In Part 2, Jessica and David J. Weeks (@djweeks_) move from the facts of David’s childhood into the adult fallout—and the work of repair. David traces how early chaos trained his body to confuse intensity with intimacy, how disorganized attachment and the survival role of “the chameleon” kept him safe then but costly now, and how narcissistic partners can exploit abandonment wounds through tactics like love-bombing, power imbalance, and data mining (“gaining information to use later against y...
All content for Your Traitor Within is the property of Jessica Anne Pressler, LCSW and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In Part 2, Jessica and David J. Weeks (@djweeks_) move from the facts of David’s childhood into the adult fallout—and the work of repair. David traces how early chaos trained his body to confuse intensity with intimacy, how disorganized attachment and the survival role of “the chameleon” kept him safe then but costly now, and how narcissistic partners can exploit abandonment wounds through tactics like love-bombing, power imbalance, and data mining (“gaining information to use later against y...
Jessica Anne Pressler, LCSW, and producer Anthony have a candid, non-graphic conversation about C-PTSD and Jessica’s experience surviving a suicidal crisis—naming the “Traitor Within,” how emotional flashbacks show up, and the small nervous-system tools that helped her choose to stay. Short, compassionate, and practical. (If you need help in the U.S., call or text 988.)
Your Traitor Within
In Part 2, Jessica and David J. Weeks (@djweeks_) move from the facts of David’s childhood into the adult fallout—and the work of repair. David traces how early chaos trained his body to confuse intensity with intimacy, how disorganized attachment and the survival role of “the chameleon” kept him safe then but costly now, and how narcissistic partners can exploit abandonment wounds through tactics like love-bombing, power imbalance, and data mining (“gaining information to use later against y...