Suspect Computing




Technology is a boon to our kind. It enables us to reach more people than ever before for the purpose of a quick squirt of fuel or as part of the orchestrated campaign to seduce our next victim who will be our primary source. The prevalence of social media platforms, blogs, chatrooms and the like provides us with a ready audience for us to declare our brilliance. Whether it is a pithy tweet, a photograph of our latest cycling adventure on Facebook, the culinary achievement that has been shared on Instagram, there are so many ways to herald our magnificence. We do not need to be near to these people. The reach is millions and therefore when we receive a praiseworthy comment, a like or love indication from the relevant button then that sudden dose of fuel comes our way. It is an almost instant hit. Fire something out across the electronic ether and in a matter of moments a reliable dose of fuel will come winging its way back. What a wonderful and simple method.

Even better is the use of our computers to search out targets, vet their online information to ascertain whether they would be suitable for our purposes and then to mine for information which can be used in the seduction of our targets. It is all there. The computer us used to find the information which forms the bedrock of our campaigns and it is also the instrument of our campaigns. So many repeated ways to bombard somebody with our supposed love. Our incessant application and monitoring. The ways in which we can keep in touch with different prospective victims as we assess who will be best. The way we can develop your replacement as we feel that your positive fuel is waning and your devaluation is just around the corner. The way we can triangulate you with a piece of machinery as our eyes remain locked on the screen as we engage in our online flirtations and gathering of fuel. The computer is truly our friend but it is also very useful for you to understand what you are dealing with.

Our use of the computer is a telling indicator of who you are dealing with. Whether it is a tablet, laptop, PC or mobile ‘phone (after all you are really carrying a small computer in your bag or pocket these days) you can expect to find similar secretive and furtive behaviour from our kind when it comes to the use of the computer to further our machinations. The computer is the nerve centre of our operations and as such it is something which we will guard. Accordingly, you should be aware of activity and behaviour such as: –

  1. Closing the computer down when you are nearby;
  2. Switching screens when you are nearby;
  3. Refusing to let you use the device;
  4. If you are able to use the device, we will not allow you to know the password and instead will enter it for you;
  5. If you are able to use the device, we will hover over you whilst you do so;
  6. If you are able to use the device you will find that the e-mail account is either locked or is empty, the search history is clear, there is no predictive search element in the search bar which may give away previous and frequent searches and documents are locked down.
  7. If you are given unfettered access to a computing device then it is highly likely that we use a different device for our dark works which you do not know about, otherwise there is no way that we will allow you to use such a device so freely. In this instance you need to have identified other red flags to indicate it is more than likely that you are engaging with a narcissist to raise the prospect of us using two computers. If there are no other red flags your unfettered access to the computer will purely be as a consequence of the use having nothing to hide and he or she will not use a secret device.

You would do well to consider the computing habits of the person that you are with and especially so if you have suspicions that you are dealing with one of our kind. Understand that the computer (in its various forms) forms the platform for so much of what we do. Gathering new victims and seducing them, organising and executing your devaluation, orchestrating the smear campaign against you. You should know that the computer is a tool which is used against you and you can utilise it as a barometer of our attitude towards you which will then in turn allow you to understand what you can expect to happen.

So much of what we do occurs through the electronic medium because that allows us full reign to portraying what we wish to portray to the world at large. It allows significant access, it provides a platform for heralding our achievements and it is not an exaggeration to state that it forms the engine room of our activities.

We will never allow you access to our computers but if there is a shared device then you should look out for two things. The first is that after we have used it, our e-mail inbox, browsing history and messaging will be cleaner than a contagious diseases research lab. This situation will persist for some time. The second is that when there is something to read in that inbox, from that browsing history and those messages you ought to know that we wanted you to see it because your devaluation has begun and this is the electronic bait that has been set to provoke you. Bear in mind, this is just what we are prepared for you to see for the purposes of gathering fuel. What is really going on our devices that we will not allow you access to (and the ones you do not even know about) is far, far worse.

13 thoughts on “Suspect Computing

  1. Laurel says:


    ‘Trolling’ HG on Insta…I am so laughing right now.
    I’m on his insta too – but it’s ok as HG wasn’t the one who broke my heart… hehe


  2. Claire says:

    My ex Narc uses the technology for living, he is very skilled indeed. It was a challenge to see his browsing history at one of his computers . Don’t ask me how but I managed it to see what I wanted. I have some interest in the technology as well.
    I am sure he had traced me but I could always pretend being foolish and the search was by mistake.
    Some stuff was kept on a hard drive and USBs. He always carried them with him at work so I never had the chance to snatch them and see their contents.

    I believe HG has written about triangulation with an object. Here I am – being triangulated in a such manner.
    It is sounds hilarious but once I was very curious what he was up to spending so much time after work in front of the screen in the other room and a bit upset.
    So I entered his office ( as he called it ) and gave him impromptu lap dance looking at his screen. He quickly switched so I saw only some coding. For the record, I am not and never been into the adult entertainment industry; I just love to dance . Even on the treadmill.

  3. Beata says:

    Hello HG,
    thank you very much for your good information.

    I would like to ask you something today. I have a co-worker, who is a narcissist. He talks smoothly and with charm, he blames everybody else for his mistakes, and is delusional. He doesn’t keep records as he is supposed to for his projects and now I am to take over one from him. I have to clean up and start from the beginning, he did more harm than anything else. But worst of all he did not do the reports for our CEO and I don’t have the information I need to do them. The CEO will expect them from me now and doesn’t care that it isn’t my fault that I cannot provide the data.
    The co-worker ignores my requests and e-mails. I have asked by supervisor for help, and put the CEO on CC., but they all say “yes, sure” to his big words, never followed up by actions. They don’t make him take responsibility. He told me, the client didn’t know how to do their job, the manager before him didn’t do his job, so nothing was his fault.

    How would you deal with him? I put the people above him in the hierarchy on Cc. and informed them and I have asked for hard facts and information, they know this. But they don’t care that he just doesn’t react and just goes around blaming everyone else. He was demoted, but that doesn’t help me and I don’t know why he is even still in the company. I had asked my supervisor if the was staying, and didn’t get an answer.

    1. HG Tudor says:

      Hello Beata, you are welcome.

      To address your problem these are exactly what you need :-

  4. Renarde says:

    Oh God. The second statement. I lived that. It broke me by degrees.

  5. Laurel says:

    Other stealthy behaviours: deleting chat apps like kik after use so they appear to not exist. And then downloading them again when they can use them in secret.

    Also, never ever using these apps to communicate with the IPS so even If they have heard of it, it flies under the radar as the narc’s phone doesn’t have it (supposedly).

    Very clever.

    By removing the app, it prevents any messages ever been delivered or seen unless alone. Notifications have no impact this way as well… bonus! Totally wipes all record of conversation when the app is once again deleted.

    Dirty little secret trick number 56432667896433667!!!

    1. Renarde says:

      What a VERY intresting post, Laurel!

      1. Laurel says:


        It was very painful when I realised this was what he was doing. I was long distance, and I used this app to chat with him.

        I began to notice that many times the D that showed up for delivered when a message was sent, was always ‘faded’. Hours or days later, it would turn to a darker black colour.

        I googled this and learned that the faded D meant the message was delivered but the user was not online or the app was not signed into.

        The darker D meant he was using the app.

        From these two things, I discovered a pattern. When we were chatting all day and within reach – or when he was impossible to reach.

        I asked him about it – mentioning the D factor. He was so Angry. He let it slip though by saying I get an email if there are messages waiting for me and I reinstall the app to get them.

        I felt sick but realised then there was someone else around as well. The beginning of the end.

        Those little D’s told me more about him than he ever did!

        1. Renarde says:


          I’m very twitchy about any SM Apps. Exactly four years today I completely lost the plot over the buggers. Took me 6 months to recover. Ever since then I use them very sparingly. My main is SMS. Does what it says. I dont know if it’s been read or delivered. I dont need to know. Much prefer it.

          1. Laurel says:


            Yes, I only use sms now too. I hadn’t used Kik until he said ‘ this is great / make an account and we will chat’.

            I don’t have or use it now – but I can see why he did. This was over 2 years ago and I’m grateful to be free of him and his games.

            You used a good word – ‘recover’ as that’s what we need to do. Such a labyrinth we have lived through and survived…

            No more losing the plot ! 🙂

            Take care x

          2. Renarde says:


            Indeed. SM is bad enough without it making a rod for our own backs!

            I really should block those two MR tools. I guess I’m curious how far one will go when he can see that I’m reading the message but not responding.

            I only created an IG account to troll HG!

    2. Claire says:

      Laurel, you don’t have to delete Kik in order to purge the message history.
      Once you are logged out, the history is gone. Kik history is not kept on their servers.
      If you want to hide someone from your contact list – make a screenshot with their Username, then delete the user . If you want to chat to this person again, you search them by their Username and voilà.


  6. Pingback: Suspect Computing ⋆ NarcTopia

Vent Your Spleen! (Please see the Rules in Formal Info)

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Previous article

Narc Magnet