The Digital Battlefield: Understanding the Terminology of Targeted Harassment
- The Dire-Rie of a Sane Black Woman

- Sep 12
- 3 min read

In an age where technology has permeated every aspect of our lives, the weapons used for harassment and abuse have evolved beyond physical boundaries. As a targeted individual, understanding the terminology associated with this experience becomes crucial—not just for making sense of your own situation, but for communicating it effectively to others who might be struggling to comprehend the scope of such harassment.
Emotional and psychological abuse form the foundation of targeted harassment. While emotional abuse undermines self-worth through humiliation, manipulation, and control, psychological abuse expands to include isolation, threats, and reality distortion. These invisible tactics are designed to destabilize and dominate the victim. Gaslighting—a term that has entered mainstream consciousness—is particularly insidious in cases of targeted individuals, as perpetrators deny surveillance evidence and claim the victim is simply paranoid. This works hand-in-hand with DARVO (Deny, Attack, Reverse Victim and Offender), a manipulative strategy where abusers deny their actions, attack the credibility of the victim, and then position themselves as the actual victims in the situation.
The digital landscape has given rise to cyber stalking and technology-facilitated abuse that transcends physical boundaries. Unlike traditional stalking, cyber stalking is systematic, involving monitoring, data extraction, manipulation, and distribution. Perpetrators may deploy spyware, malware, or social engineering to access devices and accounts, while GPS tracking and even botnets formed from others' phones create an inescapable surveillance network. This constant monitoring feeds into smear campaigns where personal information—both real and manipulated—is shared to destroy reputation. Doxing, fake accounts, and third-party grooming further amplify the harm, making it nearly impossible for victims to maintain credibility in any social circle.
The impact of these coordinated attacks is profound and far-reaching. Victims often experience anxiety, depression, and symptoms similar to PTSD, though as I've experienced personally, you can't even call it "post-traumatic" when the trauma is ongoing. The isolation tactics work effectively to cut victims off from support systems, making them more vulnerable to continued abuse. Meanwhile, subliminal harassment—using covert cues or coded language—creates an environment where the victim is constantly on edge but unable to definitively prove the harassment to others. This is particularly effective in public spaces and shared accommodations, where seemingly random objects placed strategically serve as psychological triggers.
What makes this form of abuse particularly challenging is that our legal and support systems haven't caught up to the technological reality. Law enforcement often lacks the training, resources, and sometimes even the legal framework to address these sophisticated harassment campaigns. When I've approached police, they've demonstrated they don't have the means or expertise to investigate digital surveillance and psychological manipulation at this scale. This gap in protection highlights the importance of documentation and sharing experiences, even when it feels futile or retraumatizing.
For those experiencing targeted harassment, it's crucial to remember that you're not alone and you're not imagining it. Documentation, when safe and possible, can provide validation and potentially evidence. Finding spiritual or personal strength—whatever form that takes for you—becomes essential for maintaining sanity in a situation designed to destroy it. In my case, faith has been my anchor through waves of mockery and isolation. The bible offers me the hope that "this too shall pass", even when it feels like the entire world has turned against me.
Understanding these terms and recognizing these patterns is the first step toward reclaiming your narrative from those who seek to control it. By naming these invisible weapons, we take away some of their power and begin the journey toward healing and advocacy for better protections in our increasingly digital world.



Comments