Back

A Mother's Cross to Bear

When the person destroying your life is also the only one you believe still loves you, the abuse becomes nearly impossible to see — and nearly impossible to leave.

Martha is a widow in her seventies — intelligent, accomplished, and deeply loyal to the people she loves. Over a period of several years, her son-in-law systematically dismantled her finances, her relationships, her health, and her sense of reality. By the time she came to us, she had lost approximately $4 million in assets, was facing a civil judgment exceeding $3 million, had been physically assaulted multiple times, and had been isolated from nearly everyone in her life. She had also, without knowing it, potentially broken the law while trying to help him. This is her case.

Martha's son-in-law — referred to here as the perpetrator — carries diagnoses of borderline personality disorder, narcissistic personality disorder, and multiple substance use disorders. He is charming, articulate, and capable of sustained deception. He is also profoundly destructive to everyone in his orbit.

His pattern is consistent and well-documented in the clinical literature on high-conflict personality disorders: he burns through relationships at a predictable rate, cycling through idealization, devaluation, and discard. He has pushed away therapists, attorneys, business partners, and family members who tried to help him. He hospitalizes or enters rehabilitation approximately once per month. He pursues frivolous litigation against people who have wronged him in his perception, fires professionals without cause, and systematically ruins the lives of those who attempt to hold him accountable.

Martha, widowed and without the buffer her late husband once provided, became his primary attachment figure — and his primary target. He convinced her that they were a team, that he would always care for her, that together they would fix everything he had broken. She believed him. She had no reason not to.

Over the course of several years, the perpetrator transferred, manipulated, and coerced Martha out of approximately $1.2 million in assets. The mechanisms were varied and layered: direct theft, forged documentation, manufactured investment opportunities, and the exploitation of her trust and her grief.

He infiltrated her bank accounts, retirement accounts, and investment portfolios. He used her identity to open accounts and enter into agreements she was unaware of. He misrepresented his business's success and connections — claiming relationships with public officials, fabricating company revenues, and using generative AI tools to produce falsified bank statements and purchase agreements that he presented to Martha and to third parties as genuine.

He recruited Martha's help in paying his staff, framing it as a temporary cash flow issue. What Martha did not know — and what she may now be legally exposed for — is that those transfers were likely wire transfers to offshore accounts, not legitimate payroll. She had no reason to suspect this. She was helping someone she loved.

He also used a portion of Martha's retirement savings to fund a luxury rental property — placed the lease in her name, added himself as a co-tenant, and created a living arrangement that gave him both financial control and physical proximity.

The perpetrator's use of technology was deliberate and sophisticated. He accessed Martha's devices without her knowledge, altered her technology settings in ways that impaired her ability to communicate securely, and deleted files and records from her personal storage. He modified retention policies on her accounts to prevent her from recovering deleted material.

He stole her medications — an act that had both practical and psychological dimensions, creating a physical dependency on his goodwill and degrading her cognitive clarity over time. He fabricated documents using AI tools and presented them as authentic records to attorneys, courts, and financial institutions. On at least one documented occasion, he interfered with her ability to contact emergency services.

The cumulative effect was to make Martha's account of her own life appear unreliable. When records had been altered or deleted, when communications had been tampered with, and when her own memory had been systematically undermined through gaslighting, the evidentiary foundation for any institutional intervention became fragile. This was not accidental. It was the architecture of control.

The perpetrator physically assaulted Martha on multiple occasions. Three incidents are on formal record. The documented assaults involved strangulation, bruising, and a laceration from a bladed instrument. A former partner of his had previously obtained an Order for Protection against him. A Domestic Abuse No Contact Order was issued on Martha's behalf as a result of his conduct.

The physical violence was not separate from the financial and psychological abuse — it was continuous with it. Escalation typically followed moments when Martha questioned his account of events, delayed compliance with his requests, or showed signs of seeking outside support. Violence was, in that context, a regulatory mechanism: a way of re-establishing control when other means had temporarily failed.

Martha's physical health has deteriorated. She has deferred medical care, lost weight, and is managing the compounding effects of chronic stress, medication disruption, and the physical consequences of the assaults.

Her mental health presentation includes clinical depression, anxiety, and symptoms consistent with complex trauma. She has, at her lowest moments, asked what the point of continuing is. This is not an abstract statement from someone in a difficult situation. It is the statement of a person who has been systematically stripped of every structure that gave her life meaning and security.

Her finances are effectively destroyed. She carries debt exceeding $3 million, her credit has been impaired, and she has few liquid assets remaining. She was evicted from her residence — the husband's family required the sale of the property to recover a portion of the judgment — and she has struggled to secure alternative housing because of the financial and legal record his actions created in her name.

Her relationships have been devastated. Her siblings have cut contact. One of her daughters is estranged. Her religious community, her social network, and the professional relationships she built over decades have been progressively severed — sometimes by his direct interference, sometimes because the people involved did not understand what they were witnessing, and sometimes because Martha, in trying to protect him, defended conduct that made her appear complicit in her own harm.

Martha came to us for help with a technology problem. What we found was a situation in which technology was one of several overlapping systems of control, and in which addressing the technology without addressing the broader context would have been both inadequate and irresponsible.

We began with a thorough assessment of her digital environment: her devices, her accounts, her communications, and the documentation that had been altered or deleted. We helped her secure her accounts on devices the perpetrator had not had access to, identified the extent of the infiltration, and worked with her to begin reconstructing a record from available sources.

We advised on documentation strategy — what to preserve, how to preserve it, and how to organize it for legal utility. We helped her understand the technical dimensions of what had been done to her, in terms she could use when speaking to attorneys and investigators. We provided context on the AI-fabricated documents — what they were, how they were made, and how to challenge them.

We also provided advocacy support: helping her understand her legal situation, navigating institutional channels, and connecting her with appropriate professional resources. We have continued to consult on her situation as it has evolved.

Martha's case is not unusual in kind. The specific dollar amounts, the specific legal posture, the specific pattern of violence and manipulation — these are distinctive. But the underlying structure is one that appears throughout the clinical and legal literature on coercive control, elder abuse, and high-conflict personality disorders. What is unusual is that she has someone in her corner who can document it clearly.

What this case illustrates, above all, is the way systems designed to protect people can be turned against them. Courts, financial institutions, legal processes, and even well-meaning family members all became vectors through which the perpetrator extended his control. Martha did not fail these systems. They failed her — in part because they were not designed with someone like him in mind, and in part because he understood exactly how to exploit them.

It also illustrates the particular vulnerability of older adults who are isolated by grief, who are deeply loyal to the people they love, and who have not had occasion to develop the digital literacy and institutional skepticism that might have provided earlier warning. Martha is not naive. She is a person who loved someone who was extremely skilled at being loved, and who used that skill as a weapon.

Our work with Martha is ongoing. The situation is not resolved. But she has a record, a clearer understanding of what happened to her, and — for the first time in years — people in her life who know the full truth and are not leaving.