Suspect Computer

 

 

Technology is a boon to our kind. It enables us to reach more people than ever before for the purpose of a quick squirt of fuel or as part of the orchestrated campaign to seduce our next victim who will be our primary source. The prevalence of social media platforms, blogs, chatrooms and the like provides us with a ready audience for us to declare our brilliance. Whether it is a pithy tweet, a photograph of our latest cycling adventure on Facebook, the culinary achievement that has been shared on Instagram, there are so many ways to herald our magnificence. We do not need to be near to these people. The reach is millions and therefore when we receive a praiseworthy comment, a like or love indication from the relevant button then that sudden dose of fuel comes our way. It is an almost instant hit. Fire something out across the electronic ether and in a matter of moments a reliable dose of fuel will come winging its way back. What a wonderful and simple method.

Even better is the use of our computers to search out targets, vet their online information to ascertain whether they would be suitable for our purposes and then to mine for information which can be used in the seduction of our targets. It is all there. The computer us used to find the information which forms the bedrock of our campaigns and it is also the instrument of our campaigns. So many repeated ways to bombard somebody with our supposed love. Our incessant application and monitoring. The ways in which we can keep in touch with different prospective victims as we assess who will be best. The way we can develop your replacement as we feel that your positive fuel is waning and your devaluation is just around the corner. The way we can triangulate you with a piece of machinery as our eyes remain locked on the screen as we engage in our online flirtations and gathering of fuel. The computer is truly our friend but it is also very useful for you to understand what you are dealing with.

Our use of the computer is a telling indicator of who you are dealing with. Whether it is a tablet, laptop, PC or mobile ‘phone (after all you are really carrying a small computer in your bag or pocket these days) you can expect to find similar secretive and furtive behaviour from our kind when it comes to the use of the computer to further our machinations. The computer is the nerve centre of our operations and as such it is something which we will guard. Accordingly, you should be aware of activity and behaviour such as: –

  1. Closing the computer down when you are nearby;
  2. Switching screens when you are nearby;
  3. Refusing to let you use the device;
  4. If you are able to use the device, we will not allow you to know the password and instead will enter it for you;
  5. If you are able to use the device, we will hover over you whilst you do so;
  6. If you are able to use the device you will find that the e-mail account is either locked or is empty, the search history is clear, there is no predictive search element in the search bar which may give away previous and frequent searches and documents are locked down.
  7. If you are given unfettered access to a computing device then it is highly likely that we use a different device for our dark works which you do not know about, otherwise there is no way that we will allow you to use such a device so freely. In this instance you need to have identified other red flags to indicate it is more than likely that you are engaging with a narcissist to raise the prospect of us using two computers. If there are no other red flags your unfettered access to the computer will purely be as a consequence of the use having nothing to hide and he or she will not use a secret device.

You would do well to consider the computing habits of the person that you are with and especially so if you have suspicions that you are dealing with one of our kind. Understand that the computer (in its various forms) forms the platform for so much of what we do. Gathering new victims and seducing them, organising and executing your devaluation, orchestrating the smear campaign against you. You should know that the computer is a tool which is used against you and you can utilise it as a barometer of our attitude towards you which will then in turn allow you to understand what you can expect to happen.

So much of what we do occurs through the electronic medium because that allows us full reign to portraying what we wish to portray to the world at large. It allows significant access, it provides a platform for heralding our achievements and it is not an exaggeration to state that it forms the engine room of our activities.

We will never allow you access to our computers but if there is a shared device then you should look out for two things. The first is that after we have used it, our e-mail inbox, browsing history and messaging will be cleaner than a contagious diseases research lab. This situation will persist for some time. The second is that when there is something to read in that inbox, from that browsing history and those messages you ought to know that we wanted you to see it because your devaluation has begun and this is the electronic bait that has been set to provoke you. Bear in mind, this is just what we are prepared for you to see for the purposes of gathering fuel. What is really going on our devices that we will not allow you access to (and the ones you do not even know about) is far, far worse.

6 thoughts on “Suspect Computer

  1. karmicoverload says:

    There were a couple of occasions when the computer was on and unlocked, and I had free access to his empty house. The urge to snoop was HUGE, but stopping me was the thought that it was either a trap or a test. I felt the very real possibility that I was being recorded covertly. He would have wanted to know if I looked, and if I did, how I would react to anything I saw.
    As H.G says, whatever I would have seen there would have been left for me to see. The guy has a second laptop, burner phones and multiple different social media accounts so there just didn’t seem any point in looking at one potentially planted device.

    1. HG Tudor says:

      Logic.

      1. karmicoverload says:

        So I did well? I guess there’s a first time for everything 😂 I wonder if he was annoyed that I didn’t snoop.

  2. A Victor says:

    My ex claimed he didn’t know how to text, over ten years ago this was so somewhat believable. Then our kids found an intimate text to him on his phone and not from me. Sadly, they were more upset by it than I was.

  3. Asp Emp says:

    “Suspect Computer”, indeed – as the two words can indicate many things these days(laughing)……

    Having said that, it is not just ‘intimate’ relationships this would take place. It would happen at work – definitely – they’re really sly at workplaces. Ok, some work is considered confidential but it is a different matter when someone at work is, for example, writing an email against another person (who is being ‘smeared’ by a narcissist or two).

    If anyone notices their teenager (or younger) acting in similar way as explained in the above article – the parent should notice and intervene as a parent should (it could be a ‘darker predatory’ type of person. That is one thing these days, not all parents do actively ensure the safety, mental & emotional wellbeing of their children – including those who are bullying others at school & posting videos online etc (for example, of actually bullying taking place etc).

    I have more than one email address, for example, one for friends and another for ie billing etc (but I do NOT use online banking). And, no, I still do not use any online dating sites either!

    I have never pried into a partner’s or my friends phones (or anything of the kind) – I have morals and stick to them.

  4. BC30 says:

    Yikes! That guy is a swipe left.

Vent Your Spleen! (Please see the Rules in Formal Info)

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Previous article

The Narc Days of Christmas – No. 4

Next article

Let’s Pretend