• Home
  • Buy the Book
  • More ebooks
  • Reviews
  • Ethel Is Hot LOL
  • Free resources
    • For Educators
  • Hot Topics blog
  • News & Press
  • About Us
  • Contact

Tween rival gets girl arrested after setting up an Imposter Profile

2/11/2022

0 Comments

 
The Daily Mail just published a story about a 13-year-old girl near Miami, FL who was arrested for making online threats against students and staff.

The police arrested the wrong girl.

It was later discovered after much digging, that a 12-year-old rival to the girl had used her rival's personal information to set up false emails and Instagram accounts under the accused girl's name.

According to the story, "The 12-year-old girl believed to be behind the threats has now been charged with written threats to kill or do bodily harm, falsifying a police report, penalty for disruption of an educational institution, and criminal use of personal information."

Now, if the adults at this school as well as the police understood that this was a cyberbullying tactic we have termed in our book Cyberslammed as an Imposter Profile, they would have had the knowledge to prevent the trauma to this young innocent girl.

The accused girl's lawyer, Marwan Porter, said in a statement Thursday (as reported by The Daily Mail): 'It is very clear that the Pembroke Pines Police Dept. and others involved, failed to conduct a basic investigation into the false allegations which resulted in the arrest and severe emotional damage to my client."

Get familiar with the Imposter Profile tactic by reading our past blogs on this issue.

0 Comments

Teens addicted to social media more likely to cyberbully study says

4/1/2021

0 Comments

 


Science Daily reports on new research that has just come out of The University of Georgia that shows increased screen time with male adolescents leads to potentially more cyberbullying behaviors.

According to the article, "Cyberbullying can take on many forms, including personal attacks, harassment or discriminatory behavior, spreading defamatory information, misrepresenting oneself online, spreading private information, social exclusion and cyberstalking."

With Cyberslammed, we already know that this results in the tactics of Digital Pile-ons (harassment or discriminatory behavior) and Imposter Profiles (misrepresenting oneself online) to name a few.

Anonymity is driver

A key finding to a cyberbully's motivation is all about evading consequences "Oftentimes, they are more aggressive or critical on social media because of the anonymity they have online and their ability to avoid retaliation," said Amanda Giordano, principal investigator of the study and associate professor in the UGA Mary Frances Early College of Education.

Social media addiction=dopamine hit

Like all addicitons, the little switch in the brain that turns on when there is a reward also fuels cyberbullying.

"Social networking sites are designed to give people a dopamine hit, Giordano added, and some people compulsively look for that hit. "It's feeding into that addictive behavior, and they may be using cyberbullying as a way to get likes, shares, comments and retweets," she said.

Read the full article here.


0 Comments

Zoom cyberbullying, a new twist on an old Imposter Profile tactic

2/25/2021

0 Comments

 
When we published Cyberslammed in 2012, we knew that technology was going to change so much in the coming years and that the platforms we mentioned in the book (Facebook, Twitter, YouTube) would not be the only tools cyberbullies would use in the future.

CBS Sacramento reports that cyberbullying is on the rise with remote, at-home learning. No surprise there. According to the story, for some students, bullying is taking place during the classroom Zoom calls. The story reports: “A student will change their name to [my daughter's name] and then say different slurs like ‘you’re ugly today.’ In particular, they told her to kill herself,” said one parent.

The ugliness is never-ending, but the tactics are the same.

We didn't know about the Zoom platform in 2012. What we do know is that what these kids are doing to this woman's daughter is a form of an Imposter Profile, a cyberbullying tactic in which the perpetrator(s) create a fake social media account in the name of the person they are targeting to get everybody to believe the account is owned and maintained by the target.

With an Imposter Profile there are ways to identify the perpetrator, combat the problem with the help of the school, and in some cases, the police, and transform the traumatic bullying.

Teachers and parents: here's how to report to Zoom if someone is misusing their platform.

As far as the "go kill yourself" comments, a tiresome and predictable product of an ugly mindset, we address that in a past blog: read here.

Get familiar with the Imposter Profile tactic by reading our past blogs on this issue.

0 Comments

Imposter Profiles target Denver teens

7/19/2018

0 Comments

 
Picture
In Denver, school officials found out the hard way the lengths to which students will go to impersonate "official" Facebook pages of the Denver Public Schools (DPS), creating unsupervised places for teens to cyberbully each other.

These "fake Facebook profiles"  are in fact, Imposter Profiles, the term for one of the six cyberbullying tactics we discuss in Cyberslammed.

An Imposter Profile is set up to deliberately confuse and mislead the public to believe it is owned by someone else (usually the target of cyberbullying).

In this case, the teens set up the Imposter Profile to resemble an official DPS page in order to cyberbully unsuspecting students. Once the real DPS got wind of it, however, they shut it down.

Has your teen been a victim of the Imposter Profile tactic? Buy our book online to determine how to Understand, Prevent, Combat & Transform this tactic.

​Source: The Denver Channel.
0 Comments

Another 10-year-old victim of an Imposter Profile

1/13/2017

0 Comments

 
Picture
Photo courtesy CBC news
Here's another story this week about a 10-year-old girl from Canada who found herself targeted by a group of girls at school.

According to CBC News, the mother made a Facebook post stating "a group of girls her age (10 yrs old) created a profile under her name... and have been commenting on (friends) photos telling them to go and kill themselves."

Most parents still don't know what this is, so we'll tell you. It's called an Imposter Profile, a cyberbullying tactic, in which the perpetrator(s) create a fake social media account in the name of the person they are targeting to get everybody to believe the account is owned and maintained by the target.

The article doesn't offer much in the way of resolution to this common tactic, we have an entire chapter dedicated to how to prevent and handle it in Cyberslammed, including when to bring in the school, the police or even the law.

As far as the horrible comment of "Go kill yourself" we have seen that tactic over and over again in cyberbullying as a way for the perpetrator to emotionally destroy someone. In school presentations I've done, I've told kids time and again to mentally prepare themselves for that phrase and to come up with self-talk ahead of time to protect themselves against it.

Here's hoping that little girl will be able to find strength and resilence and that her school will have a cyberbullying policy in place (also included in our book!).

Buy Cyberslammed online or contact me for a signed softcover copy.



0 Comments

Dad battles son's cyberbully on fake Twitter, Instagram accounts

4/4/2016

0 Comments

 
A San Antonio father spoke to News4sa.com about the horrendous treatment his 17-year-old son received via a fake Twitter and Instagram accounts this month. The accounts were a version of what we call an Imposter Profile (a cyberbullying tactic that sets up an anonymous account to dupe the viewer in believing it is owned by the target).

According to News4sa.com, Leo Vasquez said:
"When I saw the Twitter accounts and really the content of the attacks and how vile and malicious and disgusting they were, that's what really upset me."


The bully created fake, anonymous Twitter and Instagram accounts to try and terrorize Vasquez's son, Matt, who'd been battling lymphoma for the last two years.

Compounding Vasquez' frustration, law enforcement provided little help and they couldn't determine how to unmask the cyberbully, who would just recreate a new account after the old one was deleted.

The only way to cut through this red tape, as we outline in our award-winning book Cyberslammed, is to work with an attorney to obtain a subpeona.

As Texas happens to have a cyberbullying law that outlaws cyber-impersonation, this subpeona could be used to unmask the perpetrator electronically so that they could move forward with criminal charges.

Learn how to protect yourself and what your state laws are. You are not helpless to fight this!

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying.  Buy The Book



0 Comments

 Imposter Profile created because perpetrator was jealous

11/2/2015

0 Comments

 
It took the Federal Investigation Agency (FIA) nearly 1 1/2 months to track down and arrest a 21-year-old Pakistani college student after cyber harassing a former schoolmate through an Imposter Profile he created in her likeness.

When media is not familiar with this cyberbullying tactic, they typically call it a "fake website" or "fake Facebook account." What happened was, the young man had been friends with the victim, but when he perceived her to brush him off and show interest in another boy, he decided to "punish" her by creating an Imposter Profile. This is when the cyberbully sets up a website or profile and gets the profile's followers to believe it is genuinely owned by the target. This kind of tactic has a lot of power and the cyberbully can do immense reputation damage in a very short time.

Read the entire story here.


If someone you know is an unwitting victim of this type of cyberbullying tactic, get information fast on how to work through and resolve it with the police.  $12.50 Buy The Book
0 Comments

Imposter Website victim puts the past behind her

3/26/2014

0 Comments

 
It's always a relief to hear a cyberbullying story with a positive outcome. In this Washington teen's case, she found the resilience to move on...something that doesn't always happen for teens.

According to the Issaquah Press, in 2011, "then 12-year-old Leslie Cote was the victim of cyberbullying, as two classmates hacked into her social media page and posted altered photos, including one with 'I’m a slut' superimposed on it."

For parents and educators wondering what this tactic is: it's called an Imposter Profile, when the cyberbully sets up a fake website or profile (or hacks into a real one as in this case) and gets the profile's followers to believe it is genuinely owned by the target. This kind of tactic has a lot of power and the cyberbully can do immense reputation damage in a very short time. Another subtactic the cyberbullies used was "slut-shaming"--to try and publicly make Leslie feel guilty or inferior for certain sexual behaviors (even when she didn't engage in them!)

The article further states the cyberbullies altered their attacks by using "the site’s instant messaging service to act as Leslie to proposition boys for sexual acts." Again, this is still using the Imposter Profile tactic, only now the cyberbullies were actively communicating through IM as though they were Leslie with the sole purpose to embarrass and defame her reputation. Subsequently, the girls were charged with cyberstalking and first-degree computer trespassing.

The summer after this incident, Leslie wouldn't even go outside all summer as one of her cyberbullies lived in the same building as her.

Now Leslie is in high school with some of the girls who cyberbullied her and even has to sit next to one of them in one class. But, luckily, the support of her family and her own strength and resilience has helped her gain perspective.

As the article quotes her mother Tara:  "Leslie said she’s not angry with the girls anymore, but it has taken her some time to get to that point. At first, you have anger, you’re upset and you have rage, but now I think she feels more sorry for them."

For anyone who has ever been cyberbullied, it's gratifying to know there are kids like Leslie out there who refuse to let the traumatic incident forever define them. Good for you, Leslie. Stay strong and thank you for helping other kids after what you've been through.

To read the full article: http://www.issaquahpress.com/2014/03/25/cyberbullying-victim-puts-past-behind-her/



Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Sale: $12.50 Buy The Book
0 Comments

New cyberbullying novel for tween girls available on Amazon Kindle

3/14/2014

0 Comments

 

She stared at the website they made about her.
As she switched it off, her body began to tremble.

Picture
WAH-LAH!  (Yes, we know that is not correct French.) Here is the latest cyberbullying novel from Kay Stephens, award-winning co-author of the cyberbullying guide for adults, Cyberslammed™

Ethel Is Hot LOL features twelve-year-old Ethel F. Effleby, who goes to the Seaside School for Girls, a science and leadership middle school in Maine. After moving in with her Gram, Ethel is just fine with her oddball self until a group of girls create a website called Ethel Is Hot LOL!! making fun of her and her family secrets. When the cyberbullying gets so bad that she has to face her enemy, Stephönë on national TV, Ethel confronts her greatest fear yet. To clear her name will she have to expose her humiliation to the world?

Buy $.99

Email us if you'd like to review the new novel and receive it for free! [email protected]
0 Comments

How Parents Can Protect Their Kids From Imposter Profiles

7/26/2013

0 Comments

 
Five Town CTC and I have collaborated on a column to address the national news in Maine (our home state) concerning the death of Glenburn teenager, Nichole Cable and information on what parents and teachers can do concerning youth online safety.

A 20-year-old acquaintance Kyle Dube was indicted with murder and kidnapping in connection with Nichole Cable. From the news reports, he got her to meet up with him by luring her to a remote wooded area under the guise of a fake Facebook account, or what is known as an  “imposter profile,” in which she believed she would be meeting the real owner of the Facebook account.

Understandably, situations like these heighten parents’ fears about their children’s safety online. Here are some suggestions on how to broach this topic with your own children.

An imposter profile is when someone creates a fake website or social networking profile in order to deceive the target.  In this case, the predator stole the identity of someone Nichole may have possibly known in real life and communicated with her through this imposter Facebook profile. The imposter profile has since been deleted and my understanding is that the FBI fully investigated it. 

I have not spoken to the family nor to the police, so I cannot speculate as to why Nichole trusted this man and chose to meet up with him.

What we do know is that predators often “groom” young boys and girls online by befriending them and finding out what they like, what hurts them and what makes them tick in a short amount of time. It’s incredibly easy to find a wealth of information on a teen simply by requesting to be a friend on Facebook. Once the teen accepts the friendship request, the predator looks at what kind of media/music/movies the teen likes, what drives his or her personality and what “angles” they can use to manipulate the impression of having common interests. For example, the predator sees what bands the teen likes on his or her Facebook page and stores that as nuggets of conversational “bread crumbs” by casually mentioning: “Oh you like One Direction? I like One Direction too!” From there, the common interests quickly lead to personal revelations and “heart-to-heart” talks. Pretty soon, the teen feels like he or she has someone special who deeply understands them and might be the only one who knows what they are going through.

What parents/teachers can do.

As upsetting as this situation is, Nichole’s story needs to be told to your teenagers as a talking point. Here is an excellent list of tips in how to guide this conversation.

Meeting People Online: Dos and Don’ts of Online Relationships for Teens

The number one rule I tell teens is “Don’t friend anyone on social media that you don’t already know in real life and trust 100%.” Everything you upload for content can be used against you, whether to “groom” you for nefarious purposes or in cyberbullying situations as content to be repurposed for malicious reasons.

So many teens shrug off this advice thinking, “Oh, she’s being alarmist. It’ll never happen to me.”

It happened to Nichole and that’s why her story needs to be told.

The other suggestion I‘ve repeatedly made to parents is to implement www.uknowkids.com app on your teen’s cell phone, Facebook, Twitter and Instagram accounts.  This free “parental intelligence system”  instantly alerts you via text or email if any keywords your teen and someone else are using contain language around cyberbullying, sexting and predatory grooming. You’ll also know whom exactly your teen has accepted as a friend on social media without compromising his/her online privacy.

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Summer Sale: $12.50 Buy The Book
0 Comments

Imposter Profile Tells Girls 'To Go Kill Themselves'

11/15/2012

1 Comment

 
In Cyberslammed, Hot Topics, we discuss cyberbullying tactics that come from real-life news stories and insights on how to "identify, prevent, combat and transform them."

Minnesota-Recently a group of female high school football fans from one team got into it with fans from a rival team and is so often the case, they took their fight online.

A story in Fox9.com reports:

"Officials say at least one of the bullies made a post on Facebook urging a group of girls to go kill themselves...

Investigators say the suicide posts came from a fake Facebook account, and they're still trying to track down exactly who is behind it. "

[Note: If you've followed this blog, you'll know that a "Fake Facebook account" is what we call an Imposter Profile--a website or social networking profile set up by the perpetrator to appear as if it is owned or maintained by the target.]

The story goes on to say:

"Parents should be aware that what they send is often electronically traceable," Hattstrom warned. "If it's offensive or threatening in any nature, basically, you're going to hear from the Police Department."

Kids know that the "Go kill yourself" hot button is the ultimate insult/torment these days, particularly with the rash of international and national suicides that have been linked to cyberbullying this fall. I had a kid ask me yesterday, "How do you know if you're being cyberbullied?" as in when is it a prank and when does it get real?

According to Cyberbulling Research Center, the true definition  of cyberbullying (which we use in the book) is: "willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices."

A one-time prank where someone steals your password to your social networking profile and writes some mildly teasing or obnoxious words, while unpleasant, is not really cyberbullying. It's misconduct or peer harassment. But true cyberbullying is a calculated campaign. Keep in mind the words "willful and repeated harm."

Any time some one is threatening you, telling you to go kill yourself, using extremely derogatory language, publishing your private information, defaming you, libeling you....any time words and intent cross the line into criminal behavior, that's when you know it is real. And that's when it is advisable to bring the police into the situation.

Case in point: this story of a Veazie, ME target of criminal threats brought the police in. And in no time, they found out who the perpetrator was. Kids need to understand that just because you know how to write an anonymous comment via an anonymous account, you are never anonymous. Everyone leaves a digital footprint behind with every keystroke and the police, cyber crimes units and the FBI know exactly how to find the source of every electronic communication.

The rest of the article states:

"Police say they recognize there is a fine line between free speech and harmful threats, but they say charges are possible in this case. If students are behind the anonymous bullying, they will also face punishment from the Anoka-Hennepin School District."

Free speech does not lend itself to threats of any kind. In both the Minnesota and the Maine case, girls crossed the line, venting their frustration, their fears and their anger into something much more malevolent and lasting. And prosecutable. Unfortunately, most cyberbullying cases do not get the attention they need until they are at the highest threshold and become policeable. We need to have in-class or at-home training with our kids about cyberbullying before it's even at its lowest threshold to help them channel potential negative emotions into better outcomes.  Stay posted to this blog for more real-life examples of the most common cyberbullying tactics and what Cyberslammed and other Maine resources are doing to provide school trainings.

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Summer Sale: $12.50 Buy The Book

1 Comment

Target of Imposter Profile Sues For Defamation

9/27/2012

0 Comments

 
The Supreme Court is about to rule on a Facebook Imposter Profile case of a Canadian teen.  "The case pits the media's right to report on court proceedings against the inherent vulnerability of young girls subject to online sexualized bullying and the risk of harm if they're required to reveal their identity and republish comments, according to court documents."
Full story below:

story originally from: The Montreal Gazette

Supreme Court to rule on Facebook cyberbullying case  
By Natalie Stechyson September 26, 2012


OTTAWA - A teenage girl who says she was a victim of cyberbullying will find out Thursday whether she'll be able to keep her name and what was written about her on a fake Facebook profile out of the public eye.

The Supreme Court of Canada will announce in a judgment Thursday whether the Nova Scotia girl known only as A.B. can keep her name and the alleged defamatory statements said about her online under a publication ban, while she tries to sue the person or persons responsible for defamation.

It's the first time the Supreme Court has taken on the topic of cyberbullying, and a number of interveners - including a national media coalition, the privacy commissioner of Canada and Kids Help Phone - have chimed in on both sides of the case, which was heard in May.

The case pits the media's right to report on court proceedings against the inherent vulnerability of young girls subject to online sexualized bullying and the risk of harm if they're required to reveal their identity and republish comments, according to court documents.

What's at stake is the open court principle, which is what lets the public understand and scrutinize what's happening in the courts, said Marko Vesely, a Vancouver lawyer who represented the British Columbia Civil Liberties Association, who also acted as interveners in the case.

"Like the old saying goes, 'sunlight is the best disinfectant'. Having the courts open to scrutiny is what gives us all confidence in the court system," Vesely said.

Anytime a court declares something defamatory, it's a restriction on freedom of speech, Vesely said. And it's concerning if that's being done without being open to the public, he added.

But a child's safety should come before any discussion of openness, said Rob Frenette, the co-executive director of BullyingCanada.

Putting A.B.'s name and the details of what was written about her out into the public will likely just further victimize her, he said. And, if she does have to reveal these things, it could scare other cyberbullying victims from getting help, Frenette said.

"As students come forward to us about being bullied we need to ensure their identity is protected, simply because they feel that if they come forward...they could become more susceptible to bullying," Frenette said.

In 2010 A.B. found that someone had made a fake Facebook profile using her image and a slightly modified version of her name, according to court documents filed last year. The profile allegedly included "scandalous sexual commentary of a private and intimate nature," the documents say.

In pursuing a defamation case, A.B. has requested that the identity of the person behind the IP address linked to the profile be released by telecommunications company Bragg Communications - a request that has not been opposed.

But she also sought an order to allow her to proceed with a pseudonym and a partial publication ban. This order has been denied by the lower courts.

A.B.'s counsel has argued that the previous courts failed to take into account the special vulnerability of children, according to court documents.

According to UNICEF Canada, who also acted as interveners, some of the risks to victims of cyberbullying can include physical and emotional health problems, depression, eating disorders, nightmares, and acts of self-harm, including suicide.

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying.  Sale: $12.50 Buy The Book

0 Comments

Imposter Profiles on Facebook Target 8th Grader

9/6/2012

1 Comment

 
Texas 8th grader Brianna Sosa, 13 decided to go to her local news channel and tell her story after a summer of vicious cyberbullying.
According to Valleycentral.com, "The teen said it’s been going on the entire summer and it all started over a boy.

Sosa claims several girls have been attacking her and even creating fake accounts on Facebook under her name.

'They are just saying a whole bunch of stuff about me, mean ugly mean stuff,” Sosa said. “And that same girl made a fake profile of herself telling everyone it's me.'"

The term is: Imposter Profile. It's one of several tactics that her cyberbullies used to denigrate her and break her down. They also participated in a Digital Pile On when they began bombing her Facebook page with mean and nasty comments.
"Brianna's mother tells Action 4 News she forced her daughter to delete her Facebook account when she found out about the alleged cyber bullying, and began documenting all the postings and alleged fake profiles."

The mother did the right thing, first by shutting down anything on Brianna that could be used against her and by starting a paper trail of evidence to show police or even attorneys, if necessary.

There is so much more one can do to prevent and combat these tactics before they happen to YOUR kid. Cyberslammed will show in depth how to do this, in a logical step-by-step fashion.

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying.  Sale: $12.50 Buy The Book

1 Comment

Imposter Profile to kick off the new school year

8/30/2012

0 Comments

 
School hadn't even started for this Arizona boy when an imposter website set up in the boy's name threatened to ruin his reputation. According to The Sahuarita Sun,  "The trouble started late Saturday night when the child checked his Facebook page and discovered the phony page. The still-unknown creator of the page had replaced the boy’s last name with a sexual euphemism and portrayed him as homosexual.

The page also said that the boy was planning to start a fight at school the following Monday. In addition, photos taken from the Facebook page of his mother were used on the fake page, including a photo of the boy as a baby being held by his grandfather.
"

To read the full story go here.

Two points worth noting here, no three--

1. Defuse The Words The most common insults that are used to cyberbully both straight and homosexual kids are the words "gay" or "fag"--and for girls, they are commonly "whore or slut."
Come up with what we call “pre-play” strategies with your teens for potential conflicts or ones that are already occurring. Pre-play the use of this word in a potential cyberbullying situation and devise a number of ways they can choose to react to it.  Bullies know these words hold power and hurt when wielded publicly. Teach teens to strip the power right out of these words. Now, how do you do that in a realistic situation? (Not some "the More You Know" type of public service announcement advice that make teens roll their eyes right out of their heads.)  Besides the classic advice of "ignoring it," I just looked to see if there were any verbal techniques to handling this--all I could find is a yahoo thread giving advice. Some of this advice just antagonizes the aggressor, some of it is just dumb, but I saw one or two lines in there that seemed realistic enough to demonstrate to the cyberbully that the teen isn't all that bothered by their use of the word (i.e. disabling the power.) Modifying one piece of advice in here, I especially liked the mature approach:

"Say 'Dude I'm not gonna play your game. Just because you say that I am doesn't mean i am. Sorry to disappoint you."

2. Ditch The Conflict "The page also said that the boy was planning to start a fight at school the following Monday."

The article doesn't give enough detail about this, but suffice it to say, the boy was fully in conflict with someone or a number of people offline before the incident happened. As we keep saying, the problem is the behavior, not the technology. No matter what age your teen or tween is, your teen is always going to encounter conflict with a classmate, a friend, a romantic partner, at some point.  And whatever conflict that starts offline has the potential to go online and vice versa. Our Imposter Website chapter provides specific conflict resolution exercises to help teens avoid the behaviors that get them enmeshed in this tactic.

3. Protect your online privacy "In addition, photos taken from the Facebook page of his mother were used on the fake page, including a photo of the boy as a baby being held by his grandfather."

Parents--we can't say this enough-you contribute to your own children's cyberbullying when you inadvertently allow the public to view photos/video or any other sensitive information about your child. If the cyberbullies can't find something on your kid, they'll look to see who else they can "lift" content from. So be vigilant about keeping your social media profile protected from public view.  Teach your kids to keep their online content (called their digital footprint) private and neutral. With their online comments, postings, video, photos, etc.— it’s all traceable—and highly usable to a potential cyberbully. Get them in the habit of self-monitoring everything they transmit through Facebook, Twitter, texting, etc. and see if any of their content can be used against them or can start or add conflict to something else.


Have a safe start to the school year.

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Sale: $12.50 Buy The Book
0 Comments

Imposter MySpace profile: what to do?

6/1/2012

0 Comments

 


We have copied this from our recommended Internet Safety forum, ConnectSafely as well as the MOD's response to this young man as a way to take action in a similar situation.
Query

To make it short i am a 16-year old public school student who recently recieved a phone call from a friend saying that, someone has made a myspace as you.

So not to be a homophobe but it said all this stuff about how i was gay, not only that someone took the time to customize the myspace, with tons, and tons of half nude gay men. Now usually ive asked all my friends and nobody knows anything, i have 2 guesses about who it is but, they wont admit to anything.

Ive told my parents but it seems to have backfired, they just said tonight that im signed up for catholic school indefinitly. I dont want to go into a different school, but, by the time september rolls around and it hasnt disapear or has gotten worse,it may be the only solution.

I just wish that one of the 2 kids would have the balls to man up and say it was them it would save me alot of troube, because if i pick the wrong one to get in a fight with...well it would be a mess.

Also i was wondering if there is any legal consequences, my school really has no rules about this, im from philadelphia but now i live in this hick new jersey suburb, and i would just love to find out who this redneck is so i can set his cornfield ablaze and slash his tractor's tires,im only kidding. id really like some answeres/suggestions on what to do, thanks

***
MOD Response

I'm so sorry this has happened to you. It's definitely a tough situation to resolve because there are bullies and harassers out there who seem to have too much time on their hands and just create a new one as soon as a profile gets deleted. I suggest 2 things: 1) Start the process of getting your imposter profile deleted by emailing [email protected] with its URL and your situation or - better - just go to this page in MySpace's Help section to find out what they need to delete it. Give it a week or so because, with more than 100 million profiles, MySpace gets a few requests like this. Let us know (after you give the process a chance) if it drags on too long. 2) If you can, try to have a calm, unemotional conversation with your parents about how MySpace works - how anybody can create a profile about anyone for free in a very short amount of time, that this is usually just fine and a great vehicle for self-expression and keeping in touch with friends but can also go very wrong. For just a few examples of the downside, they click around these search results in NetFamilyNews. If they'd like, they can email us at [email protected] (if they need this coming from someone besides you).

I think you're smart to try to do some info-gathering yourself, but I'm sure you're kidding about and already know that picking fights rarely works (physical ones, I mean, since somebody already started a digital fight, it appears). It's important to remember that the more strongly you react the more gratification a bully gets (which usually only perpetuates the problem, so it's a good idea to ignore his/her behavior as best as you can can while you're getting the profile taken down. Don't give this person any "power" or satisfaction with a big public reaction (not that you would).

I hope this helps a bit. All best,
Anne
--
Anne Collier
ConnectSafely co-director


Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Sale: $12.50 Buy The Book

0 Comments

How To Sleuth Out A Cyberbully

5/17/2012

0 Comments

 
In the frustrating situation where you or someone you care about is being cyberbullied and you don't know who it is, there are ways to glean information even before you go to the police. Take Allison Pfeiffer, a teen who was targeted by an Imposter Profile that referred to her as a cow (among other nasty names) with the intent to ridicule her. She tracked down the email address used to establish it and turned the information over to police who tracked down the two people who created it.
Anytime you create any information electronically you leave personal information, like breadcrumbs behind. From so many people we've spoken to in our cyberbullying prevention workshops, not many parents or educators are aware of this--and even fewer teenagers know the kind of personally identifiable information they leave behind.

This is in your favor if you are trying to sleuth out a cyberbully. Did you know, for example, that just by clicking on someone's website, your computer's IP address is captured? This is a series of numbers that uniquely identifies your computer. A website owner can "see" some identifiable information just from looking up your IP address. Try it yourself. By using a technique called reverse lookup, you can find out information on your own Internet Service Provider (which includes what state you live in.) However, it's not that easy for an individual to find out your identity through this IP address, because privacy laws prevent Internet Service Providers giving out user information to just anyone.

Some of the links below will help you in your search to sleuth out an anonymous cyberbully.

How To Trace An Anonymous Email Address

How To Find Out Who Owns A Website

How To Get Someone's Computer's (IP) Address, then use The Reverse Lookup Tool.

How To Trace An Anonymous Cell Phone Number



As always, in providing this information, our intent is to help the targets of cyberbullying regain some power in combating their situations. Do not use this information to reverse cyberbully.
0 Comments

Megan Meier: Anatomy of Multiple Cyberbullying Tactics

5/15/2012

0 Comments

 
Whenever we write about the kids who have fallen victim to the most malicious forms of cyberbullying, it's easy to get emotional and very angry.

But
to help other victimized teens find the strength to make a different choice, we have to stay focused and study what went wrong. If you don't already know  Megan's story, click here.  We wrote to Megan's mother, Tina, asking for her permission to include the story of Megan's Imposter Profile in our Introduction to Cyberslammed. She wrote back, granting us permission, adding, "My hope is that through the continued awareness from people around the world that we will help children and their families."

So to honor Megan, we will use this space to talk strategically about what tactics were used and how to identify and avoid them.

On The Internet, no one is exactly who they appear to be. That is Lesson #1 when it comes to your kids.  We're not just talking "stranger-danger"--we're talking about enemies who pose as friends. You have to train your kids to be wary at a young age when it comes to any online communication. That will be their first line of defense when someone tries to befriend them on the 'Net on MySpace, Facebook, Bebo or any other social networking website. Tina was actually monitoring Megan's profile, had all her passwords and knew that she was talking with a boy, "Josh Evans." In Megan's case, she immediately trusted that "Josh" who befriended her was real. After all: there was his photo, his bio, his preferences. And he had a line that was sure to melt the heart of a 13-year-old girl.

"when i was 7 my dad left me and my mom and my older brother and my newborn brother 3 boys god i know poor mom yeah she had such a hard time when we were younger finding work to pay for us after he left."

Yet, all of this was fiction, set up by Tina Meier's neighbor, Lori Drew. Yes, an adult had set up this Imposter Profile with the intent to deceive a 13-year-old girl because her daughter had had a falling out with Megan. As noted on the Megan Meier Foundation's website, Drew set up the Imposter Profile to find out what Megan might be saying about her daughter.

As the story goes, one day, "Megan received a puzzling and disturbing message from Josh. Tina recalls that it said: 'I don't know if I want to be friends with you anymore because I've heard that you are not very nice to your friends.' "

From there, the Imposter Profile morphed into multiple cyberbullying tactics, as they so often do. Next, "Josh" shared some of Megan's private messages with a larger group of bystanders. There is not a name for this tactic (yet), but sharing private messages with an unintended third party as a way to incriminate the target seems to be a preferred method of teens who may not even realize it is cyberbullying. According to a 2010 study done by authors Dr. Justin Patchin and Dr. Sameer Hinduja of the Cyberbullying Research Center, "When asked about specific types of cyberbullying in the previous 30 days, mean or hurtful comments (13.7%) and rumors spread (12.9%) online continue to be among the most commonly-cited.

Lesson #2 Teach your kids never to reveal any personal or sensitive information online. Do not gossip online or share someone else's private messages even with people they know and trust. Anything electronic is proof and can be misused very badly against the poster in a way he/she never envisioned.

Next, the bystander group whose MySpace accounts were linked to the fictitious "Josh" account began to attack Megan online. The cyberbullying tactics turned to a Digital Pile On. This is when a ringleader gets his or her minions to "pile on" the target with mean, hurtful comments. Within this tactic, there was yet another sub-tactic: the followers were posting bulletins about Megan through MySpace, which are considered "fun online surveys",  but these survey topics were designed to be cruel and ranged from: "Megan Meier is a slut" (subtactic: "slut-shaming") to  "Megan Meier is fat." This subtactic is very similar to a Rating Website, outlined in Cyberslammed as well.

As the Digital Pile On progressed, Megan tried to defend herself online using vulgar language, unwittingly opening herself up to more cyberbullying.


Lesson #3: Don't Want Another Attack? Don't Fire Back. Experts consistently say the worst thing a target can do is to react with anger online. It is exactly the reaction the ringleader and his/her minions are looking for and it opens the way for harsher attacks. The best thing one can do is immediately get offline and put together a strategy to address the situation with adults.

The day Megan died, her father found what he believed to be the final message Megan saw, but it couldn't be retrieved from her hard drive. To the best of his recollection it said, "Everybody in O'Fallon knows how you are. You are a bad person and everybody hates you. Have a shitty rest of your life. The world would be a better place without you."

To read more of this convoluted case, including its legal outcomes and how this case became the foundation for a new law, click here.

The last thing we will say about this: In the age of new technological tools and fads, it is increasingly difficult to shield our teens from harmful intent online. So we must prepare them to be vigilant about their own safety, cautious about what they choose to reveal and to whom, strategic in the way they (as well as the parents) choose to resolve the conflict  and lastly, resilient in the face of electronic defamation and harassment.


Know what to do a group viciously gangs up on one person through Facebook, Twitter, Ask.fm, a group chat, comments or Instant Messaging.? Our new Parent's Guide To A Digital Pile On is now available on Kindle for $2.99.
$2.99 on Kindle
0 Comments

Teen's Facebook Sex Scam: A Cyberbullying Twofer

5/2/2012

0 Comments

 
File this one under Imposter Profile and Sexting

We're going back nearly two years for this one, but it illustrates how manipulative a person can be one one side of the computer screen and how naive and unaware the target can be on the other side.

Click for CBS video of the story.

Teen Facebook Sex Scam

An 18-year-old Wisconsin teen set up three Imposter Websites, posing as girls in his high school, then sent explicit emails to lure more than 31 boys at his high school to engage in Sexting. The perpetrator provided phony nude pics of the girls and the boys, naturally, sent nude photos of themselves to the Imposter. More than 300 nude photos of his male victims were found on his computer. He then blackmailed a few of them to engage in sex with him, rather than have the photos see the light of day.

The 18-year-old teen was charged with 12 felonies.

Use these stories on this blog as a way to broaden your knowledge of cyberbullying tactics and share them with your kids to heighten their defense. Anyone can be tricked by an Imposter Profile, which is why it is so important to keep your social networking circle small and verified.  In Sexting, much of the perpetration statistically is aimed at young women, but in this case, more than 31 boys were duped by what Nancy Willard, MS, JD, Director of the Center for Safe and Responsible Internet Use, differentiates as “Cyberbullying Sexting.” This is when the perpetrator uses Trickery to get ahold of precious photographic "currency" and and Blackmail to get the target to do something in order to avoid dissemination of the image.
0 Comments
    Picture

    Cyberslammed
    Hot Topics

    Cyberbullying tactics in the news, expert advice from contributors and prevention tips for parents, educators and kids.

    RSS Feed


    Blog Comment Rules

    All comments are pre-screened before posting. Anonymous comments will not be allowed. Keep it civil and on topic. No harassing or personal attacks; even if you disagree with something, please do it respectfully.

    Categories

    All
    After School App
    Anonymous Apps
    Anxiety
    Ask.fm
    Bulletins
    Burn Book
    Cell Phones/smart Phones
    Cyberbullying Policies
    Deepfake
    Digital Pile On
    Ethel Is Hot (LOL)
    Expert Contributors
    Facebook
    Formspring
    Funstagram
    "Go Kill Yourself"
    Google+
    Hater's Club
    Homophobic Cyberbullying
    Identifying Cyberbullies
    Imposter Profile
    Instagram
    Kik Messenger
    Myspace
    Parent Contracts
    Rating Website
    Sexting
    Slut Shaming
    Slut-shaming
    Snapchat
    Streetchat
    Text Bombing
    Tween Novels
    Twitter
    Videojacking
    Whisper
    Yelp
    Youtube
    Zoom

    RSS Feed

    Archives

    February 2022
    April 2021
    March 2021
    February 2021
    October 2020
    July 2020
    April 2020
    February 2020
    July 2018
    December 2017
    October 2017
    January 2017
    November 2016
    September 2016
    July 2016
    April 2016
    February 2016
    November 2015
    September 2015
    July 2015
    June 2015
    May 2015
    April 2015
    January 2015
    November 2014
    October 2014
    September 2014
    April 2014
    March 2014
    February 2014
    January 2014
    November 2013
    October 2013
    September 2013
    July 2013
    February 2013
    November 2012
    October 2012
    September 2012
    August 2012
    June 2012
    May 2012