Build rule: Every section includes specific examples and connects to tools that make documentation faster and more systematic.
Important: This is about tracking behaviors and patterns, not diagnosing someone.
01 — Overt vs. covert narcissism
Core point stub: Overt patterns are loud and obvious (rage, domination, public scenes). Covert patterns are quieter and easier to dismiss: victim posture, guilt pressure, quiet sabotage, and plausible deniability.
Overt patterns (easy to see)
- Direct threats, yelling, intimidation
- Public blowups
- Blatant control demands
- Obvious contempt
Covert patterns (easy to miss)
- Victim role + guilt as control
- Withholding / sulking
- Passive sabotage
- Backhanded “concern”
Tools that make this systematic
- Covert pattern tags (guilt, victim, sulk, sabotage, pity, triangulation)
- Trigger → response map (what you did → what they did → outcome)
- Contradiction tracker (their “I’m hurt” vs their actions)
02 — The 10 covert signs
Structure stub: Each sign below will be expanded with: (1) what it looks like, (2) what it sounds like, (3) how to document it, (4) a completed sample entry, and (5) which tool/template to use.
Sign 1: Victim posture as control
- Looks like: you’re always “hurting them” by having needs.
- Document: your request → their victim pivot → outcome.
Template stub:
Date/Time:
Your request:
Their victim line (quote):
Outcome (did you back down?):
Tag(s): VictimControl
Sign 2: Guilt-tripping instead of direct asks
- Sounds like: “I guess I’ll just do it alone… again.”
- Document: guilt phrase + what they wanted + your response.
Template stub:
Date/Time:
Guilt phrase (quote):
Hidden demand:
Your response:
Tag(s): GuiltPressure
Sign 3: Passive punishment (sulking / withdrawal)
- Looks like: silence or coldness after you set a boundary.
- Document: boundary stated → withdrawal window → re-entry.
Template stub:
Date:
Boundary stated:
Withdrawal behavior + duration:
Re-entry tactic:
Tag(s): SulkPunish
Sign 4: Backhanded compliments / “concern” insults
- Sounds like: “I’m just worried you can’t handle that.”
- Document: quote + context + impact.
Template stub:
Date/Time:
Quote:
Context:
Impact on decision/action:
Tag(s): BackhandedConcern
Sign 5: Quiet sabotage (plausible deniability)
- Looks like: “accidental” disruptions that always affect you.
- Document: event → sabotage outcome → their excuse.
Template stub:
Date:
What was planned:
What happened:
Their explanation (quote):
Pattern note:
Tag(s): Sabotage
Sign 6: Selective empathy (only when it benefits them)
- Looks like: they care when they’re the hero, not when you need support.
- Document: need expressed → response → comparison to other times.
Template stub:
Date:
Need expressed:
Their response:
Comparison note (baseline/past):
Tag(s): SelectiveEmpathy
Sign 7: Covert triangulation
- Sounds like: “Even my friends think you’re…”
- Document: third-party claim + purpose + effect.
Template stub:
Date/Time:
Third-party claim (quote):
What it pressured you to do:
Outcome:
Tag(s): Triangulation
Sign 8: Weaponized fragility
- Looks like: they “fall apart” whenever accountability appears.
- Document: accountability moment → collapse → you caretaking.
Template stub:
Date:
Issue raised:
Their collapse tactic:
Outcome (did issue disappear?):
Tag(s): WeaponizedFragility
Sign 9: “Nice” control (micro-rules)
- Looks like: small rules framed as care, but enforced as control.
- Document: rule stated → enforcement → consequence.
Template stub:
Date:
Rule:
How enforced:
Consequence if you refused:
Tag(s): SoftControl
Sign 10: Memory rewrite via “misunderstanding”
- Sounds like: “That’s not what I said. You misunderstood.”
- Document: original statement → rewrite statement → evidence link.
Template stub:
Date:
Original statement (quote):
Rewrite statement (quote):
Evidence reference:
Tag(s): RewriteHistory
03 — Why covert narcissism is harder to prove
Core point stub: Covert tactics are designed to be deniable and to make you look unreasonable if you describe them. The “harm” often lives in pattern + impact, not one incident.
Why people don’t believe it
- It’s subtle and socially “polite.”
- It’s framed as hurt feelings, not control.
- It’s inconsistent (nice in public, controlling in private).
- It’s a thousand paper cuts, not one punch.
What proof actually looks like
- Repeated trigger → response → outcome sequences.
- Contradictions (what they say vs what they do).
- Escalation patterns (punishment increases over time).
- Impact on your behavior (self-censorship, isolation).
04 — Documentation strategies
System stub: Use a single intake template for every incident, tag each entry with a covert sign, then review weekly for repetition and escalation.
Minimum viable documentation system
- One entry template (same fields every time)
- Fixed tag list (the 10 signs + a few meta-tags)
- Evidence vault naming rule
- Weekly rollup (counts per sign)
Entry rules that keep it credible
- Facts first, interpretation optional and labeled as such.
- Use direct quotes when possible.
- Log outcomes (what you changed/avoided).
- Capture “before/after” (your request vs their pivot).
Universal covert incident entry template (stub)
Entry ID:
Date/Time:
Trigger / what you did (1 sentence):
Their response (facts + exact quote):
Covert sign tag (1–2):
Outcome (what changed after):
Impact (objective):
Evidence reference (file name):
Notes (optional, short):
Weekly rollup table (stub)
| Week Of | Victim control | Guilt | Sulk | Sabotage | Triangulation | Rewrite | Escalation notes |
|---|---|---|---|---|---|---|---|
| YYYY-MM-DD | # | # | # | # | # | # | Short notes |
Tools that make this fast
- Google Form → Sheet (auto timestamp + consistent fields)
- Airtable (tags, filters, views per sign, attachments)
- Notion database (fast capture + “sign views”)
- Phone shortcut (one-tap logging)
05 — Building your case quietly
Core point stub: Covert controllers often escalate when they detect you’re “collecting evidence.” Your system should be discreet, neutral, and hard to tamper with.
Discretion rules (stub)
- Neutral folder names (avoid “abuse proof”).
- Use a personal account/device if workplace/shared devices are monitored.
- Turn off lock-screen previews for sensitive apps.
- Use 2FA + a password manager.
- Weekly exports to a separate “Reports” folder.
Evidence vault structure (stub)
Archive/
01_Entries/
02_Timeline/
03_Evidence/
Texts/
Emails/
AudioRefs/
Photos/
04_Exports/
05_Rollups/
“Quiet case” packet (stub)
- 1-page summary: timeframe + top 3 repeated signs
- Timeline: 20–50 strongest entries (short, factual)
- Weekly rollups showing repetition
- Evidence index (file names + dates)
Leave a Reply