Technology is a boon to our kind. It enables us to reach more people than ever before for the purpose of a quick squirt of fuel or as part of the orchestrated campaign to seduce our next victim who will be our primary source. The prevalence of social media platforms, blogs, chatrooms and the like provides us with a ready audience for us to declare our brilliance. Whether it is a pithy tweet, a photograph of our latest cycling adventure on Facebook, the culinary achievement that has been shared on Instagram, there are so many ways to herald our magnificence. We do not need to be near to these people. The reach is millions and therefore when we receive a praiseworthy comment, a like or love indication from the relevant button then that sudden dose of fuel comes our way. It is an almost instant hit. Fire something out across the electronic ether and in a matter of moments a reliable dose of fuel will come winging its way back. What a wonderful and simple method.
Even better is the use of our computers to search out targets, vet their online information to ascertain whether they would be suitable for our purposes and then to mine for information which can be used in the seduction of our targets. It is all there. The computer us used to find the information which forms the bedrock of our campaigns and it is also the instrument of our campaigns. So many repeated ways to bombard somebody with our supposed love. Our incessant application and monitoring. The ways in which we can keep in touch with different prospective victims as we assess who will be best. The way we can develop your replacement as we feel that your positive fuel is waning and your devaluation is just around the corner. The way we can triangulate you with a piece of machinery as our eyes remain locked on the screen as we engage in our online flirtations and gathering of fuel. The computer is truly our friend but it is also very useful for you to understand what you are dealing with.
Our use of the computer is a telling indicator of who you are dealing with. Whether it is a tablet, laptop, PC or mobile ‘phone (after all you are really carrying a small computer in your bag or pocket these days) you can expect to find similar secretive and furtive behaviour from our kind when it comes to the use of the computer to further our machinations. The computer is the nerve centre of our operations and as such it is something which we will guard. Accordingly, you should be aware of activity and behaviour such as: –
- Closing the computer down when you are nearby;
- Switching screens when you are nearby;
- Refusing to let you use the device;
- If you are able to use the device, we will not allow you to know the password and instead will enter it for you;
- If you are able to use the device, we will hover over you whilst you do so;
- If you are able to use the device you will find that the e-mail account is either locked or is empty, the search history is clear, there is no predictive search element in the search bar which may give away previous and frequent searches and documents are locked down.
- If you are given unfettered access to a computing device then it is highly likely that we use a different device for our dark works which you do not know about, otherwise there is no way that we will allow you to use such a device so freely. In this instance you need to have identified other red flags to indicate it is more than likely that you are engaging with a narcissist to raise the prospect of us using two computers. If there are no other red flags your unfettered access to the computer will purely be as a consequence of the use having nothing to hide and he or she will not use a secret device.
You would do well to consider the computing habits of the person that you are with and especially so if you have suspicions that you are dealing with one of our kind. Understand that the computer (in its various forms) forms the platform for so much of what we do. Gathering new victims and seducing them, organising and executing your devaluation, orchestrating the smear campaign against you. You should know that the computer is a tool which is used against you and you can utilise it as a barometer of our attitude towards you which will then in turn allow you to understand what you can expect to happen.
So much of what we do occurs through the electronic medium because that allows us full reign to portraying what we wish to portray to the world at large. It allows significant access, it provides a platform for heralding our achievements and it is not an exaggeration to state that it forms the engine room of our activities.
We will never allow you access to our computers but if there is a shared device then you should look out for two things. The first is that after we have used it, our e-mail inbox, browsing history and messaging will be cleaner than a contagious diseases research lab. This situation will persist for some time. The second is that when there is something to read in that inbox, from that browsing history and those messages you ought to know that we wanted you to see it because your devaluation has begun and this is the electronic bait that has been set to provoke you. Bear in mind, this is just what we are prepared for you to see for the purposes of gathering fuel. What is really going on our devices that we will not allow you access to (and the ones you do not even know about) is far, far worse.