of false reality. In each example, the partner was making decisions, forming identity, and conducting their life on the basis of an account of the world that was systematically untrue. The harm is not principally located in the content of the concealment but in the cumulative effect of having been placed inside a constructed reality for substantial time. This is what the term integrity abuse picks out that the term affair or betrayal does not.
A partner reading this post who recognizes their own situation in one or more of the examples is recognizing the structure, which is the work of pattern recognition rather than pathologizing themselves. The structure has a name. Most therapists will not have been trained in the name. Recognizing the structure is the precondition for finding the small number of therapists who have. The post on finding a Minwalla-trained therapist walks through what the credential actually means and how to evaluate clinicians who claim it. The post on the diagnostic criteria for Integrity Abuse Disorder lays out the formal criteria that organize what the examples illustrate.