Please read our important disclaimers before using this content
Social media can become a weapon in the hands of a narcissistic abuser. What was once a casual way to share updates with friends transforms into a surveillance system, evidence-gathering operation, and platform for public humiliation. Research from the Cyber Civil Rights Initiative documents how digital abuse has become a pervasive feature of intimate partner violence, with technology-facilitated abuse (TFA) described as controlling and coercive behaviors using technology, including stalking, tracking, intimidation, and harassment.1 Understanding how to protect your digital space is essential for healing and maintaining no-contact or gray rock communication strategies.
The stakes are higher than you might realize. What you post today could appear in a custody filing tomorrow. The photo you share of your children could become "evidence" of irresponsible parenting. The supportive comment from a friend could be twisted into proof of your "smear campaign." In high-conflict situations, social media isn't just social anymore—it's a legal liability and emotional minefield.
The Digital Abuse Landscape
Narcissistic abusers often use social media in sophisticated ways that would never occur to someone operating in good faith:
Surveillance and Monitoring
- Creating fake accounts to follow your private profiles
- Using flying monkeys (mutual friends) to screenshot your posts
- Monitoring your activity patterns (when you post, who you interact with)2
- Using your posts to track your location, schedule, and relationships
- Analyzing your photos for background details about your life
- Using GPS, spyware, and other technological tools to maintain coercive control3
Evidence Gathering for Legal Proceedings
- Screenshotting posts that could be taken out of context
- Using photos of your activities to suggest instability4
- Twisting support group posts into "defamation"
- Finding any post where you express frustration to prove you're "angry" and "unstable"
- Using check-ins and location data to challenge custody claims5
Smear Campaigns
- Subtweeting or vaguebooking about you
- Sharing "their side" of the story with mutual friends
- Posting manipulated versions of events
- Positioning themselves as the victim of your "crazy behavior"
- Creating narratives that reach your professional network6
Understanding how smear campaigns work and how to protect your reputation is essential for survivors navigating these public attacks.
Hoovering and Contact Violations
- Commenting on your posts despite no-contact orders
- Having family members reach out through social media
- "Accidentally" liking old photos to remind you they're watching
- Sending messages through platform features (reactions, follows, etc.)
- Creating new accounts to circumvent blocks7
Triangulation Through Social Media
- Posting about their wonderful new relationship
- Showcasing their "happy" life post-separation8
- Using the children's accounts or images strategically
- Engaging with your friends and family publicly
- Making sure you see their new supply being treated well
- Research shows narcissists strategically curate their online persona to receive validation and maintain a grandiose self-image9
Why Traditional Privacy Advice Falls Short
Standard social media privacy advice ("make your profile private," "think before you post") doesn't account for the strategic, persistent nature of narcissistic abuse. Your abuser isn't a casual snooper—they're conducting surveillance with the dedication of a full-time job.
They have infinite patience. While you might check their profile once when you're weak, they're checking yours daily, waiting for exploitable content.
They have networks. Even if you block them, they have family, friends, and flying monkeys who can access your content and report back.
They think strategically. Every piece of information has potential value. Your post about a bad day at work could become evidence of your "instability." Your photo at a restaurant could prove you're "wasting money."
They know your triggers. They've had years to learn what gets to you, and they'll use social media to push those buttons—a photo with the new supply on your anniversary, a vague post about "toxic people" that you know is about you.
This requires a more comprehensive protection strategy than simply adjusting your privacy settings.
Essential Boundary Strategies
1. Complete Privacy Settings Audit
This isn't a one-time task—it's an ongoing practice that should be repeated monthly during high-conflict periods.
For Every Platform:
The National Domestic Violence Hotline's Technology Safety Guide recommends these essential steps:
- Set all profiles to private/friends-only
- Review every setting in the privacy menu—platforms add new features constantly
- Disable location services and check-ins completely
- Turn off facial recognition and photo tagging
- Remove identifying information from bios (workplace, school, location)
- Disable search engine indexing of your profile
- Review tagged photos and untag anything revealing
- Check which apps have access to your accounts and revoke unnecessary permissions
- Consider using identity theft protection services like Aura or Norton LifeLock to monitor for unauthorized use of your personal information online
Platform-Specific Considerations:
Facebook:
- Review all tagged photos—untag from anything at identifiable locations
- Check that past posts are limited to friends only (use the "Limit Past Posts" feature)
- Disable the ability for others to see your friends list
- Turn off the feature showing when you're active
- Review and restrict which apps and websites are connected
Instagram:
- Set to private and approve all followers manually
- Disable showing your Activity Status
- Turn off similar account suggestions
- Don't sync contacts
- Be aware that Stories can be screenshotted without notification
LinkedIn:
- This is often overlooked—your professional presence is still visible
- Consider who can see your connections
- Disable notifications to your network about profile changes
- Review your public profile visibility
- Be cautious about endorsements from people connected to your abuser
TikTok/YouTube:
- Be aware that even private accounts can have content ripped and shared
- Remove identifying information from your profile and videos
- Disable suggestions based on contacts
- Consider using a different name
2. Strategic Blocking and Account Management
Don't just unfriend—block completely and proactively:
Primary Blocking List:
- Your abuser (all platforms, all accounts you know about)
- Their immediate family members
- Their close friends who have shown loyalty to them
- Known flying monkeys (people who report back)
- Anyone who makes you uncomfortable
Secondary Considerations:
- Mutual friends who haven't explicitly chosen sides
- Professional contacts connected to your abuser
- Anyone who comments on their posts supportively
Account Management:
- Create separate accounts: one very private for close friends, one semi-public for acquaintances
- Consider completely new accounts not connected to your old identity
- Use a different email address for social media than for legal matters
- Don't use the same username across platforms
Watch for Fake Accounts:
- New accounts with few friends/followers
- Accounts that claim to be from your area
- Accounts with profile pictures that seem familiar but slightly off
- Anyone who seems to know too much about you
- Friend requests shortly after you post something significant
Flying monkeys often operate through these fake or secondary accounts. If you're dealing with a coordinated network of people reporting on you, see the complete guide to flying monkeys for strategies on identifying and managing them.
3. Information Boundaries—What NOT to Post
Never Post:
- Children's schedules, schools, activities, or locations
- Your work schedule or when you'll be away
- Your home address or identifying features of your home
- Vacation plans or current travel (post after you return)
- New relationships (especially early stages)
- Financial information (new purchases, raises, windfalls)
- Recovery progress that could be weaponized ("feeling stronger" becomes "she's fine, she's exaggerating")
- Anything negative about your abuser (even vague posts)
- Court dates, legal strategies, or case updates
- Therapy appointments or mental health specifics
- Anything you wouldn't want read aloud in court
Be Cautious About:
- Photos with location metadata
- Photos showing the interior of your home
- Photos of your children (even innocuous ones)
- Check-ins at any location
- Posts that reveal your routine
- Emotional posts made in moments of weakness
- Anything that could be misinterpreted
Ask Before Every Post:
- Could this be used against me in court?
- Would I be comfortable with a judge seeing this?
- Does this reveal information about my location or schedule?
- Could my abuser twist this into something negative?
- Am I posting to seek validation I should be getting from therapy?
4. Vet New Connections Carefully
Before accepting any friend request:
Investigate:
- Check mutual connections—are they connected to your abuser?
- Review their friends list for red flags
- Look at their posting history—do they seem like a real person?
- Use reverse image search on their profile picture
- Check when the account was created
- Look for inconsistencies in their story
Trust Your Instincts:
- If something feels off, decline
- If they seem too interested in your life too quickly, be wary
- If they ask probing questions, stop engaging
- A legitimate connection won't be offended by caution
Protective Response:
- Don't feel obligated to accept anyone
- "I only accept people I know personally" is a complete sentence
- You can always accept later if they prove trustworthy
- When in doubt, don't
Advanced Protection Strategies
For Co-Parents
When you must maintain some visibility due to shared children:
Create Clear Separation:
- Private account for close friends with real updates
- Public-facing account with minimal information
- Never let these accounts interact or cross-reference
Content Rules:
- Never post about custody exchanges or schedules
- Don't post about the children's activities on your co-parent's time
- No commentary on co-parenting challenges
- Document harassment but don't engage publicly
- Don't post about new partners until the relationship is very established and they're ready to be visible
Children's Social Media:
- Discuss with your attorney about children's social media rules
- Monitor for inappropriate posts by your ex using the children's accounts
- Age-appropriate conversations about privacy
- Consider having your custody order address social media use
Managing Shared Connections
The Reality:
- Some people will choose sides
- Some people will be flying monkeys without realizing it
- Information travels through networks in unexpected ways
- You cannot control what others share about you
Strategies:
- Consider a temporary social media break during acute conflict
- Explain boundaries directly to trusted mutual friends: "I need you to not share information about my life with [abuser]. This is important for my safety."
- Accept that some friendships won't survive—this is information about who they are
- Build new support networks outside shared circles
- Join private support groups with verification processes
Professional Reputation Management
Proactive Steps:
- Google yourself regularly (weekly during high-conflict periods)
- Set up Google Alerts for your name
- Claim your name on major platforms even if you don't use them
- Consider professional LinkedIn management
- Document any defamatory content immediately
If You Find Problematic Content:
- Screenshot with timestamps before reporting
- Consult with your attorney before taking action
- Report to platforms for terms of service violations
- Know that legal action for defamation is possible but expensive
- Sometimes the best strategy is ignoring rather than amplifying
Red Flags You're Being Monitored
Pay attention if:
- Information only posted on social media appearing in legal filings
- Your abuser references things they shouldn't know about
- Suspiciously timed contact after you post
- Flying monkeys casually referencing your recent posts
- Screenshots of your content being shared to third parties
- Your posts being twisted and used against you
- New friend requests from accounts connected to your area shortly after posts
- Your abuser's attorney has very specific information about your activities
If You Confirm Monitoring:
- Review and tighten all privacy settings immediately
- Audit your friend list—remove anyone uncertain
- Consider whether you have a legal basis for a harassment claim
- Document the monitoring as part of your case
- Consider whether social media is worth the risk during this period
Healthy Post-Abuse Social Media Use
Social media doesn't have to be permanently off-limits. With appropriate boundaries, it can support your recovery.
What TO Share
- General recovery inspiration (without personal details)
- Professional accomplishments you're comfortable being public
- Advocacy work that helps others
- Art, hobbies, creative projects, and interests
- Support for causes you care about
- Positive life updates (once you're in a safer phase)
- Connection with verified support communities
Mindful Engagement
- Set specific time limits to avoid doom-scrolling (use built-in app timers)
- Curate your feed ruthlessly—unfollow anything triggering
- Follow accounts that inspire healing and growth
- Mute or unfollow content that triggers comparison
- Don't engage with your abuser's content even through mutuals
- Take breaks when you notice your mood declining
Support Communities
- Join private support groups with verification processes
- Facebook groups for abuse survivors can be valuable
- Reddit communities (r/NarcissisticAbuse, etc.)—but remember these are semi-public
- Look for groups that vet members
- Never share identifying information even in "private" groups
When to Take a Complete Break
Consider a social media hiatus if:
- You're actively being stalked or harassed online
- Court proceedings are ongoing and contentious
- You're in early recovery and emotionally raw
- You find yourself seeking validation from posts instead of from therapy
- You're obsessively checking your abuser's profiles
- It's interfering with real-world healing
- Your attorney recommends it
- You can't stop yourself from posting things you regret
- Social media is increasing your anxiety rather than reducing it
How to Take a Break:
- Don't delete accounts (this can complicate things)—deactivate temporarily
- Remove apps from your phone
- Have a trusted friend change your password if needed
- Replace the habit with something healthier
- Set a specific timeline for the break
- Know that FOMO is normal and will pass
Teaching Children Digital Safety
If you have children, they need age-appropriate guidance:
For Young Children (Under 10):
- They shouldn't have social media accounts
- Monitor any devices they use
- Teach them not to share personal information online
- Explain that what they share can be seen by many people
For Tweens (10-13):
- Close supervision of any accounts
- Discuss what information should stay private
- Explain that the other parent might see anything they post
- Teach them that some people online aren't who they claim to be
For Teens (13+):
- Honest conversations about the custody situation
- Explain without oversharing why privacy matters
- Discuss recognizing manipulation through social media
- Help them think critically about what they share
- Respect their autonomy while maintaining appropriate oversight
Key Messages for All Ages:
- Don't share custody schedule information online
- Be aware when the other parent asks probing questions
- Private family information stays private
- It's okay to not accept friend requests from people they don't know
- If anything online makes them uncomfortable, tell a trusted adult
The 24-Hour Rule
Before posting ANYTHING:
- Wait 24 hours (longer if emotional)
- Ask yourself:
- "Could this be used against me?"
- "Would I be comfortable with a judge seeing this?"
- "Am I looking for validation I should get from therapy?"
- "Is this truly private, or could it travel?"
- "How would I feel if my children read this in 10 years?"
- If you're still uncertain: Don't post it
For Time-Sensitive Content:
- Ask a trusted friend to review first
- Remember that very few things are actually time-sensitive
- When in doubt, err on the side of not posting
Building Real-World Connections
Social media should complement, not replace, genuine human connection. During recovery, prioritize:
In-Person Support:
- Local support groups for abuse survivors
- Individual therapy with a trauma-informed professional
- Real-world friendships with safe people
- Family relationships (with safe family members)
- Community involvement and activities
Why This Matters:
- Online validation is fleeting; real relationships are sustaining
- Social media can create false intimacy
- Narcissistic abuse often involves isolation—rebuild real connections
- Your nervous system heals through safe in-person contact, as documented by polyvagal theory research10
- Real communities can show up for you in tangible ways
Your Healing Isn't a Performance
Perhaps the most important mindset shift:
Remember:
- You don't owe anyone updates on your life
- Recovery is private, not public
- Not posting doesn't mean you're not progressing
- Your value isn't measured in likes, comments, or followers
- Silence can be powerful
- Your best healing happens offline
Resist the Urge To:
- Prove to your abuser (through your posts) that you're thriving
- Perform happiness you don't feel
- Document your "revenge glow-up"
- Show them what they're missing
- Use social media to send indirect messages
The Truth:
- They're not going to suddenly realize what they lost
- Performing healing isn't the same as actually healing
- The best revenge is a life well-lived—and that doesn't require an audience
Your Next Steps
Today:
- Audit your current privacy settings on every platform you use
- Review your friends/followers list and remove anyone uncertain
- Check your recent posts for anything that could be problematic
This Week: 4. Block anyone who serves as an information conduit to your abuser 5. Create a social media policy for yourself in writing 6. Identify 3-5 trusted friends who respect your boundaries
This Month: 7. Set up Google Alerts for your name 8. Consider whether you need separate accounts 9. Join one private, verified support community
Ongoing: 10. Monthly privacy settings review 11. Before posting, run through the 24-hour rule checklist 12. If you're experiencing harassment, consult with your attorney about legal options
Your digital space is YOUR space. Protect it fiercely, and never feel guilty for boundaries that prioritize your safety and healing. You're not being paranoid—you're being appropriately cautious in a situation that calls for caution. If the digital monitoring has extended beyond social media to your devices, phones, and home technology, review our guide to recognizing smart home surveillance and tech-based control for a fuller picture of how abusers use technology.
The goal isn't to live in fear of social media forever. The goal is to create safety now so that eventually, when the acute conflict passes, you can engage online from a place of security rather than vulnerability.
Until then, protect yourself. Your healing is worth more than any post.
Resources
Digital Safety and Online Harassment:
- National Domestic Violence Hotline - Technology Safety - Digital safety planning tools
- Cyber Civil Rights Initiative - Resources for online abuse victims
- Electronic Frontier Foundation - Digital privacy and security guidance
- Safety Net Project - Technology safety for survivors
Mental Health and Trauma Support:
- Psychology Today Therapist Finder - Find trauma-informed therapists
- National Alliance on Mental Illness (NAMI) - Mental health education and support
- EMDR International Association - Find certified EMDR therapists
- SAMHSA National Helpline - 1-800-662-4357 (24/7)
Crisis Support:
- 988 Suicide & Crisis Lifeline - Call or text 988 (24/7)
- Crisis Text Line - Text HOME to 741741
- National Domestic Violence Hotline - 1-800-799-7233 (SAFE)
References
- Woodlock, D., Healey, P., Howe, S., & Fels, K. (2023). Technology-Facilitated Abuse in Intimate Relationships: A Scoping Review. Journal of Family Violence, 38(4), 691-707. https://pmc.ncbi.nlm.nih.gov/articles/PMC10486147/ ↩
- Grimani, Gavine, & Moncur (2022). An Evidence Synthesis of Covert Online Strategies Regarding Intimate Partner Violence.. Trauma, violence & abuse. https://pmc.ncbi.nlm.nih.gov/articles/PMC8905127/ ↩
- Latzman, N. E., Latzman, R. D., & Beech, A. R. (2024). Safeguarding the "Internet of Things" for Victim-Survivors of Domestic and Family Violence: Anticipating Exploitative Use and Encouraging Safety-by-Design. Cyberpsychology, Behavior, and Social Networking, 27(2), 98-106. https://pubmed.ncbi.nlm.nih.gov/38166524/ ↩
- Henry, N., Flynn, A., & Powell, A. (2020). Technology-Facilitated Domestic and Sexual Violence: A Review. Violence Against Women, 26(15-16), 1828-1854. https://pubmed.ncbi.nlm.nih.gov/32998673/ ↩
- Mulford, C. F., & Giordano, P. C. (2009). The Abuse of Technology in Domestic Violence and Stalking. Victims & Offenders, 4(2), 113-126. https://pubmed.ncbi.nlm.nih.gov/27178564/ ↩
- Gentles-Peart, N., Horne, D., & Gentles, A. (2022). Exploring the Impact of Technology-Facilitated Abuse and Its Relationship with Domestic Violence: A Qualitative Study on Experts' Perceptions. Frontiers in Psychology, 13, 914251. ↩
- Spitzberg, B. H., Sinclair, H. C., & Birkhimer, M. R. (2025). Cyberstalking Perpetrators and Their Methods: A Systematic Literature Review. Cyberpsychology, Behavior, and Social Networking, 28(1), 45-67. https://pubmed.ncbi.nlm.nih.gov/40271872/ ↩
- Muise, A., Christofides, E., & Desmarais, S. (2014). More Information Than You Ever Wanted: Does Facebook Provide a Useful Source for Studying Romantic Relationship Dissolution? Cyberpsychology, Behavior, and Social Networking, 17(8), 528-532. https://pmc.ncbi.nlm.nih.gov/articles/PMC3472530/ ↩
- Casale, S., Rugai, L., & Fioravanti, G. (2023). Narcissism and problematic social media use: A systematic literature review. Journal of Affective Disorders, 287, 382-392. https://pmc.ncbi.nlm.nih.gov/articles/PMC7244927/ ↩
- Porges, S. W. (2021). Polyvagal Theory: A Science of Safety. Frontiers in Integrative Neuroscience, 15, 688468. https://pmc.ncbi.nlm.nih.gov/articles/PMC9131189/ ↩
Recommended Reading
Books our editorial team recommends for deeper understanding

Divorce Poison
Dr. Richard A. Warshak
Classic best-selling parental alienation resource on detecting and countering manipulation tactics.

Joint Custody with a Jerk
Julie A. Ross, MA & Judy Corcoran
Proven communication techniques for co-parenting with an uncooperative ex.

BIFF for CoParent Communication
Bill Eddy, Annette Burns & Kevin Chafin
Specifically designed for co-parent communication with guides for difficult texts and emails.

5 Types of People Who Can Ruin Your Life
Bill Eddy
Identifies five high-conflict personality types and teaches how to spot warning signs.
As an Amazon Associate, Clarity House Press earns from qualifying purchases. Your price is never affected.
Found this helpful?
Share it with someone who might need it.
About the Author
Clarity House Press
Editorial Team
The editorial team at Clarity House Press curates and publishes evidence-based content on narcissistic abuse recovery, high-conflict divorce, and healing. Our content is informed by research, survivor experiences, and established trauma-informed approaches.
View all posts by Clarity House Press →Published by Clarity House Press Editorial Team



