What Are Cyberbullying, Trolling, and Cyberstalking? The Dark Side of Free Speech, Part 2

by | Jan 18, 2016 | Uncategorized

Cyberbullying

Our culture and probably most others have historically felt that bullies are bad news, but that being bullied is also a rite of passage. We often think that bullying tends to end with grammar school. Nothing is further from the truth.

As a culture, we tolerate and often reward adult bullies – especially bully managers in the workplace. We celebrate bullies in entertainment as warriors and winners (even as we also celebrate a bully getting his or her comeuppance), and although hazing in schools, the military, and fraternities are getting pushback from the culture, we otherwise do little to eradicate bullying. Our politicians are often famously bullying in nature. Unless there are dead bodies, it seems that we expect people to just put up with it (or fight back).

As harmful and heinous as bullying can be, cyberbullying takes things a step further.

Cyberbullying uses the Internet and other electronic forms of technology to post mean or embarrassing photos, messages, emails, or to make threats. However, the attacker is often anonymous – unknown – and there is no one to fight back against. As a result, the potential cyberbully is often emboldened to create as much havoc with their victim’s life as possible. The potentially viral nature of such posts – that is, the ability for these posts to be replicated widely, quickly, and endlessly – doesn’t happen in a face-to-face encounter.

A typical (non-cyber) bullying event happens at a moment in time and then is over (although another such event may occur). The bullying happens at a location in space – a street corner or the office, perhaps. A bullying is often witnessed, with the victimizer known to everyone present. A cyberbullying incident, on the other hand, can be spread to hundreds of people in seconds and millions of people in fairly short order, can persist for a lengthy period, can be distributed worldwide, and has no one to answer for their action.

As a result, damage from such an incident can recur and echo over and over. Sadistic sorts can take pleasure in repeating and reposting, and even create web sites to encourage their persistence. These sites cause a pile-on effect, with fellow nasty travelers putting in their own often excruciatingly foul insults, reposting the private images, and multiplying the harm. Some may not realize or care about the damage they cause; others delight in it.

One unfortunate creation of cyberbullying is “revenge porn.” There are sites on the Internet that are in place solely to embarrass and hurt people (mostly women) by electronically publishing and reposting sexual images of a former lover or interest. Some such postings are designed to embarrass associates of the person whose pornographic image is being posted. The target may be the former boyfriend or husband with the the victim being “collateral damage.” Even well-known individuals may participate in the ugly behavior, such as the recent case of hip-hop star 50 Cent and his site featuring pornographic video of a girlfriend of hip-hop competitor, Rick Ross.

Many victims of seemingly endless cyberbullying, including clients who have come to us for help, have had their self-esteem devastated. Others have been driven to substance abuse, dropping out of school or society, and such bullying behavior has even been implicated in suicides. While not usually considered a crime, it is far from victimless.

Cyberstalking

Cyberstalking is a more specific form of cyberbullying, and like cyberbullying, is much enabled by the anonymity possible via the Internet. It is the use of the Internet and other technology to harrass someone, although some cyberstalking can be secret for a time. While a “traditional” stalker may shadow a victim’s movements, spying on them from hidden areas, or with binoculars or telescopes, the cyberstalker keeps an eye on their target(s) electronically.

Much of our social life is semi-public these days, on social media such as Twitter & FaceBook. The Internet makes it easy for a person to hide his or her identity, make a fake identity, or pose as someone else – as a false friend perhaps – making it simple to spy on a person’s activities via social networking. Like cyberbullying, the ease of anonymity on the Internet may embolden the cyberstalker, thinking (often correctly) that they will not be found out.

We regularly encounter cases where the stalker has managed to research and guess credentials for their victim’s email or other online accounts making it easy to discover the victim’s whereabouts, conversations and correspondence. In some of these cases, the perpetrator will even impersonate the victim, sending faked emails and messages, posting as the victim themseleves, or publishing embarrassing images as if the victim herself were the source of the statements, pictures, or videos.

This has come to be understood and adjudged to mean that the government can’t keep you from saying your piece, no matter how much the government, or anyone else might disagree. This applies to all government in the U.S. – Federal, State, local entities and public officials of those public entities. You are free to speak in “the Public Square.” Note that the concept of the Public Square applies only to governmental entities, property and officials. It does not apply to private or commercial property. Property owners or business owners can prohibit you from saying certain things, or from saying anything at all on or within their own property, business, or broadcasts unless it is otherwise allowed.

Stalkers can find a way to infiltrate themselves into the fabric of the victim’s financial, social, and family life, leaving personal lives in tatters. Though it is easy to read about such events and behavior – it’s all over the news – the victims often find themselves not being taken seriously, with friends and loved ones calling her neurotic or paranoid. Because the cyberstalker is often trying to damage the victim’s reputation, the reactions of those close to the victim often further the stalker’s aims.

And while cyberstalking is illegal in many places around the country and around the world, these actions rarely rise to the level law enforcement needs to see in order to take it seriously, or to investigate. Read between the lines in the news and you will find that nearly all arrests that include cyberstalking also include a dire threat, a violation of an existing restraining order, ID theft, theft of physical property, or child abuse.

Trolling

Internet trolling is a behavior wherein the troll intends to inflame, upset, or otherwise damage civil discourse. In the context of this series of articles, it tends toward disrupting the online or public communication of others through the use of vile invective, insults and other verbal havoc. It is often misogynistic. The ability to be anonymous on the Internet removes much of the inhibition a person might otherwise feel to behave so uncivilly.

What To Do?

A common thread throughout the described behaviors is the ability to be anonymous on the Internet. One might imagine that removing the option for being anonymous would remove the motivation for the behavior, but in this case, the solution would arguably be worse than the problem. In part one of this series, we discussed free speech – one of our most important rights – and the importance of anonymity. Both have played a huge role in the very creation of our nation and continue to protect those who would speak out about abuses, even as said anonymity enables other kinds of abuse. What are we to do?

In Part 3 of this series we will discuss what we can do and what is being done – both legally and societally – to limit damaging cyber behavior.

Subscribe to our free and informative weekly forensics newsletter!

Related Posts

Email spoofing, scamming, and hacking

Email spoofing, scamming, and hacking, Copyright 2024 by Steve Burgess Email domain spoofing scams With fortunes, privacy, and identity fraud at stake, we have had a number of cases involving phishing and spoofing in the past few years and into the present where...

AT&T Data Breach and Hack: What Does it Mean to Me?

AT&T Data Breach and Hack: What Does it Mean to Me? copyright 2024, Steven Burgess It was ginormous. It included almost all wireless customers from 2022. Did you have an AT&T phone or other account in 2022? You’re one of 110 million (gasp). You be hacked, my...

Somebody deleted stuff off my phone (I swear it wasn’t me!). Can I get it back?

- Copyright Steve Burgess 2024 Your phone is suddenly losing text, videos, photos. What’s happening? Are they gone forever? Have I been hacked? How do I avoid this in the future? What’s happening? Of course, it’s hard to tell without some history of the phone’s use,...

CSI Cases from Burgess Forensics #69 A Case of Hiphop Beef

The Stories are true; the names and places have been changed to protect the potentially guilty. It was almost closing time on Friday and my thoughts were turning to Barbequeing some of that mouth-watering Santa Maria tri-tip while my nose was turned to the scent of...

Email as a signed contract vs. fraudulent emails

Email as a signed contract vs. fraudulent emails We all send and receive email, but did you know that what you say in an email can be interpreted as a legal contract? And that sometimes, emails are fraudulent? Both are true. The Statute of Frauds Although email didn’t...

El Salvador Adopts BitCoin

El Salvador Adopts BitCoin copyright Steve Burgess, 2021 El Salvador just passed a law to make BitCoin (BTC) legal tender and is the first country to do so. It did something similar back in 2001, when it made the US Dollar the official currency, replacing the...

Keeping Your Bitcoin Safe

BitCoin. Everybody wants some. But what’s the best way to keep it safe once you’ve got it? And how to get it? First things first – you get BitCoin (and Etherium, and DogeCoin) from a cryptocurrency exchange, like you would from a “regular” currency exchange to turn...

Cyberbullying and Covid-19: 2021 Update

California defines a cyberbully as anyone who sends any online communication to deliberately frighten, embarrass, harass, or otherwise target another. The Cyberbullying Research Center defines it as “willful and repeated harm inflicted through the use of computers,...

Cybersecurity & Covid-19: Vulnerability and What to Do About It

Cybersecurity & Covid-19: Vulnerability and What to Do About It Steve Burgess, 2020 As if we didn’t have enough to worry about. With so many of us working from home (close to 90% of American corporations are encouraging or requiring employees to do so) and having...

Indian Summer Lovin’ – Tech Tips For a Warm Autumn

by Natalie Miller, 2019 With Indian Summer temperatures rising, here are some tips to help you make sure your devices are ready to conquer these warm days of Fall like you are. Check Those Pockets! Taking a dip in the pool, going for a paddle in a kayak, and jumping...

Pin It on Pinterest

Share This