Pages

Sunday, May 3, 2026

Digital Abuse: How Narcissists Use Technology to Maintain Control

 

Technology has given narcissists tools that previous generations of abusers did not have access to, and the covert narcissist in particular has found ways to use these tools that are extraordinarily difficult to detect and even more difficult to prove. Digital abuse encompasses a wide range of behaviors: monitoring your social media activity, tracking your location through shared apps or devices, accessing your email or cloud accounts without permission, using your call or message history to gather intelligence about your relationships and activities, and conducting smear campaigns online under the cover of anonymity. What makes digital abuse particularly insidious is that much of it happens invisibly. You may not know your accounts have been accessed. You may not realize that someone has been monitoring your communications for months and using that information to stay one step ahead of you. The damage accumulates before you have any idea where it is coming from.

Protecting yourself from digital abuse requires a thorough audit of every account, device, and app in your life. Change passwords on all accounts using a device the narcissist has never had access to, and use a new email address they do not know about to receive the reset links. Review which apps have access to your location and revoke any that the narcissist could potentially monitor. Check your phone account carefully, because access to call logs and message histories is one of the most common and most overlooked forms of digital surveillance. If you share cloud storage or family plans with a narcissistic partner or ex-partner, separate those accounts completely. Document every incident of digital abuse that you discover, with dates, screenshots, and any evidence of access that can be preserved. Digital abuse is increasingly recognized by attorneys and courts, and thorough documentation is the foundation of any legal response. You have the right to privacy in your own digital life. Reclaiming it is one of the most important acts of self-protection available to you.


No comments:

Post a Comment