MAPPING THE SYSTEM
THE CULTURE PRODUCED UNDER LISA SUMPTION'S LEADERSHIP
This page is not about what happened to me.
It is about the architecture that made it possible. The structure underneath the individual choices. The mechanism that runs on volunteers at state parks and libraries and hospitals and schools — anywhere unpaid labor meets institutional authority and there is no one whose job it is to protect the person giving the labor freely.
This system does not require cruel people.
It requires ordinary people making ordinary institutional choices inside a structure that rewards silence and punishes documentation.
If you recognize what follows, you are not imagining it.
THE STAGES:
- Stage One — The Origin Event
- Stage Two — The Escalation Response
- Stage Three — Trust Recruitment
- Stage Four — The Coercion Meeting
- Stage Five — Assessment and Surveillance
- Stage Six — Dismissal Without Process
- Stage Seven — The Containment Call
- Stage Eight — Retaliation in Writing
- Stage Nine — Institutional Containment
- Stage Ten — The Silence Strategy
- What the System Requires of You
- What Breaks the System
STAGE ONE — THE ORIGIN EVENT
It begins with something small.
A dismissive response. A boundary named. A communication that creates a record. Something that in a healthy institution would be unremarkable — a volunteer asking for clarity, naming a concern, documenting an interaction.
In this system, that small thing becomes the origin of everything that follows. Not because of what it was. Because of what it created.
A record.
The record is the threat. Not the behavior it documented. The record itself. Because the record means the institution can no longer control the narrative. And narrative control is how this system survives.
In this case: a 6AM text asking for operational clarity during a power outage. A follow-up email naming a supervisor's dismissive tone. That email became the origin of everything.
STAGE TWO — THE ESCALATION RESPONSE
The institution does not respond to the record by addressing what the record documents.
It responds by escalating.
A supervisor shows up unannounced. A manager gets involved. The volunteer is confronted alone, without their direct supervisor present, without notice, without any of the procedural protections that would exist for an employee.
The escalation is designed to accomplish one thing: make the volunteer understand that documentation has consequences. That naming concerns creates problems. That the path forward requires silence, not record-keeping.
Most volunteers receive this message and absorb it. They recalibrate. They stop documenting. They get through their time. The system worked.
Some people respond to the escalation by creating a record of good faith. A documented attempt to resolve the tension on the institution's terms — not because resolution is expected, but because the institution's response to that attempt reveals what the escalation actually was.
A healthy institution resolves after that response.
This system escalates further.
The failure to resolve is the evidence. The escalation that follows a documented good faith attempt doesn't just prove bad faith. It proves the issue was never the behavior the institution claimed to be addressing.
STAGE THREE — TRUST RECRUITMENT
The system needs material.
It cannot build its case on documentation alone because the documentation doesn't support the case. It needs something more personal. Something that can be reframed. Something extracted from trust.
This is where a specific role activates. Not the aggressive supervisor. Not the distant manager. Someone warm. Someone who seems safe. Someone whose position is specifically meant to support the volunteer.
They elicit trust through reciprocal vulnerability. They create the conditions for disclosure. They receive what the volunteer shares — the context, the history, the analysis, the fears — and they deliver it to management.
In this case: 90 minutes of reciprocal conversation in the Welcome Center. A walk the following day. A clear boundary set before any disclosure. A cautious hour of genuine context shared in good faith. Delivered to management.
STAGE FOUR — THE COERCION MEETING
Now the system has what it needs.
It calls a meeting. Not a formal disciplinary meeting with documentation and process and the procedural protections that would apply to an employee. An informal meeting. A public space. No paperwork. No witness for the volunteer. Just the institution's representatives and the person they've decided to remove.
The meeting is not designed to resolve conflict. It is designed to apply pressure until the volunteer resigns voluntarily. Voluntary resignation is cleaner than dismissal. It requires no documentation. It produces no record of institutional misconduct. It allows the system to reset for the next person.
The pressure takes specific forms. Reframing normal communication as threatening behavior. Weaponizing personal disclosures. Suggesting repeatedly that leaving would be easier. Refusing to engage with any substantive claim. Turning every attempt at honest dialogue back into evidence of the problem.
When the volunteer names what the meeting actually is — when they refuse to be managed out of what they know — the meeting fails. The system moves to the next stage.
In this case: 62 minutes at a public picnic table. Recorded. Every word preserved.
STAGE FIVE — ASSESSMENT AND SURVEILLANCE
The system needs to understand what it's dealing with.
It sends someone to assess. Not officially. Not in uniform. Not with identification. Someone who can approach the volunteer in isolation and ask direct questions about how they're being treated. Who can evaluate whether the volunteer is likely to escalate, go public, contact officials.
The questions are designed to elicit a response that confirms the profile the system has been building. Paranoid. Unstable. Disconnected from reality. Something that makes the documentation look like pathology rather than accuracy.
When the assessment fails — when the volunteer doesn't take the bait, documents the encounter professionally, and asks their supervisor about it the same day — the system produces a cover story. Immediately. Before the volunteer has time to investigate.
In this case: an unidentified man, no uniform, no credentials, photographing dirty yurts mid-clean, asking how leadership was treating me while all rangers were away. Cover story provided within two hours.
STAGE SIX — DISMISSAL WITHOUT PROCESS
When the volunteer cannot be pressured into resigning and the assessment has failed, the system removes them.
Not through formal process. Not with documentation. Not with cause that would survive scrutiny. With a phone call and a knock on the door and a request to return the keys.
The stated reason is always minor. A complaint from a guest. A comment someone overheard. Something so small it cannot be the real reason and so vague it cannot be effectively contested. The real reason — that the volunteer documented abuse and refused to stop — is never stated. Because stating it creates liability.
The timing matters. Six days before scheduled completion. One shift remaining. When the economic cost of fighting it is highest and the institutional cost of the dismissal appears lowest.
In this case: a phone call, then a knock on the RV door, then keys collected, no paperwork, 24 hours to vacate. Recorded on camera.
STAGE SEVEN — THE CONTAINMENT CALL
When the volunteer goes public — when they document the dismissal before the institution has finished constructing its narrative — the system deploys its most sophisticated instrument.
Someone with a professional background in human engagement calls. Not to investigate. Not to offer help. To contain.
The call deploys specific techniques. Clinical reframing of political analysis as pathology. Distortion of disclosures extracted through trust into evidence of instability. Repeated attempts to get the volunteer to inhabit a false frame. Expressions of concern designed to establish that the institution tried while producing nothing that requires action.
The goal is to gather information about what the volunteer has, what they plan to do with it, and whether they can be redirected toward a resolution that disappears the record. The goal is never stated as such.
In this case: 30 minutes and 56 seconds. Recorded. The expulsion letter was signed the following day.
STAGE EIGHT — RETALIATION IN WRITING
This is where this system makes its most catastrophic error.
The institution puts the real reason in writing.
Not always. Most of the time the system is careful enough to cite vague conduct concerns that cannot be easily disproven. But when the institution is confident enough — when it believes the volunteer has no recourse and no audience and no platform — it sometimes names the actual reason.
Protected speech. Public comments about staff. The video. The documentation. The thing the volunteer was constitutionally entitled to do.
On agency letterhead. With a signature. With a typo in the date because it was produced in haste by someone who was not confident in what they were doing but did it anyway.
In this case: permanent expulsion from all Oregon State Parks volunteer programs citing public comments about staff. That is First Amendment retaliation documented by the institution itself.
STAGE NINE — INSTITUTIONAL CONTAINMENT
When the volunteer continues to document and escalate, the institution builds walls.
A senior official redirects all correspondence through a single channel. The channel produces no substantive responses. Evidence of constitutional violations is described as dissatisfaction with a personnel decision. Requests for investigation are met with procedural language and no commitments. Public records requests are slow-walked past statutory deadlines then fulfilled through inaccessible portals at prohibitive cost.
The director closes communication by reframing comprehensive documented evidence as emotional processing.
Every mechanism of accountability is redirected to shield the people accountability was built to reach.
STAGE TEN — THE SILENCE STRATEGY
The final stage is silence.
The institution stops responding entirely. Not because there is nothing to say. Because everything it might say creates additional exposure. The surveillance cannot be explained. The cover story cannot be substantiated. The we on the expulsion letter reaches up to someone who approved it. The containment wall is evidence of knowing something needed to be contained.
Silence feels like distance. The institution believes that if it stops engaging, the situation stops existing. That the volunteer will eventually exhaust themselves. That the documentation will fade when the intensity fades.
What silence actually produces is a timestamped record of institutional knowledge and inaction. Every letter unanswered. Every question ignored. Every opportunity to self-correct declined. All of it documented. All of it permanent. All of it discoverable.
Silence is not the end of the system.
It is the system's final gift to the record.
WHAT THE SYSTEM REQUIRES OF YOU
If you are reading this because you recognize what you just read — here is what the system needs from you to work.
It needs you to stop documenting when the escalation begins.
It needs you to absorb the pressure and recalibrate quietly.
It needs you to trust the person who elicits your trust before delivering your disclosures to management.
It needs you to resign voluntarily rather than forcing a documented dismissal.
It needs you to accept the check if one is offered.
It needs you to believe that the mechanisms of accountability — the director, the governor, the public records process — will work for you the way they claim to.
It needs you to move on.
It needs you to believe you are alone.
You are not alone.
WHAT BREAKS THE SYSTEM
Documentation that begins before the system knows it needs to worry about documentation.
A record that is published before the institution finishes constructing its narrative.
A volunteer who understands that the coercion meeting is a coercion meeting while they are sitting in it.
A camera running when the keys are collected without paperwork.
A call recorded before the institution knows the call is being recorded.
A compliance email that proves good faith before the system can claim bad faith.
An archive that is independently verifiable, never legally challenged, and not going away.
A plaintiff who cannot be bought, cannot be silenced, and is prepared to argue the constitutional question at the highest level.
And the knowledge that what was done to you was not personal.
It was structural.
Which means it can be documented.
Which means it can be proven.
Which means it can be changed.
This archive is the documentation of one instance of this system. The evidence pages show each stage as it occurred. The correspondence shows the institutional response at every level of escalation.