1Episode 2: Silent Warfare: Recognizing Hidden Manipulation: DISCLAIMER
20Ambient Abuse: Death by a Thousand Cuts
2CHAPTER 4: COVERT OPERATIONS: THE HIDDEN NARCISSIST
21The Micro-Aggression Framework: Invisible Bullets
3The Communal Narcissist: The Selfless Show-Off
22Time Distortion and Reality Manipulation
4The Covert Narcissist: The Quiet Manipulator
23The Cumulative Impact: When Invisible Wounds Become Disabling
5Subtle Devaluation
24Recognition: Seeing the Invisible
6Passive Aggression as Control
25Protection Strategies: Defending Against the Undetectable
7Victim Positioning
26Conclusion: Making the Invisible Visible
8Trauma Bonding Through Intermittent Vulnerability
27CHAPTER 6: THE NETWORK: RECRUITMENT AND DEPLOYMENT OF OTHERS
9The Victimhood Trap: When Predators Pose as Prey
28Flying Monkeys: The Psychology of Enablement: The Recruitment Process: Who and Why
10Recognition Through Patterns: Identifying the Covert Narcissist
29The Manipulation Playbook: Techniques of Proxy Recruitment: Image Management: The Foundation of Recruitment
11The Perpetual Victim Without Accountability
30Narrative Manipulation: Creating the Proxy's Reality: Emotional Manipulation Techniques: Exploiting Human Psychology
12The Uneven Empathy Pattern
31Deployment: The Operationalization of Proxies
13The Hidden Audience Orientation
32Institutional Exploitation: Using Systems Against You
14The Invisible Sabotage Pattern
33Weaponizing Helping Professions
15The Selective Competence Fluctuation
34Legal System Manipulation
16Protection Strategies for Covert Manipulation
35Workplace/Educational System Exploitation
17Conclusion
36Smear Campaigns: Preemptive Reputation Destruction
18CHAPTER 5: INVISIBLE EVIDENCE: THE ABUSE NO ONE SEES
37Counter-Strategies: Breaking the Proxy Network
19Plausible Deniability: The Architecture of Invisible Abuse
38Conclusion: Illuminating the Darkness: Next in Episode 3: Dangerous Phases and Responses