Misread Journal

Home

Documenting a Narcissist Smear Campaign in Text Messages

March 23, 2026 · 7 min read

Something feels off. You just received a text from someone you barely know, saying something about you that isn't true. Or maybe it's from a friend who suddenly turned cold, referencing things you never said or events that didn't happen the way they're describing. Your stomach drops because you recognize the pattern but you can't quite name it.

That's a smear campaign. When someone with narcissistic traits decides you're a threat—whether you challenged them, set a boundary, or simply stopped giving them what they needed—they rarely confront you directly. Instead, they recruit others to do the dirty work. The messages arrive through proxies, often called "flying monkeys" in psychological literature. These are people who genuinely believe they're helping someone or "standing up for truth" when they're actually carrying out a coordinated attack on your reputation.

The good news is this: text messages leave a trail. Unlike verbal gossip that evaporates, your phone holds the evidence. And that evidence can protect you legally, help you see the pattern clearly when your head is spinning, and remind you of the truth when the noise gets loud.

Understanding the Smear Campaign Pattern

A smear campaign isn't random chaos. It follows a recognizable structure that becomes visible once you know what to look for. First, the person at the center—the one with narcissistic traits—identifies a target. This is you. They've decided you represent something they can't tolerate: criticism, independence, happiness they didn't sanction, or simply attention that belonged to them.

Then comes the recruitment phase. Your abuser doesn't badmouth you directly to everyone—they're too calculated for that. Instead, they tell a curated story to one or two trusted proxies. They position themselves as the victim. They describe you as unreasonable, unstable, or cruel. The story is distorted enough to be believable but vague enough that no one asks for specifics.

Finally, the flying monkeys activate. These are the people who start sending you messages. They might confront you, warn you to "leave them alone," or relay messages that sound like they came from your abuser but with plausible deniability. The abuser can then claim they never said those things while their proxies did the confrontation.

Why Text Messages Are Critical Evidence

Text messages are different from verbal communication in one crucial way: they persist. When someone tells three friends that you're difficult to work with, you have no proof unless one of those friends admits it later. When someone texts those same three friends about you, you have timestamps, exact language, and a paper trail that exists regardless of who remembers what.

This matters for several reasons. If you're considering legal action—restraining orders, defamation suits, custody disputes— Judges and attorneys deal in documented evidence, not memories. A pattern of hostile messages from multiple people, all arriving in a tight window after contact with one central individual, creates a picture that words cannot.

But it also matters for your own sanity. When you're in the middle of a smear campaign, you start questioning yourself. Did I say that? Was I too harsh? Maybe they're right about me. Going back and reading the actual messages, in sequence, interrupts this gaslighting loop. The pattern becomes undeniable when you see it laid out chronologically.

Have a message you can't stop thinking about?

Paste it into Misread and see the structural patterns hiding in the language — the ones you can feel but can't name.

Scan a message free →

How to Document Smear Campaign Texts Systematically

You need a system that preserves the information and makes it usable later. Don't just screenshot randomly—screenshot everything, but organize it intentionally. Create a dedicated folder on your phone or computer labeled with the date and the names involved. Every time you receive a concerning message, screenshot it immediately. Don't trust yourself to remember later.

For each message, note the date, time, sender, and your initial reaction. You can keep this in a simple document or a notes app. What matters is that you're creating a timeline. Narcissist smear campaigns escalate, and the escalation pattern—messages getting more hostile, more frequent, or involving more people—tells a story on its own.

Capture context, not just content. If someone sends you a message that says "I heard what you did and I'm disappointed," screenshot the entire conversation thread so a later reader can see what prompted it. Delete nothing, even messages from people you care about. You're not documenting to judge them—you're documenting the pattern.

Export backup copies regularly. Phone updates happen. Devices break. Cloud storage fails. Save your documentation to at least two locations: a cloud drive and a physical USB or external drive if possible. Legal matters take time, and you need this evidence to survive your phone being replaced.

What to Do With the Evidence

Once you've documented the pattern, resist the urge to respond to every flying monkey with a long explanation. I know how much you want to defend yourself. You want to show them the messages and say "See? This is what's actually happening." But this rarely works. The people sending these messages have already been fed a narrative, and your defense just looks like more manipulation to them.

Instead, hold onto your documentation and wait for the right moment. If legal action becomes necessary, your organized evidence is ready. If custody is involved, you have timestamps showing a campaign of harassment. If workplace reputation is at stake, you can provide context to HR or potential employers without appearing reactive.

In the meantime, protect your energy. You don't owe anyone a defense. The people who believe the smear without asking for your side were never truly your people. That's painful to accept, but it's also clarifying. Your documentation isn't about winning them over—it's about protecting yourself and keeping a clear record of the truth.

Protecting Yourself Moving Forward

Documentation is your armor, but boundaries are your wall. You don't have to respond to flying monkeys at all. A simple "I understand you heard something concerning, but I'm not going to discuss this with you" is enough. Say it once, then stop engaging. Every response you give feeds the cycle.

Block what you can, mute what you can't, and stop exposing yourself to content designed to hurt you. If someone keeps sending you messages meant to destabilize you, you have every right to stop reading them. Your mental health matters more than proving a point to people who aren't interested in the truth.

And remember this: the fact that you're being smeared at all is information. It tells you who centers themselves at the cost of others, who cannot handle accountability, and who builds their identity on controlling the narrative around them. You're not the problem. You're just the obstacle they decided to remove.

Tools like Misread.io can map these structural patterns automatically if you want an objective analysis of a specific message.

Your gut was right. Now see why.

Paste the message that's been sitting in your chest. Misread shows you exactly where the manipulation is — the shift, the reframe, the thing you felt but couldn't name. Free. 30 seconds. No account.

Scan it now

Keep reading

Documenting Emotional Abuse in Texts: Building Your Evidence File Documenting Stalking via Text Messages: A Legal Evidence Guide Flying Monkey Texts: When a Narcissist Uses Others to Message You Flying Monkey Family Texts After Going No Contact Text Harassment Legal Options: When Messages Cross the Line