Posts Tagged ‘losing time’

h1

Staying Safe As Survivors In Our Interactions With Others…Part 13

February 15, 2010

General Safety

1. Do NOT share your password with anyone. If you must, (like when you need someone to help you with a technical problem, change it as soon as that person is done! A friend of mine needed help with her email. She gave her password to a “trusted friend”. That “friend” then started sending emails in my friend’s name. It was a nightmare, especially since she was a multiple who lost time. It took awhile to figure out what was going on and who was doing it. But it was even worse than that because my friend also did not follow the next rule.

2. Never use the same password twice and always change your passwords periodically. My friend was also a forum owner. Since she used the same password for everything, this person had total access to every level of her forum. Not good! Some people even use the same password for banking. You can see how bad it would be if one of your accounts was compromised. If you used the same password for everything else, then ALL of your accounts would also be compromised.

In conclusion, I cannot emphasize enough to ALWAYS have someone overseeing ALL interactions. I know this list is not all-inclusive, but I hope that it helps others out there. I plan to continue to write about safety as I can and post it here. You are welcome to come by and read and do a search for whatever you are interested in. Who knows? Perhaps, I have written about it.

End of article.

The first post in this article is here.

h1

Staying Safe As Survivors In Our Interactions With Others…Part 12

February 15, 2010

8. Supporting your professional. Be very careful if a professional is sharing his/her personal issues with you. I had one therapist who opened our appointment times sharing his struggles. Granted…I did inquire as to how he was…in a general sort of way. It is a way to break the ice and can be a simple common courtesy. He, though, took it to an unhealthy level. It became very awkward.

I could not really complain about the time being taken because he was rather generous with his time. I always got my “hour” and oftentimes even more. However, the boundaries became blurred and I found myself feeling like I needed to help him feel better. His sharing made it difficult to view him as someone who was helping me rather than as a needy person himself. I am not saying that professionals cannot have needs or need support. After all…they are human, too! What I am saying is that they need to go elsewhere for support. It shut down my sharing during appointments. Without sharing…there is no work really being done.

9. Wanting to see or touch parts of your body or talk in a sexual way. I know of one therapist who would intentionally trigger the littles of some friends of mine to come out. Then he touched their bodies inappropriately in the guise of doing healing work. Littles don’t know what is legitimate healing work! What he did was sick and caused a lot of damage and hurt. Again, I cannot emphasize strongly enough the necessity of doing whatever you can to insure that littles (or any other naive alters) are NEVER out alone or unsupervised.

To be continued…

The first post in this article is here.

h1

Staying Safe As Survivors In Our Interactions With Others…Part 11

February 15, 2010

6. Secret tellers and confidence breakers. Be very wary of anyone who breaks a confidence. You can pretty much bet if they are sharing about others with you, then they are also sharing about you with others. If someone is in any real danger, it can be valid to break a confidence. However, you need to ask yourself if you are really in a “need to know” position with the person being shared about. Is there anything you can really do? Put yourself in the shared about person’s perspective. Would you be comfortable if it was you being talked about? If not…you can pretty much bet a boundary has been crossed.

It’s bad when “friends” share confidences. It’s even worse when a professional does it. There are strict guidelines given to professionals regarding confidentiality. It is NEVER OK for a professional to share with one client about another client. It doesn’t matter if the clients are both members of the therapist’s forum or if they know each other in person. If there is no signed consent form, it is NOT OK.

I am not talking about things like…“I once had a client who had a similar problem and this is what helped him/her.” That is different. And, even in those cases, you should never have enough information to enable you to figure out who that other client is. It should always be a general sharing.

It is also not OK to post private communications without permission, even if it was written by the professional. An online therapist who has a for-pay forum openly posted something that she wrote to me in private. When confronted about it by someone else, she merely changed who it was addressed to and left it up. This was very unethical.

7. Meeting in unusual places…or uncomfortable places. I’ve heard of clients being asked to meet in a therapist’s car or in restaurants, sometimes even with other clients in the same room! This is NOT OK. One therapist I know had an office with no windows and all the other offices on that floor were unoccupied. The building itself was rather isolated and his office never did feel comfortable…and rightfully so. He accessed my alters there and used them. His office setup also made it easy to not recognize the time loss.

To be continued…

The first post in this article is here.

h1

Staying Safe As Survivors In Our Interactions With Others…Part 10

February 15, 2010

4. Alters suddenly becoming afraid of someone you know, regardless of who they are. There is a reason for sudden fear. You need to get to the bottom of it. In our case, the imposter was telling littles horrible, scary things (as me). This person knew what kinds of things would hurt my friends the most and what was most likely to trigger programming. What made this situation extra dangerous was the imposter had her own relationship with my friends…apart from me. So she fed the fears and kept pointing to me as being dangerous while offering no real proof. No one caught it until it was too late. It is SO important that the system always have someone ready to step in watching over ALL interactions. Even if my innocence could never be proven, at least they would not have been so hurt. The friends who were affected were all ones who lose time.

5. Listen to your “gut”, your insiders and others you trust. This is a tricky one. While you know yourself better than others, it is possible to be blind to something that is going on with you. Sometimes others can see things you are unable to see…whether it is about you specifically or about your relationship with someone else. If one person were to tell me something, I would pay attention and check into it. Unless I could find some way to confirm it, though, I probably would not be very concerned about it. However, if several people were to tell me something about me, or about someone I was close to, I would really dig hard to see if it might be true.There are times when others can see things that we are blind to…things that we need to see in order to stay safe. Whether it is coming from insiders, or from people we know outside, pay attention. Check it out.

If you keep getting the feeling that something is wrong with an interaction, whether online or offline, please do not ignore it. I was seeing a therapist who was accessing my programming and using me. I did not find it out until after I stopped seeing him that we had a prior cult connection. The whole time I was seeing him there were flags waving. I had “gut” feelings. I just did not know how to interpret them at the time. My insiders were trying to get my attention, but I could not hear/understand it. If I had simply backed out for a while, perhaps my insiders would have been able to break through with the information I needed. I did finally hear them about three months after I stopped seeing him. Needless to say, I was floored. This is an example of not being an overt time loser, yet getting accessed anyway.

On the flip side, when I was told that “I” (or someone inside me) was doing these awful things to others, I went straight to my therapist who had at that time about 25 years of experience working with cult survivors. She had been carefully watching me from the time we first met to see if there might be an alter inside who was capable of such behavior. She had read hundreds of pages of journaling and had seen no indications. My husband, who was home almost all the time, also saw no indications. I took what I was told to those who know me best.

To be continued…

The first post in this article is here.

h1

Staying Safe As Survivors In Our Interactions With Others…Part 9

February 15, 2010

2. Sudden change in the behavior of a trusted online friend…whether online or over the phone. Another thing to watch out for is if a known “friend” suddenly starts behaving differently. Littles and very trusting alters won’t know what to make of it or how to handle it. They will assume it is still their friend they are communicating with. They most likely will not recognize that they are dealing with an imposter. This is especially the case if the imposter knows both them and their friend fairly well, as was the case with my friends and me. She had enough information to even cause some older alters to think it might be me, although they had their doubts. Sadly, littles are very easy targets.

Many systems have alters with the same, or similar, names. This can also create vulnerability as an imposter can call or write them and legitimately use the same name as a friend of theirs. There are also those who simply outright lie, calling themselves someone they are not.

3. Someone calls you that you don’t remember giving your phone number or you receive something in the mail from someone to whom you did not give your address. I have also seen this happen. The one who impersonated me also knew my friends, so she had contact information from them I did not even have. When my friends asked “me” how I got their contact information, she told them her littles (or someone else in their system) had given it to “me”. My friends heard things and received thing that were hurtful and dangerous to them. They did not know my voice because we had never spoken with one another. The impersonator (as herself) told the only one who had met me that “I” had phoned one of her littles. Since she was not “present” during the phone call, she could not know if it was my voice or not.

To be continued…

The first post in this article is here.

h1

Staying Safe As Survivors In Our Interactions With Others…Part 8

February 15, 2010

Other Things to Watch Out For

1. A difference, however subtle, in someone’s IM and email ID used. If there are ANY differences, carefully question it. Even if the answer seems to make sense, be cautious for a while until you make sure it really is the same person with a new ID. I really feel a need to emphasize how vulnerable littles are with this one. Littles, like any other young child, can be easily tricked. They will not pick up on things that older, more mature alters will. This is why it is SO important to work on getting your system to make sure there is a mature alter who can watch, listen and step in, if need be. If a little receives an Instant Message (IM) ID or email that is very similar to one used by someone they know and trust, they most likely will not notice the difference. Sadly, this, too, is where I (and some very dear friends) can draw upon some personal experiences.

I had a very specific screen name that I used…one no one else would be likely to take. When I decided I wanted to get a Yahoo IM to match, I could not get it. Although it seemed odd at the time, I finally came up with what I thought was a possible reason for it. I’m going to explain that reason and give an example because I believe it is important that you see how something so simple can cause problems for the unwary. I also want you to see how easy it can be to confuse even an older alter, let alone a young or naive one.

I have a paid Yahoo email account that allows me to pick something for a repeating base for creating disposable email addresses. I had used my screen name for that base, so I just assumed at the time that Yahoo would not allow any disposable email bases to also be used as regular emails and IM’s. I realized too late that I was wrong. At the time, I decided to use my screen name with an added digit at the end. The following example shows what I mean.

I am using a randomly made up screen name and email addy. (My apology if someone is actually using this.)

Screen name = renkenfork14

Email = falderally@yahoo.com

Disposable email base = renkenfork14-

Disposable email addresses are used to protect the main email address from spam. They are typically used when signing up for things. It also allows the convenience of the different disposables coming into the same email inbox instead of having to check a bunch of different emails. You add different things after the dash according to how you are using that particular one…such as:

renkenfork14-forum@yahoo.com                       or         renkenfork14-crafts@yahoo.com.

There is no IM connected with a disposable…only with the real email, so the IM is falderally NOT renkenfork14.

To get the renkenfork14 IM, you have to create a renkenfork14@yahoo.com email address to go with it. If renkenfork14 is already taken (as it was with my screen name), you can do what I did…double the end digit to keep it as close as possible to the actual screen name. That gets you renkenfork144 as an IM connected to an email with the same name.

See how easy it would be to miss the difference between renkenfork14 and renkenfork144. Even if you only used renkenfork14-forum@yahoo.com to email people and falderally for your IM, chances are, they won’t notice if they suddenly get emails from renkenfork144@yahoo.com and IMs from renkenfork144. That is what happened to my friends and me.

How did we figure it out? One day, a friend apologized to me for not responding to my IM earlier in the day. Yet, I knew I had not IM’d her. We almost got into an argument over it. I keep my archiving on and I was not losing time. There was nothing in the archives to her that morning. If her archiving been on, she could have gone back and double-checked the ID. At the time, we both wrote it off as the other one being a bit nutty that day. There was nothing unusual in the IM’s themselves to cause us to give it any more thought.

Later, when I ended up being accused by others of writing things I never wrote (and calling people whose phone numbers I never had), we both remembered the incident. Emails sent to that ID did NOT bounce back. It became apparent that the real reason I had been unable to get my screen name for email and IM was because someone else had gotten it first. That ID was used to impersonate me.

The imposter initially targeted littles. Littles would not notice a change in details. So this allowed the imposter to both email and IM others as “me”, even though I never used that particular email account for email. I always used my disposable one. The friends who were affected were also all ones who lose time. Do you see the importance of working on stopping time loss and on building cooperation in the system?

The imposter said mean, hurtful things to my friends…things that were also very triggering and very dangerous. She took advantage of things she knew were already going on in my friends’ lives…and blamed me for them. Some of my friends were seriously and dangerously hurt. Because of the natural fear of survivors, I lost some friendships. Others became strained, as they did not know what to make of it. Everyone agreed that it did not line up with what they knew of me, but someone at the forum played upon their uncertainties and kept telling them privately that I was dangerous. I had no idea what was going on until I was banned from the forum. By then it was too late. The damage was done. Several friends were deeply wounded. Most of them did finally realize the truth, but not all. It was…and is…heartbreaking to think of how my friends were so deeply hurt by this and of the loss of friendships, some of which are ongoing.

I know of other instances where littles were taken advantage of…both online and in person. So, PLEASE, make it a priority to keep a watchful eye over ALL little interactions, regardless of whether on line or in person and regardless of who the other person is or seems to be.

To be continued…

The first post in this article is here.

h1

Staying Safe As Survivors In Our Interactions With Others…Part 7

February 15, 2010

5. We need to jump right in and work hard on healing. Let’s not waste time. It takes time to build trust. A good therapist will give you that time. While they might gently prod you at times, they won’t accuse you of not being serious about your healing if you need to go slowly.

6. It should not take very long for you to “heal” with my method of doing things. Or…you will need to work with me a long time. The problem with this is that no one knows how long it will take for anything. I have seen huge leaps forward in healing and I have seen things take a long time. I might give them a try, but I will be wary of anyone who insists on a specific time frame rather than explaining general possibilities. It is one thing to share what others have experienced, but I am not others. I am a unique individual.

To Sum Up

Your feelings, your thoughts, your ideas, your knowledge, your questions and your hesitations…should always be respected. A good therapist will take the time to talk with you and work things through. He/she will take as much time as you need to answer all your questions and to build trust. They will never try to force something upon you.

To be continued…

The first post in this article is here.

%d bloggers like this: