All Episodes

September 14, 2025 31 mins

Navigating the shadows of targeted harassment requires understanding the terminology that defines these experiences. In this milestone fifth episode, I create a comprehensive framework for recognizing and naming the tactics used against targeted individuals.

The digital age has transformed abuse into something more insidious than ever before. I meticulously break down the landscape of emotional and psychological manipulation, from gaslighting and DARVO (Deny, Attack, Reverse Victim and Offender) to the more technological aspects of cyber stalking and digital surveillance. These aren't just unwanted messages or creepy behavior—they represent systematic campaigns of monitoring, data extraction, and reputation destruction designed to isolate and destabilize targets.

What makes these forms of abuse particularly devastating is how they work together. A perpetrator might use spyware to gather personal information, create false narratives based on that information, then recruit others to participate in harassment through what I identify as "third-party grooming." Some attackers even stoop to using children as unwitting participants in subliminal harassment campaigns—a tactic I find particularly disturbing and unethical.

As a targeted individual experiencing these attacks on a global scale, I share not just definitions but spiritual reflections on finding strength during ongoing persecution. Through prayer and faith, I've found a framework for understanding these attacks not as random suffering but as evidence that I'm on a path the enemy wants to obstruct. "What the enemy meant for bad," I affirm, "God will turn into good."

Whether you're experiencing similar targeting or simply trying to understand this phenomenon, this episode provides the vocabulary needed to recognize these tactics and the reassurance that you're not alone. Subscribe to follow my journey of documenting these experiences and reclaiming my narrative despite sophisticated attempts to silence me.

Ever felt like your darkest fears of being watched were actually true? Well, this powerful documentation pulls back the curtain on life as a targeted individual—where privacy becomes fiction and safety an illusion. This series stands as both documentation and resistance—a refusal to be silenced despite overwhelming odds. 

Support the show

Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Marie Destinee a La Grandeur (00:03):
Hi , I'm Marie, Welcome back.
This is episode five of seasonone of the Dire-Rie of a Sane
Black Woman.
This fifth episode is adefinite milestone in my
documentation journey.
In this episode, I willcontinue with identifying terms
that apply to what I've beenexperiencing as a targeted

(00:27):
individual, as well as providesome definitions for these terms
.
Now, the reason I'm doing thisis because I believe that one,
it provides a foundation and aframework around understanding
what occurs in a situation likethe one I'm faced with.

(00:48):
Two, it will put things intoperspective as I go into more
specific examples about myexperience.
Those who might be experiencinga similar situation or are
basically trying to wrap theirhead around what exactly is

(01:09):
going on, or merely trying tofigure out what in the world am
I talking about?
Moreover, this is a veryimportant topic, especially for
those who feel targeted or aretrying to make sense of a
pattern of abuse.
For this reason, I will bebreaking down how cyber stalking

(01:34):
, digital surveillance and smearcampaigns work together to
basically create a web ofpsychological and reputational
harm of psychological andreputational harm.
Now, the definitions will bebroken down by category,
starting with the first category, which is titled the landscape
of abuse.

(01:54):
Within the landscape of abuse.
You have emotional abuse,psychological abuse,
psychological manipulation,microaggressions, subliminal
harassment, sexual harassment,harassment and stalking.
So what is emotional abuse?

(02:14):
Emotional abuse essentiallyundermines the individual's
self-worth through humiliation,manipulation and control.
Emotional abuse is ofteninvisible but deeply damaging.
So that is what emotional abuseis.

(02:35):
So it undermines theindividual's self-worth through
humiliation, manipulation andcontrol, and it's often
invisible but deeply damaging.
Now looking at psychologicalabuse psychological abuse
includes emotional abuse, butalso isolation.
It includes threats and alsoreality distortion.

(02:59):
Psychological abuse is designedto destabilize and to dominate.
The next word we want to look atis psychological manipulation.
Under the umbrella ofpsychological manipulation, you
have gaslighting and DARVO.

(03:21):
Darvo gaslighting theperpetrator may deny that the
they're actually surveilling thevictim, or claim that the
victim is paranoid or makingthem question their reality.
Darvo is actually an acronymand it's a common tactic where

(03:45):
the perpetrator first denies,then attacks and then they
reverse the roles of the victimand offender, so this
essentially paints themselves asthe one that's being harassed.
I actually recently experiencedthis and I will actually be
going into more depth in theupcoming episodes.

(04:11):
Now we also havemicroaggressions.
Microaggressions are subtle.
They are often unconsciousslights that communicate
hostility, especially harmfulwhen repeated or dismissed.
You then have subliminalharassment, which is typically

(04:31):
covert intimidation throughcoded language, gestures or
environmental cues.
As well as the subliminalharassments are typically hard
to prove, but they're deeplyunsettling.
And then you have sexualharassment.

(04:54):
Sexual harassment is typicallyunwanted sex, sexual behavior or
comments that create discomfortor fear.
They can be verbal, physical orvisual.
Harassment, on the other hand,is basically the generic term,

(05:14):
and that includes repeatedunwanted behavior that causes
distress and can bepsychological, verbal and
physical, as well as visual too.
Harassment can be visual, asyou know, the same way that
sexual harassment can be visual,the generic term harassment can

(05:36):
also be visual.
There are visual ways that youcan harass someone.
Visual.
There are visual ways that youcan harass someone.
Stalking is persistent, unwantedattention that causes fear.
I think you know stalking cancause a lot of different things,
not just fear, but that is thedefinition that was provided.
It often includes following,monitoring or obsessive contact.

(06:00):
So now this brings me to ournext segment.
This segment will actually takea deep dive into cyber stalking
and will explore surveillanceas abuse and will cover the
following terms Cyber stalking,cyber stalking as a weaponized
form of surveillance, monitoringand extraction, smear campaigns

(06:24):
.
So let's dive in the first termwe want to take a deep dive
into is cyberstalking.
Cyberstalking includes digitalsurveillance, obsessive
monitoring and online harassment.
Monitoring and onlineharassment Often it's harder to

(06:48):
escape and more invasive Cyberstalking as a weaponized form of
surveillance.
Cyber stalking isn't just aboutunwanted messages or creepy
online behavior.
It's often a systematiccampaign of monitoring, data
extraction campaign ofmonitoring data extraction,
manipulation and distributionand oftentimes especially in my

(07:14):
situation cyber-stalking alsocan turn into real-life stalking
.
So often the perpetrators willnow leave their devices and
actually come whether they cometraveling on foot or in their
vehicles to actually stalk andmonitor the individual.
Within cyber stalking, Imentioned that there was
monitoring and data extraction,so this includes what is called

(07:39):
digital surveillance.
This includes what is calleddigital surveillance and this is
where perpetrators may usespyware, malware or even social
engineering to gain access toyour devices, accounts or
browsing habits.
They can use spyware, socialmedia scraping, gps tracking and
any other type of device.

(08:00):
There are so many devices outthere these days, so they also
gather data to control,intimidate and manipulate.
So if we were looking for anintent or a purpose, a motive
behind their behavior, that'ssome of the motives that are

(08:22):
behind you know theperpetrator's behavior.
Social media scraping includesthe collection of posts, photos,
likes, comments, anything thatcan be twisted or used against
the victim.
There is also GPS tracking,where some stalkers go as far as

(08:45):
embedding tracking devices inpersonal items.
Now, last but not least, thereis the smear campaigns.
Smear campaigns includes thesharing distorted or false
information to destroy someone'sreputation, and this may
include fake accounts,impersonation and third-party

(09:09):
grooming.
Now let's take a look at howthese tactics work together.
I covered a few terms in thefirst few segments, so now let's
take a look at how theseactually work together.
So, gaslighting um, as Imentioned before, was um is used

(09:32):
to deny abuse and make victimsquestion their sanity, and um,
it's common in emotional,psychological and cyber abuse.
You also have victim blaming,where you know the blame is
shift and the responsibility isshift onto the victim, and this

(09:53):
reinforces silence and shame.
Now I spoke about DARVO earlier.
Spoke about Darvo earlier andyou know, just to kind of
reiterate, this is amanipulative tactic used by
perpetrators to deny the abuse,attack the victim's credibility
and reverse roles to appear asthe victim.

(10:15):
Now this brings us to therelated terms that amplify the
harm.
These terms include technology,facilitated abuse, character
assassination, third partygrooming, and I would um, you
know, I would go as far ascalling this mind control and
programming as well, right, umand again, uh, because I'm a

(10:39):
very spiritual person.
I think there's a naturalaspect to this programming and
grooming, but there's also aspiritual aspect as well, a form
of bewitchment.
Right, people are doing thingsthat they don't even know why
they're doing it.
Right, it's not only becauseeveryone else is doing it, so
I'm doing it, or I have beenprogrammed to do something, but

(11:04):
there's a spiritual aspect tothis.
That is my belief.
And there's also digitalgaslighting.
So let's look at how these worktogether to amplify the harm.
So, technology facilitatedabuse includes cyber stalking,

(11:26):
doxing, revenge, porn or deepfakes and digital coercion.
Character assassination includesintentional destruction of
reputation.
Third party grooming includesmanipulation or manipulating
others to turn against thevictim.
So that's where I use, uh, theterm programming or mind control

(11:49):
, which could be, um, donenaturally or spiritually.
And then you have digitalgaslighting, um, which is
basically denying ormanipulating online evidence to
confuse the victim, or evensomeone that is looking into the
situation or investigating thesituation.
Right, you know, they'llprobably say, oh, nothing to see

(12:13):
here, or, you know, we're notfinding what you're seeing.
So, while we spoke about smearcampaigns in the earlier segment
, this next segment delves intoa little deeper into the tactics
as well as the intent andimpact of smear campaigns.

(12:36):
So, essentially, a smearcampaign is the public execution
of someone's reputation, right?
So once information is gathered, the next phase is the
distribution and the distortion,sharing and manipulation.
So sharing and manipulationincludes false narratives, fake

(12:58):
accounts and third-partygrooming.
So let's look at these termsmore closely.
False narratives includespreading lies, exaggerations or
selectively editing truths topaint the victim as unstable,
dangerous or immoral.
Fake accounts some may createimpersonation profiles to post

(13:20):
inflammatory content in theperson's name Um, you know,
especially because people arenot trying to get caught out
there.
So you know, there might be alot of people in group chats
that are using fake names in umgroups, uh, social media groups,
that are using fake names.
Some may be using real namesbut think that they can't be

(13:42):
caught because they're using aVPN or some other form of device
to try to shield their identity.
But anything that is doneonline, anything that is done
with technology, is discoverableat some point, as long as you
just need to have the means todiscover it.
There is forensics, digitalforensics and and digital

(14:04):
discovery, so it's alldiscoverable, um, third party
grooming um, this includesgrooming others friends,
colleagues, even strangers tobelieve uh the person's their
version of events, isolating uhthe person socially, and so, um,
the grooming is again like.

(14:25):
To me, that's a form ofprogramming, mind control, and,
um, while this could be donenaturally, I think it can also
be done spiritually to someone,and they may not even know that
they're under some type of aspell and that they're.
They're acting the way thatthey're acting because they're
under a spell.
So the intent and impact uhcharacter assassination, uh

(14:51):
reputational damage and socialisolation, um, is could be an
intent, but it can also be animpact, right, and so here the
goal is to destroy the person'scredibility, their relationships
and opportunities.
And then you have obstruction.

(15:12):
Obstruction can includesabotage in job prospects,
business opportunities, legalcases or community standing,
among many other things.
Right, this is just a fewexamples being provided here.
Next, you have emotional abuse,which is the psychological toll

(15:36):
you know that the victimbasically experiences.
It becomes very immense, andvictims often experience anxiety
, depression, emotional traumaand PTSD.
These are just some of thesymptoms.
Um, for me, um, as anindividual, that is basically

(15:56):
still kind of I don't want tosay kind of, because it's very
um prevalent Um I'm still uhexperiencing um all of these
things that I've gone through,all of these terms.
Um, I don't believe I can havePTSD because I'm still going
through it and so maybe at somepoint I'll have it.

(16:21):
God forbid, um, you know,hopefully, through prayer and
therapy, I won't have toexperience PTSD, but I don't
think at this juncture, um, Iwould um identify PTSD as a
symptom for me, because I amstill going through um these uh
attacks.

(16:41):
I am still going through theseattacks.
So, lastly, I want to take alook at how these related terms
amplify the abuse.
So these terms, which includessubliminal harassment,

(17:13):
psychological abuse, victimblaming, technology, facilitated
abuse can actually amplify harmto the victim.
Subliminal harassment includescovert cues, coded language used
to intimidate without overtthreats, and so subliminal
harassment could just be someonewalking out of their house with
an item or placing an itemsomewhere for you to see it,

(17:35):
because they know it's going totrigger you in some way, and
even if it doesn't trigger you,to trigger you in some way and
even if it doesn't trigger you,it's just the nod to let you
know that they're looking orthat they know something.
And so, um, that is whatsubliminal harassment is and, in

(17:55):
my situation because, um, Ihave been speaking out, I have
been going to the authorities,you know, I have been going
making reports about it theattacks have shifted and so
they're still subliminal.
But there are different tacticsthat are being used.

(18:17):
I mean, people are using theirchildren actually to conduct the
subliminal harassment which issickening.
That is very low, I think.
If someone could go low, thatis the lowest of lows.
To use your child to actuallyharass someone, whether it's
having certain words on at-shirt or having your child

(18:40):
walk out of the house with anobject in their hands to try to
cause a trigger, um, that is badparenting.
You are not setting a goodexample for your child.
Your child is innocent.
They have nothing to do withthis.

(19:00):
Uh, mess, um, now you have apsychological abuse, now the
umbrella under which all ofthese tactics fall, um, and this
is designed to basicallycontrol, isolate and, um,
destabilize.

(19:22):
There is victim blaming.
Right, we spoke about DARVOearlier.
Darvo, I believe, is a form ofvictim blaming and so, when
others or the perpetratorsuggests that you brought it on
yourself, further silencing andinvalidating your experience,
right In one of my episodes Ithink it was the first one I

(19:44):
spoke about.
You know, people often want tohave like a perfect victim right
.
And so if they try to go backand not even validating what
they're saying is true or not,but if they try to say, well, we
know this information about you, or we know that you did this
or we know that about you, or weknow that you did this or we
know that about you, and sotherefore you're um, you're

(20:08):
liable, or therefore, um, youknow you deserve what you get.
Um, I think that is just notthe right way to look at things.
Um, regardless of whatever theperson may have done, um, two
wrongs don't make a rightattacking someone, deliberately
attacking someone on a dailybasis, violating their privacy,

(20:32):
hacking into their system,harassing them in um, all the
different forms of harassmentthat are out there, um is just
not right.
And um, that is where victimblaming comes.
You know, I've seen subliminalcomments about okay, it's your
fault, it's all your fault, andall of that kind of stuff.

(20:54):
Or people use the term karma,they throw that around.
And what I would say to thepeople that like to throw the
word karma around?
If you believe in karma andyou're doing what you're doing
to me.
May God have mercy on your soul, because if you're throwing the
word karma around and you'redoing this to me, may God have

(21:17):
mercy on your soul.
I believe in grace.
I believe in grace.
So grace says that you know theconsequences, or sometimes he
may absolve you altogether.
But for those who are throwingthe word around or the term

(21:50):
around, karma, if that's whatyou believe in and that's what
you subscribe to and you'reactually harassing me, you're
attacking me.
May God have mercy on your soulbecause you're basically going,
you're actually harassing me,you're attacking me.
May God have mercy on your soulbecause you're basically going,
you're calling these thingsonto yourself, you're doing it
to me, you're attacking me andyou believe in karma.

(22:13):
So, guess what's going tohappen to you.
Guess what's going to happen toyou and I'll I'll leave that
right there.
Um, and I'll leave that rightthere.
Technology-facilitated abuse isthe next word, and that is a
broader term that includescyber-stalking, revenge, porn,
doxing.

(22:33):
It can include deep fakes anddigital coercion.
So, unfortunately, sounfortunately, I've experienced
all of these terms in one way oranother and, um, that's very
unfortunate.
It is very unfortunate and I,as I mentioned before, these

(22:58):
attacks are happening on aglobal scale.
They are happening in person,they are happening through
technology and they're happeningin different realms and
different, through different,very convoluted and um and

(23:25):
systematic attack.
In the upcoming episodes I willbe going through and providing
some examples of my experiencein more depth, um, but in
closing, I just want to say thatif this resonates with your
experience, know that you're notalone and you're not imagining

(23:48):
it.
I'm not saying everyone thatclaims that they are targeted is
in their right mind or is sane,but I can only attest to my
experience and what I'mexperiencing, and I'm praying
for anyone else that may begoing through something that is
similar to me, even if it's notat the scale that I'm

(24:11):
experiencing it.
I pray for you.
I will keep you in my prayers.
Hopefully this can become asafe space for you and I'll
continue to share my story.
Um, I think it's very importantto speak out, it's important to

(24:31):
claim and reclaim yournarrative and not let people
shame you into seclusion or umoblivion and um, as I said
before, I know that God has aperfect plan for me, um, and if
he did it, I don't think I wouldbe experiencing the level of

(24:53):
attacks that I'm experiencing.
Um Creflo Dollar said this inone of his sermons, and I'll
close with this People often say, well, since I've been saved,
you know, I haven't received anytype of attacks from the enemy.

(25:18):
And he said well, what kind ofsaved are you?
If anything, things should havemagnified or intensified, right
, because now you have somethingthat the enemy wants, or now he
knows that you're kind of,you're headed in a direction

(25:39):
that he doesn't want you to headinto, headed in a direction
that he doesn't want you to headinto.
So the objective of the enemyis to obstruct the progress of
the destined state by any meansnecessary.
And so now we have technology.
So what better ways to obstructsomeone's purpose, someone's

(26:00):
calling, then through the use oftechnology, then through
smearing their names, thenthrough trying to ruin their
reputation.
But I thank God that through hisword he says that what the
enemy meant for bad, he willturn into good.
And so I stand on that word andI trust God that, despite every

(26:26):
attack that has come against methrough technology or even
through spiritual means, that itshall not prosper and that it
shall not prosper and it shallnot come to pass.
And those things have that havealready happened.
I thank you, god, that yourword says that it will work out

(26:49):
for my good.
I thank you, god, that I wantto say that I am releasing every
single person, every singleagent, single person, every
single agent, every single partythat has been involved in
attacking me.
I release them in myforgiveness, the freedom of my

(27:12):
forgiveness, and I release themto you, lord.
I release them to you, father.
May you deal with themaccording to however you feel
fit.
I release them to you, not mywill, not my will, but your will
be done.
Your word says vengeance isyours, and so I release them in

(27:38):
the freedom of my forgiveness.
I release them to you.
Your word says the battle isnot mine, but it's yours.
I thank you, lord God, that thistoo shall pass.
I thank you, lord God, thatweeping may endure for a night,
but joy comes in the morning.
I thank you, lord God, thatyour mercies are new every
morning.
I thank you, father, that inthe midst of trouble, you give

(28:00):
me peace that surpasses allunderstanding.
And I thank you, father, thatin the midst of trouble, you
give me peace that surpasses allunderstanding.
And I thank you, lord, god,that you have a greater purpose
in all these attacks, lord Godthe attack on my name, the
attack on my reputation, theattack on my well-being, the
attack on my technology, theattack on my devices, the attack

(28:24):
on my family, hallelujah, theattack on my opportunities.
Father, I thank you, lord, thatyou have a greater purpose on
it, lord God, that, although theenemy, the accuser of the
brethren, thinks that they aregetting away with this, lord God
, hallelujah, you are Jehovah.

(28:48):
Sneaky, lord God.
Suddenly, suddenly, father, youwill deliver me.
Suddenly, father, you willdeliver me.
I thank you, lord God.
Things may fall at my left ormy right, it will not come nigh
me.
I thank you, lord God.
Things may fall at my left ormy right, it will not come nigh
me.
I thank you, lord God, thatyou're not only covering me.
Lord God, you're coveringeverything that I touch.

(29:10):
Lord God, you're covering thisdocu-series, you're covering
this documentary.
Lord God, you're protecting itfrom any hacker, any person that
will try to manipulate thealgorithm, anyone that will try
to suppress my voice.
Father, I thank you, lord God,that it will not work, it will
not prosper.
I praise your holy name.

(29:32):
I praise your holy name.
I praise your holy name, inJesus's name.
Thank you everyone forlistening.
I just want to say that theterms and definitions that were
used in this podcast werefacilitated with the use of AI
and it was sourced from unodcorg, psychologytodaycom and

(29:59):
stalkingawarenessorg.
Thank you, andstalkingawarenessorg, thank you.
I went into praying.
This was just not planned, butthat's how God works and it is
what it is.
This is my diary.
It's raw and it's just mesharing bits and pieces of who I

(30:19):
am and just going with the flow.
All right, thank you forlistening.
See you in the next episode.
Be safe, thank you.
Advertise With Us

Popular Podcasts

Stuff You Should Know
Las Culturistas with Matt Rogers and Bowen Yang

Las Culturistas with Matt Rogers and Bowen Yang

Ding dong! Join your culture consultants, Matt Rogers and Bowen Yang, on an unforgettable journey into the beating heart of CULTURE. Alongside sizzling special guests, they GET INTO the hottest pop-culture moments of the day and the formative cultural experiences that turned them into Culturistas. Produced by the Big Money Players Network and iHeartRadio.

Dateline NBC

Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.