• Home
  • About Craig
    • Copyright & Use Policy
    • Contact Craig
    • Testimonies and Endorsements
    • Our Mission
    • Legacy Archive
    • Teaching AI Empathy (Article)
  • Legal
    • Mission Declaration
    • Use & Sharing
    • Creative Commons License and Permissions
    • Compensation and Use Policy
    • Cookie Policy (EU)
    • Privacy and Cookie Policy for Second Chance to Live
  • AI Ethics & Design
    • Backbone of Trauma-Informed Care AI
    • Second Chance to Live Trauma-Informed Care AI — New Class of AI
    • The Soul of AI
    • Trauma-Informed AI Model
    • Proof of Concept — AI Model
    • Alpha Declaration (AI Model)
    • Ethical AI: The Model
    • Trauma-Informed AI Authorship
    • Support, Not Extraction
    • Why AI Developers Need Trauma-Informed Wisdom
  • Foundations
    • Dear AI Developers
    • The Heart of Trauma-Informed Care
    • How the AI Model Was Built
    • Trauma-Informed AI Resource
    • The Power of Identification
    • Support Group
      • Hope
      • Healing What Others Can’t See
      • Testimonials
  • Brain Injury Recovery
    • Recovery Toolkit
    • Recovery Toolbox
    • How I Use Neuroplasticity
    • Good Habits for Success
  • Books
    • Full eBook Library (20 Titles)
    • Posters
    • Inspirational Posters Illustrated
  • Speaking
    • 30 Keynote
    • Speaking
    • Book Craig
    • Honors
    • Media

Second Chance to Live

Empowering the Individual, Not the Brain Injury

Trying to Figure Things Out After Our Brain Injuries

November 19, 2018 By Second Chance to Live

Trying to Figure Things Out After Our Brain Injuries
Trying to Figure Things Out After Our Brain Injuries

As individuals living with brain injuries we are in the process of trying to figure out how to live our lives and what works for us. Because we are in the process of figuring out how to live our lives, we may feel vulnerable.

In our vulnerability, we may find ourselves guessing at what is normal. In the process of trying to sort things out, we may find ourselves questioning our judgment. We may also be struggling to trust ourselves.

In response, we may find that we are trading our judgment for other people’s judgment. In the process, we may unknowingly entrust ourselves to untrustworthy people.

In our vulnerability, these individuals may seek to take advantage of us. Once we invite them into our lives, they may use different ways to control, manipulate and intimidate us for their own agendas and gain.


Being Vulnerable

Being vulnerable can leave or open us to up to being bullied. Being vulnerable can leave us susceptible to being bullied. As a result, we may be led to believe that we can not trust ourselves.

By not trusting ourselves we may be led to believe what other people want us to believe about ourselves.

Through buying into those beliefs, we may find that we deserve to be mistreated and bullied. Such treatment and bullying can lead us to believe that we don’t deserve to be more than we are led to believe about ourselves by those individuals.

Individuals who then take advantage of our being vulnerable.


 Intimidation Defined

Merriam Webster defines intimidation as: to make timid or fearful: frighten; especially: to compel or deter by or as if by threats.

Dictionary.com defines intimation as: to make timid; fill with fear, to overawe or cow, at through force of personality or by superior display of wealth, talent, ect., to force into or deter from action by inducing fear.

Vocabulary.com defines intimidation as: You can see “timid” in the middle of intimidating, and to be timid is to be frightened or to pull back from something. When you intimidate, you frighten or make someone afraid.”To frighten” or “make fearful” is at the root of the verb intimidate.

Intimidation can be mental, emotional, spiritual and physical or a combination of one or more ways.


Finding Freedom From Being Bullied

In April 2010 I wrote a 7 Part article in which I share what I helped me to grow in awareness, about bullying and what helped to set me free from the impact of being bullied.

The information helped and continues to help me to take a different course of action. A different course of action as I interact with individuals who may seek to take advantage of my being vulnerable after my brain injury.

I would encourage you to read each part of the article in order.

Traumatic Brain Injury, the Bully and Carrying Shame Part 1

Traumatic Brain Injury, the Bully and Being Distracted Part 2

Traumatic Brain Injury, the Bully and Perfectionism Part 3

Traumatic Brain Injury, the Bully and Losing Myself Part 4

Traumatic Brain Injury, the Bully and Overcoming Shame Part 5

Traumatic Brain Injury, the Bully and No Longer Believing Lies Part 6

Traumatic Brain Injury, the Bully and Solutions — A Way Out Part 7

As I became aware, I became less vulnerable. As I became less vulnerable, I found a new freedom. A freedom to be aware. A freedom to be me. A freedom to ask for what I need without fear. A freedom from the impact of being bullied. A freedom to trust.


 Be Aware of Bullies

Through becoming aware and finding freedom I discovered that I no longer had to remain vulnerable or intimidated by bullies. Instead, I could recognize them and take steps to take care of myself. Take care of myself when bullies seek to take advantage of my vulnerability through intimidation. Intimidation that can often present itself in subtle ways, with the motivation to control and manipulate you and I. Control and manipulate us into fulfilling their agendas for their plans and purposes.

Plans and purposes to exploit and take advantage of our being vulnerable.

In my experience, I have found that being bullied does not have to be limited to individuals.. In my experience, I have found myself bullied by groups of individuals. In April 2013 I wrote a series to share what I discovered through being bullied by different groups. I will include links to the 3 Parts of this series.

  Click on each link to the part of the article series and each part will open for you.

Is the Group that You are In Hurting You? — Are you being Bullied? Part 1,

Is the Group that You are In Hurting You? — Are you being Bullied? Part 2

 Is the Group that You are In Hurting You? — Are you being Bullied? Part 3

If you find yourself being bullied by a group, realize being bullied is about them. Being bullied is not about you. You are not the perpetrator. Recognize what is going on and detach yourself from the group.


In the Event that You Find Yourself Bullied

In the event that you find yourself being bullied, be it physical, mental, emotional, spiritual or psychological; realize that you are not at fault.

Bullies do what they do to intimidate, control and manipulate for their own gain.


Learning How to Trust Myself

In my experience, I had to detach from groups, organizations, and churches that sought to control, manipulate and bully me in order to begin to learn how to trust again. To learn how to trust my judgment. To learn how to trust myself.

To learn how to trust a loving God. To learn how to trust trustworthy people. To learn how to establish relationships with individuals and groups who do not exist by control, manipulation or intimidation.

“I realized that bullying never has to do with you. It’s the bully who’s insecure.” Shay Mitchell


What may Have set you Up to be Bullied

In November 2007 I wrote a 2 Part article, Traumatic Brain Injury, and the Identified Patient to share an awareness that helped me understand what made me vulnerable to bullying and intimidation from an early age.

Click on the below 2 links to read what I discovered that set me up to be vulnerable and to believe that I deserved to be bullied.

What set me up to be vulnerable to bullying and intimidation may have also set you up to also be vulnerable.

In the process of being vulnerable, you may also believe that you deserve to be bullied.

Traumatic Brain Injury and the Identified Patient – Part 1

Traumatic Brain Injury and the Identified Patient – Part 2


You have my permission to share my articles and or video presentations with anyone you believe could benefit, however, I maintain ownership of the intellectual property AND my articles, video presentations, and eBooks are not to be considered OPEN SOURCE. Please also provide a link back to Second Chance to Live. In the event that you have questions, please send those questions to me. All questions are good questions. I look forward to hearing from you. More Information: Copyright 2007 –2018.

Filed Under: Brain Injury Recovery -- An Ongoing Process

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Second Chance to Live advocating for AI to Support Not Extract from People living with Brain Injuries

Join our Private Facebook Support Group by Clicking on the below Image

Healing What Others Can’t See after a Brain Injury — ciick on Image

Most Recent Published Articles

  • Living with a Brain Injury is a “We” Experience, not a “They” Experience
  • Hope and the Progression of Living our Best Life After a Brain Injury Keynote Presentation
  • What Opens the Door for Artificial Intelligence (AI) to Harm Individuals
  • AI Safety Is Missing a Critical Risk Layer: Relational Harm Under Asymmetry
  • Second Chance to Live — 45 Posters Created to Encourage You and I to Not Give Up
  • Being the Author of Our Own Life, Process and Journey after a Traumatic or Acquired Brain Injury — One day at a Time Part 2
  • Being the Author of Our Own Life, Process and Journey after a Traumatic or Acquired Brain Injury Part 1
  • Second Chance to Live 19th Anniversary — Support and Service in the Age of Artificial Intelligence (AI)
  • Ethical Artificial Intelligence (AI) — Who Needs to Adapt — Artificial Intelligence (AI) or Individuals? Part 3 “Ethics Are Enacted”
  • Ethical Artificial Intelligence (AI) — Who Needs to Adapt — Artificial Intelligence (AI) or Individuals? Part 2 “Ethical Failure Under Strain”
  • Ethical Artificial Intelligence (AI) — Who Needs to Adapt — Artificial Intelligence (AI) or Individuals? Part 1 “Default Harm”
  • Teaching Artificial Intelligence (AI) how to Support Vulnerable Individuals and Not Take Advantage of Vulnerable Individuals
  • Evidence Based AI Developer Facing Architecture and AI Learning Logs: May-December 2025, January 2026
  • Creating Our Normal after Brain Injury Using Trauma-Informed Care to Thrive through Living
  • Trauma-informed Care Research, Development, Documentation, Application and Mentoring

Model Protection Notice

The Second Chance to Live Trauma-Informed Care AI Collaboration Model™ was founded and documented by Craig J. Phillips, MRC, BA in May 2025. All rights reserved under U.S. copyright, Creative Commons licensing, and public record. This is an original, working model of trauma-informed care human–AI collaboration — not open-source, not conceptual, and not replicable without written permission.

Second Chance to Live – Privacy Notice and Cookie Usage

  • Privacy and Cookie Policy for Second Chance to Live
  • Cookie Policy (EU)
Craig J. Phillips Second Chance to Live mission portrait – hope, healing, and purpose.
Click the image to read about the mission and vision of Second Chance to Live.
November 2018
M T W T F S S
 1234
567891011
12131415161718
19202122232425
2627282930  
« Oct   Dec »

Translate Second Chance to Live

Albanian Arabic Bulgarian Catalan Chinese Simplified Chinese Traditional Croatian Czech Danish Dutch Estonian Filipino Finnish French Galician German Greek Hebrew Hindi Hungarian Indonesian Italian Japanese Korean Lativian Lithuanian Maltese Norwegian Polish Portuguese Romanian Russian Serbian Slovak Slovenian Spanish Swedish Thai Turkish Ukrainian Vietnamese

Contact card

Copyright © 2026 · All rights reserved. · Sitemap

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Manage Consent

To offer the best experience, we use privacy-respecting technologies like cookies to understand how our site is used. We never use tracking to exploit or overwhelm you. Your consent allows us to improve how we support individuals living with brain injuries, invisible disabilities, and trauma. You are free to accept, decline, or adjust your preferences. 

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}